WorldWideScience

Sample records for suspicious concealed object

  1. Examination of suspicious objects by virus analysts

    Science.gov (United States)

    Ananin, E. V.; Ananina, I. S.; Nikishova, A. V.

    2018-05-01

    The paper presents data on virus threats urgency. But in order for antiviruses to work properly, all data on new implementations of viruses should be added to its database. For that to be done, all suspicious objects should be investigated. It is a dangerous process and should be done in the virtual system. However, it is not secure for the main system as well. So the diagram of a secure workplace for a virus analyst is proposed. It contains software for its protection. Also all kinds of setting to ensure security of the process of investigating suspicious objects are proposed. The proposed approach allows minimizing risks caused by the virus.

  2. Concealed object segmentation and three-dimensional localization with passive millimeter-wave imaging

    Science.gov (United States)

    Yeom, Seokwon

    2013-05-01

    Millimeter waves imaging draws increasing attention in security applications for weapon detection under clothing. In this paper, concealed object segmentation and three-dimensional localization schemes are reviewed. A concealed object is segmented by the k-means algorithm. A feature-based stereo-matching method estimates the longitudinal distance of the concealed object. The distance is estimated by the discrepancy between the corresponding centers of the segmented objects. Experimental results are provided with the analysis of the depth resolution.

  3. Remote laser drilling and sampling system for the detection of concealed explosives

    Science.gov (United States)

    Wild, D.; Pschyklenk, L.; Theiß, C.; Holl, G.

    2017-05-01

    The detection of hazardous materials like explosives is a central issue in national security in the field of counterterrorism. One major task includes the development of new methods and sensor systems for the detection. Many existing remote or standoff methods like infrared or raman spectroscopy find their limits, if the hazardous material is concealed in an object. Imaging technologies using x-ray or terahertz radiation usually yield no information about the chemical content itself. However, the exact knowledge of the real threat potential of a suspicious object is crucial for disarming the device. A new approach deals with a laser drilling and sampling system for the use as verification detector for suspicious objects. Central part of the system is a miniaturised, diode pumped Nd:YAG laser oscillator-amplifier. The system allows drilling into most materials like metals, synthetics or textiles with bore hole diameters in the micron scale. During the drilling process, the hazardous material can be sampled for further investigation with suitable detection methods. In the reported work, laser induced breakdown spectroscopy (LIBS) is used to monitor the drilling process and to classify the drilled material. Also experiments were carried out to show the system's ability to not ignite even sensitive explosives like triacetone triperoxide (TATP). The detection of concealed hazardous material is shown for different explosives using liquid chromatography and ion mobility spectrometry.

  4. Segmentation of Concealed Objects in Passive Millimeter-Wave Images Based on the Gaussian Mixture Model

    Science.gov (United States)

    Yu, Wangyang; Chen, Xiangguang; Wu, Lei

    2015-04-01

    Passive millimeter wave (PMMW) imaging has become one of the most effective means to detect the objects concealed under clothing. Due to the limitations of the available hardware and the inherent physical properties of PMMW imaging systems, images often exhibit poor contrast and low signal-to-noise ratios. Thus, it is difficult to achieve ideal results by using a general segmentation algorithm. In this paper, an advanced Gaussian Mixture Model (GMM) algorithm for the segmentation of concealed objects in PMMW images is presented. Our work is concerned with the fact that the GMM is a parametric statistical model, which is often used to characterize the statistical behavior of images. Our approach is three-fold: First, we remove the noise from the image using both a notch reject filter and a total variation filter. Next, we use an adaptive parameter initialization GMM algorithm (APIGMM) for simulating the histogram of images. The APIGMM provides an initial number of Gaussian components and start with more appropriate parameter. Bayesian decision is employed to separate the pixels of concealed objects from other areas. At last, the confidence interval (CI) method, alongside local gradient information, is used to extract the concealed objects. The proposed hybrid segmentation approach detects the concealed objects more accurately, even compared to two other state-of-the-art segmentation methods.

  5. Objective Methods for Reliable Detection of Concealed Depression

    Directory of Open Access Journals (Sweden)

    Cynthia eSolomon

    2015-04-01

    Full Text Available Recent research has shown that it is possible to automatically detect clinical depression from audio-visual recordings. Before considering integration in a clinical pathway, a key question that must be asked is whether such systems can be easily fooled. This work explores the potential of acoustic features to detect clinical depression in adults both when acting normally and when asked to conceal their depression. Nine adults diagnosed with mild to moderate depression as per the Beck Depression Inventory (BDI-II and Patient Health Questionnaire (PHQ-9 were asked a series of questions and to read a excerpt from a novel aloud under two different experimental conditions. In one, participants were asked to act naturally and in the other, to suppress anything that they felt would be indicative of their depression. Acoustic features were then extracted from this data and analysed using paired t-tests to determine any statistically significant differences between healthy and depressed participants. Most features that were found to be significantly different during normal behaviour remained so during concealed behaviour. In leave-one-subject-out automatic classification studies of the 9 depressed subjects and 8 matched healthy controls, an 88% classification accuracy and 89% sensitivity was achieved. Results remained relatively robust during concealed behaviour, with classifiers trained on only non-concealed data achieving 81% detection accuracy and 75% sensitivity when tested on concealed data. These results indicate there is good potential to build deception-proof automatic depression monitoring systems.

  6. Concealing with structured light.

    Science.gov (United States)

    Sun, Jingbo; Zeng, Jinwei; Wang, Xi; Cartwright, Alexander N; Litchinitser, Natalia M

    2014-02-13

    While making objects less visible (or invisible) to a human eye or a radar has captured people's imagination for centuries, current attempts towards realization of this long-awaited functionality range from various stealth technologies to recently proposed cloaking devices. A majority of proposed approaches share a number of common deficiencies such as design complexity, polarization effects, bandwidth, losses and the physical size or shape requirement complicating their implementation especially at optical frequencies. Here we demonstrate an alternative way to conceal macroscopic objects by structuring light itself. In our approach, the incident light is transformed into an optical vortex with a dark core that can be used to conceal macroscopic objects. Once such a beam passed around the object it is transformed back into its initial Gaussian shape with minimum amplitude and phase distortions. Therefore, we propose to use that dark core of the vortex beam to conceal an object that is macroscopic yet small enough to fit the dark (negligibly low intensity) region of the beam. The proposed concealing approach is polarization independent, easy to fabricate, lossless, operates at wavelengths ranging from 560 to 700 nm, and can be used to hide macroscopic objects providing they are smaller than vortex core.

  7. Impulse radar imaging system for concealed object detection

    Science.gov (United States)

    Podd, F. J. W.; David, M.; Iqbal, G.; Hussain, F.; Morris, D.; Osakue, E.; Yeow, Y.; Zahir, S.; Armitage, D. W.; Peyton, A. J.

    2013-10-01

    Electromagnetic systems for imaging concealed objects at checkpoints typically employ radiation at millimetre and terahertz frequencies. These systems have been shown to be effective and provide a sufficiently high resolution image. However there are difficulties and current electromagnetic systems have limitations particularly in accurately differentiating between threat and innocuous objects based on shape, surface emissivity or reflectivity, which are indicative parameters. In addition, water has a high absorption coefficient at millimetre wavelength and terahertz frequencies, which makes it more difficult for these frequencies to image through thick damp clothing. This paper considers the potential of using ultra wideband (UWB) in the low gigahertz range. The application of this frequency band to security screening appears to be a relatively new field. The business case for implementing the UWB system has been made financially viable by the recent availability of low-cost integrated circuits operating at these frequencies. Although designed for the communication sector, these devices can perform the required UWB radar measurements as well. This paper reports the implementation of a 2 to 5 GHz bandwidth linear array scanner. The paper describes the design and fabrication of transmitter and receiver antenna arrays whose individual elements are a type of antipodal Vivaldi antenna. The antenna's frequency and angular response were simulated in CST Microwave Studio and compared with laboratory measurements. The data pre-processing methods of background subtraction and deconvolution are implemented to improve the image quality. The background subtraction method uses a reference dataset to remove antenna crosstalk and room reflections from the dataset. The deconvolution method uses a Wiener filter to "sharpen" the returned echoes which improves the resolution of the reconstructed image. The filter uses an impulse response reference dataset and a signal

  8. Development and validation of the Body Concealment Scale for Scleroderma

    NARCIS (Netherlands)

    Jewett, L.R.; Malcarne, V.L.; Kwakkenbos, C.M.C.; Harcourt, D.; Rumsey, N.; Körner, A.; Steele, R.J.; Hudson, M.; Baron, M.; Haythornthwaite, J.A.; Heinberg, L.; Wigley, F.M.; Thombs, B.D.

    2016-01-01

    Objective: Body concealment is a component of social avoidance among people with visible differences from disfiguring conditions, including systemic sclerosis (SSc). The study objective was to develop a measure of body concealment related to avoidance behaviors in SSc. Methods: Initial items for the

  9. Concealed identification symbols and nondestructive determination of the identification symbols

    Science.gov (United States)

    Nance, Thomas A.; Gibbs, Kenneth M.

    2014-09-16

    The concealing of one or more identification symbols into a target object and the subsequent determination or reading of such symbols through non-destructive testing is described. The symbols can be concealed in a manner so that they are not visible to the human eye and/or cannot be readily revealed to the human eye without damage or destruction of the target object. The identification symbols can be determined after concealment by e.g., the compilation of multiple X-ray images. As such, the present invention can also provide e.g., a deterrent to theft and the recovery of lost or stolen objects.

  10. Self-Concealment and Suicidal Behaviors

    Science.gov (United States)

    Friedlander, Adam; Nazem, Sarra; Fiske, Amy; Nadorff, Michael R.; Smith, Merideth D.

    2012-01-01

    Understanding self-concealment, the tendency to actively conceal distressing personal information from others, may be important in developing effective ways to help individuals with suicidal ideation. No published study has yet assessed the relation between self-concealment and suicidal behaviors. Additionally, most self-concealment research has…

  11. Expanded opportunities of THz passive camera for the detection of concealed objects

    Science.gov (United States)

    Trofimov, Vyacheslav A.; Trofimov, Vladislav V.; Kuchik, Igor E.

    2013-10-01

    Among the security problems, the detection of object implanted into either the human body or animal body is the urgent problem. At the present time the main tool for the detection of such object is X-raying only. However, X-ray is the ionized radiation and therefore can not be used often. Other way for the problem solving is passive THz imaging using. In our opinion, using of the passive THz camera may help to detect the object implanted into the human body under certain conditions. The physical reason of such possibility arises from temperature trace on the human skin as a result of the difference in temperature between object and parts of human body. Modern passive THz cameras have not enough resolution in temperature to see this difference. That is why, we use computer processing to enhance the passive THz camera resolution for this application. After computer processing of images captured by passive THz camera TS4, developed by ThruVision Systems Ltd., we may see the pronounced temperature trace on the human body skin from the water, which is drunk by person, or other food eaten by person. Nevertheless, there are many difficulties on the way of full soution of this problem. We illustrate also an improvement of quality of the image captured by comercially available passive THz cameras using computer processing. In some cases, one can fully supress a noise on the image without loss of its quality. Using computer processing of the THz image of objects concealed on the human body, one may improve it many times. Consequently, the instrumental resolution of such device may be increased without any additional engineering efforts.

  12. Flow detection via sparse frame analysis for suspicious event recognition in infrared imagery

    Science.gov (United States)

    Fernandes, Henrique C.; Batista, Marcos A.; Barcelos, Celia A. Z.; Maldague, Xavier P. V.

    2013-05-01

    It is becoming increasingly evident that intelligent systems are very bene¯cial for society and that the further development of such systems is necessary to continue to improve society's quality of life. One area that has drawn the attention of recent research is the development of automatic surveillance systems. In our work we outline a system capable of monitoring an uncontrolled area (an outside parking lot) using infrared imagery and recognizing suspicious events in this area. The ¯rst step is to identify moving objects and segment them from the scene's background. Our approach is based on a dynamic background-subtraction technique which robustly adapts detection to illumination changes. It is analyzed only regions where movement is occurring, ignoring in°uence of pixels from regions where there is no movement, to segment moving objects. Regions where movement is occurring are identi¯ed using °ow detection via sparse frame analysis. During the tracking process the objects are classi¯ed into two categories: Persons and Vehicles, based on features such as size and velocity. The last step is to recognize suspicious events that may occur in the scene. Since the objects are correctly segmented and classi¯ed it is possible to identify those events using features such as velocity and time spent motionless in one spot. In this paper we recognize the suspicious event suspicion of object(s) theft from inside a parked vehicle at spot X by a person" and results show that the use of °ow detection increases the recognition of this suspicious event from 78:57% to 92:85%.

  13. Video error concealment using block matching and frequency selective extrapolation algorithms

    Science.gov (United States)

    P. K., Rajani; Khaparde, Arti

    2017-06-01

    Error Concealment (EC) is a technique at the decoder side to hide the transmission errors. It is done by analyzing the spatial or temporal information from available video frames. It is very important to recover distorted video because they are used for various applications such as video-telephone, video-conference, TV, DVD, internet video streaming, video games etc .Retransmission-based and resilient-based methods, are also used for error removal. But these methods add delay and redundant data. So error concealment is the best option for error hiding. In this paper, the error concealment methods such as Block Matching error concealment algorithm is compared with Frequency Selective Extrapolation algorithm. Both the works are based on concealment of manually error video frames as input. The parameter used for objective quality measurement was PSNR (Peak Signal to Noise Ratio) and SSIM(Structural Similarity Index). The original video frames along with error video frames are compared with both the Error concealment algorithms. According to simulation results, Frequency Selective Extrapolation is showing better quality measures such as 48% improved PSNR and 94% increased SSIM than Block Matching Algorithm.

  14. Open-area concealed-weapon detection system

    Science.gov (United States)

    Pati, P.; Mather, P.

    2011-06-01

    Concealed Weapon Detection (CWD) has become a significant challenge to present day security needs; individuals carrying weapons into airplanes, schools, and secured establishments are threat to public security. Although controlled screening, of people for concealed weapons, has been employed in many establishments, procedures and equipment are designed to work in restricted environments like airport passport control, military checkpoints, hospitals, school and university entrance. Furthermore, screening systems do not effectively decipher between threat and non-threat metal objects, thus leading to high rate of false alarms which can become a liability to daily operational needs of establishments. Therefore, the design and development of a new CWD system to operate in a large open area environment with large numbers of people reduced incidences of false alarms and increased location accuracy is essential.

  15. Induction detection of concealed bulk banknotes

    Science.gov (United States)

    Fuller, Christopher; Chen, Antao

    2012-06-01

    The smuggling of bulk cash across borders is a serious issue that has increased in recent years. In an effort to curb the illegal transport of large numbers of paper bills, a detection scheme has been developed, based on the magnetic characteristics of bank notes. The results show that volumes of paper currency can be detected through common concealing materials such as plastics, cardboard, and fabrics making it a possible potential addition to border security methods. The detection scheme holds the potential of also reducing or eliminating false positives caused by metallic materials found in the vicinity, by observing the stark difference in received signals caused by metal and currency. The detection scheme holds the potential to detect for both the presence and number of concealed bulk notes, while maintaining the ability to reduce false positives caused by metal objects.

  16. A Suspicious Action Detection System Considering Time Series

    Science.gov (United States)

    Kozuka, Noriaki; Kimura, Koji; Hagiwara, Masafumi

    The paper proposes a new system that can detect suspicious actions such as a car break-in and surroundings in an open space parking, based on image processing. The proposed system focuses on three points of “order”, “time”, and “location” of human actions. The proposed system has the following features: it 1) deals time series data flow, 2) estimates human actions and the location, 3) extracts suspicious action detection rules automatically, 4) detects suspicious actions using the suspicious score. We carried out experiments using real image sequences. As a result, we obtained about 7.8% higher estimation rate than the conventional system.

  17. CT diagnosis of concealed rupture of intestine following abdominal trauma

    International Nuclear Information System (INIS)

    Ji Jiansong; Wei Tiemin; Wang Zufei; Zhao Zhongwei; Tu Jianfei; Fan Xiaoxi; Xu Min

    2009-01-01

    Objective: To investigate CT findings of concealed rupture of intestine following abdominal trauma. Methods: CT findings of 11 cases with concealed rupture of intestine following abdominal trauma proved by surgery were identified retrospectively. Results: The main special signs included: (1) Free air in 4 cases, mainly around injured small bowel or under the diaphragm, or in the retroperitoneal space or and in the lump. (2) High density hematoma between the intestines or in the bowel wall (4 cases). (3) Bowel wall injury sign, demonstrated as low density of the injured intestinal wall, attenuated locally but relatively enhanced in neighbor wall on enhanced CT. (4) Lump around the injured bowel wall with obvious ring-shaped enhancement (4 cases). Other signs included: (1) Free fluid in the abdominal cavity or between the intestines with blurred borders. (2) Bowel obstruction. Conclusion: CT is valuable in diagnosing concealed rupture of intestine following abdominal trauma. (authors)

  18. Concealable Stigmatized Identities and Psychological Well-Being

    OpenAIRE

    Quinn, Diane M.; Earnshaw, Valerie A.

    2013-01-01

    Many people have concealable stigmatized identities: Identities that can be hidden from others and that are socially devalued and negatively stereotyped. Understanding how these concealable stigmatized identities affect psychological well-being is critical. We present our model of the components of concealable stigmatized identities including valenced content – internalized stigma, experienced discrimination, anticipated stigma, disclosure reactions, and counter-stereotypic/positive informati...

  19. Theory of the Concealed Information Test

    NARCIS (Netherlands)

    Verschuere, B.; Ben-Shakhar, G.; Verschuere, B.; Ben-Shakhar, G.; Meijer, E.

    2011-01-01

    It is now well established that physiological measures can be validly used to detect concealed information. An important challenge is to elucidate the underlying mechanisms of concealed information detection. We review theoretical approaches that can be broadly classified in two major categories:

  20. Sonographic findings of thyroid cancer initially assessed as no suspicious malignancy

    International Nuclear Information System (INIS)

    Kim, Do Youn; Kang, Seok Seon; Ji, Eun Kyung; Kwon, Tae Hee; Park, Hae Lin; Shim, Jeong Yun

    2008-01-01

    To review the retrospective imaging findings of thyroid cancer initially assessed as no suspicious malignancy. Of 338 nodules confirmed to be thyroid cancer, this study included 38 patients with 39 nodules assessed as no suspicious malignancy on initial sonography. (mean age:39 years, 36 females and 2 males). We evaluated sonographic findings by shape, margin, echogenecity, calcification, cystic degeneration and peripheral hypoechoic rim retrospectively. We analyzed whether sonographic findings were different according to the size (standard:1 cm). The most frequent sonographic findings were avoid to round shape 90%, well-defined smooth margin 64%, hypoechogenecity 54%, no calcification 92%, no cystic degeneration 77% and peripheral hypoechoic rim 56%. Suspicious malignancy findings were taller than wide shape 10%, well-defined spiculated margin 36%, markedly hypoechogenecity 10% and microcalcifications 8%. Isoechogenecity, cystic degeneration and peripheral hypoechoic rim were common in 1 cm more than nodules. Well-defined spiculated margin was common in 1 cm less than nodules. In retrospective, 56% showed no suspicious malignancy finding. Although nodules assessed as no suspicious malignancy on initial US had many retrospectively suspicious malignancy findings, still many nodules showed no suspicious malignancy finding. Suspicious findings were ignored due to equivocal finding in small size, isoechogenecity, cystic degeneration or peripheral hypoechoic rim. We need careful observation

  1. Validation of the Body Concealment Scale for Scleroderma (BCSS): Replication in the Scleroderma Patient-centered Intervention Network (SPIN) Cohort

    NARCIS (Netherlands)

    Jewett, L.R.; Kwakkenbos, C.M.C.; Carrier, M.E.; Malcarne, V.L.; Harcourt, D.; Rumsey, N.; Mayes, M.D.; Assassi, S.; Körner, A.; Fox, R.S.; Gholizadeh, S.; Mills, S.D.; Fortune, C.; Thombs, B.D.

    2017-01-01

    Body concealment is an important component of appearance distress for individuals with disfiguring conditions, including scleroderma. The objective was to replicate the validation study of the Body Concealment Scale for Scleroderma (BCSS) among 897 scleroderma patients. The factor structure of the

  2. 75 FR 75586 - Confidentiality of Suspicious Activity Reports

    Science.gov (United States)

    2010-12-03

    ...] RIN 1550-AC26 Confidentiality of Suspicious Activity Reports AGENCY: The Office of Thrift Supervision... implementing the Bank Secrecy Act (BSA) governing the confidentiality of a suspicious activity report (SAR) to... corporations regulated by the OTS, to keep certain records and make certain reports that have been determined...

  3. 75 FR 75576 - Confidentiality of Suspicious Activity Reports

    Science.gov (United States)

    2010-12-03

    ...-2010-0019] RIN 1557-AD17 Confidentiality of Suspicious Activity Reports AGENCY: The Office of the... suspicious activity report (SAR) to: clarify the scope of the statutory prohibition on the disclosure by a... institutions, including national banks regulated by the OCC, to keep certain records and make certain reports...

  4. SUSPICIOUS POST

    CERN Multimedia

    Relations with the Host States Service

    2001-01-01

    If you receive a suspicious letter or package in the post, please do not open it and contact the Fire Brigade Tel. 74444. They will contact the CERN Medical Service. This is especially important in today's current situation with regard to the Anthrax scare. For further information, the Permanent Mission of Switzerland to the International Organisations in Geneva recommends the following web sites:   http://www.admin.ch/ch/f/cf/brennpunkt/03.html http://www.who.int/emc-documents/zoonoses/whoemczdi986c.html

  5. Suspicious amorphous microcalcifications detected on full-field digital mammography: correlation with histopathology

    Directory of Open Access Journals (Sweden)

    Vera Christina Camargo de Siqueira Ferreira

    2018-03-01

    Full Text Available Abstract Objective: To evaluate suspicious amorphous calcifications diagnosed on full-field digital mammography (FFDM and establish correlations with histopathology findings. Materials and Methods: This was a retrospective study of 78 suspicious amorphous calcifications (all classified as BI-RADS® 4 detected on FFDM. Vacuum-assisted breast biopsy (VABB was performed. The histopathological classification of VABB core samples was as follows: pB2 (benign; pB3 (uncertain malignant potential; pB4 (suspicion of malignancy; and pB5 (malignant. Treatment was recommended for pB5 lesions. To rule out malignancy, surgical excision was recommended for pB3 and pB4 lesions. Patients not submitted to surgery were followed for at least 6 months. Results: Among the 78 amorphous calcifications evaluated, the histopathological analysis indicated that 8 (10.3% were malignant/suspicious (6 classified as pB5 and 2 classified as pB4 and 36 (46.2% were benign (classified as pB2. The remaining 34 lesions (43.6% were classified as pB3: 33.3% were precursor lesions (atypical ductal hyperplasia, lobular neoplasia, or flat epithelial atypia and 10.3% were high-risk lesions. For the pB3 lesions, the underestimation rate was zero. Conclusion: The diagnosis of precursor lesions (excluding atypical ductal hyperplasia, which can be pB4 depending on the severity and extent of the lesion should not necessarily be considered indicative of underestimation of malignancy. Suspicious amorphous calcifications correlated more often with precursor lesions than with malignant lesions, at a ratio of 3:1.

  6. Neural Correlates of Suspiciousness and Interactions with Anxiety during Emotional and Neutral Word Processing

    Directory of Open Access Journals (Sweden)

    Joscelyn E Fisher

    2014-06-01

    Full Text Available Suspiciousness is usually classified as a symptom of psychosis, but it also occurs in depression and anxiety disorders. Though how suspiciousness overlaps with depression is not obvious, suspiciousness does seem to overlap with anxious apprehension and anxious arousal (e.g., verbal iterative processes and vigilance about environmental threat. However, suspiciousness also has unique characteristics (e.g., concern about harm from others and vigilance about social threat. Given that both anxiety and suspiciousness have been associated with abnormalities in emotion processing, it is unclear whether it is the unique characteristics of suspiciousness or the overlap with anxiety that drive abnormalities in emotion processing.. Event-related brain potentials were obtained during an emotion-word Stroop task. Results indicated that suspiciousness interacts with anxious apprehension to modulate initial stimulus perception processes. Suspiciousness is associated with attention to all stimuli regardless of emotion content. In contrast, anxious arousal is associated with a later response to emotion stimuli only. These results suggest that suspiciousness and anxious apprehension share overlapping processes, but suspiciousness alone is associated with a hyperactive early vigilance response. Depression did not interact with suspiciousness to predict response to emotion stimuli. These findings suggest that it may be informative to assess suspiciousness in conjunction with anxiety in order to better understand how these symptoms interact and contribute to dysfunctional emotion processing.

  7. Induction detection of concealed bulk banknotes

    International Nuclear Information System (INIS)

    Fuller, Christopher; Chen, Antao

    2011-01-01

    Bulk cash smuggling is a serious issue that has grown in volume in recent years. By building on the magnetic characteristics of paper currency, induction sensing is found to be capable of quickly detecting large masses of banknotes. The results show that this method is effective in detecting bulk cash through concealing materials such as plastics, cardboards, fabrics and aluminum foil. The significant difference in the observed phase between the received signals caused by conducting materials and ferrite compounds, found in banknotes, provides a good indication that this process can overcome the interference by metal objects in a real sensing application. This identification strategy has the potential to not only detect the presence of banknotes, but also the number, while still eliminating false positives caused by metal objects

  8. Color image fusion for concealed weapon detection

    NARCIS (Netherlands)

    Toet, A.

    2003-01-01

    Recent advances in passive and active imaging sensor technology offer the potential to detect weapons that are concealed underneath a person's clothing or carried along in bags. Although the concealed weapons can sometimes easily be detected, it can be difficult to perceive their context, due to the

  9. Intra- and interpersonal consequences of experimentally induced concealment

    NARCIS (Netherlands)

    Bouman, T.K.

    2003-01-01

    Secrecy, concealment, and thought supression are assumed to be important aspects of psychopathology. However, most studies address these from an intrapersonal perspective. This study investigates both the intra- as well as the interpersonal consequences of experimentally induced concealment. Two

  10. A Concealed Car Extraction Method Based on Full-Waveform LiDAR Data

    Directory of Open Access Journals (Sweden)

    Chuanrong Li

    2016-01-01

    Full Text Available Concealed cars extraction from point clouds data acquired by airborne laser scanning has gained its popularity in recent years. However, due to the occlusion effect, the number of laser points for concealed cars under trees is not enough. Thus, the concealed cars extraction is difficult and unreliable. In this paper, 3D point cloud segmentation and classification approach based on full-waveform LiDAR was presented. This approach first employed the autocorrelation G coefficient and the echo ratio to determine concealed cars areas. Then the points in the concealed cars areas were segmented with regard to elevation distribution of concealed cars. Based on the previous steps, a strategy integrating backscattered waveform features and the view histogram descriptor was developed to train sample data of concealed cars and generate the feature pattern. Finally concealed cars were classified by pattern matching. The approach was validated by full-waveform LiDAR data and experimental results demonstrated that the presented approach can extract concealed cars with accuracy more than 78.6% in the experiment areas.

  11. Thyroid nodules with highly suspicious ultrasonographic features, but with benign cytology on two occasions: is malignancy still possible?

    International Nuclear Information System (INIS)

    Rosario, Pedro Weslley; Calsolari, Maria Regina

    2016-01-01

    There is no information about the frequency of malignancy specifically in the case of thyroid nodules with highly suspicious sonographic features, but with two fine needle aspiration (FNA) showing benign cytology. This was the objective of the study. Subjects and methods: We report the results of 105 patients with thyroid nodules considered 'highly suspicious' according to the ultrasonographic classification of American Thyroid Association, in whom FNA revealed benign cytology on two occasions (interval of 6 months). Results: Thyroidectomy was performed in 11 cases due to desire of the patient or significant growth of the nodule. In these patients, cytology continued to be benign in 9, was non-diagnostic in 1, and suspicious in 1. Histology revealed papillary carcinoma in only one nodule. In patients in whom a third FNA was obtained for this study (n = 94), cytology continued to be benign in 86, became non-diagnostic in 5, indeterminate in 2, and suspicious in 1. The last 8 patients (with non-benign cytology) were submitted to thyroidectomy and histology revealed malignancy in only one nodule. Conclusion: The rate of malignancy found here for nodules with highly suspicious sonographic features, even after two FNA showing benign cytology, was 2%. We believe that in these cases, the continuation of follow-up consisting of ultrasound at intervals of 2 years may still be adequate. (author)

  12. Thyroid nodules with highly suspicious ultrasonographic features, but with benign cytology on two occasions: is malignancy still possible?

    Energy Technology Data Exchange (ETDEWEB)

    Rosario, Pedro Weslley; Calsolari, Maria Regina, E-mail: pedrowsrosario@gmail.com [Santa Casa de Belo Horizonte, MG (Brazil)

    2016-11-01

    There is no information about the frequency of malignancy specifically in the case of thyroid nodules with highly suspicious sonographic features, but with two fine needle aspiration (FNA) showing benign cytology. This was the objective of the study. Subjects and methods: We report the results of 105 patients with thyroid nodules considered 'highly suspicious' according to the ultrasonographic classification of American Thyroid Association, in whom FNA revealed benign cytology on two occasions (interval of 6 months). Results: Thyroidectomy was performed in 11 cases due to desire of the patient or significant growth of the nodule. In these patients, cytology continued to be benign in 9, was non-diagnostic in 1, and suspicious in 1. Histology revealed papillary carcinoma in only one nodule. In patients in whom a third FNA was obtained for this study (n = 94), cytology continued to be benign in 86, became non-diagnostic in 5, indeterminate in 2, and suspicious in 1. The last 8 patients (with non-benign cytology) were submitted to thyroidectomy and histology revealed malignancy in only one nodule. Conclusion: The rate of malignancy found here for nodules with highly suspicious sonographic features, even after two FNA showing benign cytology, was 2%. We believe that in these cases, the continuation of follow-up consisting of ultrasound at intervals of 2 years may still be adequate. (author)

  13. Quantum Image Steganography and Steganalysis Based On LSQu-Blocks Image Information Concealing Algorithm

    Science.gov (United States)

    A. AL-Salhi, Yahya E.; Lu, Songfeng

    2016-08-01

    Quantum steganography can solve some problems that are considered inefficient in image information concealing. It researches on Quantum image information concealing to have been widely exploited in recent years. Quantum image information concealing can be categorized into quantum image digital blocking, quantum image stereography, anonymity and other branches. Least significant bit (LSB) information concealing plays vital roles in the classical world because many image information concealing algorithms are designed based on it. Firstly, based on the novel enhanced quantum representation (NEQR), image uniform blocks clustering around the concrete the least significant Qu-block (LSQB) information concealing algorithm for quantum image steganography is presented. Secondly, a clustering algorithm is proposed to optimize the concealment of important data. Finally, we used Con-Steg algorithm to conceal the clustered image blocks. Information concealing located on the Fourier domain of an image can achieve the security of image information, thus we further discuss the Fourier domain LSQu-block information concealing algorithm for quantum image based on Quantum Fourier Transforms. In our algorithms, the corresponding unitary Transformations are designed to realize the aim of concealing the secret information to the least significant Qu-block representing color of the quantum cover image. Finally, the procedures of extracting the secret information are illustrated. Quantum image LSQu-block image information concealing algorithm can be applied in many fields according to different needs.

  14. Computed tomography is not justified in every pediatric blunt trauma patient with a suspicious mechanism of injury.

    Science.gov (United States)

    Hershkovitz, Yehuda; Zoarets, Itai; Stepansky, Albert; Kozer, Eran; Shapira, Zahar; Klin, Baruch; Halevy, Ariel; Jeroukhimov, Igor

    2014-07-01

    Computed tomography (CT) has become an important tool for the diagnosis of intra-abdominal and chest injuries in patients with blunt trauma. The role of CT in conscious asymptomatic patients with a suspicious mechanism of injury remains controversial. This controversy intensifies in the management of pediatric blunt trauma patients, who are much more susceptible to radiation exposure. The objective of this study was to evaluate the role of abdominal and chest CT imaging in asymptomatic pediatric patients with a suspicious mechanism of injury. Forty-two pediatric patients up to 15 years old were prospectively enrolled. All patients presented with a suspicious mechanism of blunt trauma and multisystem injury. They were neurologically intact and had no signs of injury to the abdomen or chest. Patients underwent CT imaging of the chest and abdomen as part of the initial evaluation. Thirty-one patients (74%) had a normal CT scan. Two patients of 11 with an abnormal CT scan required a change in management and were referred for observation in the Intensive Care Unit. None of the patients required surgical intervention. The routine use of CT in asymptomatic pediatric patients with a suspicious mechanism of blunt trauma injury is not justified. Copyright © 2014 Elsevier Inc. All rights reserved.

  15. 31 CFR 103.21 - Reports by casinos of suspicious transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Reports by casinos of suspicious....21 Reports by casinos of suspicious transactions. (a) General. (1) Every casino shall file with Fin... relevant to a possible violation of law or regulation. A casino may also file with FinCEN, by using the...

  16. Event-related potential correlates of suspicious thoughts in individuals with schizotypal personality features.

    Science.gov (United States)

    Li, Xue-bing; Huang, Jia; Cheung, Eric F C; Gong, Qi-yong; Chan, Raymond C K

    2011-01-01

    Suspiciousness is a common feature of schizophrenia. However, suspicious thoughts are also commonly experienced by the general population. This study aimed to examine the underlying neural mechanism of suspicious thoughts in individuals with and without schizotypal personality disorder (SPD)-proneness, using an event-related potential (ERP) paradigm. Electroencephalography (EEG) was recorded when the "feeling of being seen through" was evoked in the participants. The findings showed a prominent positive deflection of the difference wave within the time window 250-400 ms after stimuli presentation in both SPD-prone and non-SPD-prone groups. Furthermore, the P3 amplitude was significantly reduced in the SPD-prone group compared to the non-SPD-prone group. The current density analysis also indicated hypoactivity in both frontal and temporal regions in the SPD-prone group, suggesting that the frontotemporal cortical network may play a role in the onset of suspicious thoughts. The P3 of difference wave was inversely correlated with the cognitive-perception factor and the suspiciousness/paranoid ideation trait, which provided preliminary electrophysiological evidence for the association of suspiciousness with SPD features.

  17. Management of concealed penis with modified penoplasty.

    Science.gov (United States)

    Xu, Jian-Guo; Lv, Chuan; Wang, Yu-Chong; Zhu, Ji; Xue, Chun-Yu

    2015-03-01

    To investigate the effect of penile degloving in combination with penoscrotal angle reconstruction for the correction of concealed penis. A foreskin circumcision incision was made along the coronal sulcus. After a sharp dissection under the superficial layer of tunica albuginea, the penile shaft was degloved to release the fibrous bands of the tunica dartos. Through a longitudinal incision or Z-plasty at the penoscrotal junction, securing of the tunica albuginea to the proximal tunica dartos was performed. The penoscrotal angle was reconstructed. This procedure effectively corrected the concealed penis, while correcting other problems such as phimosis. From August 2008 to August 2013, we performed 41 procedures for concealed penis. Correction was successful in all patients with an improved median length of 2.1 cm in the flaccid state. Follow-up ranged from 6 months to 2 years, and satisfactory cosmetic outcomes were obtained without scars or erectile discomfort. Our technique includes degloving and penoscrotal angle reconstruction, which provides proper visualization for fixation of the penile base. The longitudinal or Z-plasty incision also opened the degloving dead cavity, which was good for drainage. The procedure is straight forward with good functional and cosmetic outcomes and is thus ideal for correction of the concealed penis. Copyright © 2015 Elsevier Inc. All rights reserved.

  18. Concealing Emotions at Work Is Associated with Allergic Rhinitis in Korea.

    Science.gov (United States)

    Seok, Hongdeok; Yoon, Jin-Ha; Won, Jong-Uk; Lee, Wanhyung; Lee, June-Hee; Jung, Pil Kyun; Roh, Jaehoon

    2016-01-01

    Concealing emotions at work can cause considerable psychological stress. While there is extensive research on the adverse health effects of concealing emotions and the association between allergic diseases and stress, research has not yet investigated whether concealing emotions at work is associated with allergic rhinitis. Allergic rhinitis is a common disease in many industrialized countries, and its prevalence is increasing. Thus, our aim was to determine the strength of this association using data from three years (2007-2009) of the 4th Korean National Health and Nutrition Examination Survey. Participants (aged 20-64) were 8,345 individuals who were economically active and who had completed the questionnaire items on concealing emotions at work. Odds ratio (OR) and 95% confidence intervals (95% CIs) were calculated for allergic rhinitis using logistic regression models. Among all participants, 3,140 subjects (37.6%) reported concealing their emotions at work: 1,661 men and 1,479 women. The OR (95% CIs) for allergic rhinitis among those who concealed emotions at work versus those who did not was 1.318 (1.148-1.512). Stratified by sex, the OR (95% CIs) was 1.307 (1.078-1.585) among men and 1.346 (1.105-1.639) among women. Thus, individuals who concealed their emotions at work were significantly more likely to have a diagnosis of AR in comparison to those who did not. Because concealing emotions at work has adverse health effects, labor policies that aim to reduce this practice are needed.

  19. Unsupervised image segmentation for passive THz broadband images for concealed weapon detection

    Science.gov (United States)

    Ramírez, Mabel D.; Dietlein, Charles R.; Grossman, Erich; Popović, Zoya

    2007-04-01

    This work presents the application of a basic unsupervised classification algorithm for the segmentation of indoor passive Terahertz images. The 30,000 pixel broadband images of a person with concealed weapons under clothing are taken at a range of 0.8-2m over a frequency range of 0.1-1.2THz using single-pixel row-based raster scanning. The spiral-antenna coupled 36x1x0.02μm Nb bridge cryogenic micro-bolometers are developed at NIST-Optoelectronics Division. The antenna is evaporated on a 250μm thick Si substrate with a 4mm diameter hyper-hemispherical Si lens. The NETD of the microbolometer is 125mK at an integration time of 30 ms. The background temperature calibration is performed with a known 25 pixel source above 330 K, and a measured background fluctuation of 200-500mK. Several weapons were concealed under different fabrics: cotton, polyester, windblocker jacket and thermal sweater. Measured temperature contrasts ranged from 0.5-1K for wrinkles in clothing to 5K for a zipper and 8K for the concealed weapon. In order to automate feature detection in the images, some image processing and pattern recognition techniques have been applied and the results are presented here. We show that even simple algorithms, that can potentially be performed in real time, are capable of differentiating between a metal and a dielectric object concealed under clothing. Additionally, we show that pre-processing can reveal low temperature contrast features, such as folds in clothing.

  20. Psychopathy and Physiological Detection of Concealed Information: A review

    Directory of Open Access Journals (Sweden)

    Bruno Verschuere

    2006-03-01

    Full Text Available The Concealed Information Test has been advocated as the preferred method for deception detection using the polygraph ("lie detector". The Concealed Information Test is argued to be a standardised, highly accurate psychophysiological test founded on the orienting reflex. The validity of polygraph tests for the assessment of psychopathic individuals has, however, been questioned. Two dimensions are said to underlie psychopathy: emotional detachment and antisocial behaviour. Distinct psychophysiological correlates are hypothesised in these facets of psychopathy. Emotional detachment is associated with deficient fear-potentiated startle, and antisocial behaviour with reduced orienting. Few studies have examined the effect of psychopathy on the validity of the Concealed Information Test. This review suggests that reduced orienting in high antisocial individuals is also found in the Concealed Information Test, thereby threatening its validity. Implications for criminal investigations, possible solutions and directions for future research will be discussed.

  1. Money laundering: correlation between risk assessment and suspicious transactions

    Directory of Open Access Journals (Sweden)

    Sonja Cindori

    2013-06-01

    Full Text Available The risk assessment system was introduced in the Republic of Croatia in 2009, as a result of harmonization with international standards, especially the Directive 2005/60/EC on the prevention of the use of the financial system for the purpose of money laundering and terrorist financing. Risk assessment is an extensive concept which requires not only a legislative framework, but also the application of numerous criteria for its effective implementation in practice. Among these criteria are suspicious transactions, closely related to the assessment of the customer, transaction, product or service.The undeniable contribution of suspicious transactions to the quality of the risk assessment system will be confirmed by a statistical analysis of a number of West and East European countries. A combination of strict, but sufficiently flexible legal provisions governing the system for prevention of money laundering and terrorist financing and a statistical analysis of reported suspicious transactions will lead to conclusions that either support or represent criticism of the efficiency of application of the risk assessment system in practice.The aforementioned statistical analysis will show whether suspicious transactions are a reliable criterion for the risk assessment analysis, and whether they can be considered the only such criterion. There is a possibility that the findings of the analysis will be contradictory to those of some international studies.

  2. Modified penoplasty for concealed penis in children.

    Science.gov (United States)

    Yang, Tianyou; Zhang, Liyu; Su, Cheng; Li, Zhongmin; Wen, Yingquan

    2013-09-01

    To report a modified penoplasty technique for concealed penis in children. Between January 2006 and June 2012, 201 cases of concealed penis were surgically repaired with modified penoplasty. The modified penoplasty technique consisted of 3 major steps: (1) degloved the penile skin and excised the inner prepuce, (2) advanced penoscrotal skin to cover penile shaft, and (3) fixed the penis base and reconstructed the penoscrotal angle. Two hundred one cases of concealed penis were enrolled in this study over a period of 6 years. Mean age at the time of surgery was 5.3 years (range 1-13 years) and mean operative time was 40 minutes (range 30-65minutes). All patients were routinely followed up at 1, 3, and 6 months after surgery. Most patients developed postoperative edema and were resolved within 1 month, whereas 20 cases developed prolonged postoperative edema, especially at the site of frenulum, which took 3 months to be resolved. Ten cases had retraction after surgery. No erection difficulties were recorded. Patients/parents reported better hygiene and improved visualization and accessibility of penis after surgery and were satisfied with the cosmetic outcome. The result of this study shows that the modified penoplasty technique is a simple, safe, and effective procedure for concealed penis with satisfied cosmetic outcome. Copyright © 2013 Elsevier Inc. All rights reserved.

  3. Management of a Concealable Stigmatized Identity: A Qualitative Study of Concealment, Disclosure, and Role Flexing Among Young, Resilient Sexual and Gender Minority Individuals.

    Science.gov (United States)

    Bry, Laura Jane; Mustanski, Brian; Garofalo, Robert; Burns, Michelle Nicole

    2017-01-01

    Disclosure of a sexual or gender minority status has been associated with both positive and negative effects on wellbeing. Few studies have explored the disclosure and concealment process in young people. Interviews were conducted with 10 sexual and/or gender minority individuals, aged 18-22 years, of male birth sex. Data were analyzed qualitatively, yielding determinants and effects of disclosure and concealment. Determinants of disclosure included holding positive attitudes about one's identity and an implicit devaluation of acceptance by society. Coming out was shown to have both positive and negative effects on communication and social support and was associated with both increases and decreases in experiences of stigma. Determinants of concealment included lack of comfort with one's identity and various motivations to avoid discrimination. Concealment was also related to hypervigilance and unique strategies of accessing social support. Results are discussed in light of their clinical implications.

  4. 12 CFR 21.11 - Suspicious Activity Report.

    Science.gov (United States)

    2010-01-01

    ... or a suspicious transaction related to a money laundering activity or a violation of the Bank Secrecy... of suspects. (4) Transactions aggregating $5,000 or more that involve potential money laundering or...

  5. An Exploratory Investigation of Social Stigma and Concealment in Patients with Multiple Sclerosis.

    Science.gov (United States)

    Cook, Jonathan E; Germano, Adriana L; Stadler, Gertraud

    2016-01-01

    We conducted a preliminary investigation into dimensions of stigma and their relation to disease concealment in a sample of American adults living with multiple sclerosis (MS). Fifty-three adults with MS in the United States completed an online survey assessing anticipated, internalized, and isolation stigma, as well as concealment. Responses to all the scales were relatively low, on average, but above scale minimums (P stigma and concealment were highest. Anticipated stigma strongly predicted concealment. Many adults living with MS may be concerned that they will be the target of social stigma because of their illness. These concerns are associated with disease concealment. More research is needed to investigate how MS stigma and concealment may be independent contributors to health in patients with MS.

  6. Suspiciousness and low self-esteem as predictors of misattributions of anger in schizophrenia spectrum disorders.

    Science.gov (United States)

    Lysaker, Paul Henry; Davis, Louanne Whitman; Tsai, Jack

    2009-04-30

    While it is widely recognized that many with schizophrenia have significant difficulties in correctly identifying the emotions of others, less is known about the causes and correlates of particular forms of misattribution, including mistakenly seeing anger in others. One possibility is that persons with high levels of suspiciousness and low levels of self-esteem are at risk to attribute their poor feelings about themselves to the malice of others. To explore this possibility, we identified 52 persons with a schizophrenia spectrum disorder who made significant numbers of errors on the Bell-Lysaker Emotional Recognition Test. We then performed a cluster analysis based on measures of suspiciousness from the Positive and Negative Syndrome Scale and self-esteem from the Rosenberg Self-Esteem Schedule, and found the following four groups: a) High Suspiciousness/High Self-Esteem; b) Mild Suspiciousness/High Self-Esteem; c) High Suspiciousness/Low Self-Esteem; and d) Minimal Suspiciousness/Low Self-Esteem. Comparisons between groups revealed that as predicted the High Suspiciousness/Low Self-Esteem group made significantly more misattributions of anger than other groups, even when levels of depression were controlled for statistically. Implications for addressing the misattributions of anger in schizophrenia are discussed.

  7. Concealing their communication: exploring psychosocial predictors of young drivers' intentions and engagement in concealed texting.

    Science.gov (United States)

    Gauld, Cassandra S; Lewis, Ioni; White, Katherine M

    2014-01-01

    Making a conscious effort to hide the fact that you are texting while driving (i.e., concealed texting) is a deliberate and risky behaviour involving attention diverted away from the road. As the most frequent users of text messaging services and mobile phones while driving, young people appear at heightened risk of crashing from engaging in this behaviour. This study investigated the phenomenon of concealed texting while driving, and utilised an extended Theory of Planned Behaviour (TPB) including the additional predictors of moral norm, mobile phone involvement, and anticipated regret to predict young drivers' intentions and subsequent behaviour. Participants (n=171) were aged 17-25 years, owned a mobile phone, and had a current driver's licence. Participants completed a questionnaire measuring their intention to conceal texting while driving, and a follow-up questionnaire a week later to report their behavioural engagement. The results of hierarchical multiple regression analyses showed overall support for the predictive utility of the TPB with the standard constructs accounting for 69% of variance in drivers' intentions, and the extended predictors contributing an additional 6% of variance in intentions over and above the standard constructs. Attitude, subjective norm, PBC, moral norm, and mobile phone involvement emerged as significant predictors of intentions; and intention was the only significant predictor of drivers' self-reported behaviour. These constructs can provide insight into key focal points for countermeasures including advertising and other public education strategies aimed at influencing young drivers to reconsider their engagement in this risky behaviour. Copyright © 2013 Elsevier Ltd. All rights reserved.

  8. Organizational Concealment: An Incentive of Reducing the Responsibility

    OpenAIRE

    Tajika, Tomoya

    2017-01-01

    We studyworkers’ incentives of reporting problems within an OLG organization consisting of a subordinate and a manager. The subordinate is responsible for reporting a problem, and the manager is responsible for solving the reported problem. The subordinate has an incentive to conceal a detected problem since if he reports it but the manager is too lazy to solve the problem, the responsibility is transferred to the subordinate since he becomes a manager in the next period. We show that conceal...

  9. Regulatory focus moderates the social performance of individuals who conceal a stigmatized identity.

    Science.gov (United States)

    Newheiser, Anna-Kaisa; Barreto, Manuela; Ellemers, Naomi; Derks, Belle; Scheepers, Daan

    2015-12-01

    People often choose to hide a stigmatized identity to avoid bias. However, hiding stigma can disrupt social interactions. We considered whether regulatory focus qualifies the social effects of hiding stigma by examining interactions in which stigmatized participants concealed a devalued identity from non-stigmatized partners. In the Prevention Focus condition, stigmatized participants were instructed to prevent a negative impression by concealing the identity; in the Promotion Focus condition, they were instructed to promote a positive impression by concealing the identity; in the Control condition, they were simply asked to conceal the identity. Both non-stigmatized partners and independent raters rated the interactions more positively in the Promotion Focus condition. Thus, promotion focus is interpersonally beneficial for individuals who conceal a devalued identity. © 2015 The British Psychological Society.

  10. Compressed Domain Packet Loss Concealment of Sinusoidally Coded Speech

    DEFF Research Database (Denmark)

    Rødbro, Christoffer A.; Christensen, Mads Græsbøll; Andersen, Søren Vang

    2003-01-01

    We consider the problem of packet loss concealment for voice over IP (VoIP). The speech signal is compressed at the transmitter using a sinusoidal coding scheme working at 8 kbit/s. At the receiver, packet loss concealment is carried out working directly on the quantized sinusoidal parameters......, based on time-scaling of the packets surrounding the missing ones. Subjective listening tests show promising results indicating the potential of sinusoidal speech coding for VoIP....

  11. Concealed Threat Detection at Multiple Frames-per-second

    Energy Technology Data Exchange (ETDEWEB)

    Chang, J T

    2005-11-08

    In this LDRD project, our research purpose is to investigate the science and technology necessary to enable real-time array imaging as a rapid way to detect hidden threats through obscurants such as smoke, fog, walls, doors, and clothing. The goal of this research is to augment the capabilities of protective forces in concealed threat detection. In the current context, threats include people as well as weapons. In most cases, security personnel must make very fast assessments of a threat based upon limited amount of data. Among other attributes, UWB has been shown and quantified to penetrate and propagate through many materials (wood, some concretes, non-metallic building materials, some soils, etc.) while maintaining high range resolution. We have build collaborations with university partners and government agencies. We have considered the impact of psychometrics on target recognition and identification. Specifically we have formulated images in real-time that will engage the user's vision system in a more active way to enhance image interpretation capabilities. In this project, we are researching the use of real time (field programmable gate arrays) integrated with high resolution (cm scale), ultra wide band (UWB) electromagnetic signals for imaging personnel through smoke and walls. We evaluated the ability of real-time UWB imaging for detecting smaller objects, such as concealed weapons that are carried by the obscured personnel. We also examined the cognitive interpretation process of real time UWB electromagnetic images.

  12. The association between concealing emotions at work and medical utilization in Korea.

    Science.gov (United States)

    Seok, Hongdeok; Yoon, Jin-Ha; Lee, Wanhyung; Lee, June-Hee; Jung, Pil Kyun; Kim, Inah; Won, Jong-Uk; Roh, Jaehoon

    2014-01-01

    We aimed to investigate the association between concealing emotions at work and medical utilization. Data from the 2007-2009 4th Korea National Health and Nutrition Examination Survey (KNHANES IV) was used, 7,094 participants (3,837 males, 3,257 females) aged between 20 and 54 who were economically active and completed all necessary questionnaire items were included. Odds ratios (ORs) and 95% confidence intervals (95% CI) for differences in hospitalization, outpatient visits, and pharmaceutical drug use between those who concealed their emotions and those who did not were investigated using logistic regression models with and without gender stratification. Among those who concealed their emotions (n = 2,763), 47.4% were females, and 50.1% had chronic disease. In addition, 9.7% of the concealing emotions group had been hospitalized within the last year, 24.8% had been outpatients in the last two weeks, and 28.3% had used pharmaceutical drugs in the last two weeks. All ORs represent the odds of belonging to the concealing emotions group over the non-concealing emotions group. After adjustment for individual, occupational, socioeconomic and disease factors, the adjusted ORs (95% CI) in hospitalization are 1.29 (1.08 ~ 1.53) in the total population, 1.25 (0.98 ~ 1.60) in males and 1.30 (1.02 ~ 1.66) in females, in outpatient visits are 1.15 (1.02 ~ 1.29) in the total population, 1.05 (0.88 ~ 1.24) in males and 1.25 (1.06 ~ 1.47) in females and in pharmaceutical drug use are 1.12 (1.01 ~ 1.25) in the total population, 1.08 (0.92 ~ 1.27) in males and 1.14 (0.98 ~ 1.33) in females. Those who concealed their emotions at work were more likely to use medical services. Moreover, the health effects of concealing emotions at work might be more detrimental in women than in men.

  13. 76 FR 69204 - Anti-Money Laundering Program and Suspicious Activity Reporting Requirements for Housing...

    Science.gov (United States)

    2011-11-08

    ... 1506-AB14 Anti-Money Laundering Program and Suspicious Activity Reporting Requirements for Housing... enterprises as financial institutions for the purpose of requiring them to establish anti-money laundering... organizations to establish anti-money laundering programs and report suspicious activities is intended to help...

  14. Schizotypy and mindfulness: Magical thinking without suspiciousness characterizes mindfulness meditators

    Directory of Open Access Journals (Sweden)

    Elena Antonova

    2016-09-01

    Full Text Available Despite growing evidence for demonstrated efficacy of mindfulness in various disorders, there is a continuous concern about the relationship between mindfulness practice and psychosis. As schizotypy is part of the psychosis spectrum, we examined the relationship between long-term mindfulness practice and schizotypy in two independent studies. Study 1 included 24 experienced mindfulness practitioners (19 males from the Buddhist tradition (meditators and 24 meditation-naïve individuals (all males. Study 2 consisted of 28 meditators and 28 meditation-naïve individuals (all males. All participants completed the Schizotypal Personality Questionnaire (Raine, 1991, a self-report scale containing 9 subscales (ideas of reference, excessive social anxiety, magical thinking, unusual perceptual experiences, odd/eccentric behavior, no close friends, odd speech, constricted affect, suspiciousness. Participants of study 2 also completed the Five-Facet Mindfulness Questionnaire which assesses observing (Observe, describing (Describe, acting with awareness (Awareness, non-judging of (Non-judgment and non-reactivity to inner experience (Non-reactivity facets of trait mindfulness. In both studies, meditators scored significantly lower on suspiciousness and higher on magical thinking compared to meditation-naïve individuals and showed a trend towards lower scores on excessive social anxiety. Excessive social anxiety correlated negatively with Awareness and Non-judgment; and suspiciousness with Awareness, Non-judgment and Non-reactivity facets across both groups. The two groups did not differ in their total schizotypy score. We conclude that mindfulness practice is not associated with an overall increase in schizotypal traits. Instead, the pattern suggests that mindfulness meditation, particularly with an emphasis on the Awareness, Non-judgment and Non-reactivity aspects, may help to reduce suspiciousness and excessive social anxiety.

  15. Detecting concealed information in less than a second: response latency-based measures

    NARCIS (Netherlands)

    Verschuere, B.; de Houwer, J.; Verschuere, B.; Ben-Shakhar, G.; Meijer, E.

    2011-01-01

    Concealed information can be accurately assessed with physiological measures. To overcome the practical limitations of physiological measures, an assessment using response latencies has been proposed. At first sight, research findings on response latency based concealed information tests seem

  16. Medical makeup for concealing facial scars.

    Science.gov (United States)

    Mee, Donna; Wong, Brian J F

    2012-10-01

    Surgical, laser, and pharmacological therapies are all used to correct scars and surgical incisions, though have limits with respect to how well facial skin can be restored or enhanced. The use of cosmetics has long been a relevant adjunct to all scar treatment modalities. In recent years, technical advancements in the chemistry and composition of cosmetic products have provided the patient with a broader range of products to employ for concealing scars. This review will provide an overview of contemporary methods for concealing facial scars, birthmarks, and pigmentary changes without the use of traditional/dated, heavy appearing camouflage products. Additionally, general guidelines and information will be provided with respect to identifying competent makeup artists for care of the medical patient. The article by no means is meant to be a tutorial, but rather serves as a starting point in this allied field of medicine. Thieme Medical Publishers 333 Seventh Avenue, New York, NY 10001, USA.

  17. Surgical resection of highly suspicious pulmonary nodules without a tissue diagnosis

    International Nuclear Information System (INIS)

    Heo, Eun-Young; Lee, Kyung-Won; Jheon, Sanghoon; Lee, Jae-Ho; Lee, Choon-Taek; Yoon, Ho-II

    2011-01-01

    The safety and efficacy of surgical resection of lung nodule without tissue diagnosis is controversial. We evaluated direct surgical resection of highly suspicious pulmonary nodules and the clinical and radiological predictors of malignancy. Retrospective analyses were performed on 113 patients who underwent surgical resection without prior tissue diagnosis for highly suspicious pulmonary nodules. Clinical and radiological characteristics were compared between histologically proven benign and malignant nodules after resection. Total costs, length of hospitalization and waiting time to surgery were compared with those of patients who had tissue diagnosis prior to surgery. Among 280 patients with pulmonary nodules suspicious for lung cancer, 113 (40.4%) underwent operation without prior tissue diagnosis. Lung nodules were diagnosed as malignant in 96 (85%) of the 113 patients. Except for forced expiratory volume in 1 s, clinical characteristics were not significantly different according to the pathologic results. Forty-five (90%) of 50 patients with ground-glass opacity nodules had a malignancy. Mixed ground-glass opacity, bubble lucency, irregular margin and larger size correlated with malignancy in ground-glass opacity nodules (P<0.05). Fifty-one (81%) of 67 patients with solid nodules had a malignancy. Spiculation, pre-contrast attenuation and contrast enhancement significantly correlated with malignancy in solid nodules (P<0.05). Surgical resection without tissue diagnosis significantly decreased total costs, hospital stay and waiting time (P<0.05). Direct surgical resection of highly suspicious pulmonary nodules can be a valid procedure. However, careful patient selection and further investigations are required to justify direct surgical resection. (author)

  18. [Identification and management of intra-operative suspicious tissues in 20 transsphenoidal surgery cases].

    Science.gov (United States)

    Liu, Jun-Feng; Ke, Chang-Shu; Chen, Xi; Xu, Yu; Zhang, Hua-Qiu; Chen, Juan; Gan, Chao; Li, Chao-Xi; Lei, Ting

    2013-05-01

    To determine appropriate protocols for the identification and management of intra operative suspicious tissues during transsphenoidal surgery. Clinical data and pathological reports of 20 patients with intra-operative suspicious tissues during transsphenoidal surgeries were analyzed retrospectively. The methods for discriminating between adenoma and normal pituitary tissues were reviewed. The postoperative pathological reports revealed that adenoma and normal pituitary tissues coexisted in 9 samples, while 5 samples were identified as normal pituitary tissues, 2 as adenoma tissues, and 4 as other tissues. Adenomas were distinguished from normal pituitary tissues on the basis of intra-operative appearance, texture, blood supply and possible existence of boundary. If decisions are difficult to made during surgeries from the appearance of the suspicious tissues, pathological examinations are advised as a guidance for the next steps.

  19. When concealed handgun licensees break bad: criminal convictions of concealed handgun licensees in Texas, 2001-2009.

    Science.gov (United States)

    Phillips, Charles D; Nwaiwu, Obioma; McMaughan Moudouni, Darcy K; Edwards, Rachel; Lin, Szu-hsuan

    2013-01-01

    We explored differences in criminal convictions between holders and nonholders of a concealed handgun license (CHL) in Texas. The Texas Department of Public Safety (DPS) provides annual data on criminal convictions of holders and nonholders of CHLs. We used 2001 to 2009 DPS data to investigate the differences in the distribution of convictions for these 2 groups across 9 types of criminal offenses. We calculated z scores for the differences in the types of crimes for which CHL holders and nonholders were convicted. CHL holders were much less likely than nonlicensees to be convicted of crimes. Most nonholder convictions involved higher-prevalence crimes (burglary, robbery, or simple assault). CHL holders' convictions were more likely to involve lower-prevalence crimes, such as sexual offenses, gun offenses, or offenses involving a death. Our results imply that expanding the settings in which concealed carry is permitted may increase the risk of specific types of crimes, some quite serious in those settings. These increased risks may be relatively small. Nonetheless, policymakers should consider these risks when contemplating reducing the scope of gun-free zones.

  20. The concealed finds from the Mühlberg-Ensemble in Kempten (southern Germany)

    DEFF Research Database (Denmark)

    Atzbach, Rainer

    2012-01-01

    history. This paper examines an exceptional collection of assemblages recovered from dead spaces within three adjacent buildings in the town of Kempten, southern Germany. It summarizes the major research project based on the wide variety of finds recovered, including numerous objects of wood, leather, fur......Concealed finds in buildings are a worldwide phenomenon. Since the 14th century, the angles of vaults, the dead space between ceilings and floors, walled niches and other voids in buildings have been used to dump waste, mostly on the occasion of rebuilding activities. In a few cases, careful...

  1. Psychopathy and the detection of concealed information

    NARCIS (Netherlands)

    Verschuere, B.; Verschuere, B.; Ben-Shakhar, G.; Meijer, E.

    2011-01-01

    The most common application of concealed information detection is crime knowledge assessment in crime suspects. The validity of this application has mainly been investigated in healthy subjects. Criminals may differ in important aspects from healthy subjects. Psychopathy, for example, is quite

  2. Error Concealment for 3-D DWT Based Video Codec Using Iterative Thresholding

    DEFF Research Database (Denmark)

    Belyaev, Evgeny; Forchhammer, Søren; Codreanu, Marian

    2017-01-01

    Error concealment for video coding based on a 3-D discrete wavelet transform (DWT) is considered. We assume that the video sequence has a sparse representation in a known basis different from the DWT, e.g., in a 2-D discrete cosine transform basis. Then, we formulate the concealment problem as l1...

  3. Minimising bias in the forensic evaluation of suspicious paediatric injury.

    Science.gov (United States)

    Skellern, Catherine

    2015-08-01

    In the rules of evidence in all legal jurisdictions, medical experts are required to maintain objectivity when providing opinions. When interpreting medical evidence, doctors must recognise, acknowledge and manage uncertainties to ensure their evidence is reliable to legal decision-makers. Even in the forensic sciences such as DNA analysis, implicit bias has been shown to influence how results are interpreted from cognitive and contextual biases unconsciously operating. In cases involving allegations of child abuse there has been significant exposure in the media, popular magazines, legal journals and in the published medical literature debating the reliability of medical evidence given in these proceedings. In these cases judges have historically been critical of experts they perceived had sacrificed objectivity for advocacy by having an investment in a 'side'. This paper firstly discusses the issue of bias then describes types of cognitive biases identified from psychological research applied to forensic evidence including adversarial bias, context bias, confirmation bias and explains how terminology can influence the communication of opinion. It follows with previously published guidelines of how to reduce the risk of bias compromising objectivity in forensic practices then concludes with my own recommendations of practices that can be used by child protection paediatricians and within an organisation when conducting forensic evaluations of suspicious childhood injury to improve objectivity in formulation of opinion evidence. Crown Copyright © 2015. Published by Elsevier Ltd. All rights reserved.

  4. Relationship between concealment of emotions at work and musculoskeletal symptoms: results from the third Korean Working Conditions Survey.

    Science.gov (United States)

    Jung, Kyungyong; Kim, Dae Hwan; Ryu, Ji Young

    2018-05-11

    In this study, we explored the relationship between concealing emotions at work and musculoskeletal symptoms in Korean workers using data from a national, population-based survey. Data were obtained from the third Korean Working Conditions Survey in 2011. We investigated the prevalence of three musculoskeletal symptoms ("back pain", "pain in the upper extremities", and "pain in the lower extremities"). Multiple logistic regression analysis was also performed to determine odds ratios (ORs) for musculoskeletal symptoms according to concealing emotions at work, adjusting for socioeconomic factors. In both sexes, the emotion-concealing group showed a significantly higher prevalence of "pain in the upper extremities" and "pain in the lower extremities" than the non-emotion-concealing group. For back pain, male - but not female - workers who concealed their emotions showed a higher prevalence than their non-emotion-concealing counterparts; the difference was statistically significant. Adjusted ORs for musculoskeletal symptoms (excluding "back pain" for female workers) in the emotion-concealing group were significantly higher. Our study suggests that concealment of emotions is closely associated with musculoskeletal symptoms, and the work environment should operate in consideration not only of the physical health work condition of workers but also of their emotional efforts including concealing emotion at work.

  5. A Concealed Information Test with multimodal measurement.

    Science.gov (United States)

    Ambach, Wolfgang; Bursch, Stephanie; Stark, Rudolf; Vaitl, Dieter

    2010-03-01

    A Concealed Information Test (CIT) investigates differential physiological responses to deed-related (probe) vs. irrelevant items. The present study focused on the detection of concealed information using simultaneous recordings of autonomic and brain electrical measures. As a secondary issue, verbal and pictorial presentations were compared with respect to their influence on the recorded measures. Thirty-one participants underwent a mock-crime scenario with a combined verbal and pictorial presentation of nine items. The subsequent CIT, designed with respect to event-related potential (ERP) measurement, used a 3-3.5s interstimulus interval. The item presentation modality, i.e. pictures or written words, was varied between subjects; no response was required from the participants. In addition to electroencephalogram (EEG), electrodermal activity (EDA), electrocardiogram (ECG), respiratory activity, and finger plethysmogram were recorded. A significant probe-vs.-irrelevant effect was found for each of the measures. Compared to sole ERP measurement, the combination of ERP and EDA yielded incremental information for detecting concealed information. Although, EDA per se did not reach the predictive value known from studies primarily designed for peripheral physiological measurement. Presentation modality neither influenced the detection accuracy for autonomic measures nor EEG measures; this underpins the equivalence of verbal and pictorial item presentation in a CIT, regardless of the physiological measures recorded. Future studies should further clarify whether the incremental validity observed in the present study reflects a differential sensitivity of ERP and EDA to different sub-processes in a CIT. Copyright 2009 Elsevier B.V. All rights reserved.

  6. Effects of modified penoplasty for concealed penis in children.

    Science.gov (United States)

    Chen, Chao; Li, Ning; Luo, Yi-Ge; Wang, Hong; Tang, Xian-Ming; Chen, Jia-Bo; Dong, Chun-Qiang; Liu, Qiang; Dong, Kun; Su, Cheng; Yang, Ti-Quan

    2016-10-01

    To evaluate the effect of modified penoplasty in the management of concealed penis. We retrospectively reviewed 96 consecutive patients with concealed penis, which had been surgically corrected between July 2013 and July 2015. All patients underwent modified Shiraki phalloplasty. All patients were scheduled for regular follow-up at 1, 3, and 6 months after the surgery. Data on the patients' age, operative time, postoperative complications, and parents' satisfaction grade were collected and analyzed. The mean follow-up period was 17.4 months (range 7-31 months). The mean operative time was 63.2 ± 8.7 min. The mean perpendicular penile length was 1.89 ± 0.77 cm preoperatively and 4.42 ± 0.87 cm postoperatively, with an improved mean length of 2.5 ± 0.68 cm in the flaccid state postoperatively (p penis can achieve maximum utilization of prepuce to assure coverage of the exposed penile shaft. It has fewer complications, achieving marked asthetics, and functional improvement. It is a relatively ideal means for treating concealed penis.

  7. [Half-gloving cordectomy: a modified procedure for concealed penis].

    Science.gov (United States)

    Sun, Wei-Gui; Zheng, Qi-Chuan; Jiang, Kun

    2012-06-01

    To search for a simple surgical procedure for the treatment of concealed penis that may have better effect and less complications. We used a modified surgical method in the treatment of 58 patients with concealed penis aged from 3 to 15 (mean 6.8) years. The operation was simplified and involved the following steps: wholly unveiling the penis glans, half-degloving the foreskins, cutting off all the adhesive fibers up to the penile suspensory ligaments, and liberating the external penis. The operation was successful in all the patients, with the operative time of 15 -45 (mean 33) minutes, hospital stay of 2 - 5 (mean 3.5) days, but no complications except mild foreskin edema in 5 cases. The external penis was prolonged from 0.5 - 2.8 (mean 1.4) cm preoperatively to 3.2 - 8.5 (mean 3.9) cm postoperatively. The patients were followed up for 1 -3 years, all satisfied with the length and appearance of the penis, and their sexual and reproductive functions were normal. The modified surgical procedure for concealed penis is simple and effective, with desirable outcomes, few postoperative complications and no damage to sexual and reproductive functions.

  8. Detection and identification of concealed weapons using matrix pencil

    Science.gov (United States)

    Adve, Raviraj S.; Thayaparan, Thayananthan

    2011-06-01

    The detection and identification of concealed weapons is an extremely hard problem due to the weak signature of the target buried within the much stronger signal from the human body. This paper furthers the automatic detection and identification of concealed weapons by proposing the use of an effective approach to obtain the resonant frequencies in a measurement. The technique, based on Matrix Pencil, a scheme for model based parameter estimation also provides amplitude information, hence providing a level of confidence in the results. Of specific interest is the fact that Matrix Pencil is based on a singular value decomposition, making the scheme robust against noise.

  9. 31 CFR 103.17 - Reports by futures commission merchants and introducing brokers in commodities of suspicious...

    Science.gov (United States)

    2010-07-01

    ... merchants and introducing brokers in commodities of suspicious transactions. 103.17 Section 103.17 Money and... merchants and introducing brokers in commodities of suspicious transactions. (a) General—(1) Every futures commission merchant (“FCM”) and introducing broker in commodities (“IB-C”) within the United States shall...

  10. Teaching preschool children to report suspicious packages to adults.

    Science.gov (United States)

    May, Michael E; Shayter, Ashley M; Schmick, Ayla; Barron, Becky; Doherty, Meghan; Johnson, Matthew

    2018-05-16

    Law enforcement agencies stress that public reporting of terror-related crime is the predominant means for disrupting these actions. However, schools may be unprepared because the majority of the populace may not understand the threat of suspicious materials or what to do when they are found on school grounds. The purpose of this study was to systematically teach preschool children to identify and report suspicious packages across three experiments. In the first experiment, we used multiple exemplar training to teach children to identify the characteristics of safe and unsafe packages. In the second experiment, we taught participants to identify the locations where packages should be considered unsafe. Finally, in the third experiment, we used behavioral skills training to teach participants to avoid touching unsafe packages, leave the area where they were located, and report their discovery to an adult. Results suggest the participants quickly developed these skills. Implications for safety skills in young school children are discussed. © 2018 Society for the Experimental Analysis of Behavior.

  11. Self-Concealment Mediates the Relationship Between Perfectionism and Attitudes Toward Seeking Psychological Help Among Adolescents.

    Science.gov (United States)

    Abdollahi, Abbas; Hosseinian, Simin; Beh-Pajooh, Ahmad; Carlbring, Per

    2017-01-01

    One of the biggest barriers in treating adolescents with mental health problems is their refusing to seek psychological help. This study was designed to examine the relationships between two forms of perfectionism, self-concealment and attitudes toward seeking psychological help and to test the mediating role of self-concealment in the relationship between perfectionism and attitudes toward seeking psychological help among Malaysian high school students. The participants were 475 Malaysian high school students from four high schools in Kuala Lumpur, Malaysia. Structural equation modelling results indicated that high school students with high levels of socially prescribed perfectionism, high levels of self-concealment, and low levels of self-oriented perfectionism reported negative attitudes toward seeking psychological help. Bootstrapping analysis showed that self-concealment emerged as a significant, full mediator in the link between socially prescribed perfectionism and attitudes toward seeking psychological help. Moderated mediation analysis also examined whether the results generalized across men and women. The results revealed that male students with socially prescribed perfectionism are more likely to engage in self-concealment, which in turn, leads to negative attitudes toward seeking psychological help more than their female counterparts. The results suggested that students high in socially prescribed perfectionism were more likely to engage in self-concealment and be less inclined to seek psychological help.

  12. College Students' Reasons for Concealing Suicidal Ideation

    Science.gov (United States)

    Burton Denmark, Adryon; Hess, Elaine; Becker, Martin Swanbrow

    2012-01-01

    Self-reported reasons for concealing suicidal ideation were explored using data from a national survey of undergraduate and graduate students: 558 students indicated that they seriously considered attempting suicide during the previous year and did not tell anyone about their suicidal thoughts. Content analysis of students' qualitative responses…

  13. A new surgical technique for concealed penis using an advanced musculocutaneous scrotal flap.

    Science.gov (United States)

    Han, Dong-Seok; Jang, Hoon; Youn, Chang-Shik; Yuk, Seung-Mo

    2015-06-19

    Until recently, no single, universally accepted surgical method has existed for all types of concealed penis repairs. We describe a new surgical technique for repairing concealed penis by using an advanced musculocutaneous scrotal flap. From January 2010 to June 2014, we evaluated 12 patients (12-40 years old) with concealed penises who were surgically treated with an advanced musculocutaneous scrotal flap technique after degloving through a ventral approach. All the patients were scheduled for regular follow-up at 6, 12, and 24 weeks postoperatively. The satisfaction grade for penile size, morphology, and voiding status were evaluated using a questionnaire preoperatively and at all of the follow-ups. Information regarding complications was obtained during the postoperative hospital stay and at all follow-ups. The patients' satisfaction grades, which included the penile size, morphology, and voiding status, improved postoperatively compared to those preoperatively. All patients had penile lymphedema postoperatively; however, this disappeared within 6 weeks. There were no complications such as skin necrosis and contracture, voiding difficulty, or erectile dysfunction. Our advanced musculocutaneous scrotal flap technique for concealed penis repair is technically easy and safe. In addition, it provides a good cosmetic appearance, functional outcomes and excellent postoperative satisfaction grades. Lastly, it seems applicable in any type of concealed penis, including cases in which the ventral skin defect is difficult to cover.

  14. Anxiety and Related Disorders and Concealment in Sexual Minority Young Adults.

    Science.gov (United States)

    Cohen, Jeffrey M; Blasey, Christine; Barr Taylor, C; Weiss, Brandon J; Newman, Michelle G

    2016-01-01

    Sexual minorities face greater exposure to discrimination and rejection than heterosexuals. Given these threats, sexual minorities may engage in sexual orientation concealment in order to avoid danger. This social stigma and minority stress places sexual minorities at risk for anxiety and related disorders. Given that three fourths of anxiety disorder onset occurs before the age of 24, the current study investigated the symptoms of generalized anxiety disorder, social phobia, panic disorder, posttraumatic stress disorder, and depression in sexual minority young adults relative to their heterosexual peers. Secondarily, the study investigated sexual orientation concealment as a predictor of anxiety and related disorders. A sample of 157 sexual minority and 157 heterosexual young adults matched on age and gender completed self-report measures of the aforementioned disorders, and indicated their level of sexual orientation concealment. Results revealed that sexual minority young adults reported greater symptoms relative to heterosexuals across all outcome measures. There were no interactions between sexual minority status and gender, however, women had higher symptoms across all disorders. Sexual minority young women appeared to be at the most risk for clinical levels of anxiety and related disorders. In addition, concealment of sexual orientation significantly predicted symptoms of social phobia. Implications are offered for the cognitive and behavioral treatment of anxiety and related disorders in this population. Copyright © 2015. Published by Elsevier Ltd.

  15. Rating Emotion Communication: Display and Concealment as Effects of Culture, Gender, Emotion Type, and Relationship

    Directory of Open Access Journals (Sweden)

    Arne Vikan

    2009-01-01

    Full Text Available Students from a collectivistic (Brazilian, n= 401 and an individualistic (Norwegian, n= 418culture rated their ability to display and conceal anger, sadness, and anxiety in relation to immediate family, partner, friends, and "other persons." Norwegians showed higher display ratings for anger and sadness, and higher concealment ratings for anger and anxiety. Display ratings were much higher, and concealment ratings much lower in relation to close persons than in relation to "other persons." A culture x relationship interaction was that Brazilian' ratings suggested more emotional openness to friends than to family and partner, whereas Norwegians showed the inverse patterns. Gender differences supported previous research by showing higher display and lower concealment ratings, and less differentiation between relationships by females.

  16. A hybrid frame concealment algorithm for H.264/AVC.

    Science.gov (United States)

    Yan, Bo; Gharavi, Hamid

    2010-01-01

    In packet-based video transmissions, packets loss due to channel errors may result in the loss of the whole video frame. Recently, many error concealment algorithms have been proposed in order to combat channel errors; however, most of the existing algorithms can only deal with the loss of macroblocks and are not able to conceal the whole missing frame. In order to resolve this problem, in this paper, we have proposed a new hybrid motion vector extrapolation (HMVE) algorithm to recover the whole missing frame, and it is able to provide more accurate estimation for the motion vectors of the missing frame than other conventional methods. Simulation results show that it is highly effective and significantly outperforms other existing frame recovery methods.

  17. Error Concealment using Neural Networks for Block-Based Image Coding

    Directory of Open Access Journals (Sweden)

    M. Mokos

    2006-06-01

    Full Text Available In this paper, a novel adaptive error concealment (EC algorithm, which lowers the requirements for channel coding, is proposed. It conceals errors in block-based image coding systems by using neural network. In this proposed algorithm, only the intra-frame information is used for reconstruction of the image with separated damaged blocks. The information of pixels surrounding a damaged block is used to recover the errors using the neural network models. Computer simulation results show that the visual quality and the MSE evaluation of a reconstructed image are significantly improved using the proposed EC algorithm. We propose also a simple non-neural approach for comparison.

  18. Suspiciousness perception in dynamic scenes: a comparison of CCTV operators and novices.

    Directory of Open Access Journals (Sweden)

    Christina Jayne Howard

    2013-08-01

    Full Text Available Perception of scenes has typically been investigated by using static or simplified visual displays. How attention is used to perceive and evaluate dynamic, realistic scenes is more poorly understood, in part due to the problem of comparing eye fixations to moving stimuli across observers. When the task and stimulus is common across observers, consistent fixation location can indicate that that region has high goal-based relevance. Here we investigated these issues when an observer has a specific, and naturalistic, task: closed-circuit television (CCTV monitoring. We concurrently recorded eye movements and ratings of perceived suspiciousness as different observers watched the same set of clips from real CCTV footage. Trained CCTV operators showed a greater consistency in fixation location and greater consistency in suspiciousness judgements than untrained observers. Training appears to increase between-operators consistency by learning 'knowing what to look for' in these scenes. We used a novel ‘Dynamic Area of Focus (DAF’ analysis to show that in CCTV monitoring there is a temporal relationship between eye movements and subsequent manual responses, as we have previously found for a sports video watching task. For trained CCTV operators and for untrained observers, manual responses were most highly related to between-observer eye position spread when a temporal lag was introduced between the fixation and response data. Shortly after between-observer eye positions became most similar, observers tended to push the joystick to indicate perceived suspiciousness. Conversely, shortly after between-observer eye positions became dissimilar, observers tended to rate suspiciousness as low. These data provide further support for this DAF method as an important tool for examining goal-directed fixation behaviour when the stimulus is a real moving image.

  19. CONCEAL TO SURVIVE: RESISTANCE STRATEGIES

    Directory of Open Access Journals (Sweden)

    Francisca Zuleide Duarte de Souza

    2013-04-01

    Full Text Available This paper analyzes the strategy of concealment, theoretically bounded by Accetto (2001, and used by Delfina, character in the novel O Alegre Canto da Perdiz of Paulina Chiziane, Mozambican writer. Focuses, among other things, the relationship colonizer versus colonized, discussing the con­dition of female inferiority that forces a reaction apparently submissive, which assumes the sale of the body and the rejection of their ancestral tra­ditions. To interpret the attitudes of Delfina as a strategy that masks resent­ment against abusive domain power.

  20. Concealment of Child Sexual Abuse in Sports

    Science.gov (United States)

    Hartill, Mike

    2013-01-01

    When the sexual abuse of children is revealed, it is often found that other nonabusing adults were aware of the abuse but failed to act. During the past twenty years or so, the concealment of child sexual abuse (CSA) within organizations has emerged as a key challenge for child protection work. Recent events at Pennsylvania State University (PSU)…

  1. Correction of concealed penis with preservation of the prepuce.

    Science.gov (United States)

    Valioulis, I A; Kallergis, I C; Ioannidou, D C

    2015-10-01

    By definition, congenital concealed penis presents at birth. Children are usually referred to physicians because of parental anxiety caused by their child's penile size. Several surgical procedures have been described to treat this condition, but its correction is still technically challenging. The present study reports a simple surgical approach, which allows preservation of the prepuce. During the last 6 years, 18 children with concealed penis (according to the classification by Maizels et al.) have been treated in the present department (mean age 4.5 years, range 3-12 years). Patients with other conditions that caused buried penis were excluded from the study. The operation was performed through a longitudinal midline ventral incision, which was extended hemi-circumferentially at the penile base. The dysgenetic dartos was identified and its distal part was resected. Dissection of the corpora cavernosa was carried down to the suspensory ligament, which was sectioned. Buck's fascia was fixed to Scarpa's fascia and shaft skin was approximated in the midline. Penoscrotal angle was fashioned by Z-plasty or V-Y plasty. The median follow-up was 24 months (range 8-36). The postoperative edema was mild and resolved within a week. All children had good to excellent outcomes. The median pre-operative to postoperative difference in penile length in the flaccid state was 2.6 cm (range 2.0-3.5). No serious complications or recurrent penile retraction were noted. Recent literature mostly suggests that concealed penis is due to deficient proximal attachments of dysgenetic dartos. Consequences of this include: difficulties in maintaining proper hygiene, balanitis, voiding difficulties with prepuce ballooning and urine spraying, and embarrassment among peers. Surgical treatment for congenital concealed penis is warranted in children aged 3 years or older. The basis of the technique is the perception that in boys with congenital concealed penis, the penile integuments are normal

  2. Predictive value of ADAMTS-13 on concealed chronic renal failure in COPD patients

    Science.gov (United States)

    Zeng, Mian; Chen, Qingui; Liang, Wenjie; He, Wanmei; Zheng, Haichong; Huang, Chunrong

    2017-01-01

    Background Impaired renal function is often neglected in COPD patients. Considering that COPD patients usually have an ongoing prothrombotic state and systemic inflammation status, we investigated the association among them and explored the predictive value of a disintegrin and metalloproteinase with a thrombospondin type 1 motif, member 13 (ADAMTS-13), on concealed chronic renal failure (CRF) in COPD patients. Methods COPD patients were recruited from the First Affiliated Hospital of Sun Yat-Sen University between January 2015 and December 2016. Control was selected from contemporaneous hospitalized patients without COPD and matched by age and gender at a ratio of 1:1. Estimated glomerular filtration rate (eGFR) was calculated by using the Chronic Kidney Disease Epidemiology Collaboration formula, and all subjects were categorized as having normal renal function (eGFR ≥60 mL min−1 1.73 m−2) and having concealed CRF (normal serum creatinine while eGFR <60 mL min−1 1.73 m−2). Independent correlates of concealed CRF were investigated by logistic regression analysis, and receiver operating characteristic (ROC) curves were used to determine the predictive value of ADAMTS-13. Results In total, 106 COPD and 106 non-COPD patients were finally recruited, and the incidences of concealed CRF were 19.81% and 7.55%, respectively. ADAMTS-13 (odds ratio [OR] =0.858, 95% CI =0.795–0.926), D-dimer (OR =1.095, 95% CI =1.027–1.169), and C-reactive protein (OR =1.252, 95% CI =1.058–1.480) were significantly associated with concealed CRF. Sensitivity and specificity at an ADAMTS-13 cutoff of 318.72 ng/mL were 100% and 81.2%, respectively. The area under the ROC curve was 0.959. Conclusion Prothrombotic state and systemic inflammation status might contribute to explaining the high incidence of concealed CRF in COPD, and plasma ADAMTS-13 levels may serve as a strong predictor. PMID:29255356

  3. Computer aided detection of suspicious regions on digital mammograms : rapid segmentation and feature extraction

    Energy Technology Data Exchange (ETDEWEB)

    Ruggiero, C; Giacomini, M; Sacile, R [DIST - Department of Communication Computer and System Sciences, University of Genova, Via Opera Pia 13, 16145 Genova (Italy); Rosselli Del Turco, M [Centro per lo studio e la prevenzione oncologica, Firenze (Italy)

    1999-12-31

    A method is presented for rapid detection of suspicious regions which consists of two steps. The first step is segmentation based on texture analysis consisting of : histogram equalization, Laws filtering for texture analysis, Gaussian blur and median filtering to enhance differences between tissues in different respects, histogram thresholding to obtain a binary image, logical masking in order to detect regions to be discarded from the analysis, edge detection. This method has been tested on 60 images, obtaining 93% successful detection of suspicious regions. (authors) 4 refs, 9 figs, 1 tabs.

  4. 31 CFR 103.18 - Reports by banks of suspicious transactions.

    Science.gov (United States)

    2010-07-01

    ... violations that require immediate attention, such as, for example, ongoing money laundering schemes, the bank... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Reports by banks of suspicious transactions. 103.18 Section 103.18 Money and Finance: Treasury Regulations Relating to Money and Finance...

  5. Direct and indirect links between parenting styles, self-concealment (secrets), impaired control over drinking and alcohol-related outcomes.

    Science.gov (United States)

    Hartman, Jessica D; Patock-Peckham, Julie A; Corbin, William R; Gates, Jonathan R; Leeman, Robert F; Luk, Jeremy W; King, Kevin M

    2015-01-01

    Self-concealment reflects uncomfortable feelings, thoughts, and information people have about themselves that they avoid telling others (Larson & Chastain, 1990). According to Larson and Chastain (1990) these secrets range from the slightly embarrassing to the very distressing with an individual's most traumatic experiences often concealed. Parental attitudes including those involving self-disclosure are thought to be expressed in their choice of parenting style (Brand, Hatzinger, Beck, & Holsboer-Trachsler, 2009). The specific aim of this investigation was to examine the direct and indirect influences of parenting styles on self-concealment, impaired control over drinking (i.e. the inability to stop drinking when intended), alcohol use (quantity/frequency), and alcohol-related problems. A structural equation model with 419 (223 men, 196 women) university students was examined. Two and three path mediated effects were examined with the bias corrected bootstrap technique in Mplus. Having an authoritarian mother was directly linked to more self-concealment, while having an authoritative father was directly linked to less self-concealment. Higher levels of mother authoritarianism were indirectly linked to both increased alcohol use and alcohol-related problems through more self-concealment and more impaired control over drinking. Moreover, higher levels of father authoritativeness were indirectly linked to less alcohol use and alcohol-related problems through less self-concealment and less impaired control over drinking. These findings suggest that parenting styles influence vulnerabilities such as self-concealment in the impaired control over the drinking pathway to alcohol use and alcohol-related problems. Copyright © 2014 Elsevier Ltd. All rights reserved.

  6. Angiosonography in suspicious breast lesions with non-diagnostic FNAC: comparison with power Doppler US.

    Science.gov (United States)

    Caumo, F; Carbognin, G; Casarin, A; Pinali, L; Vasori, S; D'Onofrio, M; Pozzi Mucelli, R

    2006-02-01

    The purpose of this study was to evaluate the accuracy of angiosonography in comparison with colour Doppler ultrasound (US) in the discrimination of suspicious breast lesions with nondiagnostic fine-needle aspiration cytology (FNAC). Pre-operative Power Doppler US and angiosonography were prospectively performed in 20 suspicious breast lesions with non-diagnostic FNAC. A second-generation US contrast agent was utilised with a high-frequency transducer and a contrast-specific algorithm (low acoustic pressure CnTI). The enhancement characteristics of all lesions were analysed using qualitative and quantitative parameters obtained from time-intensity curves with the different imaging modalities. The final diagnosis was confirmed at pathology in all cases. Microvessel density (MVD) was assessed in the surgical specimen using CD34. The correct assessment of biological behaviour was achieved in all cases by angiosonography (sensitivity of 100%; specificity of 91%) and colour Doppler US (45% sensitivity; 78% specificity). MVD correlated with the biological behaviour. Angiosonography is more accurate than colour Doppler US in the correct assessment of biological behaviour of suspicious breast lesions.

  7. ID-check: Online concealed information test reveals true identity

    NARCIS (Netherlands)

    Verschuere, B.; Kleinberg, B.

    2016-01-01

    The Internet has already changed people's lives considerably and is likely to drastically change forensic research. We developed a web-based test to reveal concealed autobiographical information. Initial studies identified a number of conditions that affect diagnostic efficiency. By combining these

  8. Clinical experiences with photoacoustic breast imaging: the appearance of suspicious lesions

    NARCIS (Netherlands)

    Heijblom, M.

    2014-01-01

    This thesis describes photoacoustic (PA) imaging of suspicious breast lesions. In PA imaging, the tissue of interest is illuminated by short pulses of laser light, usually in the near infrared (NIR) regime. Upon absorption by primarily the tumor vasculature, the light causes a small temperature

  9. A Qualitative Study Examining Experiences and Dilemmas in Concealment and Disclosure of People Living With Serious Mental Illness.

    Science.gov (United States)

    Bril-Barniv, Shani; Moran, Galia S; Naaman, Adi; Roe, David; Karnieli-Miller, Orit

    2017-03-01

    People with mental illnesses face the dilemma of whether to disclose or conceal their diagnosis, but this dilemma was scarcely researched. To gain in-depth understanding of this dilemma, we interviewed 29 individuals with mental illnesses: 16 with major depression/bipolar disorders and 13 with schizophrenia. Using a phenomenological design, we analyzed individuals' experiences, decision-making processes, and views of gains and costs regarding concealment and disclosure of mental illness. We found that participants employed both positive and negative disclosure/concealment practices. Positive practices included enhancing personal recovery, community integration, and/or supporting others. Negative practices occurred in forced, uncontrolled situations. We also identified various influencing factors, including familial norms of sharing, accumulated experiences with disclosure, and ascribed meaning to diagnosis. Based on these findings, we deepen the understanding about decision-making processes and the consequences of disclosing or concealing mental illness. We discuss how these finding can help consumers explore potential benefits and disadvantages of mental illness disclosure/concealment occurrences.

  10. Damaged Watermarks Detection in Frequency Domain as a Primary Method for Video Concealment

    Directory of Open Access Journals (Sweden)

    Robert Hudec

    2011-01-01

    Full Text Available This paper deals with video transmission over lossy communication networks. The main idea is to develop video concealment method for information losses and errors correction. At the beginning, three main groups of video concealment methods, divided by encoder/decoder collaboration, are briefly described. The modified algorithm based on the detection and filtration of damaged watermark blocks encapsulated to the transmitted video was developed. Finally, the efficiency of developed algorithm is presented in experimental part of this paper.

  11. Guilt, censure, and concealment of active smoking status among cancer patients and family members after diagnosis: a nationwide study.

    Science.gov (United States)

    Shin, Dong Wook; Park, Jong Hyock; Kim, So Young; Park, Eal Whan; Yang, Hyung Kook; Ahn, Eunmi; Park, Seon Mee; Lee, Young Joon; Lim, Myong Cheol; Seo, Hong Gwan

    2014-05-01

    We aimed to identify the prevalence of feelings of guilt, censure, and concealment of smoking status among cancer patients and their family members who continued to smoke after the patient's diagnosis. Among 990 patient-family member dyads, 45 patients and 173 family members who continued to smoke for at least 1 month after the patients' diagnoses were administered questions examining feelings of guilt, censure, and smoking concealment. Most patients who continued to smoke reported experiencing feelings of guilt toward their families (75.6%) and censure from their family members (77.8%), and many concealed their smoking from their family members (44.4%) or healthcare professionals (46.7%). Family members who continued to smoke also reported feelings of guilt with respect to the patient (63.6%) and that the patient was critical of them (68.9%), and many concealed their smoking from the patient (28.5%) or healthcare professionals (9.3%). Patients' feeling of guilt was associated with concealment of smoking from family members (55.9% vs. 10.0%) or health care professionals (55.9% vs. 20.0%). Family members who reported feeling guilty (36.5% vs. 16.3%) or censured (34.5% vs. 16.7%) were more likely to conceal smoking from patients. Many patients and family members continue to smoke following cancer diagnosis, and the majority of them experience feelings of guilt and censure, which can lead to the concealment of smoking status from families or health care professionals. Feelings of guilt, censure, and concealment of smoking should be considered in the development and implementation of smoking cessation programs for cancer patients and family members. Copyright © 2013 John Wiley & Sons, Ltd.

  12. Courtesy stigma: A concealed consternation among caregivers of people affected by leprosy.

    Science.gov (United States)

    Dako-Gyeke, Mavis

    2018-01-01

    This study explored experiences of courtesy stigma among caregivers of people affected by leprosy. Using a qualitative research approach, twenty participants were purposively selected and in-depth interviews conducted. The interviews were audio-recorded, transcribed, and analyzed to identify emerging themes that addressed objectives of the study. The findings indicated that caregivers of people affected by leprosy experienced courtesy stigma. Evidence showed that fear of contagion underpinned caregivers' experiences, especially in employment and romantic relationships. In addition, participants adopted different strategies (disregarding, concealment, education, faith-based trust) to handle courtesy stigma. The findings demonstrate that psychosocial support and financial assistance to caregivers are necessary considerations for attainment of effective care for people affected by leprosy. Copyright © 2017 Elsevier Ltd. All rights reserved.

  13. Separating Facts from Fiction: Linguistic Models to Classify Suspicious and Trusted News Posts on Twitter

    Energy Technology Data Exchange (ETDEWEB)

    Volkova, Svitlana; Shaffer, Kyle J.; Jang, Jin Yea; Hodas, Nathan O.

    2017-07-30

    Pew research polls report 62 percent of U.S. adults get news on social media (Gottfried and Shearer, 2016). In a December poll, 64 percent of U.S. adults said that “made-up news” has caused a “great deal of confusion” about the facts of current events (Barthel et al., 2016). Fabricated stories spread in social media, ranging from deliberate propaganda to hoaxes and satire, contributes to this confusion in addition to having serious effects on global stability. In this work we build predictive models to classify 130 thousand news tweets as suspicious or verified, and predict four subtypes of suspicious news – satire, hoaxes, clickbait and propaganda. We demonstrate that neural network models trained on tweet content and social network interactions outperform lexical models. Unlike previous work on deception detection, we find that adding syntax and grammar features to our models decreases performance. Incorporating linguistic features, including bias and subjectivity, improves classification results, however social interaction features are most informative for finer-grained separation between our four types of suspicious news posts.

  14. ID-Check: Online Concealed Information Test Reveals True Identity.

    Science.gov (United States)

    Verschuere, Bruno; Kleinberg, Bennett

    2016-01-01

    The Internet has already changed people's lives considerably and is likely to drastically change forensic research. We developed a web-based test to reveal concealed autobiographical information. Initial studies identified a number of conditions that affect diagnostic efficiency. By combining these moderators, this study investigated the full potential of the online ID-check. Participants (n = 101) tried to hide their identity and claimed a false identity in a reaction time-based Concealed Information Test. Half of the participants were presented with personal details (e.g., first name, last name, birthday), whereas the others only saw irrelevant details. Results showed that participants' true identity could be detected with high accuracy (AUC = 0.98; overall accuracy: 86-94%). Online memory detection can reliably and validly detect whether someone is hiding their true identity. This suggests that online memory detection might become a valuable tool for forensic applications. © 2015 American Academy of Forensic Sciences.

  15. The value of preoperative ultrasound guided fine-needle aspiration cytology of radiologically suspicious axillary lymph nodes in breast cancer

    Directory of Open Access Journals (Sweden)

    Torill Sauer

    2014-01-01

    Full Text Available Background: Preoperative ultrasound (US and eventually US-guided fine-needle aspiration cytology (FNAC of suspicious axillary lymph nodes (ALN is a standard procedure in the work-up of suspicious breast lesions. Preoperative US FNAC may prevent sentinel node biopsy (SNB procedure in 24-30% of patients with early stage breast carcinoma. The aim of this study was to evaluate the institutional results of this preoperative diagnostic procedure. Materials and Methods: A total of 182 cases of preoperative FNAC of suspicious ALN where retrieved from the pathology files. The results were compared with the final histology and staging. False negative (FN FNAC cases were reviewed and possibly missed metastatic cases (2 were immunostained with the epithelial marker AE1/AE3. Results: There were no false positives, whereas 16 cases were FN. In all but one case the FN′s represented sampling error. Half of the 16 FN cases in this series were macrometastases. Discussion: About 83% of the preoperatively aspirated cases were N+, indicating that a radiologically suspicious ALN has a very high risk of being metastatic. Preoperative US guided FNAC from radiologically suspicious ALN is highly efficient in detecting metastases. Depending on national guidelines, a preoperative, positive ALN FNAC might help to stratify the patients as to SNB and/or ALN dissection.

  16. 31 CFR 103.15 - Reports by mutual funds of suspicious transactions.

    Science.gov (United States)

    2010-07-01

    ... suspected terrorist financing or ongoing money laundering schemes, a mutual fund shall immediately notify by... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Reports by mutual funds of suspicious transactions. 103.15 Section 103.15 Money and Finance: Treasury Regulations Relating to Money and Finance...

  17. 31 CFR 103.20 - Reports by money services businesses of suspicious transactions.

    Science.gov (United States)

    2010-07-01

    ... immediate attention, such as ongoing money laundering schemes, the money services business shall immediately... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Reports by money services businesses of suspicious transactions. 103.20 Section 103.20 Money and Finance: Treasury Regulations Relating to...

  18. 75 FR 75593 - Financial Crimes Enforcement Network; Confidentiality of Suspicious Activity Reports

    Science.gov (United States)

    2010-12-03

    ... continuing effort to increase the efficiency and effectiveness of its anti-money laundering and counter... law or regulation, or a suspicious activity related to money laundering, terrorist financing, or other...). \\3\\ The Annunzio-Wylie Anti-Money Laundering Act of 1992 (the Annunzio-Wylie Act), amended the BSA...

  19. Asouzu's phenomenon of concealment and Bacon's idols of the ...

    African Journals Online (AJOL)

    The study emanates from the contentions of leaders of states, who, instead of promoting the ideals and values which promote social and political-coexistence, limit and conceal their views of leadership to some tribalistic, ethnocentric and self-serving idols, and by so doing, they cause a monumental harm to the polity. This is ...

  20. Is anterior N2 enhancement a reliable electrophysiological index of concealed information?

    Science.gov (United States)

    Ganis, Giorgio; Bridges, David; Hsu, Chun-Wei; Schendan, Haline E

    2016-12-01

    Concealed information tests (CITs) are used to determine whether an individual possesses information about an item of interest. Event-related potential (ERP) measures in CITs have focused almost exclusively on the P3b component, showing that this component is larger when lying about the item of interest (probe) than telling the truth about control items (irrelevants). Recent studies have begun to examine other ERP components, such as the anterior N2, with mixed results. A seminal CIT study found that visual probes elicit a larger anterior N2 than irrelevants (Gamer and Berti, 2010) and suggested that this component indexes cognitive control processes engaged when lying about probes. However, this study did not control for potential intrinsic differences among the stimuli: the same probe and irrelevants were used for all participants, and there was no control condition composed of uninformed participants. Here, first we show that the N2 effect found in the study by Gamer and Berti (2010) was in large part due to stimulus differences, as the effect observed in a concealed information condition was comparable to that found in two matched control conditions without any concealed information (Experiments 1 and 2). Next, we addressed the issue of the generality of the N2 findings by counterbalancing a new set of stimuli across participants and by using a control condition with uninformed participants (Experiment 3). Results show that the probe did not elicit a larger anterior N2 than the irrelevants under these controlled conditions. These findings suggest that caution should be taken in using the N2 as an index of concealed information in CITs. Furthermore, they are a reminder that results of CIT studies (not only with ERPs) performed without stimulus counterbalancing and suitable control conditions may be confounded by differential intrinsic properties of the stimuli employed. Copyright © 2016 Elsevier Inc. All rights reserved.

  1. Error Concealment using Data Hiding in Wireless Image Transmission

    Directory of Open Access Journals (Sweden)

    A. Akbari

    2016-11-01

    Full Text Available The transmission of image/video over unreliable medium like wireless networks generally results in receiving a damaged image/video. In this paper, a novel image error concealment scheme based on the idea of data hiding and Set Partitioning In Hierarchical Trees (SPIHT coding is investigated. In the encoder side, the coefficients of wavelet decomposed image are partitioned into “perfect trees”. The SPIHT coder is applied to encode each per-fect tree independently and generate an efficiently compressed reference code. This code is then embedded into the coefficients of another perfect tree which is located in a different place, using a robust data hiding scheme based on Quantization Index Modulation (QIM. In the decoder side, if a part of the image is lost, the algorithm extracts the embedded code for reference trees related to this part to reconstruct the lost information. Performance results show that for an error prone transmission, the proposed technique is promising to efficiently conceal the lost areas of the transmitted image.

  2. Sequential error concealment for video/images by weighted template matching

    DEFF Research Database (Denmark)

    Koloda, Jan; Østergaard, Jan; Jensen, Søren Holdt

    2012-01-01

    In this paper we propose a novel spatial error concealment algorithm for video and images based on convex optimization. Block-based coding schemes in packet loss environment are considered. Missing macro blocks are sequentially reconstructed by filling them with a weighted set of templates...

  3. Self-stigma among concealable minorities in Hong Kong: conceptualization and unified measurement.

    Science.gov (United States)

    Mak, Winnie W S; Cheung, Rebecca Y M

    2010-04-01

    Self-stigma refers to the internalized stigma that individuals may have toward themselves as a result of their minority status. Not only can self-stigma dampen the mental health of individuals, it can deter them from seeking professional help lest disclosing their minority status lead to being shunned by service providers. No unified instrument has been developed to measure consistently self-stigma that could be applied to different concealable minority groups. The present study presented findings based on 4 studies on the development and validation of the Self-Stigma Scale, conducted in Hong Kong with community samples of mental health consumers, recent immigrants from Mainland China, and sexual minorities. Upon a series of validation procedures, a 9-item Self-Stigma Scale-Short Form was developed. Initial support on its reliability and construct validity (convergent and criterion validities) were found among 3 stigmatized groups. Utility of this unified measure was to establish an empirical basis upon which self-stigma of different concealable minority groups could be assessed under the same dimensions. Health-care professionals could make use of this short scale to assess potential self-stigmatization among concealable minorities, which may hamper their treatment process as well as their overall well-being.

  4. Role of percent tissue altered on ectasia after LASIK in eyes with suspicious topography.

    Science.gov (United States)

    Santhiago, Marcony R; Smadja, David; Wilson, Steven E; Krueger, Ronald R; Monteiro, Mario L R; Randleman, J Bradley

    2015-04-01

    To investigate the association of the percent tissue altered (PTA) with the occurrence of ectasia after LASIK in eyes with suspicious preoperative corneal topography. This retrospective comparative case-control study compared associations of reported ectasia risk factors in 129 eyes, including 57 eyes with suspicious preoperative Placido-based corneal topography that developed ectasia after LASIK (suspect ectasia group), 32 eyes with suspicious topography that remained stable for at least 3 years after LASIK (suspect control group), and 30 eyes that developed ectasia with bilateral normal topography (normal topography ectasia group). Groups were subdivided based on topographic asymmetry into high- or low-suspect groups. The PTA, preoperative central corneal thickness (CCT), residual stromal bed (RSB), and age (years) were evaluated in univariate and multivariate analyses. Average PTA values for normal topography ectasia (45), low-suspect ectasia (39), high-suspect ectasia (36), low-suspect control (32), and high-suspect control (29) were significantly different from one another in all comparisons (P topography ectasia groups, and CCT was not significantly different between any groups. Stepwise logistic regression revealed the PTA as the most significant independent variable (P topography. Less tissue alteration, or a lower PTA value, was necessary to induce ectasia in eyes with more remarkable signs of topographic abnormality, and PTA provided better discriminative capabilities than RSB for all study populations. Copyright 2015, SLACK Incorporated.

  5. [Cardioversion for paroxysmal supraventricular tachycardia during lung surgery in a patient with concealed Wolff-Parkinson-White syndrome].

    Science.gov (United States)

    Sato, Yoshiharu; Nagata, Hirofumi; Inoda, Ayako; Miura, Hiroko; Watanabe, Yoko; Suzuki, Kenji

    2014-10-01

    We report a case of paroxysmal supraventricular tachycardia (PSVT) that occurred during video-assisted thoracoscopic (VATS) lobectomy in a patient with concealed Wolff-Parkinson-White (WPW) syndrome. A 59-year-old man with lung cancer was scheduled for VATS lobectomy under general anesthesia. After inserting a thoracic epidural catheter, general anesthesia was induced with intravenous administration of propofol. Anesthesia was maintained with inhalation of desfurane in an air/oxygen mixture and intravenous infusion of remifentanil. Recurrent PSVT occurred three times, and the last episode of PSVT continued for 50 minutes regardless of administration of antiarrhythmic drugs. Synchronized electric shock via adhesive electrode pads on the patient's chest successfully converted PSVT back to normal sinus rhythm. The remaining course and postoperative period were uneventful. An electrophysiological study performed after hospital discharge detected concealed WPW syndrome, which had contributed to the development of atrioventricular reciprocating tachycardia. Concealed WPW syndrome is a rare, but critical complication that could possibly cause lethal atrial tachyarrhythmias during the perioperative period. In the present case, cardioversion using adhesive electrode pads briefly terminated PSVT in a patient with concealed WPW syndrome.

  6. Decision makers use norms, not cost-benefit analysis, when choosing to conceal or reveal unfair rewards.

    Directory of Open Access Journals (Sweden)

    Marco Heimann

    Full Text Available We introduce the Conceal or Reveal Dilemma, in which individuals receive unfair benefits, and must decide whether to conceal or to reveal this unfair advantage. This dilemma has two important characteristics: it does not lend itself easily to cost-benefit analysis, neither to the application of any strong universal norm. As a consequence, it is ideally suited to the study of interindividual and intercultural variations in moral-economic norms. In this paper we focus on interindividual variations, and we report four studies showing that individuals cannot be swayed by financial incentives to conceal or to reveal, and follow instead fixed, idiosyncratic strategies. We discuss how this result can be extended to individual and cultural variations in the tendency to display or to hide unfair rewards.

  7. High-Performance Region-of-Interest Image Error Concealment with Hiding Technique

    Directory of Open Access Journals (Sweden)

    Shih-Chang Hsia

    2010-01-01

    Full Text Available Recently region-of-interest (ROI based image coding is a popular topic. Since ROI area contains much more important information for an image, it must be prevented from error decoding while suffering from channel lost or unexpected attack. This paper presents an efficient error concealment method to recover ROI information with a hiding technique. Based on the progressive transformation, the low-frequency components of ROI are encoded to disperse its information into the high-frequency bank of original image. The capability of protection is carried out with extracting the ROI coefficients from the damaged image without increasing extra information. Simulation results show that the proposed method can efficiently reconstruct the ROI image when ROI bit-stream occurs errors, and the measurement of PSNR result outperforms the conventional error concealment techniques by 2 to 5 dB.

  8. Phishing suspiciousness in older and younger adults: The role of executive functioning.

    Directory of Open Access Journals (Sweden)

    Brandon E Gavett

    Full Text Available Phishing is the spoofing of Internet websites or emails aimed at tricking users into entering sensitive information, with such goals as financial or identity theft. The current study sought to determine whether age is associated with increased susceptibility to phishing and whether tests of executive functioning can predict phishing susceptibility. A total of 193 cognitively intact participants, 91 younger adults and 102 older adults, were primarily recruited through a Psychology department undergraduate subject pool and a gerontology research registry, respectively. The Executive Functions Module from the Neuropsychological Assessment Battery and the Iowa Gambling Task were the primary cognitive predictors of reported phishing suspiciousness. Other predictors included age group (older vs. younger, sex, education, race, ethnicity, prior knowledge of phishing, prior susceptibility to phishing, and whether or not browsing behaviors were reportedly different in the laboratory setting versus at home. A logistic regression, which accounted for a 22.7% reduction in error variance compared to the null model and predicted phishing suspiciousness with 73.1% (95% CI [66.0, 80.3] accuracy, revealed three statistically significant predictors: the main effect of education (b = 0.58, SE = 0.27 and the interactions of age group with prior awareness of phishing (b = 2.31, SE = 1.12 and performance on the Neuropsychological Assessment Battery Mazes test (b = 0.16, SE = 0.07. Whether or not older adults reported being suspicious of the phishing attacks used in this study was partially explained by educational history and prior phishing knowledge. This suggests that simple educational interventions may be effective in reducing phishing vulnerability. Although one test of executive functioning was found useful for identifying those at risk of phishing susceptibility, four tests were not found to be useful; these results speak to the need for more ecologically valid

  9. [Management of moderate to severe pediatric concealed penis in children by Devine's technique via incision between the penis and scrotum].

    Science.gov (United States)

    Zhang, Xin-Sheng; Liu, Shi-Xiong; Xiang, Xue-Yan; Zhang, Wen-Gang; Tang, Da-Xing

    2014-04-01

    To search for a simple and effective surgical approach to the management of moderate to severe pediatric concealed penis in children. We used Devine's technique via incision between the penis and scrotum in the treatment of 68 cases of moderate to severe pediatric concealed penis. The patients were aged 3 -13 (mean 6.5) years, 30 with moderate and 38 with severe pediatric concealed penis. This strategy achieved good near- and long-term effects and satisfactory appearance of the penis, which was similar to that of circumcision. At 3 months after surgery, the penile length was 3 - 5.2 cm, averaging (2.35 +/- 0.35) cm. Devine's technique via incision between the penis and scrotum is a simple and effective surgical option for moderate to severe pediatric concealed penis in children.

  10. Do Children Understand That People Selectively Conceal or Express Emotion?

    Science.gov (United States)

    Hayashi, Hajimu; Shiomi, Yuki

    2015-01-01

    This study examined whether children understand that people selectively conceal or express emotion depending upon the context. We prepared two contexts for a verbal display task for 70 first-graders, 80 third-graders, 64 fifth-graders, and 71 adults. In both contexts, protagonists had negative feelings because of the behavior of the other…

  11. Error Concealment Method Based on Motion Vector Prediction Using Particle Filters

    Directory of Open Access Journals (Sweden)

    B. Hrusovsky

    2011-09-01

    Full Text Available Video transmitted over unreliable environment, such as wireless channel or in generally any network with unreliable transport protocol, is facing the losses of video packets due to network congestion and different kind of noises. The problem is becoming more important using highly effective video codecs. Visual quality degradation could propagate into subsequent frames due to redundancy elimination in order to obtain high compression ratio. Since the video stream transmission in real time is limited by transmission channel delay, it is not possible to retransmit all faulty or lost packets. It is therefore inevitable to conceal these defects. To reduce the undesirable effects of information losses, the lost data is usually estimated from the received data, which is generally known as error concealment problem. This paper discusses packet loss modeling in order to simulate losses during video transmission, packet losses analysis and their impacts on the motion vectors losses.

  12. Upright stereotactic vacuum-assisted needle biopsy of suspicious breast microcalcification

    International Nuclear Information System (INIS)

    Sim, L. S. J.; Kei, P. L.

    2008-01-01

    Full text: Stereotactic core needle biopsy is a useful technique for evaluation of suspicious breast microcalcifications. Thf development of the 11-G vacuum-assisted biopsy system offers another method of minimally invasive biopsy carried out on a conventional mammography unit. We evaluate its usefulness, efficacy and safety in Asian women.. Vacuum-assisted biopsy was carried out through the lateral approach using an add-on stereotactic device attached to a mammography unit. One hundred and five lesions were sampled in 97 patients. Excisional biopsy was subsequently Carried out for diagnosis of atypical ductal hyperplasia or carcinoma in high-risk patients. Patients with benign diagnosis underwent mammographic follow up. The technical success rate was 97%. An average of 13.5 tissue cores were retrieved for each lesion. The histopathological result obtained from mammotome was benign in 84.8% and malignant in 15.2%. The benign microcalcifications were predominantly fibrocystic change (n = 42)| whereas the malignant microcalcifications included ductal carcinoma in situ (n = 15) and invasive carcinoma (n = 1). Twenty-two patients underwent subsequent open surgical biopsy but no underestimation of disease was seen. Only two patients had vasovagal syncope and three others felt unwell during the biopsy. Nine patients had small haema-1 tomas, which resolved spontaneously. Vacuum-assisted biopsy carried out on an upright stereotactic mammography] unit is a safe and effective method for evaluation of suspicious microcalcifications.

  13. Hidden Markov Model-based Packet Loss Concealment for Voice over IP

    DEFF Research Database (Denmark)

    Rødbro, Christoffer A.; Murthi, Manohar N.; Andersen, Søren Vang

    2006-01-01

    As voice over IP proliferates, packet loss concealment (PLC) at the receiver has emerged as an important factor in determining voice quality of service. Through the use of heuristic variations of signal and parameter repetition and overlap-add interpolation to handle packet loss, conventional PLC...

  14. Portable concealed weapon detection using millimeter-wave FMCW radar imaging

    Science.gov (United States)

    Johnson, Michael A.; Chang, Yu-Wen

    2001-02-01

    Unobtrusive detection of concealed weapons on persons or in abandoned bags would provide law enforcement a powerful tool to focus resources and increase traffic throughput in high- risk situations. We have developed a fast image scanning 94 GHz radar system that is suitable for portable operation and remote viewing of radar data. This system includes a novel fast image-scanning antenna that allows for the acquisition of medium resolution 3D millimeter wave images of stationary targets with frame times on order of one second. The 3D radar data allows for potential isolation of concealed weapons from body and environmental clutter such as nearby furniture or other people. The radar is an active system so image quality is not affected indoors, emitted power is however very low so there are no health concerns for operator or targets. The low power operation is still sufficient to penetrate heavy clothing or material. Small system size allows for easy transport and rapid deployment of the system as well as an easy migration path to future hand held systems.

  15. Utilizing Social Media to Further the Nationwide Suspicious Activity Reporting Initiative

    Science.gov (United States)

    2012-09-01

    Initiative NYPD New York Police Department OSINT Open Source Intelligence P2P Peer to Patent SAR Suspicious Activity Report SMS Short Message (or...Media as an Open-Source Intelligence Tool Several government documents outline the use of social media as an Open Source intelligence tool ( OSINT ...social media to be an OSINT tool that federal, state, and local law enforcement agencies should use to develop timely, relevant, and actionable

  16. Out and healthy: Being more "out" about a concealable stigmatized identity may boost the health benefits of social support.

    Science.gov (United States)

    Weisz, Bradley M; Quinn, Diane M; Williams, Michelle K

    2016-12-01

    This research examined whether the relationship between perceived social support and health would be moderated by level of outness for people living with different concealable stigmatized identities (mental illness, substance abuse, domestic violence, rape, or childhood abuse). A total of 394 people living with a concealable stigmatized identity completed a survey. Consistent with hypotheses, at high levels of outness, social support predicted better health; at low levels of outness, social support was less predictive of health. People concealing a stigmatized identity may only be able to reap the health benefits of social support if they are "out" about the stigmatized identity. © The Author(s) 2015.

  17. 75 FR 76677 - Financial Crimes Enforcement Network: Anti-Money Laundering Program and Suspicious Activity...

    Science.gov (United States)

    2010-12-09

    ...: Anti-Money Laundering Program and Suspicious Activity Report Filing Requirements for Residential... loan or finance companies for the purpose of requiring them to establish anti-money laundering programs...-money laundering program requirements on financial institutions.\\3\\ The authority of the Secretary to...

  18. Concealment tactics among HIV-positive nurses in Uganda

    OpenAIRE

    Kyakuwa, M.; Hardon, A.

    2012-01-01

    This paper is based on two-and-a-half years of ethnographic fieldwork in two rural Ugandan health centres during a period of ART scale-up. Around one-third of the nurses in these two sites were themselves HIV-positive but most concealed their status. We describe how a group of HIV-positive nurses set up a secret circle to talk about their predicament as HIV-positive healthcare professionals and how they developed innovative care technologies to overcome the skin rashes caused by ART that thre...

  19. The Invisible Work of Closeting: A Qualitative Study About Strategies Used by Lesbian and Gay Persons to Conceal Their Sexual Orientation.

    Science.gov (United States)

    Malterud, Kirsti; Bjorkman, Mari

    2016-10-01

    The last decades have offered substantial improvement regarding human rights for lesbian and gay (LG) persons. Yet LG persons are often in the closet, concealing their sexual orientation. We present a qualitative study based on 182 histories submitted from 161 LG individuals to a Web site. The aim was to explore experiences of closeting among LG persons in Norway. A broad range of strategies was used for closeting, even among individuals who generally considered themselves to be out of the closet. Concealment was enacted by blunt denial, clever avoidance, or subtle vagueness. Other strategies included changing or eliminating the pronoun or name of the partner in ongoing conversations. Context-dependent concealment, differentiating between persons, situations, or arenas, was repeatedly applied for security or convenience. We propose a shift from "being in the closet" to "situated concealment of sexual orientation."

  20. Suspicious Behavior Detection System for an Open Space Parking Based on Recognition of Human Elemental Actions

    Science.gov (United States)

    Inomata, Teppei; Kimura, Kouji; Hagiwara, Masafumi

    Studies for video surveillance applications for preventing various crimes such as stealing and violence have become a hot topic. This paper proposes a new video surveillance system that can detect suspicious behaviors such as a car break-in and vandalization in an open space parking, and that is based on image processing. The proposed system has the following features: it 1)deals time series data flow, 2)recognizes “human elemental actions” using statistic features, and 3)detects suspicious behavior using Subspace method and AdaBoost. We conducted the experiments to test the performance of the proposed system using open space parking scenes. As a result, we obtained about 10.0% for false positive rate, and about 4.6% for false negative rate.

  1. JPEG2000-coded image error concealment exploiting convex sets projections.

    Science.gov (United States)

    Atzori, Luigi; Ginesu, Giaime; Raccis, Alessio

    2005-04-01

    Transmission errors in JPEG2000 can be grouped into three main classes, depending on the affected area: LL, high frequencies at the lower decomposition levels, and high frequencies at the higher decomposition levels. The first type of errors are the most annoying but can be concealed exploiting the signal spatial correlation like in a number of techniques proposed in the past; the second are less annoying but more difficult to address; the latter are often imperceptible. In this paper, we address the problem of concealing the second class or errors when high bit-planes are damaged by proposing a new approach based on the theory of projections onto convex sets. Accordingly, the error effects are masked by iteratively applying two procedures: low-pass (LP) filtering in the spatial domain and restoration of the uncorrupted wavelet coefficients in the transform domain. It has been observed that a uniform LP filtering brought to some undesired side effects that negatively compensated the advantages. This problem has been overcome by applying an adaptive solution, which exploits an edge map to choose the optimal filter mask size. Simulation results demonstrated the efficiency of the proposed approach.

  2. Combining PET/CT with serum tumor markers to improve the evaluation of histological type of suspicious lung cancers.

    Science.gov (United States)

    Jiang, Rifeng; Dong, Ximin; Zhu, Wenzhen; Duan, Qing; Xue, Yunjing; Shen, Yanxia; Zhang, Guopeng

    2017-01-01

    Histological type is important for determining the management of patients with suspicious lung cancers. In this study, PET/CT combined with serum tumor markers were used to evaluate the histological type of lung lesions. Patients with suspicious lung cancers underwent 18F-FDG PET/CT and serum tumor markers detection. SUVmax of the tumor and serum levels of tumor markers were acquired. Differences in SUVmax and serum levels of tumor markers among different histological types of lung cancers and between EGFR mutation statues of adenocarcinoma were compared. The diagnostic efficiencies of SUVmax alone, each serum tumor marker alone, combined tumor markers and the combination of both methods were further assessed and compared. SCC had the highest level of SUVmax, followed by SCLC and adenocarcinoma, and benign lesions had a lowest level. CYFRA21-1 and SCC-Ag were significantly higher in SCC, NSE was significantly higher in SCLC (Ptumor marker or SUVmax alone. When combined, the AUC, sensitivity and specificity increased significantly (Ptumor markers (P>0.05 for all). SUVmax and serum tumor markers show values in evaluating the histological types of suspicious lung cancers. When properly combined, the diagnostic efficiency can increase significantly.

  3. Concealed semantic and episodic autobiographical memory electrified.

    Science.gov (United States)

    Ganis, Giorgio; Schendan, Haline E

    2012-01-01

    Electrophysiology-based concealed information tests (CIT) try to determine whether somebody possesses concealed information about a crime-related item (probe) by comparing event-related potentials (ERPs) between this item and comparison items (irrelevants). Although the broader field is sometimes referred to as "memory detection," little attention has been paid to the precise type of underlying memory involved. This study begins addressing this issue by examining the key distinction between semantic and episodic memory in the autobiographical domain within a CIT paradigm. This study also addresses the issue of whether multiple repetitions of the items over the course of the session habituate the brain responses. Participants were tested in a 3-stimulus CIT with semantic autobiographical probes (their own date of birth) and episodic autobiographical probes (a secret date learned just before the study). Results dissociated these two memory conditions on several ERP components. Semantic probes elicited a smaller frontal N2 than episodic probes, consistent with the idea that the frontal N2 decreases with greater pre-existing knowledge about the item. Likewise, semantic probes elicited a smaller central N400 than episodic probes. Semantic probes also elicited a larger P3b than episodic probes because of their richer meaning. In contrast, episodic probes elicited a larger late positive complex (LPC) than semantic probes, because of the recent episodic memory associated with them. All these ERPs showed a difference between probes and irrelevants in both memory conditions, except for the N400, which showed a difference only in the semantic condition. Finally, although repetition affected the ERPs, it did not reduce the difference between probes and irrelevants. These findings show that the type of memory associated with a probe has both theoretical and practical importance for CIT research.

  4. Concealed semantic and episodic autobiographical memory electrified

    Directory of Open Access Journals (Sweden)

    Giorgio eGanis

    2013-01-01

    Full Text Available Electrophysiology-based concealed information tests (CIT try to determine whether somebody possesses concealed information about a probe item by comparing event-related potentials (ERPs between this item and comparison items (irrelevants. Although the broader field is sometimes referred to as memory detection, little attention has been paid to the precise type of underlying memory involved. This study begins addressing this issue by examining the key distinction between semantic and episodic memory in the autobiographical domain within a CIT paradigm. This study also addressed the issue of whether multiple repetitions of the items over the course of the session habituate the brain responses. Participants were tested in a 3-stimulus CIT with semantic autobiographical probes (their own date of birth and episodic autobiographical probes (a secret date learned just before the study. Results dissociated these two memory conditions on several ERP components. Semantic probes elicited a smaller frontal N2 than episodic probes, consistent with the idea that the frontal N2 decreases with greater pre-existing semantic knowledge about the item. Likewise, semantic probes elicited a smaller central N400 than episodic probes. Semantic probes also elicited a larger P3b than episodic probes because of their richer meaning. In contrast, episodic probes elicited a larger late positive component (LPC than semantic probes, because of the recent episodic memory associated with them. All these ERPs showed a difference between probes and irrelevants in both memory conditions, except for the N400, which showed a difference only in the semantic condition. Finally, although repetition affected the ERPs, it did not reduce the difference between probes and irrelevants. Thus, the type of memory associated with a probe has both theoretical and practical importance for CIT research.

  5. Concealed semantic and episodic autobiographical memory electrified

    Science.gov (United States)

    Ganis, Giorgio; Schendan, Haline E.

    2013-01-01

    Electrophysiology-based concealed information tests (CIT) try to determine whether somebody possesses concealed information about a crime-related item (probe) by comparing event-related potentials (ERPs) between this item and comparison items (irrelevants). Although the broader field is sometimes referred to as “memory detection,” little attention has been paid to the precise type of underlying memory involved. This study begins addressing this issue by examining the key distinction between semantic and episodic memory in the autobiographical domain within a CIT paradigm. This study also addresses the issue of whether multiple repetitions of the items over the course of the session habituate the brain responses. Participants were tested in a 3-stimulus CIT with semantic autobiographical probes (their own date of birth) and episodic autobiographical probes (a secret date learned just before the study). Results dissociated these two memory conditions on several ERP components. Semantic probes elicited a smaller frontal N2 than episodic probes, consistent with the idea that the frontal N2 decreases with greater pre-existing knowledge about the item. Likewise, semantic probes elicited a smaller central N400 than episodic probes. Semantic probes also elicited a larger P3b than episodic probes because of their richer meaning. In contrast, episodic probes elicited a larger late positive complex (LPC) than semantic probes, because of the recent episodic memory associated with them. All these ERPs showed a difference between probes and irrelevants in both memory conditions, except for the N400, which showed a difference only in the semantic condition. Finally, although repetition affected the ERPs, it did not reduce the difference between probes and irrelevants. These findings show that the type of memory associated with a probe has both theoretical and practical importance for CIT research. PMID:23355816

  6. 77 FR 8148 - Anti-Money Laundering Program and Suspicious Activity Report Filing Requirements for Residential...

    Science.gov (United States)

    2012-02-14

    ... 1506-AB02 Anti-Money Laundering Program and Suspicious Activity Report Filing Requirements for... finance companies for the purpose of requiring them to establish anti-money laundering programs and report... Secretary is authorized to impose anti-money laundering (``AML'') program requirements on financial...

  7. Minority Stress and Same-Sex Relationship Satisfaction: The Role of Concealment Motivation.

    Science.gov (United States)

    Pepping, Christopher A; Cronin, Timothy J; Halford, W Kim; Lyons, Anthony

    2018-04-30

    Most lesbian, gay, and bisexual (LGB) people want a stable, satisfying romantic relationship. Although many of the predictors of relationship outcomes are similar to those of heterosexual couples, same-sex couples face some additional challenges associated with minority stress that also impact upon relationship quality. Here, we investigate the association between minority stressors and relationship quality in a sample of 363 adults (M age = 30.37, SD = 10.78) currently in a same-sex romantic relationship. Internalized homophobia and difficulties accepting one's LGB identity were each negatively associated with relationship satisfaction via heightened concealment motivation. We also examined the protective role of identity affirmation on relationship quality, finding a direct positive relationship between the two variables. Minority stressors were negatively associated with couple relationship satisfaction via heightened concealment motivation. The finding that identity affirmation directly predicted increased couple satisfaction also highlights the important role of protective factors in same-sex couple relationships. © 2018 Family Process Institute.

  8. Indian program for development of technologies relevant to reliable, non-intrusive, concealed-contraband detection

    International Nuclear Information System (INIS)

    Auluck, S.K.H.

    2007-01-01

    Generating capability for reliable, non-intrusive detection of concealed-contraband, particularly, organic contraband like explosives and narcotics, has become a national priority. This capability spans a spectrum of technologies. If a technology mission addressing the needs of a highly sophisticated technology like PFNA is set up, the capabilities acquired would be adequate to meet the requirements of many other sets of technologies. This forms the background of the Indian program for development of technologies relevant to reliable, non-intrusive, concealed contraband detection. One of the central themes of the technology development programs would be modularization of the neutron source and detector technologies, so that common elements can be combined in different ways for meeting a variety of application requirements. (author)

  9. Role of 3D power Doppler ultrasound in the further characterization of suspicious breast masses.

    Science.gov (United States)

    Kupeli, Ali; Kul, Sibel; Eyuboglu, Ilker; Oguz, Sukru; Mungan, Sevdegul

    2016-01-01

    To investigate effectiveness of vascular indices obtained with 3D power Doppler ultrasound in the further characterization of breast masses and prevention of unnecessary biopsies. Between April 2013 and March 2014, 109 patients (age range, 17-85 years; mean age, 47 years) with 117 radiologically or clinically suspicious breast masses were prospectively evaluated with 3DPDUS before biopsy. Mass volume (MV), vascularization index (VI), flow index (FI) and vascularization flow index (VFI) were calculated using Virtual Organ Computer-aided Analysis (VOCAL) software and they were correlated with the final diagnosis. Cutoff values of vascular indices were determinated and diagnostic efficacy was calculated with receiver operating curve (ROC) analysis. All vascular indices, age of patients and tumor volume were significantly lower in benign masses compared with malignant ones (p<0.001). AUCs were 0.872, 0.867 and 0.789 for VI, VFI and FI, respectively. The diagnostic efficacy of VI (for cutoff 1.1; 83% sensitivity, 82% specificity and 82% accuracy) and VFI (for cutoff 0.4; 80% sensitivity, 83% specificity and 80% accuracy) were significantly higher than FI (for cutoff 33,9; 73% sensitivity, 69% specificity and 71% accuracy). It was found that with the use of vascular indices of 3DPDUS in the further characterization of suspicious breast masses between 24% to 37% of unnecessary biopsies could have been avoided. The vascular indices obtained with 3DPDUS seem reliable in the further characterization of suspicious breast masses and might be used to decrease unnecessary biopsies. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  10. 31 CFR 103.19 - Reports by brokers or dealers in securities of suspicious transactions.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Reports by brokers or dealers in... Reports Required To Be Made § 103.19 Reports by brokers or dealers in securities of suspicious transactions. (a) General. (1) Every broker or dealer in securities within the United States (for purposes of...

  11. Automatic detection of suspicious behavior of pickpockets with track-based features in a shopping mall

    NARCIS (Netherlands)

    Bouma, H.; Baan, J.; Burghouts, G.J.; Eendebak, P.T.; Huis, J.R. van; Dijk, J.; Rest, J.H.C. van

    2014-01-01

    Proactive detection of incidents is required to decrease the cost of security incidents. This paper focusses on the automatic early detection of suspicious behavior of pickpockets with track-based features in a crowded shopping mall. Our method consists of several steps: pedestrian tracking, feature

  12. The Psychological Implications of Concealing a Stigma: A Cognitive-Affective-Behavioral Model

    Science.gov (United States)

    Pachankis, John E.

    2007-01-01

    Many assume that individuals with a hidden stigma escape the difficulties faced by individuals with a visible stigma. However, recent research has shown that individuals with a concealable stigma also face considerable stressors and psychological challenges. The ambiguity of social situations combined with the threat of potential discovery makes…

  13. [Ladder step strategy for surgical repair of congenital concealed penis in children].

    Science.gov (United States)

    Wang, Fu-Ran; Zhong, Hong-Ji; Chen, Yi; Zhao, Jun-Feng; Li, Yan

    2016-11-01

    To assess the feasibility of the ladder step strategy in surgical repair of congenital concealed penis in children. This study included 52 children with congenital concealed penis treated in the past two years by surgical repair using the ladder step strategy, which consists of five main steps: cutting the narrow ring of the foreskin, degloving the penile skin, fixing the penile skin at the base, covering the penile shaft, and reshaping the prepuce. The perioperative data of the patients were prospectively collected and statistically described. Of the 52 patients, 20 needed remodeling of the frenulum and 27 received longitudinal incision in the penoscrotal junction to expose and deglove the penile shaft. The advanced scrotal flap technique was applied in 8 children to cover the penile shaft without tension, the pedicled foreskin flap technique employed in 11 to repair the penile skin defect, and excision of the webbed skin of the ventral penis performed in another 44 to remodel the penoscrotal angle. The operation time, blood loss, and postoperative hospital stay were 40-100 minutes, 5-30 ml, and 3-6 days, respectively. Wound bleeding and infection occurred in 1 and 5 cases, respectively. Follow-up examinations at 3 and 6 months after surgery showed that all the children had a satisfactory penile appearance except for some minor complications (2 cases of penile retraction, 2 cases of redundant ventral skin, and 1 case of iatrogenic penile curvature). The ladder step strategy for surgical repair of congenital concealed penis in children is a simple procedure with minor injury and satisfactory appearance of the penis.

  14. Regulatory focus moderates the social performance of individuals who conceal a stigmatized identity

    NARCIS (Netherlands)

    Newheiser, Anna-Kaisa; Barreto, Manuela; Ellemers, Naomi; Derks, Belle; Scheepers, Daan

    2015-01-01

    People often choose to hide a stigmatized identity to avoid bias. However, hiding stigma can disrupt social interactions. We considered whether regulatory focus qualifies the social effects of hiding stigma by examining interactions in which stigmatized participants concealed a devalued identity

  15. Diffusion-weighted magnetic resonance imaging in the assessment of ovarian masses with suspicious features: Strengths and challen

    Directory of Open Access Journals (Sweden)

    Sahar Mansour

    2015-12-01

    Conclusion: DWI supported by conventional MRI data can confirm or exclude malignancy in suspicious ovarian masses. The combined analysis of quantitative and qualitative criteria and knowledge of the sequence pitfalls are required.

  16. Early experience with multiparametric magnetic resonance imaging-targeted biopsies under visual transrectal ultrasound guidance in patients suspicious for prostate cancer undergoing repeated biopsy

    DEFF Research Database (Denmark)

    Boesen, Lars; Noergaard, Nis; Chabanova, Elizaveta

    2015-01-01

    OBJECTIVES: The purpose of this study was to investigate the detection rate of prostate cancer (PCa) by multiparametric magnetic resonance imaging-targeted biopsies (mp-MRI-bx) in patients with prior negative transrectal ultrasound biopsy (TRUS-bx) sessions without previous experience of this......-RADS) and Likert classification. All underwent repeated TRUS-bx (10 cores) and mp-MRI-bx under visual TRUS guidance of any mp-MRI-suspicious lesion not targeted by systematic TRUS-bx. RESULTS: PCa was found in 39 out of 83 patients (47%) and mp-MRI identified at least one lesion with some degree of suspicion...

  17. Fiber Optic Coupled Raman Based Detection of Hazardous Liquids Concealed in Commercial Products

    Directory of Open Access Journals (Sweden)

    Michael L. Ramírez-Cedeño

    2012-01-01

    Full Text Available Raman spectroscopy has been widely proposed as a technique to nondestructively and noninvasively interrogate the contents of glass and plastic bottles. In this work, Raman spectroscopy is used in a concealed threat scenario where hazardous liquids have been intentionally mixed with common consumer products to mask its appearance or spectra. The hazardous liquids under consideration included the chemical warfare agent (CWA simulant triethyl phosphate (TEP, hydrogen peroxide, and acetone as representative of toxic industrial compounds (TICs. Fiber optic coupled Raman spectroscopy (FOCRS and partial least squares (PLS algorithm analysis were used to quantify hydrogen peroxide in whiskey, acetone in perfume, and TEP in colored beverages. Spectral data was used to evaluate if the hazardous liquids can be successfully concealed in consumer products. Results demonstrated that FOC-RS systems were able to discriminate between nonhazardous consumer products and mixtures with hazardous materials at concentrations lower than 5%.

  18. Investigation of the structure and lithology of bedrock concealed by basin fill, using ground-based magnetic-field-profile data acquired in the San Rafael Basin, southeastern Arizona

    Science.gov (United States)

    Bultman, Mark W.

    2013-01-01

    Data on the Earth’s total-intensity magnetic field acquired near ground level and at measurement intervals as small as 1 m include information on the spatial distribution of nearsurface magnetic dipoles that in many cases are unique to a specific lithology. Such spatial information is expressed in the texture (physical appearance or characteristics) of the data at scales of hundreds of meters to kilometers. These magnetic textures are characterized by several descriptive statistics, their power spectrum, and their multifractal spectrum. On the basis of a graphical comparison and textural characterization, ground-based magnetic-field profile data can be used to estimate bedrock lithology concealed by as much as 100 m of basin fill in some cases, information that is especially important in assessing and exploring for concealed mineral deposits. I demonstrate that multifractal spectra of ground-based magnetic-field-profile data can be used to differentiate exposed lithologies and that the shape and position of the multifractal spectrum of the ground-based magnetic-field-profile of concealed lithologies can be matched to the upward-continued multifractal spectrum of an exposed lithology to help distinguish the concealed lithology. In addition, ground-based magnetic-field-profile data also detect minute differences in the magnetic susceptibility of rocks over small horizontal and vertical distances and so can be used for precise modeling of bedrock geometry and structure, even when that bedrock is concealed by 100 m or more of nonmagnetic basin fill. Such data contain valuable geologic information on the bedrock concealed by basin fill that may not be so visible in aeromagnetic data, including areas of hydrothermal alteration, faults, and other bedrock structures. Interpretation of these data in the San Rafael Basin, southeastern Arizona, has yielded results for estimating concealed lithologies, concealed structural geology, and a concealed potential mineral

  19. Concealing emotions: nurses' experiences with induced abortion care.

    Science.gov (United States)

    Yang, Cheng-Fang; Che, Hui-Lian; Hsieh, Hsin-Wan; Wu, Shu-Mei

    2016-05-01

    To explore the experiences of nurses involved with induced abortion care in the delivery room in Taiwan. Induced abortion has emotional, ethical and legal facets. In Taiwan, several studies have addressed the ethical issues, abortion methods and women's experiences with abortion care. Although abortion rates have increased, there has been insufficient attention on the views and experiences of nurses working in the delivery room who are involved with induced abortion care. Qualitative, semistructured interviews. This study used a purposive sampling method. In total, 22 nurses involved with induced abortion care were selected. Semistructured interviews with guidelines were conducted, and the content analysis method was used to analyse the data. Our study identified one main theme and five associated subthemes: concealing emotions, which included the inability to refuse, contradictory emotions, mental unease, respect for life and self-protection. This is the first specific qualitative study performed in Taiwan to explore nurses' experiences, and this study also sought to address the concealing of emotions by nurses when they perform induced abortion care, which causes moral distress and creates ethical dilemmas. The findings of this study showed that social-cultural beliefs profoundly influence nurses' values and that the rights of nurses are neglected. The profession should promote small-group and case-study discussions, the clarification of values and reflective thinking among nurses. Continued professional education that provides stress relief will allow nurses to develop self-healing and self-care behaviours, which will enable them to overcome the fear of death while strengthening pregnancy termination counselling, leading to better quality professional care. © 2016 John Wiley & Sons Ltd.

  20. Informing cancer patient based on his type of personality: the suspicious (paranoid) patient.

    Science.gov (United States)

    Kallergis, G

    2013-01-01

    Imparting bad news had always been an unpleasant task for the physician, as shown from ancient years to our days. In the healthcare sector and as far as the cancer patient is concerned, the imparting of bad news is performed by the patient's doctor within a therapeutic relationship of course. The fundamental question is how a therapist could tailor the information to any patient and if "Is it possible to determine who should be told what, when and how ?". The aim of this paper was to describe the suspicious character or type of personality thoroughly so that any physician can make a diagnosis and tailor the information strategy to the patient's needs. As method of research was used the qualitative method through groups with doctors and nurses, while research within groups lasted for 5 years. The degree of informing of the suspicious personality in the range "minimal - small - medium - large - very large" is : the degree of denial varies between large and very large. The degree of informing varies between medium and small and sometimes minimal. Informing the Family: The hardest family to deal with. Pay attention to litigious mania. Avoid confrontation or be drawn into agreeing with the family views.

  1. Bayesian interpolation in a dynamic sinusoidal model with application to packet-loss concealment

    DEFF Research Database (Denmark)

    Nielsen, Jesper Kjær; Christensen, Mads Græsbøll; Cemgil, Ali Taylan

    2010-01-01

    a Bayesian inference scheme for the missing observations, hidden states and model parameters of the dynamic model. The inference scheme is based on a Markov chain Monte Carlo method known as Gibbs sampler. We illustrate the performance of the inference scheme to the application of packet-loss concealment...

  2. [Effects of false memories on the Concealed Information Test].

    Science.gov (United States)

    Zaitsu, Wataru

    2012-10-01

    The effects of false memories on polygraph examinations with the Concealed Information Test (CIT) were investigated by using the Deese-Roediger-McDermott (DRM) paradigm, which allows participants to evoke false memories. Physiological responses to questions consisting of learned, lure, and unlearned items were measured and recorded. The results indicated that responses to lure questions showed critical responses to questions about learned items. These responses included repression of respiration, an increase in electrodermal activity, and a drop in heart rate. These results suggest that critical response patterns are generated in the peripheral nervous system by true and false memories.

  3. Living with a concealable stigmatized identity: the impact of anticipated stigma, centrality, salience, and cultural stigma on psychological distress and health.

    Science.gov (United States)

    Quinn, Diane M; Chaudoir, Stephenie R

    2009-10-01

    The current research provides a framework for understanding how concealable stigmatized identities impact people's psychological well-being and health. The authors hypothesize that increased anticipated stigma, greater centrality of the stigmatized identity to the self, increased salience of the identity, and possession of a stigma that is more strongly culturally devalued all predict heightened psychological distress. In Study 1, the hypotheses were supported with a sample of 300 participants who possessed 13 different concealable stigmatized identities. Analyses comparing people with an associative stigma to those with a personal stigma showed that people with an associative stigma report less distress and that this difference is fully mediated by decreased anticipated stigma, centrality, and salience. Study 2 sought to replicate the findings of Study 1 with a sample of 235 participants possessing concealable stigmatized identities and to extend the model to predicting health outcomes. Structural equation modeling showed that anticipated stigma and cultural stigma were directly related to self-reported health outcomes. Discussion centers on understanding the implications of intraindividual processes (anticipated stigma, identity centrality, and identity salience) and an external process (cultural devaluation of stigmatized identities) for mental and physical health among people living with a concealable stigmatized identity. 2009 APA, all rights reserved.

  4. The added value of contrast enhanced spectral mammography in identification of multiplicity of suspicious lesions in dense breast

    Directory of Open Access Journals (Sweden)

    Amr Farouk Ibrahim Moustafa

    2018-03-01

    Full Text Available Objective: To evaluate the additive value of Contrast Enhanced Spectral Mammography (CESM in the preoperative assessment of malignant lesions in dense breast parenchyma regarding multiplicity. Material and methods: The study included 160 women having heterogeneous dense breast parenchyma (ACR c and d with suspicious lesions identified on sono mammography examination. All patients performed contrast enhanced spectral mammography to confirm or exclude lesion multiplicity. The number of lesions was calculated in the contrast high energy subtraction images with the reference standard being histopathological analysis. Results: Adding CESM to sono-mammography the accuracy in identifying multiple malignant lesion increased from 81.8% accuracy of sono-mammography up to 100% accuracy after adding CESM. Conclusion: Contrast enhanced spectral mammogram showed an added value in the preoperative assessment of breast masses increasing the accuracy of detection of lesions and multiplicity (multifocality and multi-centricity. Keywords: Breast cancer, Contrast enhanced spectral mammogram

  5. Concealment tactics among HIV-positive nurses in Uganda.

    Science.gov (United States)

    Kyakuwa, Margaret; Hardon, Anita

    2012-01-01

    This paper is based on two-and-a-half years of ethnographic fieldwork in two rural Ugandan health centres during a period of ART scale-up. Around one-third of the nurses in these two sites were themselves HIV-positive but most concealed their status. We describe how a group of HIV-positive nurses set up a secret circle to talk about their predicament as HIV-positive healthcare professionals and how they developed innovative care technologies to overcome the skin rashes caused by ART that threatened to give them away. Together with patients and a traditional healer, the nurses resisted hegemonic biomedical norms denouncing herbal medicines and then devised and advocated for a herbal skin cream treatment to be included in the ART programme.

  6. Evaluation of a mammographic stereotactic device for localization, fine-needle aspiration cytologic studies, and core biopsy of suspicious lesions

    International Nuclear Information System (INIS)

    Fajardo, L.J.; Davey, G.A.

    1988-01-01

    Mammography-guided interventional breast procedures, such as preoperative localization, fine-needle aspiration cytology (FNAC), and core biopsy of suspicious lesions, require accurate three-dimensional localization. The authors have evaluated a prototype stereotactic mammography device for localizing abnormalities with both phantom and clinical studies. Twenty-six localizations on a phantom were within 0.5 mm +- 0.93 (standard deviation) from the lesions; accuracy in clinical procedures was within 0.6 mm +- 0.8. Procedures are performed an average of 8 minutes faster with this device. They are prospectively evaluating mammography-guided FNAC and core biopsy of suspicious lesions in 100 patients. Results of FNAC performed without the stereotactic device agreed with results of open surgical biopsy in six of eight patients; results of core biopsy agreed in seven of eight

  7. Face and voice as social stimuli enhance differential physiological responding in a Concealed Information Test

    Directory of Open Access Journals (Sweden)

    Wolfgang eAmbach

    2012-11-01

    Full Text Available Attentional, intentional, and motivational factors are known to influence the physiological responses in a Concealed Information Test (CIT. Although concealing information is essentially a social action closely related to motivation, CIT studies typically rely on testing participants in an environment lacking of social stimuli: Subjects interact with a computer while sitting alone in an experimental room. To address this gap, we examined the influence of social stimuli on the physiological responses in a CIT.Seventy-one participants underwent a mock-crime experiment with a modified CIT. In a between-subjects design, subjects were either questioned acoustically by a pre-recorded male voice presented together with a virtual male experimenter’s uniform face or by a text field on the screen, which displayed the question devoid of face and voice. Electrodermal activity (EDA, respiration line length (RLL, phasic heart rate (pHR, and finger pulse waveform length (FPWL were registered. The Psychopathic Personality Inventory - Revised (PPI-R was administered in addition. The differential responses of RLL, pHR, and FPWL to probe vs. irrelevant items were greater in the condition with social stimuli than in the text condition; interestingly, the differential responses of EDA did not differ between conditions. No modulatory influence of the PPI-R sum or subscale scores was found.The results emphasize the relevance of social aspects in the process of concealing information and in its detection. Attentional demands as well as the participants’ motivation to avoid detection might be the important links between social stimuli and physiological responses in the CIT.

  8. Combining Blink, Pupil, and Response Time Measures in a Concealed Knowledge Test

    Directory of Open Access Journals (Sweden)

    Travis eSeymour

    2013-02-01

    Full Text Available The response time (RT based Concealed Knowledge Test (CKT has been shown to accurately detect participants’ knowledge of mock-crime related information. Tests based on ocular measures such as pupil size and blink rate have sometimes resulted in poor classification, or lacked detailed classification analyses. The present study examines the fitness of multiple pupil and blink related responses in the CKT paradigm. To maximize classification efficiency, participants’ concealed knowledge was assessed using both individual test measures and combinations of test measures. Results show that individual pupil-size, pupil-slope, and pre-response blink-rate measures produce efficient classifications. Combining pupil and blink measures yielded more accuracy classifications than individual ocular measures. Although RT-based tests proved efficient, combining RT with ocular measures had little incremental benefit. It is argued that covertly assessing ocular measures during RT-based tests may guard against effective countermeasure use in applied settings. A compound classification procedure was used to categorize individual participants and yielded high hit rates and low false-alarm rates without the need for adjustments between test paradigms or subject populations. We conclude that with appropriate test paradigms and classification analyses, ocular measures may prove as effective as other indices, though additional research is needed.

  9. Geophysical techniques for exploration of concealed uranium deposits in the Gwalior basin

    International Nuclear Information System (INIS)

    Choudhary, Kalpan; Singh, R.B.

    2004-01-01

    There is no direct geophysical method for the exploration of concealed uranium ore. Scope of geophysics for this in the Gwalior basin comprises delineating the basement topography, demarcation or zones of intense fracturing intersecting the unconformities and to identify the presence of carbonaceous rocks, specially in the graben-like structures. These geophysical problems have been successfully solved in other places by employing IP, resistivity, SP and gravity techniques for basement mapping, identification of fracture zone/shear zone, delineation of electrical conductors like carbonaceous rocks and sulphides. Three such case histories are presented here that include: a). basement and shear/fracture zone mapping in the Vindhyan basin north of Son-Narmada lineament, b). delineation of conductive zone (proved to be carbon phyllite) in the Mahakoshal Group of Kanhara area of Sonbhadra district, UP and c). Identification of a conductive zone, proved to be sulphide body, within the Mahakoshal group in the Gurharpahar area of Sidhi and Sonbhadra districts of MP and UP respectively. In the context of exploration for concealed uranium in the Gwalior basin, it is suggested to employ IP, resistivity, SP, gravity and magnetic methods for delineation of conductive zones like carbonaceous rocks, basement topography, including the graben like structures, fracture zone, geological boundaries and demarcation of the basin boundary. (author)

  10. Detection of suspicious malignant cervical lymph nodes of unknown origin: diagnostic accuracy of ultrasound-guided fine-needle aspiration biopsy with nodal size and central necrosis correlate

    International Nuclear Information System (INIS)

    Lo, C.-P.; Chen, C.-Y.; Chin, S-.C.; Lee, K.-W.; Hsueh, C.-J.; Juan, C.-J.; Kao, H.-W.; Huang, G.-S.

    2007-01-01

    To assess the role of ultrasound-guided fine-needle aspiration biopsy (US-guided FNAB) in the diagnostic workup of suspicious malignant cervical lymph nodes in patients with palpable neck masses and without known primary cancer. The diagnostic accuracy of imaging morphologic criteria, including sizes and central necrosis for assessing suspicious malignant nodes, were also examined. This is a retrospective study of 426 patients with palpable neck masses from an outpatient department evaluated with computed tomography, magnetic resonance imaging, or US. US-guided FNABs were performed in 102 patients with suspicious malignant cervical lymph nodes at a single institution. Cytologically positive lymph nodes (n = 12) were further validated with excisional biopsy. Negative lymph nodes (n = 90) were either excised (n = 10) or followed up by imaging studies for at least one year (n = 80). The diagnostic accuracy of the FNABs along with the imaging findings of nodal sizes and presence of central necrosis, which were classified by a consensus of 2 radiologists, were assessed. Twelve malignant nodes were detected with US-guided FNAB with one false-positive and one false-negative result. The overall sensitivity, specificity, and accuracy for FNAB were 91.7%, 98.9%, and 98.0%. respectively. The sensitivity, specificity, and accuracy were 66.7%, 30.0%, and 34.3% for size criterion and 75.0%, 83.3%, and 82.3% for central necrosis criterion. The size of cervical lymph node does not appear to be an important imaging criterion for assessing suspicious malignant lymph nodes, compared with the criterion of central necrosis. US-guided FNAB is highly specific and sensitive in the diagnostic workup of suspicious malignant cervical lymph nodes in patients without known primary cancers. (author)

  11. What's on your mind? Recent advances in memory detection using the Concealed Information Test

    NARCIS (Netherlands)

    Verschuere, B.; Meijer, E.H.

    2014-01-01

    Lie detectors can be applied in a wide variety of settings. But this advantage comes with a considerable cost: False positives. The applicability of the Concealed Information Test (CIT) is more limited, yet when it can be applied, the risk of false accusations can be set a priori at a very low

  12. Risk factors responsible for atrial fibrillation development between symptomatic patients with concealed or manifest atrioventricular accessory pathways

    Directory of Open Access Journals (Sweden)

    Mu Chen

    2015-06-01

    Conclusions: Results from this study demonstrate that the risk factors of AF are not homogenous between concealed and manifest APs, which might suggest heterogeneous pathogenesis of AF in these two types of APs.

  13. Error in laboratory report data for platelet count assessment in patients suspicious for dengue: a note from observation

    Directory of Open Access Journals (Sweden)

    Somsri Wiwanitkit

    2016-08-01

    Full Text Available Dengue is a common tropical infection that is still a global health threat. An important laboratory parameter for the management of dengue is platelet count. Platelet count is an useful test for diagnosis and following up on dengue. However, errors in laboratory reports can occur. This study is a retrospective analysis on laboratory report data of complete blood count in cases with suspicious dengue in a medical center within 1 month period during the outbreak season on October, 2015. According to the studied period, there were 184 requests for complete blood count for cases suspected for dengue. From those 184 laboratory report records, errors can be seen in 12 reports (6.5%. This study demonstrates that there are considerable high rate of post-analytical errors in laboratory reports. Interestingly, the platelet count in those erroneous reports can be unreliable and ineffective or problematic when it is used for the management of dengue suspicious patients.

  14. Prospective effects of social support on internalized homonegativity and sexual identity concealment among middle-aged and older gay men: a longitudinal cohort study.

    Science.gov (United States)

    Lyons, Anthony; Pepping, Christopher A

    2017-09-01

    Middle-aged and older gay men experience higher rates of depression and anxiety compared to their heterosexual counterparts, with internalized homonegativity and sexual identity concealment known to be major stress-related contributors. This study examined the prospective effect of different types and sources of social support on internalized homonegativity and sexual identity concealment experienced among middle-aged and older gay men. A longitudinal survey involving two waves of data collection separated by 12 months was conducted among a cohort of 186 gay-identified men aged 40 years and older. Two types of social support were found to be important. Greater baseline tangible or practical support independently predicted lower internalized homonegativity at 12-month follow-up, while greater baseline emotional or psychological support independently predicted a lower tendency toward sexual identity concealment at 12-month follow-up. Greater baseline support from community or government agencies, such as health services and support organizations, predicted higher internalized homonegativity at 12-month follow-up. These findings suggest that tangible and emotional support may be beneficial in reducing internalized homonegativity and sexual identity concealment among middle-aged and older gay men. Ensuring that services provide environments that do not compound the stressful impact of stigma also appears to be important.

  15. The manifest but concealed background of our communication

    Directory of Open Access Journals (Sweden)

    Erkut SEZGIN

    2012-01-01

    Full Text Available That manifest background needs to be elucidated as against intentional memory and imagination habits structured by our learning and operating with rules and pictures (representations of language. That’s the background which is concealed by our very demonstrative forms of expressions meaning and speaking habits expressed by intentional gestures and gesticulations of meaning the surrounding differences and identities: As if they are self essential representative of their own truth and certainty, which is supposed to be meant by the demonstrative, intentional form of the expression. While on the other hand, such intentional demonstrative gestures and gesticulations of meaning operate as conditioned forms of expressions of truth beliefs of imagination and memory habits expressed in reaction to the differences and identities pictured (represented by names and descriptions in deep oblivion of the internal signifying connections of the Use of pictures.

  16. Automatic detection of suspicious behavior of pickpockets with track-based features in a shopping mall

    OpenAIRE

    Bouma, H.; Baan, J.; Burghouts, G.J.; Eendebak, P.T.; Huis, J.R. van; Dijk, J.; Rest, J.H.C. van

    2014-01-01

    Proactive detection of incidents is required to decrease the cost of security incidents. This paper focusses on the automatic early detection of suspicious behavior of pickpockets with track-based features in a crowded shopping mall. Our method consists of several steps: pedestrian tracking, feature computation and pickpocket recognition. This is challenging because the environment is crowded, people move freely through areas which cannot be covered by a single camera, because the actual snat...

  17. Computerized classification of suspicious regions in chest radiographs using subregion Hotelling observers

    International Nuclear Information System (INIS)

    Baydush, Alan H.; Catarious, David M. Jr.; Lo, Joseph Y.; Abbey, Craig K.; Floyd, Carey E. Jr.

    2001-01-01

    We propose to investigate the use of subregion Hotelling observers (SRHOs) in conjunction with perceptrons for the computerized classification of suspicious regions in chest radiographs for being nodules requiring follow up. Previously, 239 regions of interest (ROIs), each containing a suspicious lesion with proven classification, were collected. We chose to investigate the use of SRHOs as part of a multilayer classifier to determine the presence of a nodule. Each SRHO incorporates information about signal, background, and noise correlation for classification. For this study, 225 separate Hotelling observers were set up in a grid across each ROI. Each separate observer discriminates an 8 by 8 pixel area. A round robin sampling scheme was used to generate the 225 features, where each feature is the output of the individual observers. These features were then rank ordered by the magnitude of the weights of a perceptron. Once rank ordered, subsets of increasing number of features were selected to be used in another perceptron. This perceptron was trained to minimize mean squared error and the output was a continuous variable representing the likelihood of the region being a nodule. Performance was evaluated by receiver operating characteristic (ROC) analysis and reported as the area under the curve (A Z ). The classifier was optimized by adding additional features until the A Z declined. The optimized subset of observers then were combined using a third perceptron. A subset of 80 features was selected which gave an A Z of 0.972. Additionally, at 98.6% sensitivity, the classifier had a specificity of 71.3% and increased the positive predictive value from 60.7% to 84.1%. Preliminary results suggest that using SRHOs in combination with perceptrons can provide a successful classification scheme for pulmonary nodules. This approach could be incorporated into a larger computer aided detection system for decreasing false positives

  18. The Concealed Information Test in the Laboratory Versus Japanese Field Practice: Bridging the Scientist-Practitioner Gap

    NARCIS (Netherlands)

    Ogawa, T.; Matsuda, I.; Tsuneoka, M.; Verschuere, B.

    2015-01-01

    Whereas the Concealed Information Test (CIT) is heavily researched in laboratories, Japan is the only country that applies it on a large scale to real criminal investigations. Here we note that important differences exist in CIT design, data-analysis, and test conclusions between these two settings.

  19. Specific NIST projects in support of the NIJ Concealed Weapon Detection and Imaging Program

    Science.gov (United States)

    Paulter, Nicholas G.

    1998-12-01

    The Electricity Division of the National Institute of Standards and Technology is developing revised performance standards for hand-held (HH) and walk-through (WT) metal weapon detectors, test procedures and systems for these detectors, and a detection/imaging system for finding concealed weapons. The revised standards will replace the existing National Institute of Justice (NIJ) standards for HH and WT devices and will include detection performance specifications as well as system specifications (environmental conditions, mechanical strength and safety, response reproducibility and repeatability, quality assurance, test reporting, etc.). These system requirements were obtained from the Law Enforcement and corrections Technology Advisory Council, an advisory council for the NIJ. Reproducible and repeatable test procedures and appropriate measurement systems will be developed for evaluating HH and WT detection performance. A guide to the technology and application of non- eddy-current-based detection/imaging methods (such as acoustic, passive millimeter-wave and microwave, active millimeter-wave and terahertz-wave, x-ray, etc.) Will be developed. The Electricity Division is also researching the development of a high- frequency/high-speed (300 GH to 1 THz) pulse-illuminated, stand- off, video-rate, concealed weapons/contraband imaging system.

  20. Between Concealing and Revealing Intersexed Bodies: Parental Strategies.

    Science.gov (United States)

    Danon, Limor Meoded; Krämer, Anike

    2017-08-01

    Parents of intersex children are perceived in many studies as hopeless, highly dependent on the medical system, and as gate keepers of normative gendered bodies. In this article, we challenge these perceptions and argue that parents of intersex children are problematically positioned between their children's needs for care and well-being and the socialmedical forces that aim to "normalize" them. Their in-between position leads them to establish different parental strategies within and outside of traditional sex/gender norms. We focus on three intertwined parental strategy frameworks: bodily dialogue, sex/gender framing, and concealing/revealing practices, and describe how, in each of these strategic frameworks, the parents maneuver, act in accordance with or against, react to, and challenge the medical system, social interactions, and the sex/gender paradigm. This is a comparative study based on narrative interviews with 22 parents of intersex children in Germany and Israel.

  1. Visualization of suspicious lesions in breast MRI based on intelligent neural systems

    Science.gov (United States)

    Twellmann, Thorsten; Lange, Oliver; Nattkemper, Tim Wilhelm; Meyer-Bäse, Anke

    2006-05-01

    Intelligent medical systems based on supervised and unsupervised artificial neural networks are applied to the automatic visualization and classification of suspicious lesions in breast MRI. These systems represent an important component of future sophisticated computer-aided diagnosis systems and enable the extraction of spatial and temporal features of dynamic MRI data stemming from patients with confirmed lesion diagnosis. By taking into account the heterogenity of the cancerous tissue, these techniques reveal the malignant, benign and normal kinetic signals and and provide a regional subclassification of pathological breast tissue. Intelligent medical systems are expected to have substantial implications in healthcare politics by contributing to the diagnosis of indeterminate breast lesions by non-invasive imaging.

  2. Prevention of firearm-related injuries with restrictive licensing and concealed carry laws: An Eastern Association for the Surgery of Trauma systematic review.

    Science.gov (United States)

    Crandall, Marie; Eastman, Alexander; Violano, Pina; Greene, Wendy; Allen, Steven; Block, Ernest; Christmas, Ashley Britton; Dennis, Andrew; Duncan, Thomas; Foster, Shannon; Goldberg, Stephanie; Hirsh, Michael; Joseph, D'Andrea; Lommel, Karen; Pappas, Peter; Shillinglaw, William

    2016-11-01

    In the past decade, more than 300,000 people in the United States have died from firearm injuries. Our goal was to assess the effectiveness of two particular prevention strategies, restrictive licensing of firearms and concealed carry laws, on firearm-related injuries in the US Restrictive Licensing was defined to include denials of ownership for various offenses, such as performing background checks for domestic violence and felony convictions. Concealed carry laws allow licensed individuals to carry concealed weapons. A comprehensive review of the literature was performed. We used Grading of Recommendations Assessment, Development, and Evaluation methodology to assess the breadth and quality of the data specific to our Population, Intervention, Comparator, Outcomes (PICO) questions. A total of 4673 studies were initially identified, then seven more added after two subsequent, additional literature reviews. Of these, 3,623 remained after removing duplicates; 225 case reports, case series, and reviews were excluded, and 3,379 studies were removed because they did not focus on prevention or did not address our comparators of interest. This left a total of 14 studies which merited inclusion for PICO 1 and 13 studies which merited inclusion for PICO 2. PICO 1: We recommend the use of restrictive licensing to reduce firearm-related injuries.PICO 2: We recommend against the use of concealed carry laws to reduce firearm-related injuries.This committee found an association between more restrictive licensing and lower firearm injury rates. All 14 studies were population-based, longitudinal, used modeling to control for covariates, and 11 of the 14 were multi-state. Twelve of the studies reported reductions in firearm injuries, from 7% to 40%. We found no consistent effect of concealed carry laws. Of note, the varied quality of the available data demonstrates a significant information gap, and this committee recommends that we as a society foster a nurturing and encouraging

  3. Subcategorization of Suspicious Breast Lesions (BI-RADS Category 4) According to MRI Criteria: Role of Dynamic Contrast-Enhanced and Diffusion-Weighted Imaging.

    Science.gov (United States)

    Maltez de Almeida, João Ricardo; Gomes, André Boechat; Barros, Thomas Pitangueira; Fahel, Paulo Eduardo; de Seixas Rocha, Mário

    2015-07-01

    The purposes of this study were to investigate whether dynamic contrast-enhanced MRI is adequate for subcategorization of suspicious lesions (BI-RADS category 4) and to evaluate whether use of DWI improves diagnostic performance. The study group was composed of 103 suspicious lesions found in 83 subjects. Patient ages and lesion sizes were compiled, and two radiologists reanalyzed the images; subcategorized the findings as BI-RADS 4A, 4B, or 4C; and calculated apparent diffusion coefficient (ADC) values. The stratified variables were tested by univariate analysis and inserted in two multivariate predictive models, which were used to generate ROC curves and compare AUCs. Positive predictive values (PPVs) for each subcategory and ADC level were calculated, and interobserver agreement was tested. Forty-four (42.7%) suspicious findings proved malignant. Except for age (p = 0.08), all stratified predictor variables were significant in univariate analyses (p BI-RADS 4 subcategory (4A, 0.15; 4B, 0.37; 4C, 0.84). ADC values of 1.10 × 10(-3) mm(2)/s or less had the second highest PPV (0.77). Interobserver agreement was substantial at a kappa value of 0.80 (95% CI, 0.70-0.90; p BI-RADS category 4) can be satisfactorily performed with DCE-MRI and slightly improved when DWI is introduced.

  4. 一种基于人脸对称性的差错掩盖方法%An Error Concealment Method Based on Facial Symmetry

    Institute of Scientific and Technical Information of China (English)

    赖俊; 张江鑫

    2013-01-01

    This paper presents an error concealment method based on facial symmetry .We first execute color segmentation , determine the skin color region;then judge the symmetry of this region , conceal symmetry face regions with symmetry algorithm , conceal other regions with adaptive interpolation algorithm .Using JM86 model of H.264 standard to simulate the algorithm , the experimental results show that our method achieves better conceal results when compared with traditional interpolation algorithm .%该文提出一种基于人脸对称性的差错掩盖方法。首先进行肤色分割,判断出肤色区域;然后对检测出的肤色区域进行对称性判断,选出对称的人脸区域并采用人脸对称掩盖算法进行差错掩盖,对其它区域则采用自适应插值算法。采用H.264的JM86模型对算法进行验证,实验结果表明,与传统的插值算法相比,该文算法利用了人脸的对称性,对于对称的人脸区域获得了更好的掩盖效果。

  5. Detecting concealed information from groups using a dynamic questioning approach: simultaneous skin conductance measurement and immediate feedback

    NARCIS (Netherlands)

    Meijer, E.H.; Bente, G.; Ben-Shakhar, G.; Schumacher, A.

    2013-01-01

    Lie detection procedures typically aim at determining the guilt or innocence of a single suspect. The Concealed Information Test (CIT), for example, has been shown to be highly successful in detecting the presence or absence of crime-related information in a suspect's memory. Many of today's

  6. Comparison of F-18 FDG PET and I-131 whole body scan in diagnosis of suspicious metastatic thyroid carcinoma

    International Nuclear Information System (INIS)

    Seok, Ju Won; Chung, June Key

    2005-01-01

    There are several reports about the usefulness of F-18 FDG PET in thyroid cancer. The aim of this study was to evaluate the effectiveness of F-18 FDG PET and I-131 whole body scan in suspicious metastatic thyroid cancer. There were 46 patients (11 men, 35 women; age range, 18-74yr; mean age, 47.3yr) with suspicious metastatic thyroid cancer after total thyroidectomy who performed FDG PET and I-131 scan. The interval of FDG PET and I-131 scan was within 6 months. An overall clinical evaluation was performed including cytology, thyroglobulin level, sonography, MRI and CT. Metastatic regions were divided into four areas: neck, mediastinum, lung and bone. Among 46 patients, the number of patients, metastatic lesions were detected, totaled 36 (78.3%). Twenty-nine patients (63.0%) were detected by FDG PET and 18 patients (39.1%) were detected by I-131 scan. Twenty-one patients were detected in neck by two methods. Nineteen patients (90.5%) were detected by FDG PET and 7 patients (33.3%) were detected by I-131 scan. Eighteen patients were detected in mediastinum by two methods. Ten patients (55.5%) were detected by FDG PET and 10 patients (55.5%) were detected by I-131 scan. Ten patients were detected in lung by two methods. Nine patients (90.0%) were detected by FDG PET and 3 patients (30.0%) were detected by I-131 scan. Three patients were detected in bone by two methods. Three patients (100%) were detected by FDG PET and 0 patients (0%) were detected by I-131 scan. These data indicate that for detecting metastatic lesions, F-18 FDG PET and I-131 whole body scan may provide complementary information. Thus, the combination of FDG PET and I-131 scan is the method of choice for detecting suspicious metastatic thyroid cancer after total thyroidectomy

  7. Are There Limits to Collectivism? Culture and Children's Reasoning About Lying to Conceal a Group Transgression.

    Science.gov (United States)

    Sweet, Monica A; Heyman, Gail D; Fu, Genyue; Lee, Kang

    2010-07-01

    This study explored the effects of collectivism on lying to conceal a group transgression. Seven-, 9-, and 11-year-old US and Chinese children (N = 374) were asked to evaluate stories in which protagonists either lied or told the truth about their group's transgression and were then asked about either the protagonist's motivations or justification for their own evaluations. Previous research suggests that children in collectivist societies such as China find lying for one's group to be more acceptable than do children from individualistic societies such as the United States. The current study provides evidence that this is not always the case: Chinese children in this study viewed lies told to conceal a group's transgressions less favourably than did US children. An examination of children's reasoning about protagonists' motivations for lying indicated that children in both countries focused on an impact to self when discussing motivations for protagonists to lie for their group. Overall, results suggest that children living in collectivist societies do not always focus on the needs of the group.

  8. Anxiety/Depression and Hostility/Suspiciousness in Adolescent Boys: Testing Adherence to Honor Code as Mediator of Callousness and Attachment Insecurity

    Science.gov (United States)

    Somech, Lior Y.; Elizur, Yoel

    2012-01-01

    Research of psychological distress (PD) needs to differentiate between anxiety/depression and hostility/suspiciousness, which are associated with different motivational systems. In this study, structural equation modeling was used to test two hypothesized models for the prediction of each facet of PD. Hypotheses were proposed about the effects of…

  9. Blood pressure shifts resulting from a concealed arteriovenous fistula associated with an iliac aneurysm: a case report.

    Science.gov (United States)

    Doi, Shintaro; Motoyama, Yoshiaki; Ito, Hiromi

    2016-01-01

    A solitary iliac aneurysm (SIA) is more uncommon than an abdominal aortic aneurysm. The aneurysm is located in the deep pelvis and is diagnosed when it reaches a large size with symptoms of compression around adjacent structures and organs or when it ruptures. A definite diagnosis of an arteriovenous fistula (AVF) associated with a SIA is difficult preoperatively because there might not be enough symptoms and time for diagnosis. Here, we present a patient with asymptomatic rupture of SIA into the common iliac vein with characteristic blood pressure shifts. A 41-year-old man with a huge SIA underwent aortobifemoral graft replacement. Preoperatively, his blood pressure showed characteristic shifts for one or two heartbeats out of five beats, indicating that an AVF was present and that the shunt was about to having a high flow. During surgery, an AVF associated with the SIA was found to be concealed owing to compression from the huge iliac artery aneurysm, and the shunt showed a high flow, resulting in shock during the surgery. No complications were noted after aortobifemoral graft replacement. Postoperatively, we noted an enhanced paravertebral vein on computed tomography (CT), which indicated the presence of an AVF. Definite diagnosis of an AVF offers advantages in surgical and anesthetic management. We emphasize that a large SIA can push the iliac vein and occlude an AVF laceration, concealing the enhancement of the veins in the arterial phase on CT. Blood pressure shifts might predict the existence of a concealed AVF that has a large shunt. Even if the vena cava and the iliac veins are not enhanced on CT, anesthesiologists should carefully determine whether their distal branches are enhanced.

  10. Student Perceptions of Auditor Responses to Evidence of Suspicious Activities: An Experimental Assessment

    Directory of Open Access Journals (Sweden)

    David S Murphy

    2015-12-01

    Full Text Available This study assessed student perceptions of auditor responses to evidence that a client failed to respond appropriately to suspicious activities that could indicate money laundering. Subjects were presented with a series of randomized cases in which partner type (new vs. experienced, firm type (regional vs. international and audit fee materiality (not material, material to the local office only, material to the firm were manipulated asked to indicate their perceptions of the likelihood that an audit partner would discuss such evidence with the client, and the likelihood that the issue would be disclosed by the auditor. Both partner type and audit fee materiality was found to have significant effects on perceived likelihoods.

  11. The effects of sweep numbers per average and protocol type on the accuracy of the p300-based concealed information test.

    Science.gov (United States)

    Dietrich, Ariana B; Hu, Xiaoqing; Rosenfeld, J Peter

    2014-03-01

    In the first of two experiments, we compared the accuracy of the P300 concealed information test protocol as a function of numbers of trials experienced by subjects and ERP averages analyzed by investigators. Contrary to Farwell et al. (Cogn Neurodyn 6(2):115-154, 2012), we found no evidence that 100 trial based averages are more accurate than 66 or 33 trial based averages (all numbers led to accuracies of 84-94 %). There was actually a trend favoring the lowest trial numbers. The second study compared numbers of irrelevant stimuli recalled and recognized in the 3-stimulus protocol versus the complex trial protocol (Rosenfeld in Memory detection: theory and application of the concealed information test, Cambridge University Press, New York, pp 63-89, 2011). Again, in contrast to expectations from Farwell et al. (Cogn Neurodyn 6(2):115-154, 2012), there were no differences between protocols, although there were more irrelevant stimuli recognized than recalled, and irrelevant 4-digit number group stimuli were neither recalled nor recognized as well as irrelevant city name stimuli. We therefore conclude that stimulus processing in the P300-based complex trial protocol-with no more than 33 sweep averages-is adequate to allow accurate detection of concealed information.

  12. [EFFECTIVENESS OF ADVANCED SKIN FLAP AND V-SHAPED VENTRAL INCISION ALONG THE ROOT OF PENILE SHAFT FOR CONCEALED PENIS].

    Science.gov (United States)

    Lin, Junshan; Li, Dumiao; Zhang, Jianxing; Wu, Qiang; Xu, Yali; Lin, Li

    2015-09-01

    To investigate effectiveness of advanced skin flap and V-shaped ventral incision along the root of penile shaft for concealed penis in children. Between July 2007 and January 2015, 121 boys with concealed penis were treated with advanced skin flap and V-shaped ventral incision along the root of penile shaft. The age varied from 18 months to 13 years (mean, 7.2 years). Repair was based on a vertical incision in median raphe, complete degloving of penis and tacking its base to the dermis of the skin. Advanced skin flap and a V-shaped ventral incision along the root of penile shaft were used to cover the penile shaft. The operation time ranged from 60 to 100 minutes (mean, 75 minutes). Disruption of wound occurred in 1 case, and was cured after dressing change; and primary healing of incision was obtained in the others. The follow-up period ranged from 3 months to 7 years (median, 24 months). All patients achieved good to excellent cosmetic results with a low incidence of complications. The results were satisfactory in exposure of penis and prepuce appearance. No obvious scar was observed. The penis had similar appearance to that after prepuce circumcision. A combination of advanced skin flap and V-shaped ventral incision along the root of penile shaft is a simple, safe, and effective procedure for concealed penis with a similar appearance result to the prepuce circumcision.

  13. Crustal concealing of small-scale core-field secular variation

    DEFF Research Database (Denmark)

    Hulot, G.; Olsen, Nils; Thebault, E.

    2009-01-01

    of internal origin happen to be detectable now in spherical harmonic degrees up to, perhaps, 16. All of these changes are usually attributed to changes in the core field itself, the secular variation, on the ground that the lithospheric magnetization cannot produce such signals. It has, however, been pointed...... out, on empirical grounds, that temporal changes in the field of internal origin produced by the induced part of the lithospheric magnetization could dominate the core field signal beyond degree 22. This short note revisits this issue by taking advantage of our improved knowledge of the small...... cause of the observed changes in the field of internal origin up to some critical degree, N-C, is indeed likely to be the secular variation of the core field, but that the signal produced by the time-varying lithospheric field is bound to dominate and conceal the time-varying core signal beyond...

  14. Sharp and blunt force trauma concealment by thermal alteration in homicides: an in-vitro experiment for methodology and protocol development in forensic anthropological analysis of burnt bones

    OpenAIRE

    Macoveciuc, I; Marquez-Grant, N; Horsfall, I; Zioupos, P

    2017-01-01

    Burning of human remains is one method used by perpetrators to conceal fatal trauma and expert opinions regarding the degree of skeletal evidence concealment are often disparate. This experiment aimed to reduce this incongruence in forensic anthropological interpretation of burned human remains and implicitly contribute to the development of research methodologies sufficiently robust to withstand forensic scrutiny in the courtroom. We have tested the influence of thermal alteration on pre-exi...

  15. Self-Concealment, Social Network Sites Usage, Social Appearance Anxiety, Loneliness of High School Students: A Model Testing

    Science.gov (United States)

    Dogan, Ugur; Çolak, Tugba Seda

    2016-01-01

    This study was tested a model for explain to social networks sites (SNS) usage with structural equation modeling (SEM). Using SEM on a sample of 475 high school students (35% male, 65% female) students, model was investigated the relationship between self-concealment, social appearance anxiety, loneliness on SNS such as Twitter and Facebook usage.…

  16. Narratives around concealment and agency for stigma-reduction: a study of women affected by leprosy in Cirebon District, Indonesia.

    NARCIS (Netherlands)

    Peters, R.M.H.; Hofker, M.E.; Zweekhorst, M.B.M.; van Brakel, W.H.; Bunders-Aelen, J.G.F.

    2014-01-01

    Purpose: This study analyses the experiences of women affected by leprosy, taking into consideration whether they concealed or disclosed their status, and looks specifically at their ‘agency’. The aim is to provide recommendations for stigma-reduction interventions. Methods: The study population

  17. Presence of histopathological premalignant lesions and infection caused by high-risk genotypes of human papillomavirus in patients with suspicious cytological and colposcopy results: A prospective study

    Directory of Open Access Journals (Sweden)

    Golubović Mileta

    2017-01-01

    Full Text Available Background/Aim. In patients with premalignant cervical lesions, human papillomavirus (HPV infection, at any moment, may be spontaneously eliminated, or may persist or transform cervical epithelium from a lower to a higher degree. Due to that, it is necessary to wisely select the patients who are at high risk of cancer development. The aim of the study was to establish the interdependence between a suspicious Papanicolaou (Pap test and colposcopy with the infection caused by high-risk genotypes of human papillomavirus and the presence of premalignant cervical lesions. Methods. This prospective study used cytological, colposcopy, real-time polymerase chain reaction (PCR of high-risk genotypes of human papillomavirus and histopathological analysis of cervical biopsy specimen. Out of 2,578 female patients sent to cytological analyses in Clinical Center of Montenegro, during 2012, 2013 and 2014, the study included 80 women who had to submit their biopsy specimens due to a suspicious Pap test and atypical colposcopy results. Results. In the group of 80 (3.1%; n = 80/2,578 of the selected female patients with suspicious Pap test and colposcopy, 2/3 or 56 (70% of them had cervicitis, and 1/3 or 24 (30% had cervical intraepithelial neoplasia. The most common type in cervical intraepithelial neoplasia was HPV16 in 8 female patients, ie 61.53% out of the number of infected, or 33.33% out of the total number of premalignant lesions. Conclusion. Patients with suspicious Papanicolaou test, colposcopy results and infection which is caused by high-risk HPV infection (HPV 16 in particular often have premalignant cervical lesions. In these cases, histopathological confirmation of lesions is mandatory, since it serves as a definitive diagnostic procedure.

  18. A comparisonof lymphocytic thyroiditis with papillary thyroid carcinoma showing suspicious ultrasonographic findings in a background of heterogeneous parenchyma

    Energy Technology Data Exchange (ETDEWEB)

    Nam, Sang Yu; Shin, Jung Hee; Ko, Eun Young; Hahn, Soo Yeon [Dept. of Radiology, Samsung Medicine Center, Sungkyunkwan University School of Medicine, Seoul (Korea, Republic of)

    2015-01-15

    The aim of this study was to compare ultrasonographic features in patients with lymphocytic thyroiditis (LT) and papillary thyroid carcinoma (PTC) having suspicious thyroid nodule(s) in a background of heterogeneous parenchyma and to determine the clinical and radiological predictors of malignancy. We reviewed the cases of 100 patients who underwent ultrasonography between April 2011 and October 2012, and showed suspicious thyroid nodule(s) in a background of heterogeneous parenchyma. Eight patients who did not undergo ultrasonography-guided fineneedle aspiration cytology (FNAC) and 34 cases of follow-up ultrasonography after initial FNAC were excluded. We compared the benign and malignant nodules in terms of their clinical and radiological factors. For the 58 nodules including 31 LTs (53.4%) and 27 PTCs (46.6%), the mean tumor sizes of the two groups were 0.96 cm for LT and 0.97 cm for PTC. A univariate analysis revealed that PTCs were more frequent in patients younger than 45 years and having microcalcifications than was LT. An independent predictor of PTC after adjustment was an age of <45 years. LT mimics malignancy in a background of heterogeneous parenchyma on ultrasonography. A young age of <45 years is the most important predictor of malignancy in this condition.

  19. HA03 as an Iranian Candidate Concealed Antigen for Vaccination against Hyalomma anatolicum anatolicum: Comparative Structural and In silico Studies

    Directory of Open Access Journals (Sweden)

    Mohammadi, A.

    2013-12-01

    Full Text Available In the last decades researchers had focused on developing a vaccine against tick based on protective antigen. Recombinant vaccines based on concealed antigen from Boophilus microplus have been developed in Australia and Cuba by the name of TICKGARD and GAVAC (De La Fuente and Kocan, 2006. Further studies on this antigen have shown some extent of protection against other species (De Vos et al., 2001. In Iran most important species is Hyalomma anatolicum and limited information about its control are available. This paper reports structural and polymorphic analysis of HA03 as an Iranian candidate concealed antigen of H. a. anatolicum deposited in Gen-Bank .(Aghaeipour et al. GQ228820. The comparison between this antigen and other mid gut concealed antigen that their characteristics are available in GenBank showed there are high rate of similarity between them. The HA03 amino acid sequence had a homology of around 89%, 64%, 56% with HA98, BM86, BM95 respectively. Potential of MHC class I and II binding region indicated a considerable variation between BM86 antigen and its efficiency against Iranian H. a. anatolicum. In addition, predicted major of hydrophobisity and similarity in N-glycosylation besides large amount of cystein and seven EGF like regions presented in protein structure revealed that value of HA03 as a new protective antigen and the necessity of the development, BM86 homolog of H. a. anatolicum HA03 based recombinant vaccine.

  20. Economic Impact of Frozen Section for Thyroid Nodules with "Suspicious for Malignancy" Cytology.

    Science.gov (United States)

    Bollig, Craig A; Gilley, David; Lesko, David; Jorgensen, Jeffrey B; Galloway, Tabitha L; Zitsch, Robert P; Dooley, Laura M

    2018-02-01

    Objective To perform a cost analysis of the routine use of intraoperative frozen section (iFS) among patients undergoing a thyroid lobectomy with "suspicious for malignancy" (SUSP) cytology in the context of the 2015 American Thyroid Association guidelines. Study Design Case series with chart review; cost minimization analysis. Setting Academic. Subjects and Methods Records were reviewed for patients with SUSP cytology who underwent thyroid surgery between 2010 and 2015 in which iFS was utilized. The diagnostic test performance of iFS and the frequency of indicated completion/total thyroidectomies based on the 2015 guidelines were calculated. A cost minimization analysis was performed comparing lobectomy, with and without iFS, and the need for completion thyroidectomy according to costs estimated from 2014 data from Medicare, the Bureau of Labor Statistics, and the Nationwide Inpatient Sample. Results Sixty-five patients met inclusion criteria. The malignancy rate was 61.5%, 45% of which was identified intraoperatively. The specificity and positive predictive value were 100%. The negative predictive value and sensitivity were 83% and 95%, respectively. Completion/total thyroidectomy was indicated for 9% of patients; 83% of these individuals had findings on iFS that would have changed management intraoperatively. Application of the new guidelines would have resulted in a significant reduction in the frequency of conversion to a total thyroidectomy when compared with the actual management (26.1% vs 7.7%, P = .005). Performing routine iFS was the less costly scenario, resulting in a savings of $474 per case. Conclusion For patients with SUSP cytology undergoing lobectomy, routine use of iFS would result in decreased health care utilization.

  1. Revaluation of breast cytology with pathologist on-site of lesions with suspicious sonographic features

    Energy Technology Data Exchange (ETDEWEB)

    Capalbo, Emanuela, E-mail: emanuelacapalbo@tiscalinet.it [Scuola di Specializzazione di Radiologia Diagnostica ed Interventistica, Università degli Studi di Milano Via Di Rudinì, Milano, 20142 Italy (Italy); Sajadidehkordi, Farideh, E-mail: faridehit@yahoo.it [Scuola di Specializzazione di Radiologia Diagnostica ed Interventistica, Università degli Studi di Milano Via Di Rudinì, Milano, 20142 Italy (Italy); Colombi, Claudio; Ticha, Vladimira; Moretti, Angela, E-mail: info.radiologia@sancarlo.mi.it [Dipartimento di Scienze Diagnostiche, UOC di Radiologia Diagnostica ed Interventistica, A.O San Carlo Borromeo. Via Pio II, 3, 20153 Milano (Italy); Peli, Michela, E-mail: peli.michela@gmail.com [Scuola di Specializzazione di Radiologia Diagnostica ed Interventistica, Università degli Studi di Milano Via Di Rudinì, Milano, 20142 Italy (Italy); Cosentino, Maria, E-mail: maria-cosentino@tiscali.it [Scuola di Specializzazione di Radiologia Diagnostica ed Interventistica, Università degli Studi di Milano Via Di Rudinì, Milano, 20142 Italy (Italy); Lovisatti, Maria, E-mail: marialovisatti@hotmail.com [Scuola di Specializzazione di Radiologia Diagnostica ed Interventistica, Università degli Studi di Milano Via Di Rudinì, Milano, 20142 Italy (Italy); Berti, Elisabetta, E-mail: eliberti@hotmail.it [Dipartimento di Scienze Diagnostiche, UOC di Anatomia Patologica, A.O San Carlo Borromeo. Via Pio II, 3, Milano 20153 (Italy); Cariati, Maurizio, E-mail: info.radiologia@sancarlo.mi.it [Dipartimento di Scienze Diagnostiche, UOC di Radiologia Diagnostica ed Interventistica, A.O San Carlo Borromeo. Via Pio II, 3, 20153 Milano (Italy)

    2013-09-15

    Objective: Evaluating correlation estimation between diagnostic ultrasound (U.S.) of breast lesions and fine needle aspiration cytology (FNAC), and the correlation between cytology and histology (I) of these lesions undergo surgery. Materials and methods: In 2010 we performed 1589 ultrasound breast. We identified 210 suspicious lesions to be subjected to FNAC, which was performed with pathologist on site, and extemporaneous analysis of the sample to assess their appropriateness. We classified the lesions in 5 ultrasound (U) classes according to the criteria defined by Echographic BIRADS Lexicon. The results of cytology were classified in 5 classes (C) according to the guidelines of F.O.N.Ca.M. Then we evaluated the diagnostic correlation between U.S. and FNAC, and between FNAC and Histology. Results: The distribution of lesions in U classes was: 57U2, 55U3, 36U4 and 62U5. The diagnostic concordance between U and FNAC was 96.7%, with a sensitivity of 98%, specificity 93%, negative and positive predictive value respectively of 94.9% and 97.3%, and diagnostic accuracy of 96.6%. The 98 patients with C4-C5 lesions were subjected to surgery and the histology confirmed high-grade malignancy of lesions with a concordance of 99.7%. Conclusions: Having achieved high diagnostic concordance between U and FNAC, and then between FNAC and histology, we may say that the FNAC, less invasive and traumatic for the patient than needle biopsy (CB), may be still a valid method when performed with pathologist on-site to assess the adequacy of the sample taken.

  2. When interference helps: Increasing executive load to facilitate deception detection in the Concealed Information Test

    Directory of Open Access Journals (Sweden)

    George eVisu-Petra

    2013-03-01

    Full Text Available The possibility to enhance the detection efficiency of the Concealed Information Test (CIT by increasing executive load was investigated, using an interference design. After learning and executing a mock crime scenario, subjects underwent three deception detection tests: an RT-based CIT, an RT-based CIT plus a concurrent memory task (CITMem, and an RT-based CIT plus a concurrent set-shifting task (CITShift. The concealed information effect, consisting in increased RT and lower response accuracy for probe items compared to irrelevant items, was evidenced across all three conditions. The group analyses indicated a larger difference between RTs to probe and irrelevant items in the dual-task conditions, but this difference was not translated in a significantly increased detection efficiency at an individual level. Signal detection parameters based on the comparison with a simulated innocent group showed accurate discrimination for all conditions. Overall response accuracy on the CITMem was highest and the difference between response accuracy to probes and irrelevants was smallest in this condition. Accuracy on the concurrent tasks (Mem and Shift was high, and responses on these tasks were significantly influenced by CIT stimulus type (probes vs. irrelevants. The findings are interpreted in relation to the cognitive load/dual-task interference literature, generating important insights for research on the involvement of executive functions in deceptive behavior.

  3. Evaluation of coping strategies in established rheumatoid arthritis patients: emergence of concealment in an Asian cohort.

    Science.gov (United States)

    Chew, Elizabeth; Griva, Konstadina; Cheung, Peter P

    2016-11-01

    To evaluate coping strategies of Asian RA patients and their associations with health-related quality of life (HRQoL). A cross-sectional sample of patients with established RA was evaluated using measures of coping (Coping in Rheumatoid Arthritis Questionnaire [C-RAQ]; appraisal of coping effectiveness and helplessness), HRQoL (Mental and Physical Components [MCS/PCS] of the Short Form 12v2; Rheumatoid Arthritis Impact of Disease score [RAID]) and clinical/laboratory assessments. Principal component analysis was conducted to identify coping strategies. Multiple linear regression analyses were performed to evaluate the associations between coping strategies and HRQoL outcomes. The study sample comprised 101 patients, 81% female, 72.3% Chinese, mean age 54.2 ± 12.6 years. Five coping strategies were identified: Active problem solving (E = 5.36), Distancing (E = 2.30), Concealment (E = 1.89), Cognitive reframing (E = 1.55) and Emotional expression (E = 1.26). Concealment was consistently associated with PCS (r s = -0.23, P = 0.049), MCS (r s = -0.24, P = 0.04) and RAID (r s = 0.39, P culture-specific. Interventions should tailor psychosocial support needs to address not only coping strategies, but patients' perception of their coping. © 2016 Asia Pacific League of Associations for Rheumatology and John Wiley & Sons Australia, Ltd.

  4. Post-clip placement MRI following second-look US-guided core biopsy for suspicious lesions identified on breast MRI

    Energy Technology Data Exchange (ETDEWEB)

    Song, Sung Eun [Seoul National University Hospital, Department of Radiology, Seoul (Korea, Republic of); Korea University Anam Hospital, Korea University College of Medicine, Department of Radiology, Seoul (Korea, Republic of); Cho, Nariya [Seoul National University Hospital, Department of Radiology, Seoul (Korea, Republic of); Seoul National University College of Medicine, Department of Radiology, Seoul (Korea, Republic of); Seoul National University Medical Research Centre, Institute of Radiation Medicine, Seoul (Korea, Republic of); Han, Wonshik [Seoul National University Hospital, Department of Surgery, Seoul (Korea, Republic of)

    2017-12-15

    To evaluate whether the post-clip placement MRI following second-look ultrasound (US)-guided core biopsy is useful to confirm the adequate sampling of suspicious lesions identified on breast MRI. Between 2014 and 2016, 31 consecutive women with 34 suspicious lesions that had not been identified on previous mammography or US were detected using MRI. Among them, 26 women with 29 lesions (mean size 1.5 cm, range 0.5-5.8 cm) found by second-look US underwent US-guided biopsy, subsequent clip insertion and post-clip placement MRI. Five women with five lesions that were not found by second-look US underwent MRI-guided biopsy. The technical success rate and lesion characteristics were described. The technical success rate was 96.6% (28/29). One failure case was a benign, 1.1-cm non-mass enhancement. Of the 28 success cases, 23 (82.1%) were masses and 5 (17.9%) were non-mass enhancements; 17 (60.7%) were benign, 4 (14.3%) were high-risk and 7 (25.0%) were malignant lesions. The technical success rate was 100% (28/28) for masses and 83.3% (5/6) for non-mass enhancements. Post-clip placement MRI following US-guided biopsy is useful in confirming the adequate sampling of lesions identified on MRI. This method could be an alternative to MRI-guided biopsy for lesions visible on US. (orig.)

  5. Can positron emission mammography help to identify clinically significant breast cancer in women with suspicious calcifications on mammography?

    Energy Technology Data Exchange (ETDEWEB)

    Bitencourt, Almir G.V.; Lima, Eduardo N.P.; Macedo, Bruna R.C.; Conrado, Jorge L.F.A.; Marques, Elvira F.; Chojniak, Rubens [A C Camargo Cancer Center-Department of Imaging, Sao Paulo, SP (Brazil)

    2017-05-15

    To evaluate the diagnostic accuracy of positron emission mammography (PEM) for identifying malignant lesions in patients with suspicious microcalcifications detected on mammography. A prospective, single-centre study that evaluated 40 patients with suspicious calcifications at mammography and indication for percutaneous or surgical biopsy, with mean age of 56.4 years (range: 28-81 years). Patients who agreed to participate in the study underwent PEM with 18F-fluorodeoxyglucose before the final histological evaluation. PEM findings were compared with mammography and histological findings. Most calcifications (n = 34; 85.0 %) were classified as BIRADS 4. On histology, there were 25 (62.5 %) benign and 15 (37.5 %) malignant lesions, including 11 (27.5 %) ductal carcinoma in situ (DCIS) and 4 (10 %) invasive carcinomas. On subjective analysis, PEM was positive in 15 cases (37.5 %) and most of these cases (n = 14; 93.3 %) were confirmed as malignant on histology. There was one false-positive result, which corresponded to a fibroadenoma, and one false negative, which corresponded to an intermediate-grade DCIS. PEM had a sensitivity of 93.3 %, specificity of 96.0 % and accuracy of 95 %. PEM was able to identify all invasive carcinomas and high-grade DCIS (nuclear grade 3) in the presented sample, suggesting that this method may be useful for further evaluation of patients with suspected microcalcifications. (orig.)

  6. Post-clip placement MRI following second-look US-guided core biopsy for suspicious lesions identified on breast MRI

    International Nuclear Information System (INIS)

    Song, Sung Eun; Cho, Nariya; Han, Wonshik

    2017-01-01

    To evaluate whether the post-clip placement MRI following second-look ultrasound (US)-guided core biopsy is useful to confirm the adequate sampling of suspicious lesions identified on breast MRI. Between 2014 and 2016, 31 consecutive women with 34 suspicious lesions that had not been identified on previous mammography or US were detected using MRI. Among them, 26 women with 29 lesions (mean size 1.5 cm, range 0.5-5.8 cm) found by second-look US underwent US-guided biopsy, subsequent clip insertion and post-clip placement MRI. Five women with five lesions that were not found by second-look US underwent MRI-guided biopsy. The technical success rate and lesion characteristics were described. The technical success rate was 96.6% (28/29). One failure case was a benign, 1.1-cm non-mass enhancement. Of the 28 success cases, 23 (82.1%) were masses and 5 (17.9%) were non-mass enhancements; 17 (60.7%) were benign, 4 (14.3%) were high-risk and 7 (25.0%) were malignant lesions. The technical success rate was 100% (28/28) for masses and 83.3% (5/6) for non-mass enhancements. Post-clip placement MRI following US-guided biopsy is useful in confirming the adequate sampling of lesions identified on MRI. This method could be an alternative to MRI-guided biopsy for lesions visible on US. (orig.)

  7. Vitamin D and Musculoskeletal Status in Nova Scotian Women Who Wear Concealing Clothing

    Directory of Open Access Journals (Sweden)

    Jo M. Welch

    2012-05-01

    Full Text Available Bone and muscle weakness due to vitamin D deficiency is common among Muslim women who reside in sunny, equatorial countries. The purpose of this study was to determine if living in a northern maritime location additionally disadvantages women who wear concealing clothes. A cross-sectional matched pair design was used to compare women who habitually wore concealing clothing with women who dressed according to western norms. Each premenopausal hijab-wearing woman (n = 11 was matched by age, height, weight and skin tone with a western-dressed woman. Subjects were tested by hand grip dynamometry to assess muscular strength and by quantitative ultrasound at the calcaneus to assess bone status. Nutritional intake was obtained by 24 h recall. Serum 25-hydroxyvitamin D (s-25(OHD status was determined in seven matched pairs. The hijab group had lower s-25(OHD than women who wore western clothes (40 ± 28 vs. 81 ± 32 nmol/L, p = 0.01. Grip strength in the right hand was lower in the hijab-wearing women (p = 0.05 but this appeared to be due to less participation in intense exercise. Bone status did not differ between groups (p = 0.9. Dietary intake of vitamin D was lower in the hijab-wearers (316 ± 353 vs. 601 ± 341 IU/day, p = 0.001. This pilot study suggests that women living in a northern maritime location appear to be at risk for vitamin D insufficiency and therefore should consider taking vitamin D supplements.

  8. The "good cop, bad cop" effect in the RT-based concealed information test: exploring the effect of emotional expressions displayed by a virtual investigator.

    Directory of Open Access Journals (Sweden)

    Mihai Varga

    Full Text Available Concealing the possession of relevant information represents a complex cognitive process, shaped by contextual demands and individual differences in cognitive and socio-emotional functioning. The Reaction Time-based Concealed Information Test (RT-CIT is used to detect concealed knowledge based on the difference in RTs between denying recognition of critical (probes and newly encountered (irrelevant information. Several research questions were addressed in this scenario implemented after a mock crime. First, we were interested whether the introduction of a social stimulus (facial identity simulating a virtual investigator would facilitate the process of deception detection. Next, we explored whether his emotional displays (friendly, hostile or neutral would have a differential impact on speed of responses to probe versus irrelevant items. We also compared the impact of introducing similar stimuli in a working memory (WM updating context without requirements to conceal information. Finally, we explored the association between deceptive behavior and individual differences in WM updating proficiency or in internalizing problems (state / trait anxiety and depression. Results indicated that the mere presence of a neutral virtual investigator slowed down participants' responses, but not the appended lie-specific time (difference between probes and irrelevants. Emotional expression was shown to differentially affect speed of responses to critical items, with positive displays from the virtual examiner enhancing lie-specific time, compared to negative facial expressions, which had an opposite impact. This valence-specific effect was not visible in the WM updating context. Higher levels of trait / state anxiety were related to faster responses to probes in the negative condition (hostile facial expression of the RT-CIT. These preliminary findings further emphasize the need to take into account motivational and emotional factors when considering the

  9. Introducing a Model for Suspicious Behaviors Detection in Electronic Banking by Using Decision Tree Algorithms

    Directory of Open Access Journals (Sweden)

    Rohulla Kosari Langari

    2014-02-01

    Full Text Available Change the world through information technology and Internet development, has created competitive knowledge in the field of electronic commerce, lead to increasing in competitive potential among organizations. In this condition The increasing rate of commercial deals developing guaranteed with speed and light quality is due to provide dynamic system of electronic banking until by using modern technology to facilitate electronic business process. Internet banking is enumerate as a potential opportunity the fundamental pillars and determinates of e-banking that in cyber space has been faced with various obstacles and threats. One of this challenge is complete uncertainty in security guarantee of financial transactions also exist of suspicious and unusual behavior with mail fraud for financial abuse. Now various systems because of intelligence mechanical methods and data mining technique has been designed for fraud detection in users’ behaviors and applied in various industrial such as insurance, medicine and banking. Main of article has been recognizing of unusual users behaviors in e-banking system. Therefore, detection behavior user and categories of emerged patterns to paper the conditions for predicting unauthorized penetration and detection of suspicious behavior. Since detection behavior user in internet system has been uncertainty and records of transactions can be useful to understand these movement and therefore among machine method, decision tree technique is considered common tool for classification and prediction, therefore in this research at first has determinate banking effective variable and weight of everything in internet behaviors production and in continuation combining of various behaviors manner draw out such as the model of inductive rules to provide ability recognizing of different behaviors. At least trend of four algorithm Chaid, ex_Chaid, C4.5, C5.0 has compared and evaluated for classification and detection of exist

  10. A comment on Farwell : brain fingerprinting: a comprehensive tutorial review of detection of concealed information with event-related brain potentials

    NARCIS (Netherlands)

    Meijer, E.H.; Ben-Shakhar, G.; Verschuere, B.; Donchin, E.

    2013-01-01

    In a recent issue of Cognitive Neurodynamics Farwell (Cogn Neurodyn 6:115-154, 2012) published a comprehensive tutorial review of the use of Event Related Brain Potentials (ERP) in the detection of concealed information. Farwell’s review covered much of his own work employing his ‘‘brain

  11. Performance Study of Objective Speech Quality Measurement for Modern Wireless-VoIP Communications

    Directory of Open Access Journals (Sweden)

    Chan Wai-Yip

    2009-01-01

    Full Text Available Wireless-VoIP communications introduce perceptual degradations that are not present with traditional VoIP communications. This paper investigates the effects of such degradations on the performance of three state-of-the-art standard objective quality measurement algorithms—PESQ, P.563, and an "extended" E-model. The comparative study suggests that measurement performance is significantly affected by acoustic background noise type and level as well as speech codec and packet loss concealment strategy. On our data, PESQ attains superior overall performance and P.563 and E-model attain comparable performance figures.

  12. Object permanence in cats: Analysis in locomotor space.

    Science.gov (United States)

    Thinus-Blanc, C; Poucet, B; Chapuis, N

    1982-04-01

    Stages IV and V object permanence were studied with 38-40-week-old cats. A constraining apparatus preventing animals from pursuing the bowl containing meat before it was concealed was used. Either the bowl was seen moving and disappeared from view behind a screen (stage IV trials), or after this sequence, it reappeared from behind the first screen and disappeared behind a second screen (stage V trials). In both situations cats performed significantly above chance but the paths taken to reach the food were different according to the stage. In stage V trials, cats expressed a preference for the path leading to the end of the second screen where the food was last seen disappearing. Copyright © 1982. Published by Elsevier B.V.

  13. Fast and Noninvasive Characterization of Suspicious Lesions Detected at Breast Cancer X-Ray Screening: Capability of Diffusion-weighted MR Imaging with MIPs.

    Science.gov (United States)

    Bickelhaupt, Sebastian; Laun, Frederik B; Tesdorff, Jana; Lederer, Wolfgang; Daniel, Heidi; Stieber, Anne; Delorme, Stefan; Schlemmer, Heinz-Peter

    2016-03-01

    To evaluate the ability of a diagnostic abbreviated magnetic resonance (MR) imaging protocol consisting of maximum intensity projections (MIPs) from diffusion-weighted imaging with background suppression (DWIBS) and unenhanced morphologic sequences to help predict the likelihood of malignancy on suspicious screening x-ray mammograms, as compared with an abbreviated contrast material-enhanced MR imaging protocol and a full diagnostic breast MR imaging protocol. This prospective institutional review board-approved study included 50 women (mean age, 57.1 years; range, 50-69 years), who gave informed consent and who had suspicious screening mammograms and an indication for biopsy, from September 2014 to January 2015. Before biopsy, full diagnostic contrast-enhanced MR imaging was performed that included DWIBS (b = 1500 sec/mm(2)). Two abbreviated protocols (APs) based on MIPs were evaluated regarding the potential to exclude malignancy: DWIBS (AP1) and subtraction images from the first postcontrast and the unenhanced series (AP2). Diagnostic indexes of both methods were examined by using the McNemar test and were compared with those of the full diagnostic protocol and histopathologic findings. Twenty-four of 50 participants had a breast carcinoma. With AP1 (DWIBS), the sensitivity was 0.92 (95% confidence interval [CI]: 0.73, 0.98), the specificity was 0.94 (95% CI: 0.77, 0.99), the negative predictive value (NPV) was 0.92 (95% CI: 0.75, 0.99), and the positive predictive value (PPV) was 0.93 (95% CI: 0.75, 0.99). The mean reading time was 29.7 seconds (range, 4.9-110.0 seconds) and was less than 3 seconds (range, 1.2-7.6 seconds) in the absence of suspicious findings on the DWIBS MIPs. With the AP2 protocol, the sensitivity was 0.85 (95% CI: 0.78, 0.95), the specificity was 0.90 (95% CI: 0.72, 0.97), the NPV was 0.87 (95% CI: 0.69, 0.95), the PPV was 0.89 (95% CI: 0.69, 0.97), and the mean reading time was 29.6 seconds (range, 6.0-100.0 seconds). Unenhanced diagnostic

  14. Understanding Where Americas Public Discussion Takes Place In Todays Society: Case Studies of Concealed Weapons Carry Reform

    Science.gov (United States)

    2016-06-01

    arguing that concealed carry permit holders are a danger to public safety and that mass shootings are taking place by citizens who are legally armed.2...who worked at an abortion clinic that had recently been bombed and whose life had been threatened was denied a license to carry because he was not...populace. The new law laid out new prohibitions and penalties enforceable statewide. Additionally, the Preemption Act was necessary to set the legal

  15. Analysis of potential dynamic concealed factors in the difficulty of lower third molar extraction.

    Science.gov (United States)

    Singh, P; Ajmera, D-H; Xiao, S-S; Yang, X-Z; Liu, X; Peng, B

    2016-11-01

    The purpose of this study was to identify potential concealed variables associated with the difficulty of lower third molar (M3) extractions. To address the research purpose, we implemented a prospective study and enrolled a sample of subjects presenting for M3 removal. Predictor variables were categorized into Group-I and Group-II, based on predetermined criteria. The primary outcome variable was the difficulty of extraction, measured as extraction time. Appropriate univariate and multivariate statistics were computed using ordinal logistic regression. The sample comprised of 1235 subjects with a mean age of 29.49 +/- 8.92 years in Group-I and 26.20 +/- 11.55 years in Group-II subjects. The mean operating time per M3 extraction was 21.24 +/- 12.80 and 20.24 +/- 12.50 minutes for Group-I and Group-II subjects respectively. Three linear parameters including B-M2 height (distance between imaginary point B on the inferior border of mandibular body, and M2), lingual cortical thickness, bone density and one angular parameter including Rc-Cs angle (angle between ramus curvature and curve of spee), in addition to patient's age, profile type, facial type, cant of occlusal plane, and decreased overbite, were found to be statistically associated ( p < or = 0.05) with extraction difficulty under regression models. In conclusion, our study indicates that the difficulty of lower M3 extractions is possibly governed by morphological and biomechanical factors with substantial influence of myofunctional factors. Preoperative evaluation of dynamic concealed factors may not only help in envisaging the difficulty and planning of surgical approach but might also help in better time management in clinical practice.

  16. Secrecy in the collection and mediation practices of two World Wars objects: lessons from a shared survey

    Directory of Open Access Journals (Sweden)

    Emilie DA LAGE

    2013-12-01

    Full Text Available This paper focuses on secrecy, observed through the collection and mediation practices of two World Wars objects. The first part of this article examines secrecy through the prism of a survey conducted, on the one hand, by the collector to uncover the secret of the object, and, on the other hand, by us to uncover the secret of its collection. The second part of this contribution focuses on secrecy in the mediation practices of collectors and on the process of revelation and concealment of certain aspects of the exhibits, characterizing those practices. Some reflections on the communication of the results of our personal research are also presented.

  17. Mental Health Stigma and Self-Concealment as Predictors of Help-Seeking Attitudes among Latina/o College Students in the United States

    Science.gov (United States)

    Mendoza, Hadrian; Masuda, Akihiko; Swartout, Kevin M.

    2015-01-01

    The study examined whether mental health stigma and self-concealment are uniquely related to various dimensions of attitudes toward seeking professional psychological services (i.e., help-seeking attitudes) in Latina/o college students. Data from 129 Latina/o undergraduates (76% female) were used in the analysis. Results revealed that mental…

  18. A Fast-Track Referral System for Skin Lesions Suspicious of Melanoma: Population-Based Cross-Sectional Study from a Plastic Surgery Center

    Directory of Open Access Journals (Sweden)

    Reem Dina Jarjis

    2016-01-01

    Full Text Available Introduction. To minimize delay between presentation, diagnosis, and treatment of cutaneous melanoma (CM, a national fast-track referral system (FTRS was implemented in Denmark. The aim of this study was to analyze the referral patterns to our department of skin lesions suspicious of melanoma in the FTRS. Methods. Patients referred to the Department of Plastic Surgery and Breast Surgery in Zealand University Hospital were registered prospectively over a 1-year period in 2014. A cross-sectional study was performed analyzing referral patterns, including patient and tumor characteristics. Results. A total of 556 patients were registered as referred to the center in the FTRS for skin lesions suspicious of melanoma. Among these, a total of 312 patients (56.1% were diagnosed with CM. Additionally, 41 (7.4% of the referred patients were diagnosed with in situ melanoma. Conclusion. In total, 353 (63.5% patients had a malignant or premalignant melanocytic skin lesion. When only considering patients who where referred without a biopsy, the diagnostic accuracy for GPs and dermatologists was 29% and 45%, respectively. We suggest that efforts of adequate training for the referring physicians in diagnosing melanocytic skin lesions will increase diagnostic accuracy, leading to larger capacity in secondary care for the required treatment of malignant skin lesions.

  19. Eyes with Suspicious Appearance of the Optic Disc and Normal Intraocular Pressure: Using Clinical and Epidemiological Characteristics to Differentiate Those with and without Glaucoma.

    Directory of Open Access Journals (Sweden)

    Diego T Dias

    Full Text Available Among all glaucoma suspects, eyes with optic nerve head features suspicious or suggestive of early glaucoma are probably those that offer the greatest challenge for clinicians. In contrast with the robust longitudinal data published on ocular hypertension, there is no specific management guideline for these patients. Therefore, evaluating eyes with suspicious optic disc appearance and normal intraocular pressure (IOP, we sought to investigate potential differences in clinical and epidemiological characteristics to differentiate those with normal-tension glaucoma (NTG from those with presumed large physiological optic disc cups (pLPC. In this observational case-control study, we consecutively enrolled individuals with pLPC and NTG. All eyes had vertical cup-to-disc ratio (VCDR≥0.6 and untreated IOP<21 mmHg. Glaucomatous eyes had reproducible visual field defects. Eyes with pLPC required normal visual fields and ≥30 months of follow-up with no evidence of glaucomatous neuropathy. Clinical and epidemiological parameters were compared between groups. Eighty-four individuals with pLPC and 40 NTG patients were included. Regarding our main results, NTG patients were significantly older and with a higher prevalence of Japanese descendants (p<0.01. Not only did pLPC eyes have smaller mean VCDR, but also larger optic discs (p≤0.04. There were no significant differences for gender, central corneal thickness, and spherical equivalent (p≥0.38. Significant odds ratios (OR were found for race (OR = 2.42; for Japanese ancestry, age (OR = 1.05, VCDR (OR = 5.03, and disc size (OR = 0.04; p≤0.04. In conclusion, in patients with suspicious optic disc and normal IOP, those with older age, Japanese ancestry, smaller optic discs, and larger VCDR are more likely to have NTG, and therefore, deserve deeper investigation and closer monitoring.

  20. Influence of allocation concealment and intention-to-treat analysis on treatment effects of physical therapy interventions in low back pain randomised controlled trials: a protocol of a meta-epidemiological study.

    Science.gov (United States)

    Almeida, Matheus Oliveira; Saragiotto, Bruno T; Maher, Chris G; Pena Costa, Leonardo Oliveira

    2017-09-27

    Meta-epidemiological studies examining the influence of methodological characteristics, such as allocation concealment and intention-to-treat analysis have been performed in a large number of healthcare areas. However, there are no studies investigating these characteristics in physical therapy interventions for patients with low back pain. The aim of this study is to investigate the influence of allocation concealment and the use of intention-to-treat analysis on estimates of treatment effects of physical therapy interventions in low back pain clinical trials. Searches on PubMed, Embase, Cochrane Database of Systematic Reviews, Physiotherapy Evidence Database (PEDro) and CINAHL databases will be performed. We will search for systematic reviews that include a meta-analysis of randomised controlled trials that compared physical therapy interventions in patients with low back pain with placebo or no intervention, and have pain intensity or disability as the primary outcomes. Information about selection (allocation concealment) and attrition bias (intention-to-treat analysis) will be extracted from the PEDro database for each included trial. Information about bibliographic data, study characteristics, participants' characteristics and study results will be extracted. A random-effects model will be used to provide separate estimates of treatment effects for trials with and without allocation concealment and with and without intention-to-treat analysis (eg, four estimates). A meta-regression will be performed to measure the association between methodological features and treatment effects from each trial. The dependent variable will be the treatment effect (the mean between-group differences) for the primary outcomes (pain or disability), while the independent variables will be the methodological features of interest (allocation concealment and intention-to-treat analysis). Other covariates will include sample size and sequence generation. No ethical approval will be

  1. The human operational sex ratio: effects of marriage, concealed ovulation, and menopause on mate competition.

    Science.gov (United States)

    Marlowe, Frank W; Berbesque, J Colette

    2012-12-01

    Among mammals, male-male competition for sexual access to females frequently involves fighting. Larger body size gives males an advantage in fighting, which explains why males tend to be larger than females in many species, including anthropoid primates. Mitani et al. derived a formula to measure the operational sex ratio (OSR) to reflect the degree of male-male competition using the number of reproductively available males to females who are cycling and capable of conceiving. The OSR should predict the degree of sexual dimorphism in body mass-at least if male-male competition involves much fighting or threatening. Here, we use hunter-gatherer demographic data and the Mitani et al. formula to calculate the human OSR. We show that humans have a much lower degree of body mass sexual dimorphism than is predicted by our OSR. We suggest this is because human competition rarely involves fighting. In human hunter-gatherer societies, differences in the ages of marriage have an impact on competition in that the age of males at first marriage is younger when there is a lower percentage of married men with two or more wives, and older when there is a higher percentage of married men with two or more wives. We discuss the implications of this for females, along with the effects of two key life history traits that influence the OSR, concealed ovulation and menopause. While menopause decreases the number of reproductively available females to males and thus increases male-male competition, concealed ovulation decreases male-male competition. Finally, we discuss the importance of mostly monogamous mate bonds in human evolution. Copyright © 2012 Elsevier Ltd. All rights reserved.

  2. The current and future status of the Concealed Information Test for field use

    Directory of Open Access Journals (Sweden)

    Izumi eMatsuda

    2012-11-01

    Full Text Available The Concealed Information Test (CIT is a psychophysiological technique for examining whether a person has knowledge of crime-relevant information. Many laboratory studies have shown that the CIT has good scientific validity. However, the CIT has seldom been used for actual criminal investigations. One successful exception is its use by the Japanese police. In Japan, the CIT has been widely used for criminal investigations, although its probative force in court is not strong. In this paper, we first review the current use of the field CIT in Japan. Then, we discuss two possible approaches to increase its probative force: sophisticated statistical judgment methods and combining new psychophysiological measures with classic autonomic measures. On the basis of these considerations, we propose several suggestions for future practice and research involving the field CIT.

  3. Mammographic evaluation of suspicious malignant lesions based on ACR(American College of Radiology) breast imaging reporting and data system(BI-RADS)

    International Nuclear Information System (INIS)

    Lee, Jei Hee; Oh, Ki Keun; Chang, So Yong; Kim, Eun Kyung; Kim, Mi Hye

    1999-01-01

    The purpose of this study was to assess the mammographic features and pathologic outcome of category 4 lesions using the Breast Imaging Reporting and Data System(BI-RADS), and to evaluate the significance of final assessment categories. Using BI-RADS, the interpretations of 8,134 mammograms acquired between January 1997 and May 1998 were categorized. From among 161 lesions categorized as '4' ('suspicious abnormality') and pathologically confirmed by surgery or biopsy, we analysed 113, found in 66 patients. The pathologic outcome of these 113 lesions was as follows:infiltrating ductal carcinoma, 17.7%(20/113); DCIS(ductal carcinoma in sitv), 8.0%(9/113); ADH(atypical ductal hyperplasia), 5.3%(6/113); DEH(ductal epithelial hyperplasia), 1.8%(2/113); ductectasia, 0.9%(1/113), FCD(fibrocystic change), 27.4%(31/113); firoadenoma, 7.1%(8/113); stromal fibrosis, 9.7%(11/113); normal parenchyma, 7.1%(8/113); other pathology, 15.0%(17/113). The most frequent mammographic features of BI-RADS category 4 lesions were irregular mass shape(41.2%), spiculated mass margin(52.3%), amorphous calcification(47.3%) and clustered calcification distribution(37.1%). Because category 4 lesions account for about 25.7% of all breast malignancies, mammographic lesions in this category ('suspicious abnormality') should be considered for supplementary study and breast biopsy rather than short-term follow-up. Initial pathologic findings can thus be confirmed

  4. Long Distance Endovascular Growth of Jugulotympanic Paraganglioma Evident in 68Ga-DOTATATE PET but Concealed on CT.

    Science.gov (United States)

    Avramovic, Nemanja; Weckesser, Matthias; Velasco, Aglaé; Stenner, Markus; Noto, Benjamin

    2017-02-01

    A 60-year-old woman was referred to contrast-enhanced CT for evaluation of jugular vein thrombosis incidentally detected by ultrasound. Contrast-enhanced CT showed an enhanced tumor of the right skull base highly suspicious of jugulotympanic paraganglioma. However, the jugular veins showed a nearly symmetric contrast enhancement without clear evidence of thrombosis. Consecutive Ga-DOTATATE PET/CT depicted high tumor uptake, which comprised the entire internal jugular vein. Endovascular growth of paraganglioma might be missed on contrast-enhanced CT because of high vascularization of the lesion. Ga-DOTATATE PET is suited for accurate determination of tumor extent.

  5. Account Deletion Prediction on RuNet: A Case Study of Suspicious Twitter Accounts Active During the Russian-Ukrainian Crisis

    Energy Technology Data Exchange (ETDEWEB)

    Volkova, Svitlana; Bell, Eric B.

    2016-06-17

    Social networks are dynamically changing over time e.g., some accounts are being created and some are being deleted or become private. This ephemerality at both an account level and content level results from a combination of privacy concerns, spam, and deceptive behaviors. In this study we analyze a large dataset of 180,340 accounts active during the Russian-Ukrainian crisis to discover a series of predictive features for the removal or shutdown of a suspicious account. We find that unlike previously reported profile and net- work features, lexical features form the basis for highly accurate prediction of the deletion of an account.

  6. Training Objectives for Tank Platoon Leaders Covering Tasks Performed during Four Armor Operations

    Science.gov (United States)

    1983-01-01

    screens to conceal their movement to covered and concealed positions. The M250 grenade launcher consists of two six-barreled dischargers wired for two...generates smoke by the injestion of fuel onto the hot engine exhaust system. The smoke screen generated by VEESS is used to compli- ment the M250 smoke...grenade system by reinforcing and sustaining the screen created by the M250 system. The purpose of the smoke producing systems is to make it more

  7. Post-clip placement MRI following second-look US-guided core biopsy for suspicious lesions identified on breast MRI.

    Science.gov (United States)

    Song, Sung Eun; Cho, Nariya; Han, Wonshik

    2017-12-01

    To evaluate whether the post-clip placement MRI following second-look ultrasound (US)-guided core biopsy is useful to confirm the adequate sampling of suspicious lesions identified on breast MRI. Between 2014 and 2016, 31 consecutive women with 34 suspicious lesions that had not been identified on previous mammography or US were detected using MRI. Among them, 26 women with 29 lesions (mean size 1.5 cm, range 0.5-5.8 cm) found by second-look US underwent US-guided biopsy, subsequent clip insertion and post-clip placement MRI. Five women with five lesions that were not found by second-look US underwent MRI-guided biopsy. The technical success rate and lesion characteristics were described. The technical success rate was 96.6% (28/29). One failure case was a benign, 1.1-cm non-mass enhancement. Of the 28 success cases, 23 (82.1%) were masses and 5 (17.9%) were non-mass enhancements; 17 (60.7%) were benign, 4 (14.3%) were high-risk and 7 (25.0%) were malignant lesions. The technical success rate was 100% (28/28) for masses and 83.3% (5/6) for non-mass enhancements. Post-clip placement MRI following US-guided biopsy is useful in confirming the adequate sampling of lesions identified on MRI. This method could be an alternative to MRI-guided biopsy for lesions visible on US. • Post-clip MRI is useful for confirming adequate sampling of US-guided biopsy. • Post-clip MRI following US-guided biopsy revealed a 96.6 % technical success rate. • One technical failure case was a benign, 1.1-cm non-mass enhancement. • The technical success rate of US-guided biopsy for non-mass enhancements was 83.3 %.

  8. Ultra Wide X-Band Microwave Imaging of Concealed Weapons and Explosives Using 3D-SAR Technique

    Directory of Open Access Journals (Sweden)

    P. Millot

    2015-01-01

    Full Text Available In order to detect and image concealed weapons and explosives, an electromagnetic imaging tool with its related signal processing is presented. The aim is to penetrate clothes and to find personal-born weapons and explosives under clothes. The chosen UWB frequency range covers the whole X-band. The frequency range is justified after transmission measurements of numerous clothes that are dry or slightly wet. The apparatus and the 3D near-field SAR processor are described. A strategy for contour identification is presented with results of some simulants of weapon and explosive. A conclusion is drawn on the possible future of this technique.

  9. Mammographic evaluation of suspicious malignant lesions based on ACR(American College of Radiology) breast imaging reporting and data system(BI-RADS)

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jei Hee; Oh, Ki Keun; Chang, So Yong; Kim, Eun Kyung; Kim, Mi Hye [Yonsei Univ. College of Medicine, Research Institute of Radiological Science, Yonsei Univ., Seoul (Korea, Republic of)

    1999-12-01

    The purpose of this study was to assess the mammographic features and pathologic outcome of category 4 lesions using the Breast Imaging Reporting and Data System(BI-RADS), and to evaluate the significance of final assessment categories. Using BI-RADS, the interpretations of 8,134 mammograms acquired between January 1997 and May 1998 were categorized. From among 161 lesions categorized as '4' ('suspicious abnormality') and pathologically confirmed by surgery or biopsy, we analysed 113, found in 66 patients. The pathologic outcome of these 113 lesions was as follows:infiltrating ductal carcinoma, 17.7%(20/113); DCIS(ductal carcinoma in sitv), 8.0%(9/113); ADH(atypical ductal hyperplasia), 5.3%(6/113); DEH(ductal epithelial hyperplasia), 1.8%(2/113); ductectasia, 0.9%(1/113), FCD(fibrocystic change), 27.4%(31/113); firoadenoma, 7.1%(8/113); stromal fibrosis, 9.7%(11/113); normal parenchyma, 7.1%(8/113); other pathology, 15.0%(17/113). The most frequent mammographic features of BI-RADS category 4 lesions were irregular mass shape(41.2%), spiculated mass margin(52.3%), amorphous calcification(47.3%) and clustered calcification distribution(37.1%). Because category 4 lesions account for about 25.7% of all breast malignancies, mammographic lesions in this category ('suspicious abnormality') should be considered for supplementary study and breast biopsy rather than short-term follow-up. Initial pathologic findings can thus be confirmed.

  10. Can methodological requirements be fulfilled when studying concealed or unethical research objects? The case of astroturfing

    Directory of Open Access Journals (Sweden)

    Sophie BOULAY

    2013-12-01

    Full Text Available Scientific soundness is key in the development of research designs. Methodological choices bear the responsibility to demonstrate its obtainment. However, it is challenging to abide by these standards while dealing with hidden, masked or unethical objects. In this article, we share the various strategies employed to aim at a sound scientific process in spite of astroturfing’s characteristics and of the methodological orientations it dictates. Facing the dilemma between the importance of scientific value and the richness of inductive and exploratory approaches, we question the influence of positivist research standards in communication studies. We fear these requirements may limit their development.

  11. The image of the butcher (13th-20th): In search of respectability between corporate pride and blood concealment.

    OpenAIRE

    Leteux , Sylvain

    2015-01-01

    International audience; In most images that represent butchers in France since the Middle Ages, the animal’s blood and death are often eclipsed or softened, except for the realistic photographs of slaughterhouses in the 20th century. The will to conceal blood shows the butchers’ will to build an honourable image of themselves. This quest for respectability is obvious if you look at the ceremony clothes worn by butchers during civil and religious celebrations. In the 19th century, as the trade...

  12. Geochemical Data for Samples Collected in 2007 Near the Concealed Pebble Porphyry Cu-Au-Mo Deposit, Southwest Alaska

    Science.gov (United States)

    Fey, David L.; Granitto, Matthew; Giles, Stuart A.; Smith, Steven M.; Eppinger, Robert G.; Kelley, Karen D.

    2008-01-01

    In the summer of 2007, the U.S. Geological Survey (USGS) began an exploration geochemical research study over the Pebble porphyry copper-gold-molydenum (Cu-Au-Mo) deposit in southwest Alaska. The Pebble deposit is extremely large and is almost entirely concealed by tundra, glacial deposits, and post-Cretaceous volcanic and volcaniclastic rocks. The deposit is presently being explored by Northern Dynasty Minerals, Ltd., and Anglo-American LLC. The USGS undertakes unbiased, broad-scale mineral resource assessments of government lands to provide Congress and citizens with information on national mineral endowment. Research on known deposits is also done to refine and better constrain methods and deposit models for the mineral resource assessments. The Pebble deposit was chosen for this study because it is concealed by surficial cover rocks, it is relatively undisturbed (except for exploration company drill holes), it is a large mineral system, and it is fairly well constrained at depth by the drill hole geology and geochemistry. The goals of the USGS study are (1) to determine whether the concealed deposit can be detected with surface samples, (2) to better understand the processes of metal migration from the deposit to the surface, and (3) to test and develop methods for assessing mineral resources in similar concealed terrains. This report presents analytical results for geochemical samples collected in 2007 from the Pebble deposit and surrounding environs. The analytical data are presented digitally both as an integrated Microsoft 2003 Access? database and as Microsoft 2003 Excel? files. The Pebble deposit is located in southwestern Alaska on state lands about 30 km (18 mi) northwest of the village of Illiamna and 320 km (200 mi) southwest of Anchorage (fig. 1). Elevations in the Pebble area range from 287 m (940 ft) at Frying Pan Lake just south of the deposit to 1146 m (3760 ft) on Kaskanak Mountain about 5 km (5 mi) to the west. The deposit is in an area of

  13. 3-T breast magnetic resonance imaging in patients with suspicious microcalcifications on mammography

    Energy Technology Data Exchange (ETDEWEB)

    Stehouwer, B.L.; Merckel, L.G.; Verkooijen, H.M.; Peters, N.H.G.M.; Mali, W.P.T.M.; Veldhuis, W.B.; Bosch, M.A.A.J. van den [University Medical Center Utrecht, Department of Radiology, Utrecht (Netherlands); Mann, R.M. [University Medical Center St Radboud, Departement of Radiology, Nijmegen (Netherlands); Duvivier, K.M. [University Medical Center Utrecht, Department of Radiology, Utrecht (Netherlands); VU University Medical Center, Department of Radiology, Amsterdam (Netherlands); Peeters, P.H.M. [University Medical Center Utrecht, Julius Center for Health Sciences and Primary Care, Utrecht (Netherlands)

    2014-03-15

    To investigate the diagnostic value of 3-Tesla (T) breast MRI in patients presenting with microcalcifications on mammography. Between January 2006 and May 2009, 123 patients with mammographically detected BI-RADS 3-5 microcalcifications underwent 3-T breast MRI before undergoing breast biopsy. All MRIs of the histopathologically confirmed index lesions were reviewed by two breast radiologists. The detection rate of invasive carcinoma and ductal carcinoma in situ (DCIS) was evaluated, as well as the added diagnostic value of MRI over mammography and breast ultrasound. At pathology, 40/123 (33 %) lesions proved malignant; 28 (70 %) DCIS and 12 (30 %) invasive carcinoma. Both observers detected all invasive malignancies at MRI, as well as 79 % (observer 1) and 86 % (observer 2) of in situ lesions. MRI in addition to conventional imaging led to a significant increase in area under the receiver operating characteristic (ROC) curve from 0.67 (95 % CI 0.56-0.79) to 0.79 (95 % CI 0.70-0.88, observer 1) and to 0.80 (95 % CI 0.71-0.89, observer 2), respectively. 3-T breast MRI was shown to add significant value to conventional imaging in patients presenting with suspicious microcalcifications on mammography. (orig.)

  14. GILBERT'S SYNDROME - A CONCEALED ADVERSITY FOR PHYSICIANS AND SURGEONS.

    Science.gov (United States)

    Rasool, Ahsan; Sabir, Sabir; Ashlaq, Muhammad; Farooq, Umer; Khan, Muhammad Zatmar; Khan, Faisal Yousaf

    2015-01-01

    Gilbert's syndrome (often abbreviated as GS) is most common hereditary cause of mild unconjugated (indirect) hyperbilirubinemia. Various studies have been published depicting clinical and pharmacological effects of Gilbert's syndrome (GS). However GS as a sign of precaution for physician and surgeons has not been clearly established. A systematic study of the available literature was done. Key words of Gilbert's syndrome, hyperbilirubinemia and clinical and pharmacological aspects of GS were searched using PubMed as search engine. Considering the study done in last 40 years, 375 articles were obtained and their abstracts were studied. The criterion for selecting the articles for through study was based on their close relevance with the topic. Thus 40 articles and 2 case reports were thoroughly studied. It was concluded that Gilbert's syndrome has immense clinical importance because the mild hyperbilirubinemia can be mistaken for a sign of occult, chronic, or progressive liver disease. GS is associated with lack of detoxification of few drugs. It is related with spherocytosis, cholithiasis, haemolytic anaemia, intra-operative toxicity, irinotecan toxicity, schizophrenia and problems in morphine metabolism. It also has profound phenotypic effect as well. The bilirubin level of a GS individual can rise abnormally high in various conditions in a person having Gilbert's syndrome. This can mislead the physicians and surgeons towards false diagnosis. Therefore proper diagnosis of GS should be ascertained in order to avoid the concealed adversities of this syndrome.

  15. Reprogramming to pluripotency can conceal somatic cell chromosomal instability.

    Directory of Open Access Journals (Sweden)

    Masakazu Hamada

    Full Text Available The discovery that somatic cells are reprogrammable to pluripotency by ectopic expression of a small subset of transcription factors has created great potential for the development of broadly applicable stem-cell-based therapies. One of the concerns regarding the safe use of induced pluripotent stem cells (iPSCs in therapeutic applications is loss of genomic integrity, a hallmark of various human conditions and diseases, including cancer. Structural chromosome defects such as short telomeres and double-strand breaks are known to limit reprogramming of somatic cells into iPSCs, but whether defects that cause whole-chromosome instability (W-CIN preclude reprogramming is unknown. Here we demonstrate, using aneuploidy-prone mouse embryonic fibroblasts (MEFs in which chromosome missegregation is driven by BubR1 or RanBP2 insufficiency, that W-CIN is not a barrier to reprogramming. Unexpectedly, the two W-CIN defects had contrasting effects on iPSC genomic integrity, with BubR1 hypomorphic MEFs almost exclusively yielding aneuploid iPSC clones and RanBP2 hypomorphic MEFs karyotypically normal iPSC clones. Moreover, BubR1-insufficient iPSC clones were karyotypically unstable, whereas RanBP2-insufficient iPSC clones were rather stable. These findings suggest that aneuploid cells can be selected for or against during reprogramming depending on the W-CIN gene defect and present the novel concept that somatic cell W-CIN can be concealed in the pluripotent state. Thus, karyotypic analysis of somatic cells of origin in addition to iPSC lines is necessary for safe application of reprogramming technology.

  16. Adaptive Suspicious Prevention for Defending DoS Attacks in SDN-Based Convergent Networks.

    Science.gov (United States)

    Dao, Nhu-Ngoc; Kim, Joongheon; Park, Minho; Cho, Sungrae

    2016-01-01

    The convergent communication network will play an important role as a single platform to unify heterogeneous networks and integrate emerging technologies and existing legacy networks. Although there have been proposed many feasible solutions, they could not become convergent frameworks since they mainly focused on converting functions between various protocols and interfaces in edge networks, and handling functions for multiple services in core networks, e.g., the Multi-protocol Label Switching (MPLS) technique. Software-defined networking (SDN), on the other hand, is expected to be the ideal future for the convergent network since it can provide a controllable, dynamic, and cost-effective network. However, SDN has an original structural vulnerability behind a lot of advantages, which is the centralized control plane. As the brains of the network, a controller manages the whole network, which is attractive to attackers. In this context, we proposes a novel solution called adaptive suspicious prevention (ASP) mechanism to protect the controller from the Denial of Service (DoS) attacks that could incapacitate an SDN. The ASP is integrated with OpenFlow protocol to detect and prevent DoS attacks effectively. Our comprehensive experimental results show that the ASP enhances the resilience of an SDN network against DoS attacks by up to 38%.

  17. Application of classification trees for the qualitative differentiation of focal liver lesions suspicious for metastasis in gadolinium-EOB-DTPA-enhanced liver MR imaging

    Energy Technology Data Exchange (ETDEWEB)

    Schelhorn, J. [Sophien und Hufeland Klinikum, Weimar (Germany). Dept. of Radiology and Nuclear Medicine; Benndorf, M.; Dietzel, M.; Burmeister, H.P.; Kaiser, W.A.; Baltzer, P.A.T. [Jena Univ. (Germany). Inst. of Diagnostic and Interventional Radiology

    2012-09-15

    Purpose: To evaluate the diagnostic accuracy of qualitative descriptors alone and in combination for the classification of focal liver lesions (FLLs) suspicious for metastasis in gadolinium-EOB-DTPA-enhanced liver MR imaging. Materials and Methods: Consecutive patients with clinically suspected liver metastases were eligible for this retrospective investigation. 50 patients met the inclusion criteria. All underwent Gd-EOB-DTPA-enhanced liver MRI (T2w, chemical shift T1w, dynamic T1w). Primary liver malignancies or treated lesions were excluded. All investigations were read by two blinded observers (O1, O2). Both independently identified the presence of lesions and evaluated predefined qualitative lesion descriptors (signal intensities, enhancement pattern and morphology). A reference standard was determined under consideration of all clinical and follow-up information. Statistical analysis besides contingency tables (chi square, kappa statistics) included descriptor combinations using classification trees (CHAID methodology) as well as ROC analysis. Results: In 38 patients, 120 FLLs (52 benign, 68 malignant) were present. 115 (48 benign, 67 malignant) were identified by the observers. The enhancement pattern, relative SI upon T2w and late enhanced T1w images contributed significantly to the differentiation of FLLs. The overall classification accuracy was 91.3 % (O1) and 88.7 % (O2), kappa = 0.902. Conclusion: The combination of qualitative lesion descriptors proposed in this work revealed high diagnostic accuracy and interobserver agreement in the differentiation of focal liver lesions suspicious for metastases using Gd-EOB-DTPA-enhanced liver MRI. (orig.)

  18. "Small intestinal biopsy and anti endomyosial sorologic test in children suspicious for celiac disease: a comparative study in Children Medical Center "

    Directory of Open Access Journals (Sweden)

    F. Mahjoub

    2006-08-01

    Full Text Available Background: Celiac is one the most common causes of malabsorption and is an autoimmune disorder resulting in damage to intestinal epithelial cells by self T lymphocytes. The main culprit is gluten. The aim of our study was to assess the histopathologic findings of patients suspicious to have celiac disease in their first admission and compare them with serologic findings (endomyosial antibody test: EMA. Methods: The study is a prospective descriptional type and 95 patients suspicious to have celiac disease were included who went under upper endoscopy and sampling and also serologic studies. Histopathologic findings were grouped by Marsh classification. Specimens in Marsh stage 0 and 1 were also stained for leukocyte common antigen by immunohistochemistry Results: Ninety five patients, 49 males and 46 females, ranging from 9 months to 17 years (mean: 6.3 ys were included in the study The most common complaint was abdominal pain. EMA test was positive in 43 patients. Most specimens were categorized as Marsh stage IIIA (51 cases by histopatholgic examination, which can be seen in many other conditions. Only 16 patients were categorized as Marsh stage IIIB & IIIC, which are seen in established celiac patients No significant correlation was found between histopathologic and serologic findings. No difference was found between H&E staining and immunohistochemical staining in counting of intra- epithelial lymphocytes. Conclusion: Most of our patients had mild partial villous atrophy which is also seen in many other disorders and also EMA test was negative in this group. It appears that current assessment of celiac disease has many drawbacks and necessity of more specific methods is highly appreciated.

  19. Attitudes toward Face-to-Face and Online Counseling: Roles of Self-Concealment, Openness to Experience, Loss of Face, Stigma, and Disclosure Expectations among Korean College Students

    Science.gov (United States)

    Bathje, Geoff J.; Kim, Eunha; Rau, Ellen; Bassiouny, Muhammad Adam; Kim, Taehoon

    2014-01-01

    This study examined attitudes toward face-to-face (f2f) and online counseling among 228 Korean college students. In addition, it tested a hypothesized model proposing that general propensities (i.e., self-concealment, openness to experience, and loss of face) would influence counseling-specific expectations (i.e., self-stigma and disclosure…

  20. Current research and potential applications of the Concealed Information Test: An overview

    Directory of Open Access Journals (Sweden)

    Gershon eBen-Shakhar

    2012-09-01

    Full Text Available Research interest in psychophysiological detection of deception has significantly increased since the September 11 terror attack in the USA. In particular, the Concealed Information Test (CIT, designed to detect memory traces that can connect suspects to a certain crime, has been extensively studied. In this paper I will briefly review several psychophysiological detection paradigms that have been studied, with a focus on the CIT. The theoretical background of the CIT, its strength and weaknesses, its potential applications as well as research finings related to its validity, (based on a recent mata-analytic study, will be discussed. Several novel research directions, with a focus on factors that may affect CIT detection in realistic settings (e.g., memory for crime details; the effect of emotional stress during crime execution will be described. Additionally, research focusing on mal-intentions and attempts to detect terror networks using information gathered from groups of suspects using both the standard CIT and the searching CIT will be reviewed. Finally, implications of current research to the actual application of the CIT will be discussed and several recommendations that can enhance the use of the CIT will be made.

  1. Concealed concern: fathers' experiences of having a child with juvenile idiopathic arthritis.

    Science.gov (United States)

    Waite-Jones, J M; Madill, A

    2008-01-01

    Despite increased research into families of chronically ill children, more needs to be known about the father's experience. We address this issue through asking: 'What is it like to be the father of a child with Juvenile Idiopathic Arthritis?' (JIA). Four members of eight families with an adolescent diagnosed with JIA, including seven fathers, were interviewed and transcripts analysed using grounded theory. This study suggests that fathers of children with JIA experience several severe losses which are exacerbated through comparisons they make between their own situation and that of fathers of healthy children. In addition, the fathers faced several constraints which reduced their opportunities to communicate with their ill child through shared activities. Fathers appeared to conceal their distress by adopting strategies of denial and distraction however their adjustment was facilitated, to some extent, by social support. They could also develop greater acceptance of their situation over time as the care of their ill child became assimilated into family life and constraints upon their life gradually reduced through the increased maturity of their son or daughter with JIA. These findings have implications for healthcare professionals and voluntary organisations.

  2. Camouflage, Concealment, and Decoys

    Science.gov (United States)

    2010-11-26

    otherwise dull Note. Use canned milk or powdered eggs to increase the binding properties of field-expedient paints. RADAR-ABSORBING MATERIAL 3-72. RAM... falsification of evidence, inducing him to react in a manner prejudicial to his interests. decoy An imitation in any sense of a person, an object

  3. False negative rate of syndesmotic injury in pronation-external rotation stage IV ankle fractures

    Directory of Open Access Journals (Sweden)

    Kwang-Soon Song

    2013-01-01

    Full Text Available Background: To investigate false negative rate in the diagnosis of diastasis on initial static anteroposterior radiograph and reliability of intraoperative external rotational stress test for detection of concealed disruption of syndesmosis in pronation external rotation (PER stage IV (Lauge-Hansen ankle fractures. Materials and Methods: We prospectively studied 34 PER stage IV ankle fractures between September 2001 and September 2008. Twenty (59% patients show syndesmotic injury on initial anteroposterior radiographs. We performed an intraoperative external rotation stress test in other 14 patients with suspicious PER stage IV ankle fractures, which showed no defined syndesmotic injury on anteroposterior radiographs inspite of a medial malleolar fracture, an oblique fibular fracture above the syndesmosis and fracture of the posterior tubercle of the tibia. Results: All 14 fractures showed different degrees of tibiofibular clear space (TFCS and tibiofibular overlapping (TFO on the external rotation stress test radiograph compared to the initial plain anteroposterior radiograph. It is important to understand the fracture pattern characterstic of PER stage IV ankle fractures even though it appears normal on anteroposterior radiographs, it is to be confirmed for the concealed syndesmotic injury through a routine intraoperative external rotational stress radiograph.

  4. Sonographically-guided vacuum-assisted biopsy with digital mammography-guided skin marking of suspicious breast microcalcifications: comparison of outcomes with stereotactic biopsy in Asian women.

    Science.gov (United States)

    Hahn, Soo Yeon; Shin, Jung Hee; Han, Boo-Kyung; Ko, Eun Young

    2011-02-01

    Management of suspicious microcalcifications in very thin breasts is problematic. To evaluate whether sonographically-guided vacuum-assisted biopsy (USVAB) with digital mammography-guided skin marking (DM) for the diagnosis of breast microcalcifications is comparable to stereotactic-guided vacuum-assisted biopsy (SVAB) in Asian women with thin breasts. Retrospective review was performed for 263 consecutive suspicious microcalcification lesions in 261 women who underwent USVAB with DM or SVAB using a prone table between January 2004 and December 2007. SVAB was performed for 190 lesions and USVAB for 73 lesions. Biopsy results were correlated with surgical pathology or followed up for at least 12 months. The diagnostic outcomes of SVAB and USVAB to diagnose microcalcifications were compared. Of 263 lesions, 104 (40%) underwent surgery and 159 (60%) were followed up. SVAB and USVAB groups showed similar final categories or the extent of microcalcifications. US visible lesions were 57 (78%) of 73 at USVAB and 14 (10%) of 140 at SVAB. Of 57 US visible lesions at USVAB, 29 (51%) were not found in initial US but were detectable with the help of DM. Specimen radiographs were negative in 2.1% of lesions at SVAB and in 4.1% at USVAB (p=0.4008). The under-estimation rate and false-negative rate were similar in SVAB and USVAB. US with DM facilitates US visibility of microcalcifications. USVAB with DM can produce acceptable biopsy results, as can SVAB, to diagnose breast microcalcifications in patients with thin breasts.

  5. Fusion of classifiers for REIS-based detection of suspicious breast lesions

    Science.gov (United States)

    Lederman, Dror; Wang, Xingwei; Zheng, Bin; Sumkin, Jules H.; Tublin, Mitchell; Gur, David

    2011-03-01

    After developing a multi-probe resonance-frequency electrical impedance spectroscopy (REIS) system aimed at detecting women with breast abnormalities that may indicate a developing breast cancer, we have been conducting a prospective clinical study to explore the feasibility of applying this REIS system to classify younger women (breast cancer. The system comprises one central probe placed in contact with the nipple, and six additional probes uniformly distributed along an outside circle to be placed in contact with six points on the outer breast skin surface. In this preliminary study, we selected an initial set of 174 examinations on participants that have completed REIS examinations and have clinical status verification. Among these, 66 examinations were recommended for biopsy due to findings of a highly suspicious breast lesion ("positives"), and 108 were determined as negative during imaging based procedures ("negatives"). A set of REIS-based features, extracted using a mirror-matched approach, was computed and fed into five machine learning classifiers. A genetic algorithm was used to select an optimal subset of features for each of the five classifiers. Three fusion rules, namely sum rule, weighted sum rule and weighted median rule, were used to combine the results of the classifiers. Performance evaluation was performed using a leave-one-case-out cross-validation method. The results indicated that REIS may provide a new technology to identify younger women with higher than average risk of having or developing breast cancer. Furthermore, it was shown that fusion rule, such as a weighted median fusion rule and a weighted sum fusion rule may improve performance as compared with the highest performing single classifier.

  6. Application of classification trees for the qualitative differentiation of focal liver lesions suspicious for metastasis in gadolinium-EOB-DTPA-enhanced liver MR imaging.

    Science.gov (United States)

    Schelhorn, J; Benndorf, M; Dietzel, M; Burmeister, H P; Kaiser, W A; Baltzer, P A T

    2012-09-01

    To evaluate the diagnostic accuracy of qualitative descriptors alone and in combination for the classification of focal liver lesions (FLLs) suspicious for metastasis in gadolinium-EOB-DTPA-enhanced liver MR imaging. Consecutive patients with clinically suspected liver metastases were eligible for this retrospective investigation. 50 patients met the inclusion criteria. All underwent Gd-EOB-DTPA-enhanced liver MRI (T2w, chemical shift T1w, dynamic T1w). Primary liver malignancies or treated lesions were excluded. All investigations were read by two blinded observers (O1, O2). Both independently identified the presence of lesions and evaluated predefined qualitative lesion descriptors (signal intensities, enhancement pattern and morphology). A reference standard was determined under consideration of all clinical and follow-up information. Statistical analysis besides contingency tables (chi square, kappa statistics) included descriptor combinations using classification trees (CHAID methodology) as well as ROC analysis. In 38 patients, 120 FLLs (52 benign, 68 malignant) were present. 115 (48 benign, 67 malignant) were identified by the observers. The enhancement pattern, relative SI upon T2w and late enhanced T1w images contributed significantly to the differentiation of FLLs. The overall classification accuracy was 91.3 % (O1) and 88.7 % (O2), kappa = 0.902. The combination of qualitative lesion descriptors proposed in this work revealed high diagnostic accuracy and interobserver agreement in the differentiation of focal liver lesions suspicious for metastases using Gd-EOB-DTPA-enhanced liver MRI. © Georg Thieme Verlag KG Stuttgart · New York.

  7. Contraband detection

    International Nuclear Information System (INIS)

    Gozzani, T.

    1995-01-01

    Inspecting incoming cargo for drugs, explosives and other contraband would quickly overwhelm inspection agencies even if a small percentage of the cargoes were manually searched. Now a new accelerator-based inspection system using pulsed fast neutron analysis (PFNA) allows automated inspection of loaded cargo containers and trucks. A collimated pulsed beam of fast neutrons, scanned over the side of a cargo container as it passes, excites the nuclei of common elements in bulk materials. The primary signals of interest for contraband are gammaray emissions following inelastic scattering of the fast neutrons from carbon and oxygen. Direct imaging of the contents of the material by time-of-flight analysis identifies the position of the interactions, while gamma-ray spectroscopy identifies the elemental gamma rays. The ratio of elements or other combinations of the elemental signatures are used to identify contraband - a high carbon-to-oxygen ratio, for example, is characteristic of drugs. The system incorporates gamma ray detectors, and analogue and digital processors sort the pulses for position and elemental information. Detection algorithms produce three-dimensional images of possible concealed contraband. From these images the inspector can identify suspicious objects within the cargo container

  8. Contraband detection

    Energy Technology Data Exchange (ETDEWEB)

    Gozzani, T. [Science Applications International Corporation, Santa Clara (United States)

    1995-07-15

    Inspecting incoming cargo for drugs, explosives and other contraband would quickly overwhelm inspection agencies even if a small percentage of the cargoes were manually searched. Now a new accelerator-based inspection system using pulsed fast neutron analysis (PFNA) allows automated inspection of loaded cargo containers and trucks. A collimated pulsed beam of fast neutrons, scanned over the side of a cargo container as it passes, excites the nuclei of common elements in bulk materials. The primary signals of interest for contraband are gammaray emissions following inelastic scattering of the fast neutrons from carbon and oxygen. Direct imaging of the contents of the material by time-of-flight analysis identifies the position of the interactions, while gamma-ray spectroscopy identifies the elemental gamma rays. The ratio of elements or other combinations of the elemental signatures are used to identify contraband - a high carbon-to-oxygen ratio, for example, is characteristic of drugs. The system incorporates gamma ray detectors, and analogue and digital processors sort the pulses for position and elemental information. Detection algorithms produce three-dimensional images of possible concealed contraband. From these images the inspector can identify suspicious objects within the cargo container.

  9. Three-Dimensional Microwave Imaging for Concealed Weapon Detection Using Range Stacking Technique

    Directory of Open Access Journals (Sweden)

    Weixian Tan

    2017-01-01

    Full Text Available Three-dimensional (3D microwave imaging has been proven to be well suited for concealed weapon detection application. For the 3D image reconstruction under two-dimensional (2D planar aperture condition, most of current imaging algorithms focus on decomposing the 3D free space Green function by exploiting the stationary phase and, consequently, the accuracy of the final imagery is obtained at a sacrifice of computational complexity due to the need of interpolation. In this paper, from an alternative viewpoint, we propose a novel interpolation-free imaging algorithm based on wavefront reconstruction theory. The algorithm is an extension of the 2D range stacking algorithm (RSA with the advantages of low computational cost and high precision. The algorithm uses different reference signal spectrums at different range bins and then forms the target functions at desired range bin by a concise coherent summation. Several practical issues such as the propagation loss compensation, wavefront reconstruction, and aliasing mitigating are also considered. The sampling criterion and the achievable resolutions for the proposed algorithm are also derived. Finally, the proposed method is validated through extensive computer simulations and real-field experiments. The results show that accurate 3D image can be generated at a very high speed by utilizing the proposed algorithm.

  10. Deconstructing Concealed Gayness Text in The Film Negeri van Oranje: Critical Discourse Analysis

    Directory of Open Access Journals (Sweden)

    Heri Setiawan

    2018-02-01

    Full Text Available As one of the most popular creative cultural products, film sometimes speaks beyond what it presents. It is not always produced merely for entertainment purposes, but also to spread a certain ideology and represent a particular culture. Anchored in queer theory, this research looks at the Indonesian film, Negeri Van Oranje, which was chosen purposely to be analyzed using Fairclough’s critical discourse analysis model with an aim to deconstruct the concealed gayness text in the film. From the analysis, it was found that the gay scenes in the film try to tell its audience about the positions, feelings, challenges, and rejections that Indonesian gay people experience living amongst heteronormative surroundings. Some new notions about gay people’s life in Indonesia are extracted based on the analysis of the gay scenes in the film. The strategy of inserting gay content into a film nationally released in Indonesia is also revealed. The results of the analysis could be used to create a picture of what gay life looks like in Indonesia, a multicultural country that is well-known as the place in which the world’s largest Muslim population dwells.

  11. The clinical value of bilateral breast MR imaging: is it worth performing on patients showing suspicious microcalcifications on mammography?

    Energy Technology Data Exchange (ETDEWEB)

    Akita, Ayano; Tanimoto, Akihiro; Kuribayashi, Sachio [Keio University, Department of Diagnostic Radiology, School of Medicine, Tokyo (Japan); Jinno, Hiromitsu [Keio University, Department of Surgery, School of Medicine, Tokyo (Japan); Kameyama, Kaori [Keio University, Division of Diagnostic Pathology, School of Medicine, Tokyo (Japan)

    2009-09-15

    The purpose of this study was to evaluate the clinical value of bilateral breast magnetic resonance (MR) imaging (MRI) in patients showing suspicious microcalcifications on mammography and negative ultrasound findings. Fifty patients underwent MRI before stereotactic vacuum-assisted breast biopsy (SVAB). MR findings were classified into five types for interpretation, and types 4 and 5 were considered malignant. SVAB revealed 13 carcinomas and 37 benign lesions. Malignant lesions were more frequently found in cases of positive MRI diagnoses than in negative MRI diagnoses (P < 0.001). Mammography had a sensitivity of 100%, a specificity of 24% and an accuracy of 44%, whereas mammography plus MRI had a sensitivity of 85%, a specificity of 100% and an accuracy of 96%. In the evaluation of mammographically detected microcalcifications, bilateral breast MRI is of good diagnostic value and may alter the indications for SVAB. (orig.)

  12. Frequency and spatial distribution of animal and object hoarder behavior in Curitiba, Paraná State, Brazil

    Directory of Open Access Journals (Sweden)

    Graziela Ribeiro da Cunha

    Full Text Available Abstract: This study aimed to establish the frequency and spatial distribution of animal and object hoarding in Curitiba (Paraná State, the eighth most populous city in Brazil. All hoarding complaints received by the City Secretaries of Health, Environment and Social Assistance between September 2013 and April 2015 were collected (n = 226 and suspicious cases were individually investigated. A total of 113/226 (50% of complaints were confirmed as hoarding cases, representing an overall ratio of 6.45 cases per 100,000 inhabitants in Curitiba, of which 48/113 (42.5% involved object hoarders, 41/113 (36.3% animal hoarders and 24/113 (21.2% both animal and object hoarders. A correlation of total identified cases with neighborhood population density and all population stratums analyzed (total, gender, age was significantly positive (p < 0.01, and with neighborhood mean monthly income (r = -0.2; p = 0.03 significantly negative. A spatial cluster of cases was found in the north of the city (OR = 8.57; p < 0.01. Hoarding cases were relatively frequent in Curitiba and were associated with population distribution patterns and inversely related to neighborhood income.

  13. Automatic detection of suspicious behavior of pickpockets with track-based features in a shopping mall

    Science.gov (United States)

    Bouma, Henri; Baan, Jan; Burghouts, Gertjan J.; Eendebak, Pieter T.; van Huis, Jasper R.; Dijk, Judith; van Rest, Jeroen H. C.

    2014-10-01

    Proactive detection of incidents is required to decrease the cost of security incidents. This paper focusses on the automatic early detection of suspicious behavior of pickpockets with track-based features in a crowded shopping mall. Our method consists of several steps: pedestrian tracking, feature computation and pickpocket recognition. This is challenging because the environment is crowded, people move freely through areas which cannot be covered by a single camera, because the actual snatch is a subtle action, and because collaboration is complex social behavior. We carried out an experiment with more than 20 validated pickpocket incidents. We used a top-down approach to translate expert knowledge in features and rules, and a bottom-up approach to learn discriminating patterns with a classifier. The classifier was used to separate the pickpockets from normal passers-by who are shopping in the mall. We performed a cross validation to train and evaluate our system. In this paper, we describe our method, identify the most valuable features, and analyze the results that were obtained in the experiment. We estimate the quality of these features and the performance of automatic detection of (collaborating) pickpockets. The results show that many of the pickpockets can be detected at a low false alarm rate.

  14. Clinical and diagnostic value of preoperative MR mammography and FDG-PET in suspicious breast lesions

    International Nuclear Information System (INIS)

    Walter, C.; Scheidhauer, K.; Theissen, P.; Scharl, A.; Goering, U.J.; Kugel, H.; Krahe, T.; Pietrzyk, U.

    2003-01-01

    Dynamic enhanced magnetic resonance (MR) mammography and fluorine-18 fluorodeoxyglucose positron emission tomography (FDG-PET) of the breast were directly compared preoperatively in suspicious breast lesions. Forty-two breast lesions in 40 patients were examined with a three-dimensional dynamic MR imaging series and FDG-PET. The MR and PET examinations were evaluated separately and the results were compared with the histological findings. The sensitivity and specificity of each method were calculated. The diagnostic value of both modalities as single diagnostic tool and in combination was investigated. Nineteen malignant and 23 benign breast lesions were proven histologically. Magnetic resonance mammography and FDG-PET showed a sensitivity of 89 and 63%, respectively. The specificity was 74 and 91%, respectively. The combination of both imaging methods decreased the not-required biopsies from 55 to 17%. Only one false-negative finding - a patient pre-treated with chemotherapy - was observed in both methods. The combination of MR mammography and FDG-PET can help to decrease biopsies of benign breast lesions. Because of their high cost, these modalities should only be used in problematic cases to either rule out or to demonstrate malignancy. The best diagnostic strategy is achieved using MR mammography first. If the diagnosis is still questionable, FDG-PET can be performed. (orig.)

  15. Migrant workers’ occupation and healthcare-seeking preferences for TB-suspicious symptoms and other health problems: a survey among immigrant workers in Songkhla province, southern Thailand

    Directory of Open Access Journals (Sweden)

    Naing Tinzar

    2012-10-01

    Full Text Available Abstract Background Much of the unskilled and semi-skilled workforce in Thailand comprises migrant workers from neighbouring countries. While, in principle, healthcare facilities in the host country are open to those migrants registered with the Ministry of Labour, their actual healthcare-seeking preferences and practices, as well as those of unregistered migrants, are not well documented. This study aimed to describe the patterns of healthcare-seeking behaviours of immigrant workers in Thailand, emphasizing healthcare practices for TB-suspicious symptoms, and to identify the role of occupation and other factors influencing these behaviours. Methods A survey was conducted among 614 immigrant factory workers (FW, rubber tappers (RT and construction workers (CW, in which information was sought on socio-demography, history of illness and related healthcare-seeking behaviour. Mixed effects logistic regression modeling was employed in data analysis. Results Among all three occupations, self-medication was the most common way of dealing with illnesses, including the development of TB-suspicious symptoms, for which inappropriate drugs were used. Only for GI symptoms and obstetric problems did migrant workers commonly seek healthcare at modern healthcare facilities. For GI illness, FW preferred to attend the in-factory clinic and RT a private facility over government facilities owing to the quicker service and greater convenience. For RT, who were generally wealthier, the higher cost of private treatment was not a deterrent. CW preferentially chose a government healthcare facility for their GI problems. For obstetric problems, including delivery, government facilities were utilized by RT and CW, but most FW returned to their home country. After adjusting for confounding, having legal status in the country was associated with overall greater use of government facilities and being female and being married with use of both types of modern healthcare

  16. Effect of Temperature and Moisture on the Development of Concealed Damage in Raw Almonds (Prunus dulcis).

    Science.gov (United States)

    Rogel-Castillo, Cristian; Zuskov, David; Chan, Bronte Lee; Lee, Jihyun; Huang, Guangwei; Mitchell, Alyson E

    2015-09-23

    Concealed damage (CD) is a brown discoloration of nutmeat that appears only after kernels are treated with moderate heat (e.g., roasting). Identifying factors that promote CD in almonds is of significant interest to the nut industry. Herein, the effect of temperature (35 and 45 °C) and moisture (almonds (Prunus dulcis var. Nonpareil) was studied using HS-SPME-GC/MS. A CIE LCh colorimetric method was developed to identify raw almonds with CD. A significant increase in CD was demonstrated in almonds exposed to moisture (8% kernel moisture content) at 45 °C as compared to 35 °C. Elevated levels of volatiles related to lipid peroxidation and amino acid degradation were observed in almonds with CD. These results suggest that postharvest moisture exposure resulting in an internal kernel moisture ≥ 8% is a key factor in the development of CD in raw almonds and that CD is accelerated by temperature.

  17. Subclinical vitamin D deficiency is increased in adolescent girls who wear concealing clothing.

    Science.gov (United States)

    Hatun, Sukru; Islam, Omer; Cizmecioglu, Filiz; Kara, Bulent; Babaoglu, Kadir; Berk, Fatma; Gökalp, Ayse Sevim

    2005-02-01

    Vitamin D deficiency continues to be a worldwide problem, especially in developing countries. The aim of this study was to investigate potential risk factors for vitamin D deficiency. Girls (n = 89) aged 13 to 17 y were enrolled in the study. Study subjects were stratified into 3 groups: Group I included girls living in a suburban area; Group II girls lived in an urban area, and Group III girls lived in an urban area and wore concealing clothes for religious reasons. At the end of winter (in April) serum 25-hydroxyvitamin D [25(OH)D] levels were measured and dietary data were collected using questionnaires. Vitamin D deficiency was defined as a serum 25(OH)D concentration dress) the serum 25(OH)D concentrations (28.13 +/- 12.53 nmol/L) were significantly lower than in the other 2 groups, and within this group, 50% of girls were vitamin D deficient. The lumbar and femur neck BMD of girls with lower 25(OH)D levels did not differ from those with adequate vitamin D levels. We conclude that vitamin D deficiency is an important problem in Turkish adolescent girls, especially in those who follow a religious dress code; therefore, vitamin D supplementation appears to be necessary for adolescent girls.

  18. Dynamic detection-rate-based bit allocation with genuine interval concealment for binary biometric representation.

    Science.gov (United States)

    Lim, Meng-Hui; Teoh, Andrew Beng Jin; Toh, Kar-Ann

    2013-06-01

    Biometric discretization is a key component in biometric cryptographic key generation. It converts an extracted biometric feature vector into a binary string via typical steps such as segmentation of each feature element into a number of labeled intervals, mapping of each interval-captured feature element onto a binary space, and concatenation of the resulted binary output of all feature elements into a binary string. Currently, the detection rate optimized bit allocation (DROBA) scheme is one of the most effective biometric discretization schemes in terms of its capability to assign binary bits dynamically to user-specific features with respect to their discriminability. However, we learn that DROBA suffers from potential discriminative feature misdetection and underdiscretization in its bit allocation process. This paper highlights such drawbacks and improves upon DROBA based on a novel two-stage algorithm: 1) a dynamic search method to efficiently recapture such misdetected features and to optimize the bit allocation of underdiscretized features and 2) a genuine interval concealment technique to alleviate crucial information leakage resulted from the dynamic search. Improvements in classification accuracy on two popular face data sets vindicate the feasibility of our approach compared with DROBA.

  19. Malignancy rate of biopsied suspicious bone lesions identified on FDG PET/CT

    Energy Technology Data Exchange (ETDEWEB)

    Adams, Hugo J.A.; Kwee, Thomas C. [University Medical Center Utrecht, Department of Radiology and Nuclear Medicine, Utrecht (Netherlands); Klerk, John M.H. de [Meander Medical Center, Department of Nuclear Medicine, Amersfoort (Netherlands); Heggelman, Ben G.F. [Meander Medical Center, Department of Radiology, Amersfoort (Netherlands); Dubois, Stefan V. [Meander Medical Center, Department of Pathology, Amersfoort (Netherlands)

    2016-07-15

    To determine the malignancy rate of bone lesions identified on FDG PET/CT in patients who have undergone CT-guided biopsy because of the suspicion of malignancy. This single-centre retrospective study spanned eight consecutive years and included all patients who underwent both FDG PET/CT and CT-guided bone biopsy because of the suspicion of malignancy. The positive predictive value (PPV) for malignancy was calculated, and different patient and imaging characteristics were compared between malignant and benign bone lesions. Of 102 included patients with bone lesions that all showed FDG uptake exceeding mediastinal uptake, bone biopsy showed a malignant lesion in 91 patients, yielding a PPV for malignancy of 89.2 % (95 % CI 81.7 - 93.9 %). In the 94 patients with bone lesions that showed FDG uptake exceeding liver uptake, bone biopsy showed a malignant lesion in 83 patients, yielding a PPV for malignancy of 88.3 % (95 % CI 80.1 - 93.5 %). Higher age, bone marrow replacement of the lesion seen on CT, expansion of the lesion seen on CT, and presence of multifocal lesions on FDG PET/CT were significantly more frequent in patients with malignant lesions than in those with benign bone lesions (P = 0.044, P = 0.009, P = 0.015, and P = 0.019, respectively). Furthermore, there was a trend towards a higher incidence of cortical destruction (P = 0.056) and surrounding soft tissue mass (P = 0.063) in patients with malignant bone lesions. The PPV for malignancy of suspicious bone lesions identified on FDG PET/CT is not sufficiently high to justify changes in patient management without histopathological confirmation. Nevertheless, ancillary patient and imaging characteristics may increase the likelihood of a malignant bone lesion. (orig.)

  20. Sharp and blunt force trauma concealment by thermal alteration in homicides: An in-vitro experiment for methodology and protocol development in forensic anthropological analysis of burnt bones.

    Science.gov (United States)

    Macoveciuc, Ioana; Márquez-Grant, Nicholas; Horsfall, Ian; Zioupos, Peter

    2017-06-01

    Burning of human remains is one method used by perpetrators to conceal fatal trauma and expert opinions regarding the degree of skeletal evidence concealment are often disparate. This experiment aimed to reduce this incongruence in forensic anthropological interpretation of burned human remains and implicitly contribute to the development of research methodologies sufficiently robust to withstand forensic scrutiny in the courtroom. We have tested the influence of thermal alteration on pre-existing sharp and blunt trauma on twenty juvenile sheep radii in the laboratory using an automated impact testing system and an electric furnace. The testing conditions simulated a worst-case scenario where remains with pre-existing sharp or blunt trauma were exposed to burning with an intentional vehicular fire scenario in mind. All impact parameters as well as the burning conditions were based on those most commonly encountered in forensic cases and maintained constant throughout the experiment. The results have shown that signatures associated with sharp and blunt force trauma were not masked by heat exposure and highlights the potential for future standardization of fracture analysis in burned bone. Our results further emphasize the recommendation given by other experts on handling, processing and recording burned remains at the crime scene and mortuary. Copyright © 2017 Elsevier B.V. All rights reserved.

  1. Autofluorescence guided diagnostic evaluation of suspicious oral mucosal lesions: opportunities, limitations, and pitfalls

    Science.gov (United States)

    Vigneswaran, Nadarajah

    2011-03-01

    Wide-filed autofluorescence examination is currently considered as a standard of care for screening and diagnostic evaluation of early neoplastic changes of the skin, cervix, lung, bladder, gastrointestinal tract and oral cavity. Naturally occurring fluorophores within the tissue absorb UV and visible light and can re-emit some of this light at longer wavelengths in the form of fluorescence. This non-invasive tissue autofluorescence imaging is used in optical diagnostics, especially in the early detection of cancer. Usually, malignant transformation is associated with thickening of the epithelium, enhanced cellular density due to increased nuclear cytoplasmic ratio which may attenuate the excitation leading to a decrease in collagen autofluorescence. Hence, dysplastic and cancerous tissues often exhibit decreased blue-green autofluorescence and appear darker compared to uninvolved mucosa. Currently, there are three commercially available devices to examine tissue autofluorescence in the oral cavity. In this study we used the oral cancer screening device IdentafiTM 3000 to examine the tissue reflectance and autofluorescence of PML and confounding lesions of the oral cavity. Wide-field autofluorescence imaging enables rapid inspection of large mucosal surfaces, to aid in recognition of suspicious lesions and may also help in discriminate the PML (class 1) from some of the confounding lesions (class II). However, the presence of inflammation or pigments is also associated with loss of stromal autofluorescence, and may give rise to false-positive results with widefield fluorescence imaging. Clinicians who use these autofluorescence based oral cancer screening devices should be aware about the benign oral mucosal lesions that may give false positivity so that unnecessary patient's anxiety and the need for scalpel biopsy can be eliminated.

  2. Instant detection and identification of concealed explosive-related compounds: Induced Stokes Raman versus infrared.

    Science.gov (United States)

    Elbasuney, Sherif; El-Sherif, Ashraf F

    2017-01-01

    The instant detection of explosives and explosive-related compounds has become an urgent priority in recent years for homeland security and counter-terrorism applications. Modern techniques should offer enhancement in selectivity, sensitivity, and standoff distances. Miniaturisation, portability, and field-ruggedisation are crucial requirements. This study reports on instant and standoff identification of concealed explosive-related compounds using customized Raman technique. Stokes Raman spectra of common explosive-related compounds were generated and spectrally resolved to create characteristic finger print spectra. The scattered Raman emissions over the band 400:2000cm -1 were compared to infrared absorption using FTIR. It has been demonstrated that the two vibrational spectroscopic techniques were opposite and completing each other. Molecular vibrations with strong absorption in infrared (those involve strong change in dipole moments) induced weak signals in Raman and vice versa. The tailored Raman offered instant detection, high sensitivity, and standoff detection capabilities. Raman demonstrated characteristic fingerprint spectra with stable baseline and sharp intense peaks. Complete correlations of absorption/scattered signals to certain molecular vibrations were conducted to generate an entire spectroscopic profile of explosive-related compounds. This manuscript shades the light on Raman as one of the prevailing technologies for instantaneous detection of explosive-related compounds. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  3. Retrospective Study on the Prevalence and Antibiotic Resistance Pattern of Staphylococcus Aureus and Staphylococcus Epidermidis Among Patients Suspicious of Bacteremia During 2006 - 2011

    Directory of Open Access Journals (Sweden)

    Mohammad Ali Mohaghegh

    2015-05-01

    Full Text Available Background: Staphylococci bacteria cause different diseases, varies from mild skin infections to serious bacteremia. Also they are a major cause of nosocomial and community-acquired infections globally. Staphylococcus aureus and Staphylococcus epidermidis are the two important opportunistic pathogens of the staphylococci that both can cause bacteremia. Objectives: The aim of the present study was to investigate the prevalence and antibiotic resistance pattern of S. aureus and S. epidermidis among blood culture of patients of Ghaem Educational, Research and Treatment Center, Mashhad, Iran, during 6 years (2006 - 2011. Patients and Methods: In this retrospective study, hospital medical records of 28000 patients referred to Ghaem Educational, Research and Treatment Center, Mashhad, Iran, who were suspicious of blood infections during 6 years (2005-2011, were extracted. The patient’s blood culture with staphylococcal growth and their antibiogram results during 2006 - 2011 were collected and studied. Results: Staphylococcus spp. were isolated from 600 (2.14% out of 28000 blood cultures. Furthermore, 420 (70%, 170 (28.3% and 10 (1.7% out of 600 bacterial isolates identified as S. epidermidis, S. aureus and other Staphylococcus spp., respectively. Ampicillin, amoxicillin, cefixime, ceftazidime, penicillin, oxacillin, nalidixic acid and cephepime were the most antibiotics that the isolates were resistant against. Also vancommycin and chloramphenicol were the most effective antibiotics against S. epidermidis and S. aureus, respectively. Conclusions: Prevalence of Staphylococcal bacteremia caused by S. epidermidis is fairly high comparing to S. aureus among patients referred to Ghaem Educational, Research and Treatment Center, Mashhad, Iran. Also the resistance rate of Staphylococcus spp. isolated from blood against commonly used antibiotic is high, but there are some highly sensitive antibiotic against the infection.

  4. Studies on the detection of concealed objects using the neutron reflection method

    International Nuclear Information System (INIS)

    Papp, A.

    2013-01-01

    The increment of reflected thermal and 1.45 eV resonance neutrons vs. the thickness of the reflector has been measured and described by an analytical expression. Macroscopic, Σ β , and microscopic, σ β , reflection cross sections averaged over the bulk reflector substances were deduced for some elements and compounds. It was found that the σ β values are additive even for bulk samples and so the σ βmol could be given for some illicit drugs, explosives and hiding materials. - Highlights: ► The effect of reflector materials on the increment of neutrons were determined. ► Macroscopic and microscopic reflection cross sections averaged over bulk samples were determined. ► Simple analytical expression was given to describe the yield of reflected neutrons. ► The observed additive behavior in reflected neutrons rendered to characterize other materials

  5. Agreement Among RTOG Sarcoma Radiation Oncologists in Contouring Suspicious Peritumoral Edema for Preoperative Radiation Therapy of Soft Tissue Sarcoma of the Extremity

    Energy Technology Data Exchange (ETDEWEB)

    Bahig, Houda [Department of Radiation Oncology, Centre Hospitalier de l' Université de Montréal, Montreal, QC (Canada); Roberge, David, E-mail: david.roberge.chum@ssss.gouv.qc.ca [Department of Radiation Oncology, Centre Hospitalier de l' Université de Montréal, Montreal, QC (Canada); Bosch, Walter [Department of Radiation Oncology, Washington University, St Louis, Missouri (United States); Levin, William [Department of Radiation Oncology, University of Pennsylvania, Philadelphia, Pennsylvania (United States); Petersen, Ivy; Haddock, Michael [Department of Radiation Oncology, Mayo Clinic, Rochester, Minnesota (United States); Freeman, Carolyn [Division of Radiation Oncology, McGill University Health Centre, Montreal, QC (Canada); DeLaney, Thomas F. [Department of Radiation Oncology, Massachusetts General Hospital, Boston, Massachusetts (United States); Abrams, Ross A. [Department of Radiation Oncology, Rush University Medical Center, Chicago, Illinois (United States); Indelicato, Danny J. [Department of Radiation Oncology, University of Florida Medical Center, Jacksonville, Florida (United States); Baldini, Elizabeth H. [Department of Radiation Oncology, Brigham and Women' s Hospital and Dana-Farber Cancer Institute, Boston, Massachusetts (United States); Hitchcock, Ying [Department of Radiation Oncology, University of Utah Medical Center, Salt Lake City, Utah (United States); Kirsch, David G. [Department of Radiation Oncology, Duke University Medical Center, Durham, North Carolina (United States); Kozak, Kevin R. [Department of Human Oncology, University of Wisconsin School of Medicine and Public Health, Madison, Wisconsin (United States); Wolfson, Aaron [Department of Radiation Oncology, University of Miami Miller School of Medicine, Miami, Florida (United States); and others

    2013-06-01

    Purpose: Peritumoral edema may harbor sarcoma cells. The extent of suspicious edema (SE) included in the treatment volume is subject to clinical judgment, balancing the risk of missing tumor cells with excess toxicity. Our goal was to determine variability in SE delineation by sarcoma radiation oncologists (RO). Methods and Materials: Twelve expert ROs were provided with T1 gadolinium and T2-weighted MR images of 10 patients with high-grade extremity soft-tissue sarcoma. Gross tumor volume, clinical target volume (CTV)3cm (3 cm longitudinal and 1.5 cm radial margin), and CTV2cm (2 cm longitudinal and 1 cm radial margin) were contoured by a single observer. Suspicious peritumoral edema, defined as abnormal signal on T2 images, was independently delineated by all 12 ROs. Contouring agreement was analyzed using the simultaneous truth and performance level estimation (STAPLE) algorithm and kappa statistics. Results: The mean volumes of GTV, CTV2cm, and CTV3cm were, respectively, 130 cm{sup 3} (7-413 cm{sup 3}), 280 cm{sup 3} and 360 cm{sup 3}. The mean consensus volume computed using the STAPLE algorithm at 95% confidence interval was 188 cm{sup 3} (24-565 cm{sup 3}) with a substantial overall agreement corrected for chance (mean kappa = 0.71; range: 0.32-0.87). The minimum, maximum, and mean volume of SE (excluding the GTV) were 4, 182, and 58 cm{sup 3} (representing a median of 29% of the GTV volume). The median volume of SE not included in the CTV2cm and in the CTV3cm was 5 and 0.3 cm{sup 3}, respectively. There were 3 large tumors with >30 cm{sup 3} of SE not included in the CTV3cm volume. Conclusion: Despite the fact that SE would empirically seem to be a more subjective volume, a substantial or near-perfect interobserver agreement was observed in SE delineation in most cases with high-grade soft-tissue sarcomas of the extremity. A median of 97% of the consensus SE is within the CTV2cm (99.8% within the CTV3cm). In a minority of cases, however, significant

  6. Agreement among RTOG sarcoma radiation oncologists in contouring suspicious peritumoral edema for preoperative radiation therapy of soft tissue sarcoma of the extremity.

    Science.gov (United States)

    Bahig, Houda; Roberge, David; Bosch, Walter; Levin, William; Petersen, Ivy; Haddock, Michael; Freeman, Carolyn; Delaney, Thomas F; Abrams, Ross A; Indelicato, Danny J; Baldini, Elizabeth H; Hitchcock, Ying; Kirsch, David G; Kozak, Kevin R; Wolfson, Aaron; Wang, Dian

    2013-06-01

    Peritumoral edema may harbor sarcoma cells. The extent of suspicious edema (SE) included in the treatment volume is subject to clinical judgment, balancing the risk of missing tumor cells with excess toxicity. Our goal was to determine variability in SE delineation by sarcoma radiation oncologists (RO). Twelve expert ROs were provided with T1 gadolinium and T2-weighted MR images of 10 patients with high-grade extremity soft-tissue sarcoma. Gross tumor volume, clinical target volume (CTV)3cm (3 cm longitudinal and 1.5 cm radial margin), and CTV2cm (2 cm longitudinal and 1 cm radial margin) were contoured by a single observer. Suspicious peritumoral edema, defined as abnormal signal on T2 images, was independently delineated by all 12 ROs. Contouring agreement was analyzed using the simultaneous truth and performance level estimation (STAPLE) algorithm and kappa statistics. The mean volumes of GTV, CTV2cm, and CTV3cm were, respectively, 130 cm(3) (7-413 cm(3)), 280 cm(3) and 360 cm(3). The mean consensus volume computed using the STAPLE algorithm at 95% confidence interval was 188 cm(3) (24-565 cm(3)) with a substantial overall agreement corrected for chance (mean kappa = 0.71; range: 0.32-0.87). The minimum, maximum, and mean volume of SE (excluding the GTV) were 4, 182, and 58 cm(3) (representing a median of 29% of the GTV volume). The median volume of SE not included in the CTV2cm and in the CTV3cm was 5 and 0.3 cm(3), respectively. There were 3 large tumors with >30 cm(3) of SE not included in the CTV3cm volume. Despite the fact that SE would empirically seem to be a more subjective volume, a substantial or near-perfect interobserver agreement was observed in SE delineation in most cases with high-grade soft-tissue sarcomas of the extremity. A median of 97% of the consensus SE is within the CTV2cm (99.8% within the CTV3cm). In a minority of cases, however, significant expansion of the CTVs is required to cover SE. Copyright © 2013 Elsevier Inc. All rights

  7. Agreement Among RTOG Sarcoma Radiation Oncologists in Contouring Suspicious Peritumoral Edema for Preoperative Radiation Therapy of Soft Tissue Sarcoma of the Extremity

    International Nuclear Information System (INIS)

    Bahig, Houda; Roberge, David; Bosch, Walter; Levin, William; Petersen, Ivy; Haddock, Michael; Freeman, Carolyn; DeLaney, Thomas F.; Abrams, Ross A.; Indelicato, Danny J.; Baldini, Elizabeth H.; Hitchcock, Ying; Kirsch, David G.; Kozak, Kevin R.; Wolfson, Aaron

    2013-01-01

    Purpose: Peritumoral edema may harbor sarcoma cells. The extent of suspicious edema (SE) included in the treatment volume is subject to clinical judgment, balancing the risk of missing tumor cells with excess toxicity. Our goal was to determine variability in SE delineation by sarcoma radiation oncologists (RO). Methods and Materials: Twelve expert ROs were provided with T1 gadolinium and T2-weighted MR images of 10 patients with high-grade extremity soft-tissue sarcoma. Gross tumor volume, clinical target volume (CTV)3cm (3 cm longitudinal and 1.5 cm radial margin), and CTV2cm (2 cm longitudinal and 1 cm radial margin) were contoured by a single observer. Suspicious peritumoral edema, defined as abnormal signal on T2 images, was independently delineated by all 12 ROs. Contouring agreement was analyzed using the simultaneous truth and performance level estimation (STAPLE) algorithm and kappa statistics. Results: The mean volumes of GTV, CTV2cm, and CTV3cm were, respectively, 130 cm 3 (7-413 cm 3 ), 280 cm 3 and 360 cm 3 . The mean consensus volume computed using the STAPLE algorithm at 95% confidence interval was 188 cm 3 (24-565 cm 3 ) with a substantial overall agreement corrected for chance (mean kappa = 0.71; range: 0.32-0.87). The minimum, maximum, and mean volume of SE (excluding the GTV) were 4, 182, and 58 cm 3 (representing a median of 29% of the GTV volume). The median volume of SE not included in the CTV2cm and in the CTV3cm was 5 and 0.3 cm 3 , respectively. There were 3 large tumors with >30 cm 3 of SE not included in the CTV3cm volume. Conclusion: Despite the fact that SE would empirically seem to be a more subjective volume, a substantial or near-perfect interobserver agreement was observed in SE delineation in most cases with high-grade soft-tissue sarcomas of the extremity. A median of 97% of the consensus SE is within the CTV2cm (99.8% within the CTV3cm). In a minority of cases, however, significant expansion of the CTVs is required to cover SE

  8. Sex difference in choice of concealed or exposed refuge sites by preschool children viewing a model leopard in a playground simulation of antipredator behavior

    Directory of Open Access Journals (Sweden)

    Richard G. Coss

    2016-07-01

    Full Text Available The current study of preschool children characterizes a semi-natural extension of experimental questions on how human ancestors evaded predation when encountering dangerous felids. In a pretend game on a playground, we presented full-size leopard and deer models to children (N = 39 in a repeatedmeasures experimental design. Prior to viewing the model presented 15-m away, each child was instructed by the experimenter to go where she or he would feel safe. The rationale for this study was based on the anthropological construct of “sexual dinichism,” positing that, during the Pliocene, smaller-bodied hominin females engaged in more arboreal behavior than larger-bodied males. Consistent with this construct, our previous simulation research using images of an African rock outcrop showed that, after viewing a lion, girls preferred a tree as refuge rather than a crevice or large boulder whereas boys did not differentiate these refuge sites. In this follow-up study, we predicted that, after viewing the model leopard, the preschool girls would differ from the boys by not choosing enclosed refuge sites analogous to the crevice. Analyses of a contingency table for the leopard model supported this hypothesis by yielding a significant interaction of sex and refuge location (p = .031, d = .76, the source of which was a reliably larger percentage of girls not choosing concealed refuge (p = .005, d = 2.3. The interaction of sex and refuge location for the model deer was not significant (p > .5. Our findings suggest that, in contrast to the deer, the girls selected exposed playground refuge sites rather than concealing ones to maintain visual contact with the leopard as a contingency for future action

  9. Effect of Drying Moisture Exposed Almonds on the Development of the Quality Defect Concealed Damage.

    Science.gov (United States)

    Rogel-Castillo, Cristian; Luo, Kathleen; Huang, Guangwei; Mitchell, Alyson E

    2017-10-11

    Concealed damage (CD), is a term used by the nut industry to describe a brown discoloration of kernel nutmeat that becomes visible after moderate heat treatments (e.g., roasting). CD can result in consumer rejection and product loss. Postharvest exposure of almonds to moisture (e.g., rain) is a key factor in the development of CD as it promotes hydrolysis of proteins, carbohydrates, and lipids. The effect of drying moisture-exposed almonds between 45 to 95 °C, prior to roasting was evaluated as a method for controlling CD in roasted almonds. Additionally, moisture-exposed almonds dried at 55 and 75 °C were stored under accelerated shelf life conditions (45 °C/80% RH) and evaluated for headspace volatiles. Results indicate that drying temperatures below 65 °C decreases brown discoloration of nutmeat up to 40% while drying temperatures above 75 °C produce significant increases in brown discoloration and volatiles related to lipid oxidation, and nonsignificant increases in Amadori compounds. Results also demonstrate that raw almonds exposed to moisture and dried at 55 °C prior to roasting, reduce the visual sign of CD and maintain headspace volatiles profiles similar to almonds without moisture damage during accelerated storage.

  10. Ultrasound guided core biopsy of suspicious mammographic calcifications using high frequency and power Doppler ultrasound

    International Nuclear Information System (INIS)

    Teh, W.L.; Wilson, A.R.M; Evans, A.J.; Burrell, H.; Pinder, S.E.; Ellis, I.O.

    2000-01-01

    AIM: The pre-operative diagnosis of suspicious mammographic microcalcifications usually requires stereotactic needle biopsy. The aim of this study was to evaluate if high frequency 13 MHz ultrasound (HFUS) and power Doppler (PD) can aid visualization and biopsy of microcalcifications. MATERIALS AND METHODS: Forty-four consecutive patients presenting with microcalcifications without associated mammographic or palpable masses were examined with HFUS and PD. Ultrasound-guided core biopsy (USCB) was performed where possible. Stereotactic biopsy was carried out when US-guided biopsy was unsuccessful. Surgery was performed if a diagnosis of malignancy was made on core biopsy or if the repeat core biopsy was non-diagnostic. RESULTS: Forty-one patients (93%) had ultrasound abnormalities corresponding to mammographic calcification. USCB was performed on 37 patients. In 29/37, USCB obtained a definitive result (78.4%). USCB was non-diagnostic in 4/9 benign (44.4%) and 4/28 (14.3%) malignant lesions biopsied. The complete and absolute sensitivities for malignancy using USCB were 85.7% (24/28) and 81% (23/28), respectively. USCB correctly identified invasive disease in 12/23 (52.2%) cases. There was no significant difference in the presence of abnormal flow on PD between benign and malignant lesions. However, abnormal PD vascularity was present in 43.5% of invasive cancer and was useful in directing successful biopsy in eight cases. CONCLUSION: The combination of high frequency US with PD is useful in the detection and guidance of successful needle biopsy of microcalcifications particularly where there is an invasive focus within larger areas of DCIS. Teh, W.L. (2000)

  11. Mapping Fearscapes of a Mammalian Herbivore using Terrestrial LiDAR and UAV Imagery

    Science.gov (United States)

    Olsoy, P.; Nobler, J. D.; Forbey, J.; Rachlow, J. L.; Burgess, M. A.; Glenn, N. F.; Shipley, L. A.

    2013-12-01

    Concealment allows prey animals to remain hidden from a predator and can influence both real and perceived risks of predation. The heterogeneous nature of vegetative structure can create a variable landscape of concealment - a 'fearscape' - that may influence habitat quality and use by prey. Traditional measurements of concealment rely on a limited number of distances, heights, and vantage points, resulting in small snapshots of concealment available to a prey animal. Our objective was to demonstrate the benefits of emerging remote sensing techniques to map fearscapes for pygmy rabbits (Brachylagus idahoensis) in sagebrush steppe habitat across a continuous range of scales. Specifically, we used vegetation height rasters derived from terrestrial laser scanning (TLS) to create viewsheds from multiple vantage points, representing predator visibility. The sum of all the viewsheds modeled horizontal concealment of prey at both the shrub and patch scales. We also used a small, unmanned aerial vehicle (UAV) to determine vertical concealment at a habitat scale. Terrestrial laser scanning provided similar estimates of horizontal concealment at the shrub scale when compared to photographic methods (R2 = 0.85). Both TLS and UAV provide the potential to quantify concealment of prey from multiple distances, heights, or vantage points, allowing the creation of a manipulable fearscape map that can be correlated with habitat use by prey animals. The predictive power of such a map also could identify shrubs or patches for fine scale nutritional and concealment analysis for future investigation and conservation efforts. Fearscape map at the mound-scale. Viewsheds were calculated from 100 equally spaced observer points located 4 m from the closest on-mound sagebrush of interest. Red areas offer low concealment, while green areas provide high concealment.

  12. Concealed d-wave pairs in the s± condensate of iron-based superconductors.

    Science.gov (United States)

    Ong, Tzen; Coleman, Piers; Schmalian, Jörg

    2016-05-17

    A central question in iron-based superconductivity is the mechanism by which the paired electrons minimize their strong mutual Coulomb repulsion. In most unconventional superconductors, Coulomb repulsion is minimized through the formation of higher angular momentum Cooper pairs, with Fermi surface nodes in the pair wavefunction. The apparent absence of such nodes in the iron-based superconductors has led to a belief they form an s-wave ([Formula: see text]) singlet state, which changes sign between the electron and hole pockets. However, the multiorbital nature of these systems opens an alternative possibility. Here, we propose a new class of [Formula: see text] state containing a condensate of d-wave Cooper pairs, concealed by their entanglement with the iron orbitals. By combining the d-wave ([Formula: see text]) motion of the pairs with the internal angular momenta [Formula: see text] of the iron orbitals to make a singlet ([Formula: see text]), an [Formula: see text] superconductor with a nontrivial topology is formed. This scenario allows us to understand the development of octet nodes in potassium-doped Ba1-x KXFe2As2 as a reconfiguration of the orbital and internal angular momentum into a high spin ([Formula: see text]) state; the reverse transition under pressure into a fully gapped state can then be interpreted as a return to the low-spin singlet. The formation of orbitally entangled pairs is predicted to give rise to a shift in the orbital content at the Fermi surface, which can be tested via laser-based angle-resolved photoemission spectroscopy.

  13. Use of Near-Infrared Spectroscopy and Chemometrics for the Nondestructive Identification of Concealed Damage in Raw Almonds (Prunus dulcis).

    Science.gov (United States)

    Rogel-Castillo, Cristian; Boulton, Roger; Opastpongkarn, Arunwong; Huang, Guangwei; Mitchell, Alyson E

    2016-07-27

    Concealed damage (CD) is defined as a brown discoloration of the kernel interior (nutmeat) that appears only after moderate to high heat treatment (e.g., blanching, drying, roasting, etc.). Raw almonds with CD have no visible defects before heat treatment. Currently, there are no screening methods available for detecting CD in raw almonds. Herein, the feasibility of using near-infrared (NIR) spectroscopy between 1125 and 2153 nm for the detection of CD in almonds is demonstrated. Almond kernels with CD have less NIR absorbance in the region related with oil, protein, and carbohydrates. With the use of partial least squares discriminant analysis (PLS-DA) and selection of specific wavelengths, three classification models were developed. The calibration models have false-positive and false-negative error rates ranging between 12.4 and 16.1% and between 10.6 and 17.2%, respectively. The percent error rates ranged between 8.2 and 9.2%. Second-derivative preprocessing of the selected wavelength resulted in the most robust predictive model.

  14. Temperature resolution enhancing of commercially available THz passive cameras due to computer processing of images

    Science.gov (United States)

    Trofimov, Vyacheslav A.; Trofimov, Vladislav V.; Kuchik, Igor E.

    2014-06-01

    As it is well-known, application of the passive THz camera for the security problems is very promising way. It allows seeing concealed object without contact with a person and this camera is non-dangerous for a person. Efficiency of using the passive THz camera depends on its temperature resolution. This characteristic specifies possibilities of the detection of concealed object: minimal size of the object, maximal distance of the detection, image detail. One of probable ways for a quality image enhancing consists in computer processing of image. Using computer processing of the THz image of objects concealed on the human body, one may improve it many times. Consequently, the instrumental resolution of such device may be increased without any additional engineering efforts. We demonstrate new possibilities for seeing the clothes details, which raw images, produced by the THz cameras, do not allow to see. We achieve good quality of the image due to applying various spatial filters with the aim to demonstrate independence of processed images on math operations. This result demonstrates a feasibility of objects seeing. We consider images produced by THz passive cameras manufactured by Microsemi Corp., and ThruVision Corp., and Capital Normal University (Beijing, China).

  15. Strategies to exclude subjects who conceal and fabricate information when enrolling in clinical trials.

    Science.gov (United States)

    Devine, Eric G; Peebles, Kristina R; Martini, Valeria

    2017-03-01

    Clinical trials within the US face an increasing challenge with the recruitment of quality candidates. One readily available group of subjects that have high rates of participation in clinical research are subjects who enroll in multiple trials for the purpose of generating income through study payments. Aside from issues of safety and generalizability, evidence suggests that these subjects employ methods of deception to qualify for the strict entrance criteria of some studies, including concealing information and fabricating information. Including these subjects in research poses a significant risk to the integrity of data quality and study designs. Strategies to limit enrollment of subjects whose motivation is generating income have not been systematically addressed in the literature. The present paper is intended to provide investigators with a range of strategies for developing and implementing a study protocol with protections to minimize the enrollment of subjects whose primary motivation for enrolling is to generate income. This multifaceted approach includes recommendations for advertising strategies, payment strategies, telephone screening strategies, and baseline screening strategies. The approach also includes recommendations for attending to inconsistent study data and subject motivation. Implementing these strategies may be more or less important depending upon the vulnerability of the study design to subject deception. Although these strategies may help researchers exclude subjects with a higher rate of deceptive practices, widespread adoption of subject registries would go a long way to decrease the chances of subjects enrolling in multiple studies or more than once in the same study.

  16. Improved characterization of scenes with a combination of MMW radar and radiometer information

    Science.gov (United States)

    Dill, Stephan; Peichl, Markus; Schreiber, Eric; Anglberger, Harald

    2017-05-01

    For security related applications MMW radar and radiometer systems in remote sensing or stand-off configurations are well established techniques. The range of development stages extends from experimental to commercial systems on the civil and military market. Typical examples are systems for personnel screening at airports for concealed object detection under clothing, enhanced vision or landing aid for helicopter and vehicle based systems for suspicious object or IED detection along roads. Due to the physical principle of active (radar) and passive (radiometer) MMW measurement techniques the appearance of single objects and thus the complete scenario is rather different for radar and radiometer images. A reasonable combination of both measurement techniques could lead to enhanced object information. However, some technical requirements should be taken into account. The imaging geometry for both sensors should be nearly identical, the geometrical resolution and the wavelength should be similar and at best the imaging process should be carried out simultaneously. Therefore theoretical and experimental investigations on a suitable combination of MMW radar and radiometer information have been conducted. First experiments in 2016 have been done with an imaging linescanner based on a cylindrical imaging geometry [1]. It combines a horizontal line scan in azimuth with a linear motion in vertical direction for the second image dimension. The main drawback of the system is the limited number of pixel in vertical dimension at a certain distance. Nevertheless the near range imaging results where promising. Therefore the combination of radar and radiometer sensor was assembled on the DLR wide-field-of-view linescanner ABOSCA which is based on a spherical imaging geometry [2]. A comparison of both imaging systems is discussed. The investigations concentrate on rather basic scenarios with canonical targets like flat plates, spheres, corner reflectors and cylinders. First

  17. Superiority of visual (verbal) vs. auditory test presentation modality in a P300-based CIT: The Complex Trial Protocol for concealed autobiographical memory detection.

    Science.gov (United States)

    Deng, Xiaohong; Rosenfeld, J Peter; Ward, Anne; Labkovsky, Elena

    2016-07-01

    This paper continues our efforts to determine which modality is best for presentation of stimuli in the P300-based concealed information test (CIT) called the Complex Trial Protocol (CTP). The first part of the CTP trial involves presentation of the key probe or irrelevant stimuli, and is followed by presentation of target (T) or non-target (NT). In Rosenfeld et al. (2015), probes and irrelevants regularly alternated modality over trials, but Ts and NTs were always visual. In the present study, (in both its experiments, EXP 1 and EXP 2), probes and irrelevants alternated modalities on successive trials, as before. In present EXP 1, Ts and NTs were always auditory, but in EXP 2, they were simultaneously auditory and visual. Probe P300 data were different in each study: In Rosenfeld et al. (2015) and EXP 2 here, the bootstrap-based detection rates based on probe-minus-irrelevant differences, significantly differed favoring visual probe and irrelevant presentation modality. In EXP 1 here, detection rates were the same for the two modalities. In Rosenfeld et al. (2015) there was no main effect of probe modality, visual vs. auditory on probe-minus-irrelevant P300 difference. There were such effects here in EXP 1 (pvisual modality. Probe P300 latencies were shorter for visual than for auditory stimuli in Rosenfeld et al. (2015), a trend specifically reversed in the present pair of studies. RT was faster for visual stimuli in the present studies. The T and NT modality appears to interact with probe/irrelevant modality, and the best protocol for detecting concealed information is with the 2015 study protocol or that of EXP 2, using visual stimulus presentation. Copyright © 2016 Elsevier B.V. All rights reserved.

  18. A concealed observational study of infection control and safe injection practices in Jordanian governmental hospitals.

    Science.gov (United States)

    Al-Rawajfah, Omar M; Tubaishat, Ahmad

    2017-10-01

    The recognized international organizations on infection prevention recommend using an observational method as the gold standard procedure for assessing health care professional's compliance with standard infection control practices. However, observational studies are rarely used in Jordanian infection control studies. This study aimed to evaluate injection practices among nurses working in Jordanian governmental hospitals. A cross-sectional concealed observational design is used for this study. A convenience sampling technique was used to recruit a sample of nurses working in governmental hospitals in Jordan. Participants were unaware of the time and observer during the observation episode. A total of 384 nurses from 9 different hospitals participated in the study. A total of 835 injections events were observed, of which 73.9% were performed without handwashing, 64.5% without gloving, and 27.5% were followed by needle recapping. Handwashing rate was the lowest (18.9%) when injections were performed by beginner nurses. Subcutaneous injections were associated with the lowest rate (26.7%) of postinjection handwashing compared with other routes. This study demonstrates the need for focused and effective infection control educational programs in Jordanian hospitals. Future studies should consider exploring the whole infection control practices related to waste disposal and the roles of the infection control nurse in this process in Jordanian hospitals. Copyright © 2017 Association for Professionals in Infection Control and Epidemiology, Inc. Published by Elsevier Inc. All rights reserved.

  19. Preoperative US-guided hook-needle insertion in recurrent lymph nodes of papillary thyroid cancer: A help for the surgeon

    International Nuclear Information System (INIS)

    Duprez, Raphaelle; Lebas, Patrick; Marc, Olivier Saint; Mongeois, Elise; Emy, Philippe; Michenet, Patrick

    2010-01-01

    Objective: The objective of this study is to investigate whether preoperative ultrasound guided insertion of a hook-needle is useful in reoperations for cervical recurrent lymph node metastases of papillary thyroid cancer. Patients and methods: 8 patients with operated papillary thyroid cancer were included in this study. They all had suspicious nonpalpable cervical lymph nodes discovered during follow-up. These lymph nodes were identified by ultrasound imaging and their metastatic nature was confirmed by fine needle aspiration cytology and measurement of in situ thyroglobulin. In all cases, surgical excision of these lymph nodes was decided. All 8 patients had a hook-needle inserted in the suspicious lymph node(s) preoperatively and under ultrasound guidance. Results and conclusion: In all 8 patients, the suspicious lymph nodes were removed and their metastatic nature was confirmed by the final pathological examination. This localization technique is very helpful for the surgeon during the excision of small and nonpalpable lymph nodes, especially in previously operated area.

  20. Strategies to exclude subjects who conceal and fabricate information when enrolling in clinical trials

    Directory of Open Access Journals (Sweden)

    Eric G. Devine

    2017-03-01

    Full Text Available Clinical trials within the US face an increasing challenge with the recruitment of quality candidates. One readily available group of subjects that have high rates of participation in clinical research are subjects who enroll in multiple trials for the purpose of generating income through study payments. Aside from issues of safety and generalizability, evidence suggests that these subjects employ methods of deception to qualify for the strict entrance criteria of some studies, including concealing information and fabricating information. Including these subjects in research poses a significant risk to the integrity of data quality and study designs. Strategies to limit enrollment of subjects whose motivation is generating income have not been systematically addressed in the literature. The present paper is intended to provide investigators with a range of strategies for developing and implementing a study protocol with protections to minimize the enrollment of subjects whose primary motivation for enrolling is to generate income. This multifaceted approach includes recommendations for advertising strategies, payment strategies, telephone screening strategies, and baseline screening strategies. The approach also includes recommendations for attending to inconsistent study data and subject motivation. Implementing these strategies may be more or less important depending upon the vulnerability of the study design to subject deception. Although these strategies may help researchers exclude subjects with a higher rate of deceptive practices, widespread adoption of subject registries would go a long way to decrease the chances of subjects enrolling in multiple studies or more than once in the same study.

  1. African land degradation in a world of global atmospheric change: fertilization conceals degradation?

    Science.gov (United States)

    Le, Lulseged Tamene, Paul L. G. Vlek, Quang Bao

    2009-04-01

    Land degradation is one of the most widespread environmental problems worldwide. The sub-Saharan Africa (SSA) is one of the most seriously affected regions with huge implications on food security and economic development. To plan plausible management measures, understanding the magnitude of the problem and identification of hotspot areas are necessary. Analysis of remote sensing and climate data observed from space for the period 1982 - 2003 showed significant improvement in vegetation productivity across 30% of SSA with decline on 5% of the subcontinent. Global change in atmospheric chemistry is likely responsible for the observed increasing trend in vegetation productivity. Such widespread greening observed from space could mask anthropogenic land degradation processes such as land conversion, selective logging, and soil nutrient mining. To assess this possible masking effect, a re-analysis of the vegetation productivity dynamics, taking into account atmospheric fertilization, was conducted. This was performed by analyzing the long-term trend in vegetation productivity of pristine lands (areas with minimum human- and climate- related impacts) identified across different biomes in SSA. The baseline slope values of biomass accrual calculated for those pristine lands were estimated and used to re-calculate the long-term trend of green biomass with and without the impact of atmospheric fertilization. This ultimately enabled to delineate the areas that would have experienced significant loss in vegetation productivity had the atmospheric chemistry not changed. The result suggests that seven times more than the area of actual productivity decline in SSA is affected by land degradation processes that are concealed by atmospheric fertilization. With this rate of surreptitious loss of vital land attributes and with the current rate of population growth (3%), the SSA subcontinent may soon lack the land resources necessary to foster economic development. Spatially

  2. Testing a potential alternative to traditional identification procedures: Reaction time-based concealed information test does not work for lineups with cooperative witnesses.

    Science.gov (United States)

    Sauerland, Melanie; Wolfs, Andrea C F; Crans, Samantha; Verschuere, Bruno

    2017-11-27

    Direct eyewitness identification is widely used, but prone to error. We tested the validity of indirect eyewitness identification decisions using the reaction time-based concealed information test (CIT) for assessing cooperative eyewitnesses' face memory as an alternative to traditional lineup procedures. In a series of five experiments, a total of 401 mock eyewitnesses watched one of 11 different stimulus events that depicted a breach of law. Eyewitness identifications in the CIT were derived from longer reaction times as compared to well-matched foil faces not encountered before. Across the five experiments, the weighted mean effect size d was 0.14 (95% CI 0.08-0.19). The reaction time-based CIT seems unsuited for testing cooperative eyewitnesses' memory for faces. The careful matching of the faces required for a fair lineup or the lack of intent to deceive may have hampered the diagnosticity of the reaction time-based CIT.

  3. A 3D tunable and multi-frequency graphene plasmonic cloak

    KAUST Repository

    Farhat, Mohamed; Rockstuhl, Carsten; Bagci, Hakan

    2013-01-01

    We demonstrate the possibility of cloaking three-dimensional objects at multi-frequencies in the far-infrared part of the spectrum. The proposed cloaking mechanism exploits graphene layers wrapped around the object to be concealed. Graphene layers

  4. Instructions to suppress semantic memory enhances or has no effect on P300 in a concealed information test (CIT).

    Science.gov (United States)

    Rosenfeld, J Peter; Ward, Anne; Drapekin, Jesse; Labkovsky, Elena; Tullman, Samuel

    2017-03-01

    The present study investigated the extent to which people can suppress semantic memory as indexed with the P300 ERP and the autobiographical implicit association test (aIAT). In EXP 1, participants (22) were run in a counterbalanced repeated measures study in both simply knowledgeable (SK) and knowledgeable with suppression (SP) conditions. A P300-based, concealed information test ("Complex Trial Protocol"; CTP) with a 50/50 Target/Nontarget (T/NT) ratio was given both with and without instructions to suppress semantic memories. The results showed increased P300s to probe name stimuli, reduced (but still high positive) aIAT d-scores, and increased simple reaction times to all stimuli used in ERP tests in the SP condition. EXP 2 was similar, but with SP and SK in two separate groups, and a 20/80 T/NT ratio. Again, ERP and aIAT results failed to show a suppression effect for semantic memory. The behavioral data suggest some task demand effects under suppression instructions, and that EXP 1 was more demanding than EXP 2. Copyright © 2017 Elsevier B.V. All rights reserved.

  5. Quasi-objects, Cult Objects and Fashion Objects

    DEFF Research Database (Denmark)

    Andersen, Bjørn Schiermer

    2011-01-01

    This article attempts to rehabilitate the concept of fetishism and to contribute to the debate on the social role of objects as well as to fashion theory. Extrapolating from Michel Serres’ theory of the quasi-objects, I distinguish two phenomenologies possessing almost opposite characteristics. T...... as a unique opportunity for studying the interchange between these two forms of fetishism and their respective phenomenologies. Finally, returning to Serres, I briefly consider the theoretical consequences of introducing the fashion object as a quasi-object.......This article attempts to rehabilitate the concept of fetishism and to contribute to the debate on the social role of objects as well as to fashion theory. Extrapolating from Michel Serres’ theory of the quasi-objects, I distinguish two phenomenologies possessing almost opposite characteristics....... These two phenomenologies are, so I argue, essential to quasi-object theory, yet largely ignored by Serres’ sociological interpreters. They correspond with the two different theories of fetishism found in Marx and Durkheim, respectively. In the second half of the article, I introduce the fashion object...

  6. [Value of sepsis single-disease manage system in predicting mortality in patients with sepsis].

    Science.gov (United States)

    Chen, J; Wang, L H; Ouyang, B; Chen, M Y; Wu, J F; Liu, Y J; Liu, Z M; Guan, X D

    2018-04-03

    Objective: To observe the effect of sepsis single-disease manage system on the improvement of sepsis treatment and the value in predicting mortality in patients with sepsis. Methods: A retrospective study was conducted. Patients with sepsis admitted to the Department of Surgical Intensive Care Unit of Sun Yat-Sen University First Affiliated Hospital from September 22, 2013 to May 5, 2015 were enrolled in this study. Sepsis single-disease manage system (Rui Xin clinical data manage system, China data, China) was used to monitor 25 clinical quality parameters, consisting of timeliness, normalization and outcome parameters. Based on whether these quality parameters could be completed or not, the clinical practice was evaluated by the system. The unachieved quality parameter was defined as suspicious parameters, and these suspicious parameters were used to predict mortality of patients with receiver operating characteristic curve (ROC). Results: A total of 1 220 patients with sepsis were enrolled, included 805 males and 415 females. The mean age was (59±17) years, and acute physiology and chronic health evaluation (APACHE Ⅱ) scores was 19±8. The area under ROC curve of total suspicious numbers for predicting 28-day mortality was 0.70; when the suspicious parameters number was more than 6, the sensitivity was 68.0% and the specificity was 61.0% for predicting 28-day mortality. In addition, the area under ROC curve of outcome suspicious number for predicting 28-day mortality was 0.89; when the suspicious outcome parameters numbers was more than 1, the sensitivity was 88.0% and the specificity was 78.0% for predicting 28-day mortality. Moreover, the area under ROC curve of total suspicious number for predicting 90-day mortality was 0.73; when the total suspicious parameters number was more than 7, the sensitivity was 60.0% and the specificity was 74.0% for predicting 90-day mortality. Finally, the area under ROC curve of outcome suspicious numbers for predicting 90

  7. Comparative analysis of {sup 99m}Tc-MDP three-phase bone scan with SPECT/CT and {sup 99m}Tc-HMPAO-labeled WBC SPECT/CT in the differential diagnosis of clinically suspicious post-traumatic osteomyelitis

    Energy Technology Data Exchange (ETDEWEB)

    KIm, Chan Woo; Lee, Soo Jin; Kim, Ji Young; Hwang, Kyu Tae; Choi, Yun Young [Hanyang University Medical CenterSeoul (Korea, Republic of)

    2017-03-15

    To identify differences between three-phase bone scan and SPECT/CT (TBS) and WBC SPECT/CT (WS) and compare diagnostic accuracies of each modality in patients with suspicious post-traumatic osteomyelitis (OM). Twenty-one patients with suspicious post-traumatic OM were enrolled. All patients performed TBS and WS within 1 week. Foci of MDP and WBC accumulation were divided into three categories: bone (OM), soft tissue (soft tissue inflammation; STI), negative for inflammation (NI). Confirmative diagnosis was made upon operative pathology or long-term clinical follow-up. Of 21 patients, four OM, eight STI, nine NI were finally diagnosed. TBS diagnosis was correct in three of four positive cases and nine of 17 negative cases. Sensitivity, specificity, accuracy, positive predictive value (PPV), negative predictive value (NPV) of TBS were 75 %, 52.9 %, 57.1 %, 27.3 %, 90 %. WS diagnosis was correct in two of four positive cases and 17 of 17 negative cases. Sensitivity, specificity, accuracy, PPV, NPV were 50 %, 100 %, 81.0 %, 100 %, 89.5 %. Twelve of 21 cases showed agreement between TBS and WS. TBS misdiagnosed nine cases (six STI and two NI as eight OM; one OM as one STI), while WS misdiagnosed four cases (two OM as two STI; two STI as two NI). Combining results from TBS and WS led to better diagnostic accuracy (91.7 %) than either TBS or WS alone. TBS and WS showed moderate agreement in assessment of clinically suspected post-traumatic OM. WS better evaluated inflammation than TBS. WS tended to underestimate inflammation whereas TBS tended to overestimate inflammation. Combining TBS and WS enhanced diagnostic accuracy.

  8. NGC1448 and IC 3639: Two Concealed Black Holes Lurking in our Cosmic Backyard Unveiled by NuSTAR

    Science.gov (United States)

    Stern, Daniel; Boorman, Peter; Annuar, Ady; Gandhi, Poshak; Alexander, D. M.; Lansbury, George B.; Asmus, Daniel; Ballantyne, David R.; Bauer, Franz E.; Boggs, Steven E.; Brandt, W. Niel; Brightman, Murray; Christensen, Finn; Craig, William W.; Farrah, Duncan; Goulding, Andy D.; Hailey, Charles James; Harrison, Fiona; Hoenig, Sebastian; Koss, Michael; LaMassa, Stephanie M.; Masini, Alberto; Murray, Stephen S.; Ricci, Claudio; Risaliti, Guido; Rosario, David J.; Stanley, Flora; Zhang, William

    2017-01-01

    We present NuSTAR observations of two nearby Active Galactic Nuclei (AGN), NGC 1448 and IC 3639, located at distances of 12 Mpc and 54 Mpc, respectively. NuSTAR high-energy X-ray (> 10 keV) observations, combined with archival lower energy X-ray observations from Chandra and Suzaku, reveal both sources to contain heavily obscured, accreting super-massive black holes. NGC 1448 is one of the nearest luminous galaxies to the Milky Way, yet the AGN at its centre was only discovered in 2009. Using state-of-the-art models, we constrain the obscuring column density (NH) of gas concealing both AGN, finding them to be extreme, with NH values well into the Compton-thick (CT) regime with N(H) > 3e24 /cm2. NGC 1448 has an intrinsic X-ray luminosity of L(24 keV) ˜ 5e40 erg/s, making it one of the lowest luminosity CT AGN known. IC 3639, on the other hand, has one of the strongest iron fluorescence emission lines known. We also discuss multi-wavelength diagnostics at optical and mid-infrared energies as indirect indicators to penetrate through the obscuring veils and probe the intrinsic properties of the AGN. Through detailed studies such as we present here, NuSTAR is showing that there are still plenty of interesting discoveries awaiting to be made, even in the nearby Universe.

  9. Molecular Testing of Nodules with a Suspicious or Malignant Cytologic Diagnosis in the Setting of Non-Invasive Follicular Thyroid Neoplasm with Papillary-Like Nuclear Features (NIFTP).

    Science.gov (United States)

    Strickland, Kyle C; Eszlinger, Markus; Paschke, Ralf; Angell, Trevor E; Alexander, Erik K; Marqusee, Ellen; Nehs, Matthew A; Jo, Vickie Y; Lowe, Alarice; Vivero, Marina; Hollowell, Monica; Qian, Xiaohua; Wieczorek, Tad; French, Christopher A; Teot, Lisa A; Cibas, Edmund S; Lindeman, Neal I; Krane, Jeffrey F; Barletta, Justine A

    2018-03-01

    Non-invasive follicular thyroid neoplasm with papillary-like nuclear features (NIFTP) is an indolent thyroid tumor characterized by frequent RAS mutations and an absence of the BRAF V600E mutation commonly seen in classical papillary thyroid carcinoma (cPTC). The ability to differentiate potential NIFTP/follicular variant of papillary thyroid carcinoma (FVPTC) from cPTC at the time of fine-needle aspiration (FNA) can facilitate conservative management of NIFTP. The aim of the current study was to investigate how molecular testing may add to cytologic assessment in the pre-operative differentiation of potential NIFTP/FVPTC and cPTC. We had previously evaluated cytologists' ability to prospectively distinguish potential NIFTP/FVPTC from cPTC in a cohort of 56 consecutive FNAs diagnosed as malignant or suspicious for malignancy. We utilized this cohort to perform molecular analysis. Detected molecular abnormalities were stratified into two groups: (1) those supporting malignancy and (2) those supporting a diagnosis of potential NIFTP/FVPTC. The cytologists' characterization of cases and the detected molecular alterations were correlated with the final histologic diagnoses. Molecular testing was performed in 52 (93%) of the 56 cases. For the 37 cases cytologists favored to be cPTC, 31 (84%) had a molecular result that supported malignancy (28 BRAF V600E mutations, 2 NTRK1 fusions, 1 AGK-BRAF fusion). For the 8 cases that were favored to be NIFTP/FVPTC by cytologists, 7 (88%) had a molecular result that supported conservative management (1 NRAS mutation, 6 wild-type result). Seven cases were designated as cytomorphologically indeterminate for NIFTP/FVPTC or cPTC, of which 6 (86%) had a molecular result that would have aided in the pre-operative assessment of potential NIFTP/FVPTC or cPTC/malignancy. These included 3 BRAF V600E mutations in nodules that were cPTC on resection, an HRAS mutation, and a wild-type result in the 2 nodules that were NIFTP, and a TERT promoter

  10. Morte materna mascarada: um caminho para sua identificação Muerte materna enmascarada: un camino para su identificación Identification of concealed or presumable maternal deaths

    Directory of Open Access Journals (Sweden)

    Flávia Azevedo Gomes

    2006-12-01

    maternas no informadas.OBJECTIVE: to identify unreported concealed or presumable maternal deaths which occurred in the states of São Paulo, Paraná, Pará, Ceará, and Mato Grosso Brazil. METHODS: Data were collected from the CD-ROM Hospital Admission Authorization Database of the Hospital Information System of the Unified Health System (SIH-SUS regarding records of obstetric procedures and secondary diagnoses between the years of 1999 to 2000. RESULTS: There were 651 maternal deaths registered. From those, 55 were registered as concealed or presumable maternal deaths according to Chapter XV of the International Classification of Diseases (DID-10 - Pregnancy, Delivery and Postpartum. CONCLUSION: This study showed that this information system can be used as a complementary measure for the identification of unreported maternal deaths.

  11. Retrospective analysis of suspicious pelvic masses using the Pelvic Mass Index (PMI) scoring system from 2007 to 2014.

    Science.gov (United States)

    Sinha, Anju; Drews, Florian; Lim, Kenneth; Pugh, Neil D

    2016-06-01

    This study aims to validate the accuracy of the Pelvic Mass Index (PMI) by comparing it with Risk of Malignancy Index (RMI) in a large patient cohort. This retrospective study used data of women with ovarian masses collected from 2007 to 2014, referred to the Pelvic Mass Clinic (PMC) at University Hospital of Wales in Cardiff. The locally developed PMI was used to triage patients for surgery, surveillance or discharge. Performance measures for PMI, RMI and CA125 are reported as sensitivity, specificity, negative predictive value (NPV), positive predictive value (PPV), receiver operating characteristic (ROC) curves and area under the curve (AUC) for premenopausal and postmenopausal women alike. PMI was calculated on 1468 patients of whom 497 underwent surgery, 176 (71.0%) were in the high risk group, 63 (68.0%) intermediate and 258 (23%) amongst low risk women. Compared to RMI, PMI had a higher sensitivity (90.4%) and NPV (96.9%) for the entire cohort, as well as in the premenopausal (88.9%; 97.6%) and postmenopausal (91.5%; 95.6%) subcategories. ROC curves indicated better performance in the total group (AUC 0.823 vs. 0.770) and the premenopausal group (AUC 0.847 vs. 0.728), though AUC in the postmenopausal group was similar (0.779 vs. 0.791) - likely due to increased specificity of CA125 after menopause. Histology revealed PMI significantly outperforms RMI in diagnosing malignancy, missing only 1 compared to 20 cancers. The high sensitivity and NPV of PMI makes it a useful tool in triaging patients with suspicious ovarian masses. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  12. The Burden of Stigma on Health and Well-Being: A Taxonomy of Concealment, Course, Disruptiveness, Aesthetics, Origin, and Peril Across 93 Stigmas.

    Science.gov (United States)

    Pachankis, John E; Hatzenbuehler, Mark L; Wang, Katie; Burton, Charles L; Crawford, Forrest W; Phelan, Jo C; Link, Bruce G

    2018-04-01

    Most individuals are stigmatized at some point. However, research often examines stigmas separately, thus underestimating the overall impact of stigma and precluding comparisons across stigmatized identities and conditions. In their classic text, Social Stigma: The Psychology of Marked Relationships, Edward Jones and colleagues laid the groundwork for unifying the study of different stigmas by considering the shared dimensional features of stigmas: aesthetics, concealability, course, disruptiveness, origin, peril. Despite the prominence of this framework, no study has documented the extent to which stigmas differ along these dimensions, and the implications of this variation for health and well-being. We reinvigorated this framework to spur a comprehensive account of stigma's impact by classifying 93 stigmas along these dimensions. With the input of expert and general public raters, we then located these stigmas in a six-dimensional space and created discrete clusters organized around these dimensions. Next, we linked this taxonomy to health and stigma-related mechanisms. This quantitative taxonomy offers parsimonious insights into the relationship among the numerous qualities of numerous stigmas and health.

  13. Jumping to Conclusions Is Associated with Paranoia but Not General Suspiciousness: A Comparison of Two Versions of the Probabilistic Reasoning Paradigm

    Directory of Open Access Journals (Sweden)

    Steffen Moritz

    2012-01-01

    Full Text Available Theoretical models ascribe jumping to conclusions (JTCs a prominent role in the pathogenesis of paranoia. While many earlier studies corroborated this account, some newer investigations have found no or only small associations of the JTC bias with paranoid symptoms. The present study examined whether these inconsistencies in part reflect methodological differences across studies. The study was built upon the psychometric high-risk paradigm. A total of 1899 subjects from the general population took part in an online survey and were administered the Paranoia Checklist as well as one of two different variants of the probabilistic reasoning task: one variant with a traditional instruction (a and one novel variant that combines probability estimates with decision judgments (b. Factor analysis of the Paranoia Checklist yielded an unspecific suspiciousness factor and a psychotic paranoia factor. The latter was significantly associated with scores indicating hasty decision making. Subjects scoring two standard deviations above the mean of the Paranoia Checklist showed an abnormal data-gathering style relative to subjects with normal scores. Findings suggest that the so-called decision threshold parameter is more sensitive than the conventional JTC index. For future research the specific contents of paranoid beliefs deserve more consideration in the investigation of decision making in schizophrenia as JTC seems to be associated with core psychosis-prone features of paranoia only.

  14. Suspicious breast calcifications undergoing stereotactic biopsy in women ages 70 and over: Breast cancer incidence by BI-RADS descriptors.

    Science.gov (United States)

    Grimm, Lars J; Johnson, David Y; Johnson, Karen S; Baker, Jay A; Soo, Mary Scott; Hwang, E Shelley; Ghate, Sujata V

    2017-06-01

    To determine the malignancy rate overall and for specific BI-RADS descriptors in women ≥70 years who undergo stereotactic biopsy for calcifications. We retrospectively reviewed 14,577 consecutive mammogram reports in 6839 women ≥70 years to collect 231 stereotactic biopsies of calcifications in 215 women. Cases with missing images or histopathology and calcifications associated with masses, distortion, or asymmetries were excluded. Three breast radiologists determined BI-RADS descriptors by majority. Histology, hormone receptor status, and lymph node status were correlated with BI-RADS descriptors. There were 131 (57 %) benign, 22 (10 %) atypia/lobular carcinomas in situ, 55 (24 %) ductal carcinomas in situ (DCIS), and 23 (10 %) invasive diagnoses. Twenty-seven (51 %) DCIS cases were high-grade. Five (22 %) invasive cases were high-grade, two (9 %) were triple-negative, and three (12 %) were node-positive. Malignancy was found in 49 % (50/103) of fine pleomorphic, 50 % (14/28) of fine linear, 25 % (10/40) of amorphous, 20 % (3/15) of round, 3 % (1/36) of coarse heterogeneous, and 0 % (0/9) of dystrophic calcifications. Among women ≥70 years that underwent stereotactic biopsy for calcifications only, we observed a high rate of malignancy. Additionally, coarse heterogeneous calcifications may warrant a probable benign designation. • Cancer rates of biopsied calcifications in women ≥70 years are high • Radiologists should not dismiss suspicious calcifications in older women • Coarse heterogeneous calcifications may warrant a probable benign designation.

  15. Repeal of the concealed weapons law and its impact on gun-related injuries and deaths.

    Science.gov (United States)

    Ginwalla, Rashna; Rhee, Peter; Friese, Randall; Green, Donald J; Gries, Lynn; Joseph, Bellal; Kulvatunyou, Narong; Lubin, Dafney; O'Keeffe, Terence; Vercruysse, Gary; Wynne, Julie; Tang, Andrew

    2014-03-01

    Senate Bill 1108 (SB-1108) allows adult citizens to carry concealed weapons without a permit and without completion of a training course. It is unclear whether the law creates a "deterrent factor" to criminals or whether it escalates gun-related violence. We hypothesized that the enactment of SB-1108 resulted in an increase in gun-related injuries and deaths (GRIDs) in southern Arizona. We performed a retrospective cohort study spanning 24 months before (prelaw) and after (postlaw) SB-1108. We collected injury and death data and overall crime and accident trends. Injured patients were dichotomized based on whether their injuries were intentional (iGRIDs) or accidental (aGRIDs). The primary outcome was any GRID. To determine proportional differences in GRIDs between the two periods, we performed χ analyses. For each subgroup, we calculated relative risk (RR). The number of national and state background checks for firearms purchases increased in the postlaw period (national and state p guns had an 11% increased risk of being injured or killed by a firearm (p = 0.036) The proportion of iGRIDs to overall city violent crime remained the same during the two periods (9.74% prelaw vs. 10.36% postlaw; RR, 1.06; 95% confidence interval, 0.96-1.17). However, in the postlaw period, the proportion of gun-related homicides increased by 27% after SB-1108 (RR, 1.27; 95% confidence interval, 1.02-1.58). Both nationally and statewide, firearm purchases increased after the passage of SB-1108. Although the proportion of iGRIDs to overall city violent crime remained the same, the proportion of gun-related homicides increased. Liberalization of gun access is associated with an increase in fatalities from guns. Epidemiologic study, level III.

  16. Evidence suggesting superiority of visual (verbal) vs. auditory test presentation modality in the P300-based, Complex Trial Protocol for concealed autobiographical memory detection.

    Science.gov (United States)

    Rosenfeld, J Peter; Ward, Anne; Frigo, Vincent; Drapekin, Jesse; Labkovsky, Elena

    2015-04-01

    One group of participants received a series of city name stimuli presented on trials of the Complex Trial Protocol (CTP) version of a P300-based, concealed information test (CIT). Stimuli were presented on alternating trials in either auditory or visual presentation modality. In 1/7 of the trials the participant's home town (probe) repeatedly appeared in a series of 6 other (irrelevant) repeated city names. In both modalities, probe stimuli produced larger P300s than irrelevant stimuli. Visual stimuli produced shorter behavioral reaction times and P300 latencies, as well as larger P300 probe amplitudes, probe-irrelevant amplitude differences, and individual diagnostic accuracies than the same stimuli presented in the auditory modality. Possible reasons for these effects are discussed, and subject to discussed limitations, the applied conclusion reached is that in all CITs, visual presentation of stimuli, if feasible, should be preferentially used. Copyright © 2015 Elsevier B.V. All rights reserved.

  17. Novel inversion method for land mine imaging and detection

    Science.gov (United States)

    Sindoni, Orazio I.; Cohoon, David K.

    2000-08-01

    We have developed, using both partial differential equation approaches and integral equation formulations, a precise method to invert acoustic or electromagnetic scattering data from macroscopic concealed objects. Our approach makes use of the ideas associated with our exact solution of partial differential equations as described in our paper where we were able to collapse the number of equations by elimination of transcendentals therefore preserving the absolute mathematical precision inherent in the partial differential equation formulation. Our mathematical method, as a consequence, has not encountered the traditional loss of precision when inverting the scattered data. The unrestricted wavelength range allows us to penetrate any material which may surround the object and differentiate between the object and the media. For this reason we have applied our inversion scheme to landmine detection as we can penetrate and differentiate under both wet and dry conditions. Also, we are able to account, under certain conditions, for dielectric nonlinearities of material in the concealed object. Therefore, we are able to build in density dependent false colors a 3D grid representative of both the media and of the embedded object including the internal structure of the object. We have surveyed the literature on the subject of recovery of physical location of concealed objects and we have found that most of the present applications such as land mine detection, and we have found that most of the present applications have shortcomings due to the physical changes that are present in the surrounding media or the discontinuities of physical properties of the media. For all the above reasons we believe that we may have the most versatile and mathematically precise approach to the solution of this problem.

  18. Research Article Special Issue

    African Journals Online (AJOL)

    pc

    2017-10-17

    Oct 17, 2017 ... Voice quality, body motion, touch, facial expression and the use of personal ... the suspicious motion patterns and to obtain a description towards the actions and interactions ..... model using multi-objective genetic algorithm.

  19. Body Packing and Its Radiologic Manifestations: A Review Article

    International Nuclear Information System (INIS)

    Shahnazi, Makhtoom; Sanei Taheri, Morteza; Pourghorban, Ramin

    2011-01-01

    Body packing is described as using the abdominal or pelvic cavity for concealing illegal drugs. Leakage from the packets may cause catastrophic effects on smugglers and medical history is not reliable in these patients. Moreover, new sophisticated smuggling techniques make it imperative that radiologists and emergency physicians understand and familiarize themselves with the different radiological manifestations of ingested drug packets. Currently, there is no gold standard for imaging patients suspected of body packing; nevertheless, computed tomography (CT) seems to be the best modality for packet detection and unenhanced CT without bowel preparation is a reliable technique for detection of ingested packets. On abdominal radiography, packets may be visualized as oval or round radiopaque foreign bodies surrounded by a gas halo. In the literature, sensitivity of abdominal radiography is reported from 74% to 100%. Visualization of the drug packets may be strikingly hampered by administration of oral or intravenous contrast medium in abdomino-pelvic CT; hence, contrast-enhanced CT does not seem to be a suitable modality for searching the ingested packets in suspicious smugglers

  20. Clinical and molecular profile of newborns with confirmed or suspicious congenital adrenal hyperplasia detected after a public screening program implementation.

    Science.gov (United States)

    Kopacek, Cristiane; Prado, Mayara J; da Silva, Claudia M D; de Castro, Simone M; Beltrão, Luciana A; Vargas, Paula R; Grandi, Tarciana; Rossetti, Maria L R; Spritzer, Poli Mara

    2018-04-30

    To describe the results obtained in a neonatal screening program after its implementation and to assess the clinical and molecular profiles of confirmed and suspicious congenital adrenal hyperplasia cases. A cross-sectional study was conducted. Newborns with suspected disease due to high 17-hydroxyprogesterone levels and adjusted for birth weight were selected. Classical congenital adrenal hyperplasia (salt-wasting and simple virilizing forms) was diagnosed by an increase in 17-hydroxyprogesterone levels as confirmed in the retest, clinical evaluation, and genotype determined by SNaPshot and multiplex ligation-dependent probe amplification. After 24 months, 15 classic congenital adrenal hyperplasia cases were diagnosed in a total of 217,965 newborns, with an estimated incidence of 1:14,531. From 132 patients, seven non-classical and 14 heterozygous patients were screened for CYP21A2 mutations, and 96 patients presented false positives with wild type CYP21A2. On retest, increased 17-hydroxyprogesterone levels were found in classical congenital adrenal hyperplasia patients and showed significant correlation with genotype-related classical genital adrenal hyperplasia. The most frequent mutations were IVS2-13A/C>G followed by gene deletion or rearrangement events in the classical form. In non-classical and heterozygous diseases, p.Val282Leu was the most common mutation. The results underscore the effectiveness of congenital adrenal hyperplasia neonatal screening in the public health system and indicate that the adopted strategy was appropriate. The second sample collection along with genotyping of suspected cases helped to properly diagnose both severe and milder cases and delineate them from false positive patients. Copyright © 2018. Published by Elsevier Editora Ltda.

  1. The Usefulness of the Transabdominal Ultrasonography as a Screening Examination in the Evaluation of the Patient with Suspicious Gastric Disease

    International Nuclear Information System (INIS)

    Kim, Hyun Cheol; Shin, Hyeong Cheol; Kim, Hyung Hwan; Park, Seong Jin; Nam, Deok Ho; Bae, Won Kyung; Kim, Il Young; Jeong, Du Shin; Chung, Il Kwun

    2005-01-01

    To evaluate the usefulness of transabdominal ultrasonography as a screening examination in patients with suspicious gastric disease. We selected 141 patients with epigastric pain and who were found to have antral gastric wall thickening of more than 5 mm in transabdominal ultrasonography, and who underwent gastroscopy immediately following the ultrasonography examination, because we suspected that these patients had gastric disease. We measured the full thickness of the five layers of the gastric wall and evaluated the preservation of this five layered structure. We respectively compared the gastric wall thickness and the preservation of gastric layers in 26 normal, 91 gastritis, 12 gastric ulcer, and 12 gastric cancer patients, who were classified based on the gastroscopy results. The mean thicknesses of the gastric wall in the normal, gastritis, gastric ulcer and gastric cancer patients were 5.13±0.14 mm, 6.71±1.33 mm, 8.08±2.80 mm, and 12.45±3.70 mm, respectively. The gastric walls in the gastritis, gastric ulcer and gastric cancer patients were significantly thicker than that in the normal patients (p 0.01). Except for two patients with gastritis and three patients with gastric ulcer, the stratification of the gastric wall was preserved in all of the normal, gastritis and gastric ulcer patients, whereas it was disrupted in all of the patients with gastric cancer. Transabdominal ultrasonography in the fasting state may be a helpful and convenient modality, which can serve as a screening examination in the evaluation of gastric disease. Therefore, careful attention and effort are needed to evaluate the gastric wall during transabdominal ultrasonography

  2. Efficient power combiner for THz radiation

    Energy Technology Data Exchange (ETDEWEB)

    Seidfaraji, Hamide, E-mail: hsfaraji@unm.edu; Fuks, Mikhail I.; Christodoulou, Christos; Schamiloglu, Edl [Department of Electrical and Computer Engineering, University of New Mexico, Albuquerque, NM, 87131-0001 (United States)

    2016-08-15

    Most dangerous explosive materials, both toxic and radioactive, contain nitrogen salts with resonant absorption lines in the frequency range 0.3-10 THz. Therefore, there has been growing interest in remotely detecting such materials by observing the spectrum of reflected signals when the suspicious material is interrogated by THz radiation. Practical portable THz sources available today generate only 20–40 mW output power. This power level is too low to interrogate suspicious material from a safe distance, especially if the material is concealed. Hence, there is a need for sources that can provide greater power in the THz spectrum. Generating and extracting high output power from THz sources is complicated and inefficient. The efficiency of vacuum electronic microwave sources is very low when scaled to the THz range and THz sources based on scaling down semiconductor laser sources have low efficiency as well, resulting in the well known “THz gap.” The reason for such low efficiencies for both source types is material losses in the THz band. In this article an efficient power combiner is described that is based on scaling to higher frequencies a microwave combiner that increases the output power in the THz range of interest in simulation studies. The proposed power combiner not only combines the THz power output from several sources, but can also form a Gaussian wavebeam output. A minimum conversion efficiency of 89% with cophased inputs in a lossy copper power combiner and maximum efficiency of 100% in a Perfect Electric Conductor (PEC)-made power combiner were achieved in simulations. Also, it is shown that the TE{sub 01} output mode is a reasonable option for THz applications due to the fact that conductive loss decreases for this mode as frequency increases.

  3. Efficient power combiner for THz radiation

    Directory of Open Access Journals (Sweden)

    Hamide Seidfaraji

    2016-08-01

    Full Text Available Most dangerous explosive materials, both toxic and radioactive, contain nitrogen salts with resonant absorption lines in the frequency range 0.3-10 THz. Therefore, there has been growing interest in remotely detecting such materials by observing the spectrum of reflected signals when the suspicious material is interrogated by THz radiation. Practical portable THz sources available today generate only 20–40 mW output power. This power level is too low to interrogate suspicious material from a safe distance, especially if the material is concealed. Hence, there is a need for sources that can provide greater power in the THz spectrum. Generating and extracting high output power from THz sources is complicated and inefficient. The efficiency of vacuum electronic microwave sources is very low when scaled to the THz range and THz sources based on scaling down semiconductor laser sources have low efficiency as well, resulting in the well known “THz gap.” The reason for such low efficiencies for both source types is material losses in the THz band. In this article an efficient power combiner is described that is based on scaling to higher frequencies a microwave combiner that increases the output power in the THz range of interest in simulation studies. The proposed power combiner not only combines the THz power output from several sources, but can also form a Gaussian wavebeam output. A minimum conversion efficiency of 89% with cophased inputs in a lossy copper power combiner and maximum efficiency of 100% in a Perfect Electric Conductor (PEC-made power combiner were achieved in simulations. Also, it is shown that the TE01 output mode is a reasonable option for THz applications due to the fact that conductive loss decreases for this mode as frequency increases.

  4. Revealing/Concealing

    DEFF Research Database (Denmark)

    Isar, Nicoletta

    2017-01-01

    and potential to disrupt the dualism of Platonism challenged by Nietzsche. Yet the substance of this contribution, intended to express the symptom of perception of premodern image, must greatly differ from the grounds of phenomenology. This paper aims to bring however some arguments in support...... to disrupt the Platonic dualism, but also to provide the arguments to challenge the misunderstood dualism of Platonism itself as it was incorporated into the Western thinking. The subject of this paper will provide the means for this demonstration, and hopefully shed new lights on the nature of the premodern...... image. My argument is based on the third Platonic term – χώρα – a concept with a long tradition since Antiquity until the Byzantine era. I will take further her argument and explore the paradigmatic dimension of this syntagm which could be viewed as “an integrated part of the ancient and premodern image...

  5. Birth of the Object: Detection of Objectness and Extraction of Object Shape through Object Action Complexes

    DEFF Research Database (Denmark)

    Kraft, Dirk; Pugeault, Nicolas; Baseski, Emre

    2008-01-01

    We describe a process in which the segmentation of objects as well as the extraction of the object shape becomes realized through active exploration of a robot vision system. In the exploration process, two behavioral modules that link robot actions to the visual and haptic perception of objects...... interact. First, by making use of an object independent grasping mechanism, physical control over potential objects can be gained. Having evaluated the initial grasping mechanism as being successful, a second behavior extracts the object shape by making use of prediction based on the motion induced...... system, knowledge about its own embodiment as well as knowledge about geometric relationships such as rigid body motion. This prior knowledge allows the extraction of representations that are semantically richer compared to many other approaches....

  6. Object-Based Benefits without Object-Based Representations

    OpenAIRE

    Alvarez, George Angelo; Fougnie, Daryl; Cormiea, Sarah M

    2012-01-01

    The organization of visual information into objects strongly influences visual memory: Displays with objects defined by two features (e.g. color, orientation) are easier to remember than displays with twice as many objects defined by one feature (Olson & Jiang, 2002). Existing theories suggest that this ‘object-benefit’ is based on object-based limitations in working memory: because a limited number of objects can be stored, packaging features together so that fewer objects have to be remembe...

  7. Object width modulates object-based attentional selection.

    Science.gov (United States)

    Nah, Joseph C; Neppi-Modona, Marco; Strother, Lars; Behrmann, Marlene; Shomstein, Sarah

    2018-04-24

    Visual input typically includes a myriad of objects, some of which are selected for further processing. While these objects vary in shape and size, most evidence supporting object-based guidance of attention is drawn from paradigms employing two identical objects. Importantly, object size is a readily perceived stimulus dimension, and whether it modulates the distribution of attention remains an open question. Across four experiments, the size of the objects in the display was manipulated in a modified version of the two-rectangle paradigm. In Experiment 1, two identical parallel rectangles of two sizes (thin or thick) were presented. Experiments 2-4 employed identical trapezoids (each having a thin and thick end), inverted in orientation. In the experiments, one end of an object was cued and participants performed either a T/L discrimination or a simple target-detection task. Combined results show that, in addition to the standard object-based attentional advantage, there was a further attentional benefit for processing information contained in the thick versus thin end of objects. Additionally, eye-tracking measures demonstrated increased saccade precision towards thick object ends, suggesting that Fitts's Law may play a role in object-based attentional shifts. Taken together, these results suggest that object-based attentional selection is modulated by object width.

  8. Qualitative and Semiquantitative Elastography for the Diagnosis of Intermediate Suspicious Thyroid Nodules Based on the 2015 American Thyroid Association Guidelines.

    Science.gov (United States)

    Yang, Bo Ra; Kim, Eun-Kyung; Moon, Hee Jung; Yoon, Jung Hyun; Park, Vivian Y; Kwak, Jin Young

    2018-04-01

    To evaluate qualitative and semiquantitative elastography for the diagnosis of intermediate suspicious thyroid nodules based on the 2015 American Thyroid Association (ATA) guidelines. Through a retrospective search of our institutional database, 746 solid thyroid nodules found on grayscale ultrasonography, strain elastography, and ultrasound-guided fine-needle aspiration between June and November 2009 were collected. Among them, 80 nodules from 80 patients with an intermediate suspicion of malignancy based on the 2015 ATA guidelines that were 10 mm or larger were recruited as the final study nodules. Elastographic findings were categorized according to the criteria of Rago et al (J Clin Endocrinol Metab 2007; 92:2917-2922) and Asteria et al (Thyroid 2008; 18:523-531), and strain ratio values were calculated and recorded. The independent 2-sample t test and χ 2 test (or Fisher exact test) were used to evaluate differences in clinical parameters between benign and malignant thyroid nodules. All variables were compared by univariate and multivariate logistic regression analyses, and odds ratios with 95% confidence intervals were calculated. Of the 80 nodules, 6 (7.5%) were malignant, and 74 (92.5%) were benign. No significant differences were observed in age, sex, nodule size, elasticity score, and strain ratio between benign and malignant nodules. No variables significantly predicted thyroid malignancy on the univariate analysis. On the multivariate logistic regression analysis, there were no independent variables associated with thyroid malignancy, including the elasticity score and strain ratio (all P > .05). Elastographic analysis using the elasticity score and strain ratio has limited ability to characterize the benignity or malignancy of thyroid nodules with an intermediate suspicion of malignancy based on the 2015 ATA guidelines. © 2017 by the American Institute of Ultrasound in Medicine.

  9. The Usefulness of the Transabdominal Ultrasonography as a Screening Examination in the Evaluation of the Patient with Suspicious Gastric Disease

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hyun Cheol; Shin, Hyeong Cheol; Kim, Hyung Hwan; Park, Seong Jin; Nam, Deok Ho; Bae, Won Kyung; Kim, Il Young; Jeong, Du Shin; Chung, Il Kwun [Soonchunhyang University, Cheonan Hospital, Cheonan (Korea, Republic of)

    2005-03-15

    To evaluate the usefulness of transabdominal ultrasonography as a screening examination in patients with suspicious gastric disease. We selected 141 patients with epigastric pain and who were found to have antral gastric wall thickening of more than 5 mm in transabdominal ultrasonography, and who underwent gastroscopy immediately following the ultrasonography examination, because we suspected that these patients had gastric disease. We measured the full thickness of the five layers of the gastric wall and evaluated the preservation of this five layered structure. We respectively compared the gastric wall thickness and the preservation of gastric layers in 26 normal, 91 gastritis, 12 gastric ulcer, and 12 gastric cancer patients, who were classified based on the gastroscopy results. The mean thicknesses of the gastric wall in the normal, gastritis, gastric ulcer and gastric cancer patients were 5.13{+-}0.14 mm, 6.71{+-}1.33 mm, 8.08{+-}2.80 mm, and 12.45{+-}3.70 mm, respectively. The gastric walls in the gastritis, gastric ulcer and gastric cancer patients were significantly thicker than that in the normal patients (p < 0.01). The gastric wall in the gastric cancer patients was significantly thicker than those in the gastritis and gastric ulcer patients (p < 0.01). However, the difference in the gastric wall thickness between the gastritis and gastric ulcer patients was not statistically significant (p > 0.01). Except for two patients with gastritis and three patients with gastric ulcer, the stratification of the gastric wall was preserved in all of the normal, gastritis and gastric ulcer patients, whereas it was disrupted in all of the patients with gastric cancer. Transabdominal ultrasonography in the fasting state may be a helpful and convenient modality, which can serve as a screening examination in the evaluation of gastric disease. Therefore, careful attention and effort are needed to evaluate the gastric wall during transabdominal ultrasonography

  10. Multi-probe-based resonance-frequency electrical impedance spectroscopy for detection of suspicious breast lesions: improving performance using partial ROC optimization

    Science.gov (United States)

    Lederman, Dror; Zheng, Bin; Wang, Xingwei; Wang, Xiao Hui; Gur, David

    2011-03-01

    We have developed a multi-probe resonance-frequency electrical impedance spectroscope (REIS) system to detect breast abnormalities. Based on assessing asymmetry in REIS signals acquired between left and right breasts, we developed several machine learning classifiers to classify younger women (i.e., under 50YO) into two groups of having high and low risk for developing breast cancer. In this study, we investigated a new method to optimize performance based on the area under a selected partial receiver operating characteristic (ROC) curve when optimizing an artificial neural network (ANN), and tested whether it could improve classification performance. From an ongoing prospective study, we selected a dataset of 174 cases for whom we have both REIS signals and diagnostic status verification. The dataset includes 66 "positive" cases recommended for biopsy due to detection of highly suspicious breast lesions and 108 "negative" cases determined by imaging based examinations. A set of REIS-based feature differences, extracted from the two breasts using a mirror-matched approach, was computed and constituted an initial feature pool. Using a leave-one-case-out cross-validation method, we applied a genetic algorithm (GA) to train the ANN with an optimal subset of features. Two optimization criteria were separately used in GA optimization, namely the area under the entire ROC curve (AUC) and the partial area under the ROC curve, up to a predetermined threshold (i.e., 90% specificity). The results showed that although the ANN optimized using the entire AUC yielded higher overall performance (AUC = 0.83 versus 0.76), the ANN optimized using the partial ROC area criterion achieved substantially higher operational performance (i.e., increasing sensitivity level from 28% to 48% at 95% specificity and/ or from 48% to 58% at 90% specificity).

  11. Improved Side Information Generation for Distributed Video Coding by Exploiting Spatial and Temporal Correlations

    Directory of Open Access Journals (Sweden)

    Ye Shuiming

    2009-01-01

    Full Text Available Distributed video coding (DVC is a video coding paradigm allowing low complexity encoding for emerging applications such as wireless video surveillance. Side information (SI generation is a key function in the DVC decoder, and plays a key-role in determining the performance of the codec. This paper proposes an improved SI generation for DVC, which exploits both spatial and temporal correlations in the sequences. Partially decoded Wyner-Ziv (WZ frames, based on initial SI by motion compensated temporal interpolation, are exploited to improve the performance of the whole SI generation. More specifically, an enhanced temporal frame interpolation is proposed, including motion vector refinement and smoothing, optimal compensation mode selection, and a new matching criterion for motion estimation. The improved SI technique is also applied to a new hybrid spatial and temporal error concealment scheme to conceal errors in WZ frames. Simulation results show that the proposed scheme can achieve up to 1.0 dB improvement in rate distortion performance in WZ frames for video with high motion, when compared to state-of-the-art DVC. In addition, both the objective and perceptual qualities of the corrupted sequences are significantly improved by the proposed hybrid error concealment scheme, outperforming both spatial and temporal concealments alone.

  12. Sodium pertechnetate scintigraphy in detection of Meckel's diverticulum

    DEFF Research Database (Denmark)

    Poulsen, K A; Qvist, N

    2000-01-01

    OBJECTIVE: To evaluate the results of 99mTc-Na-pertechnetate scintigraphy in children presenting with symptoms suspicious of Meckel's diverticulum (MD). METHOD: Retrospective study. A total of 55 99mTc-Na-pertechnetate scintigraphies in 53 patients were compared with the results from surgery and ...

  13. Scientific review of psychophysiological detection of deceit

    Directory of Open Access Journals (Sweden)

    Igor Areh

    2016-10-01

    Full Text Available Psychophysiological detection of deceit has been in the centre of attention in the recent decade, which correlates with heightened security challenges of a modern world. The article provides scientific discussion about polygraph that is used in criminal investigation. Two most employed polygraph techniques are critically presented, examined and compared: the Comparison Question Test (CQT and the Concealed Information Test (CIT. Theoretical foundations, objectivity and standardization of testing procedures, ethical and practical issues are analysed. Proponents of the Comparison Question Test have not been successful in their efforts to resolve fundamental problems and limitations with which the technique is challenged. It remains unstandardized and unscientific, separated from science and mainly without attempts to escape from the dead-end. The most influential theoretical backgrounds of CQT technique are examined; however, none of them represents a satisfactory scientific foundation of the technique. Without being scientifically grounded in a verifiable theory, it remains controversial and caught into self-sufficiency, mostly supported by methodologically questionable research findings gained by proponents. To the contrary, the Concealed Information Test is associated with fast development, particularly in the field of neurology, and is considered to be less disputed and to be partly supported by a sound scientific ground. Applying the Concealed Question Test, somewhat naïve and disputable detection of lies typical of the Comparison Question Test is replaced by a search for information that lies concealed in the suspects’ memory. However, the Concealed Information Test also has been challenged by serious deficiencies, which bring forward a question about justification of the use of the polygraph.

  14. Empirical evidence of bias in treatment effect estimates in controlled trials with different interventions and outcomes: meta-epidemiological study

    DEFF Research Database (Denmark)

    Wood, L.; Egger, M.; Gluud, L.L.

    2008-01-01

    OBJECTIVE: To examine whether the association of inadequate or unclear allocation concealment and lack of blinding with biased estimates of intervention effects varies with the nature of the intervention or outcome. DESIGN: Combined analysis of data from three meta-epidemiological studies based o...

  15. Examining Effects of Anticipated Stigma, Centrality, Salience, Internalization, and Outness on Psychological Distress for People with Concealable Stigmatized Identities

    Science.gov (United States)

    Quinn, Diane M.; Williams, Michelle K.; Quintana, Francisco; Gaskins, Jennifer L.; Overstreet, Nicole M.; Pishori, Alefiyah; Earnshaw, Valerie A.; Perez, Giselle; Chaudoir, Stephenie R.

    2014-01-01

    Understanding how stigmatized identities contribute to increased rates of depression and anxiety is critical to stigma reduction and mental health treatment. There has been little research testing multiple aspects of stigmatized identities simultaneously. In the current study, we collected data from a diverse, urban, adult community sample of people with a concealed stigmatized identity (CSI). We targeted 5 specific CSIs – mental illness, substance abuse, experience of domestic violence, experience of sexual assault, and experience of childhood abuse – that have been shown to put people at risk for increased psychological distress. We collected measures of the anticipation of being devalued by others if the identity became known (anticipated stigma), the level of defining oneself by the stigmatized identity (centrality), the frequency of thinking about the identity (salience), the extent of agreement with negative stereotypes about the identity (internalized stigma), and extent to which other people currently know about the identity (outness). Results showed that greater anticipated stigma, greater identity salience, and lower levels of outness each uniquely and significantly predicted variance in increased psychological distress (a composite of depression and anxiety). In examining communalities and differences across the five identities, we found that mean levels of the stigma variables differed across the identities, with people with substance abuse and mental illness reporting greater anticipated and internalized stigma. However, the prediction pattern of the variables for psychological distress was similar across the substance abuse, mental illness, domestic violence, and childhood abuse identities (but not sexual assault). Understanding which components of stigmatized identities predict distress can lead to more effective treatment for people experiencing psychological distress. PMID:24817189

  16. Examining effects of anticipated stigma, centrality, salience, internalization, and outness on psychological distress for people with concealable stigmatized identities.

    Directory of Open Access Journals (Sweden)

    Diane M Quinn

    Full Text Available Understanding how stigmatized identities contribute to increased rates of depression and anxiety is critical to stigma reduction and mental health treatment. There has been little research testing multiple aspects of stigmatized identities simultaneously. In the current study, we collected data from a diverse, urban, adult community sample of people with a concealed stigmatized identity (CSI. We targeted 5 specific CSIs--mental illness, substance abuse, experience of domestic violence, experience of sexual assault, and experience of childhood abuse--that have been shown to put people at risk for increased psychological distress. We collected measures of the anticipation of being devalued by others if the identity became known (anticipated stigma, the level of defining oneself by the stigmatized identity (centrality, the frequency of thinking about the identity (salience, the extent of agreement with negative stereotypes about the identity (internalized stigma, and extent to which other people currently know about the identity (outness. Results showed that greater anticipated stigma, greater identity salience, and lower levels of outness each uniquely and significantly predicted variance in increased psychological distress (a composite of depression and anxiety. In examining communalities and differences across the five identities, we found that mean levels of the stigma variables differed across the identities, with people with substance abuse and mental illness reporting greater anticipated and internalized stigma. However, the prediction pattern of the variables for psychological distress was similar across the substance abuse, mental illness, domestic violence, and childhood abuse identities (but not sexual assault. Understanding which components of stigmatized identities predict distress can lead to more effective treatment for people experiencing psychological distress.

  17. Adobe Boxes: Locating Object Proposals Using Object Adobes.

    Science.gov (United States)

    Fang, Zhiwen; Cao, Zhiguo; Xiao, Yang; Zhu, Lei; Yuan, Junsong

    2016-09-01

    Despite the previous efforts of object proposals, the detection rates of the existing approaches are still not satisfactory enough. To address this, we propose Adobe Boxes to efficiently locate the potential objects with fewer proposals, in terms of searching the object adobes that are the salient object parts easy to be perceived. Because of the visual difference between the object and its surroundings, an object adobe obtained from the local region has a high probability to be a part of an object, which is capable of depicting the locative information of the proto-object. Our approach comprises of three main procedures. First, the coarse object proposals are acquired by employing randomly sampled windows. Then, based on local-contrast analysis, the object adobes are identified within the enlarged bounding boxes that correspond to the coarse proposals. The final object proposals are obtained by converging the bounding boxes to tightly surround the object adobes. Meanwhile, our object adobes can also refine the detection rate of most state-of-the-art methods as a refinement approach. The extensive experiments on four challenging datasets (PASCAL VOC2007, VOC2010, VOC2012, and ILSVRC2014) demonstrate that the detection rate of our approach generally outperforms the state-of-the-art methods, especially with relatively small number of proposals. The average time consumed on one image is about 48 ms, which nearly meets the real-time requirement.

  18. Detecting concealed information from groups using a dynamic questioning approach: simultaneous skin conductance measurement and immediate feedback

    Directory of Open Access Journals (Sweden)

    Ewout H Meijer

    2013-02-01

    Full Text Available Lie detection procedures typically aim at determining the guilt or innocence of a single suspect. The Concealed Information Test (CIT, for example, has been shown to be highly successful in detecting the presence or absence of crime-related information in a suspect’s memory. Many of today’s security threats, however, do not come from individuals, but from organized groups such as criminal organizations or terrorist networks. In this study, we tested whether a plan of an upcoming mock terrorist attack could be extracted from a group of suspects using a dynamic questioning approach. One-hundred participants were tested in 20 groups of 5. Each group was asked to plan a mock terrorist attack based on a list of potential countries, cities and streets. Next, three questions referring to the country, city, and street were presented, each with 5 options. Skin conductance in all 5 members of the group was measured simultaneously during this presentation. The dynamic questioning approach entailed direct analysis of the data, and if the average skin conductance of the group to a certain option exceeded a threshold, this option was followed up. E.g., if the reaction to the option ‘Italy’ exceeded the threshold, this was followed up by presenting 5 cities in Italy. Results showed that in 19 of the 20 groups the country was correctly detected using this procedure. In 13 of these remaining 19 groups the city was correctly detected. In 7 of these 13, the street was also correctly detected. The question about the country resulted in no false positives (out of 20, the question about the city resulted in 2 false positives (out of 19, while the question about the streets resulted in 2 false positives (out of 13. Furthermore, the 2 false positives at the city level also yielded a false positive at the street level. Taken together these results indicate our dynamic questioning approach can help to unveil plans about a mock terrorist attack.

  19. Paediatric HIV/AIDS in Abakaliki | Ojukwu | Nigerian Journal of ...

    African Journals Online (AJOL)

    Objectives: The study was aimed at determining the mode of transmission, clinical presentation, and outcome of HIV infection in children admitted with clinical manifestations suspicious of HIV infection. It was also to examine whether the WHO clinical case definition for paediatric AIDS in Africa could help predict the infection ...

  20. Railway clearance intrusion detection method with binocular stereo vision

    Science.gov (United States)

    Zhou, Xingfang; Guo, Baoqing; Wei, Wei

    2018-03-01

    In the stage of railway construction and operation, objects intruding railway clearance greatly threaten the safety of railway operation. Real-time intrusion detection is of great importance. For the shortcomings of depth insensitive and shadow interference of single image method, an intrusion detection method with binocular stereo vision is proposed to reconstruct the 3D scene for locating the objects and judging clearance intrusion. The binocular cameras are calibrated with Zhang Zhengyou's method. In order to improve the 3D reconstruction speed, a suspicious region is firstly determined by background difference method of a single camera's image sequences. The image rectification, stereo matching and 3D reconstruction process are only executed when there is a suspicious region. A transformation matrix from Camera Coordinate System(CCS) to Track Coordinate System(TCS) is computed with gauge constant and used to transfer the 3D point clouds into the TCS, then the 3D point clouds are used to calculate the object position and intrusion in TCS. The experiments in railway scene show that the position precision is better than 10mm. It is an effective way for clearance intrusion detection and can satisfy the requirement of railway application.

  1. 32 CFR 552.127 - Prohibitions.

    Science.gov (United States)

    2010-07-01

    ... than 3 inches. Swords, sabers, and machetes with sharpened blades. (8) Any object which carries an... handles which convert into a sword type instrument. (b) Carrying a concealed weapon. A person commits the..., carrying, transporting, or storing decorative, ornamental, and ceremonial swords and sabers within the...

  2. Magnetic imager and method

    Science.gov (United States)

    Powell, James; Reich, Morris; Danby, Gordon

    1997-07-22

    A magnetic imager 10 includes a generator 18 for practicing a method of applying a background magnetic field over a concealed object, with the object being effective to locally perturb the background field. The imager 10 also includes a sensor 20 for measuring perturbations of the background field to detect the object. In one embodiment, the background field is applied quasi-statically. And, the magnitude or rate of change of the perturbations may be measured for determining location, size, and/or condition of the object.

  3. The subjective experience of object recognition: comparing metacognition for object detection and object categorization.

    Science.gov (United States)

    Meuwese, Julia D I; van Loon, Anouk M; Lamme, Victor A F; Fahrenfort, Johannes J

    2014-05-01

    Perceptual decisions seem to be made automatically and almost instantly. Constructing a unitary subjective conscious experience takes more time. For example, when trying to avoid a collision with a car on a foggy road you brake or steer away in a reflex, before realizing you were in a near accident. This subjective aspect of object recognition has been given little attention. We used metacognition (assessed with confidence ratings) to measure subjective experience during object detection and object categorization for degraded and masked objects, while objective performance was matched. Metacognition was equal for degraded and masked objects, but categorization led to higher metacognition than did detection. This effect turned out to be driven by a difference in metacognition for correct rejection trials, which seemed to be caused by an asymmetry of the distractor stimulus: It does not contain object-related information in the detection task, whereas it does contain such information in the categorization task. Strikingly, this asymmetry selectively impacted metacognitive ability when objective performance was matched. This finding reveals a fundamental difference in how humans reflect versus act on information: When matching the amount of information required to perform two tasks at some objective level of accuracy (acting), metacognitive ability (reflecting) is still better in tasks that rely on positive evidence (categorization) than in tasks that rely more strongly on an absence of evidence (detection).

  4. Disposition and Health Outcomes among Infants Born to Mothers with No Prenatal Care

    Science.gov (United States)

    Friedman, Susan Hatters; Heneghan, Amy; Rosenthal, Miriam

    2009-01-01

    Objective: This study assessed infant disposition and health outcomes among offspring born to mothers without prenatal care, based on maternal characteristics and the reason for lack of prenatal care (i.e., denial of pregnancy, concealment of pregnancy, primary substance use, financial barriers and multiparity). Methods: A retrospective record…

  5. Social Camouflage: Interpreting Male Student Veterans' Behavior for Residence Life Professionals

    Science.gov (United States)

    Livingston, Wade G.; Scott, David A.; Havice, Pamela A.; Cawthon, Tony W.

    2012-01-01

    The term "camouflage" implies obscurity and concealment. Male student veterans who return from the military often employ a social camouflage; though some may reveal and discuss their military experience, their overriding objective is to blend in, have a "normal" college experience, and graduate. This creates challenges for housing professionals…

  6. Is it bad to have secrets? Cognitive preoccupation as a toxic element of secrecy

    NARCIS (Netherlands)

    Maas, J.; Wismeijer, A.A.J.; Assen, M.A.L.M. van; Aquarius, A.E.A.M.

    2012-01-01

    This ex post facto study examined the effect of secrecy on well-being in a sample of 287 HIV-positive individuals, using both self-report data and objective immune parameters. The effects on well-being of three components of secrecy were studied; self-concealment, possession of a secret, and

  7. Breaking object correspondence across saccadic eye movements deteriorates object recognition

    Directory of Open Access Journals (Sweden)

    Christian H. Poth

    2015-12-01

    Full Text Available Visual perception is based on information processing during periods of eye fixations that are interrupted by fast saccadic eye movements. The ability to sample and relate information on task-relevant objects across fixations implies that correspondence between presaccadic and postsaccadic objects is established. Postsaccadic object information usually updates and overwrites information on the corresponding presaccadic object. The presaccadic object representation is then lost. In contrast, the presaccadic object is conserved when object correspondence is broken. This helps transsaccadic memory but it may impose attentional costs on object recognition. Therefore, we investigated how breaking object correspondence across the saccade affects postsaccadic object recognition. In Experiment 1, object correspondence was broken by a brief postsaccadic blank screen. Observers made a saccade to a peripheral object which was displaced during the saccade. This object reappeared either immediately after the saccade or after the blank screen. Within the postsaccadic object, a letter was briefly presented (terminated by a mask. Observers reported displacement direction and letter identity in different blocks. Breaking object correspondence by blanking improved displacement identification but deteriorated postsaccadic letter recognition. In Experiment 2, object correspondence was broken by changing the object’s contrast-polarity. There were no object displacements and observers only reported letter identity. Again, breaking object correspondence deteriorated postsaccadic letter recognition. These findings identify transsaccadic object correspondence as a key determinant of object recognition across the saccade. This is in line with the recent hypothesis that breaking object correspondence results in separate representations of presaccadic and postsaccadic objects which then compete for limited attentional processing resources (Schneider, 2013. Postsaccadic

  8. Objectivity

    CERN Document Server

    Daston, Lorraine

    2010-01-01

    Objectivity has a history, and it is full of surprises. In Objectivity, Lorraine Daston and Peter Galison chart the emergence of objectivity in the mid-nineteenth-century sciences--and show how the concept differs from its alternatives, truth-to-nature and trained judgment. This is a story of lofty epistemic ideals fused with workaday practices in the making of scientific images. From the eighteenth through the early twenty-first centuries, the images that reveal the deepest commitments of the empirical sciences--from anatomy to crystallography--are those featured in scientific atlases, the compendia that teach practitioners what is worth looking at and how to look at it. Galison and Daston use atlas images to uncover a hidden history of scientific objectivity and its rivals. Whether an atlas maker idealizes an image to capture the essentials in the name of truth-to-nature or refuses to erase even the most incidental detail in the name of objectivity or highlights patterns in the name of trained judgment is a...

  9. Object manipulation facilitates kind-based object individuation of shape-similar objects

    DEFF Research Database (Denmark)

    Kingo, Osman Skjold; Krøjgaard, Peter

    2011-01-01

    Five experiments investigated the importance of shape and object manipulation when 12-month-olds were given the task of individuating objects representing exemplars of kinds in an event-mapping design. In Experiments 1 and 2, results of the study from Xu, Carey, and Quint (2004, Experiment 4) wer...

  10. Object-based warping: an illusory distortion of space within objects.

    Science.gov (United States)

    Vickery, Timothy J; Chun, Marvin M

    2010-12-01

    Visual objects are high-level primitives that are fundamental to numerous perceptual functions, such as guidance of attention. We report that objects warp visual perception of space in such a way that spatial distances within objects appear to be larger than spatial distances in ground regions. When two dots were placed inside a rectangular object, they appeared farther apart from one another than two dots with identical spacing outside of the object. To investigate whether this effect was object based, we measured the distortion while manipulating the structure surrounding the dots. Object displays were constructed with a single object, multiple objects, a partially occluded object, and an illusory object. Nonobject displays were constructed to be comparable to object displays in low-level visual attributes. In all cases, the object displays resulted in a more powerful distortion of spatial perception than comparable non-object-based displays. These results suggest that perception of space within objects is warped.

  11. Vicarious Learning from Human Models in Monkeys

    OpenAIRE

    Falcone, Rossella; Brunamonti, Emiliano; Genovesio, Aldo

    2012-01-01

    We examined whether monkeys can learn by observing a human model, through vicarious learning. Two monkeys observed a human model demonstrating an object-reward association and consuming food found underneath an object. The monkeys observed human models as they solved more than 30 learning problems. For each problem, the human models made a choice between two objects, one of which concealed a piece of apple. In the test phase afterwards, the monkeys made a choice of their own. Learning was app...

  12. MULTIPLE OBJECTS

    Directory of Open Access Journals (Sweden)

    A. A. Bosov

    2015-04-01

    Full Text Available Purpose. The development of complicated techniques of production and management processes, information systems, computer science, applied objects of systems theory and others requires improvement of mathematical methods, new approaches for researches of application systems. And the variety and diversity of subject systems makes necessary the development of a model that generalizes the classical sets and their development – sets of sets. Multiple objects unlike sets are constructed by multiple structures and represented by the structure and content. The aim of the work is the analysis of multiple structures, generating multiple objects, the further development of operations on these objects in application systems. Methodology. To achieve the objectives of the researches, the structure of multiple objects represents as constructive trio, consisting of media, signatures and axiomatic. Multiple object is determined by the structure and content, as well as represented by hybrid superposition, composed of sets, multi-sets, ordered sets (lists and heterogeneous sets (sequences, corteges. Findings. In this paper we study the properties and characteristics of the components of hybrid multiple objects of complex systems, proposed assessments of their complexity, shown the rules of internal and external operations on objects of implementation. We introduce the relation of arbitrary order over multiple objects, we define the description of functions and display on objects of multiple structures. Originality.In this paper we consider the development of multiple structures, generating multiple objects.Practical value. The transition from the abstract to the subject of multiple structures requires the transformation of the system and multiple objects. Transformation involves three successive stages: specification (binding to the domain, interpretation (multiple sites and particularization (goals. The proposed describe systems approach based on hybrid sets

  13. A Wearable Goggle Navigation System for Dual-Mode Optical and Ultrasound Localization of Suspicious Lesions: Validation Studies Using Tissue-Simulating Phantoms and an Ex Vivo Human Breast Tissue Model.

    Directory of Open Access Journals (Sweden)

    Zeshu Zhang

    Full Text Available Surgical resection remains the primary curative treatment for many early-stage cancers, including breast cancer. The development of intraoperative guidance systems for identifying all sites of disease and improving the likelihood of complete surgical resection is an area of active ongoing research, as this can lead to a decrease in the need of subsequent additional surgical procedures. We develop a wearable goggle navigation system for dual-mode optical and ultrasound imaging of suspicious lesions. The system consists of a light source module, a monochromatic CCD camera, an ultrasound system, a Google Glass, and a host computer. It is tested in tissue-simulating phantoms and an ex vivo human breast tissue model. Our experiments demonstrate that the surgical navigation system provides useful guidance for localization and core needle biopsy of simulated tumor within the tissue-simulating phantom, as well as a core needle biopsy and subsequent excision of Indocyanine Green (ICG-fluorescing sentinel lymph nodes. Our experiments support the contention that this wearable goggle navigation system can be potentially very useful and fully integrated by the surgeon for optimizing many aspects of oncologic surgery. Further engineering optimization and additional in vivo clinical validation work is necessary before such a surgical navigation system can be fully realized in the everyday clinical setting.

  14. The Influence of Sexual Orientation and Masculinity on Young Men's Tobacco Smoking

    Science.gov (United States)

    Pachankis, John E.; Westmaas, J. Lee; Dougherty, Lea R.

    2011-01-01

    Objective: The prevalence of smoking among gay men is considerably higher than in the general population. To investigate possible causes of this health risk disparity, this study used multilevel modeling of daily diary data to examine the temporal relationship between smoking and both sexual orientation concealment and masculine gender role…

  15. Exploring Variation in Glycemic Control Across and Within Eight High-Income Countries

    DEFF Research Database (Denmark)

    Charalampopoulos, Dimitrios; Hermann, Julia M; Svensson, Jannet

    2018-01-01

    OBJECTIVE: International studies on childhood type 1 diabetes (T1D) have focused on whole-country mean HbA1c levels, thereby concealing potential variations within countries. We aimed to explore the variations in HbA1c across and within eight high-income countries to best inform international ben...

  16. A review of visual perception mechanisms that regulate rapid adaptive camouflage in cuttlefish.

    Science.gov (United States)

    Chiao, Chuan-Chin; Chubb, Charles; Hanlon, Roger T

    2015-09-01

    We review recent research on the visual mechanisms of rapid adaptive camouflage in cuttlefish. These neurophysiologically complex marine invertebrates can camouflage themselves against almost any background, yet their ability to quickly (0.5-2 s) alter their body patterns on different visual backgrounds poses a vexing challenge: how to pick the correct body pattern amongst their repertoire. The ability of cuttlefish to change appropriately requires a visual system that can rapidly assess complex visual scenes and produce the motor responses-the neurally controlled body patterns-that achieve camouflage. Using specifically designed visual backgrounds and assessing the corresponding body patterns quantitatively, we and others have uncovered several aspects of scene variation that are important in regulating cuttlefish patterning responses. These include spatial scale of background pattern, background intensity, background contrast, object edge properties, object contrast polarity, object depth, and the presence of 3D objects. Moreover, arm postures and skin papillae are also regulated visually for additional aspects of concealment. By integrating these visual cues, cuttlefish are able to rapidly select appropriate body patterns for concealment throughout diverse natural environments. This sensorimotor approach of studying cuttlefish camouflage thus provides unique insights into the mechanisms of visual perception in an invertebrate image-forming eye.

  17. Bladder cancer in patients after previous irradiation for treatment of tumors of the organs of the lesser pelvis

    Directory of Open Access Journals (Sweden)

    O. S. Strel’tsova

    2017-01-01

    Full Text Available Background. This article presents clinical cases of bladder cancer (BC developed after previous irradiation and diagnosed in flat suspicious area by cross-polarization optical coherence tomography (CP-OCT based on analysis of characteristics of scattered light, and with histological material confirmed by nonlinear microscopy.Objective: to present clinical cases and features of BC diagnosis in presence of radiation-induced changes.Materials and methods. Intra-vitam examination of the bladder mucosa was performed using the OKT 1300-U system (Institute of Applied Physics of the Russian Academy of Sciences, Nizhniy Novgorod. Areas that appeared malignant per CP-OCT data were biopsied. Apart from traditional examination of histological samples with hematoxylin and eosin staining, tissue samples were analyzed using nonlinear microscopy in the mode of second harmonic generation (collagen state analysis and emission of two-photon fluorescence excitation (elastin state analysis.Results are presented through 2 cases of BC in patients with side effects of radiation therapy of varying severity. CP-OCT allowed in-life differentiation of areas of post-radiation inflammatory changes and malignant tumors developed as a result. Nonlinear microscopy provided information on the state of connective tissue matrix of the bladder in the context of radiation changes and transition to tumor.Conclusion. Radiation changes of the bladder mucosa, especially severe ones, can conceal development of malignant tumors. Use of optical methods helps in differential diagnosis of cancer and post-radiation changes of the bladder. CP-OCT is an optimal noninvasive method of examination of the bladder mucosa during cystoscopy. Demonstration of clinical material is aimed at practicing urologists to increase their vigilance in relation to possible BC in patients who underwent radiation therapy of the organs of the lesser pelvis.

  18. TeraSCREEN: multi-frequency multi-mode Terahertz screening for border checks

    Science.gov (United States)

    Alexander, Naomi E.; Alderman, Byron; Allona, Fernando; Frijlink, Peter; Gonzalo, Ramón; Hägelen, Manfred; Ibáñez, Asier; Krozer, Viktor; Langford, Marian L.; Limiti, Ernesto; Platt, Duncan; Schikora, Marek; Wang, Hui; Weber, Marc Andree

    2014-06-01

    The challenge for any security screening system is to identify potentially harmful objects such as weapons and explosives concealed under clothing. Classical border and security checkpoints are no longer capable of fulfilling the demands of today's ever growing security requirements, especially with respect to the high throughput generally required which entails a high detection rate of threat material and a low false alarm rate. TeraSCREEN proposes to develop an innovative concept of multi-frequency multi-mode Terahertz and millimeter-wave detection with new automatic detection and classification functionalities. The system developed will demonstrate, at a live control point, the safe automatic detection and classification of objects concealed under clothing, whilst respecting privacy and increasing current throughput rates. This innovative screening system will combine multi-frequency, multi-mode images taken by passive and active subsystems which will scan the subjects and obtain complementary spatial and spectral information, thus allowing for automatic threat recognition. The TeraSCREEN project, which will run from 2013 to 2016, has received funding from the European Union's Seventh Framework Programme under the Security Call. This paper will describe the project objectives and approach.

  19. Object-based attention: strength of object representation and attentional guidance.

    Science.gov (United States)

    Shomstein, Sarah; Behrmann, Marlene

    2008-01-01

    Two or more features belonging to a single object are identified more quickly and more accurately than are features belonging to different objects--a finding attributed to sensory enhancement of all features belonging to an attended or selected object. However, several recent studies have suggested that this "single-object advantage" may be a product of probabilistic and configural strategic prioritizations rather than of object-based perceptual enhancement per se, challenging the underlying mechanism that is thought to give rise to object-based attention. In the present article, we further explore constraints on the mechanisms of object-based selection by examining the contribution of the strength of object representations to the single-object advantage. We manipulated factors such as exposure duration (i.e., preview time) and salience of configuration (i.e., objects). Varying preview time changes the magnitude of the object-based effect, so that if there is ample time to establish an object representation (i.e., preview time of 1,000 msec), then both probability and configuration (i.e., objects) guide attentional selection. If, however, insufficient time is provided to establish a robust object-based representation, then only probabilities guide attentional selection. Interestingly, at a short preview time of 200 msec, when the two objects were sufficiently different from each other (i.e., different colors), both configuration and probability guided attention selection. These results suggest that object-based effects can be explained both in terms of strength of object representations (established at longer exposure durations and by pictorial cues) and probabilistic contingencies in the visual environment.

  20. Disclosing and Concealing

    DEFF Research Database (Denmark)

    Flyverbom, Mikkel

    2016-01-01

    The ubiquity of digital technologies and the datafication of many domains of social liferaise important questions about governance. In the emergent field of internet governancestudies, most work has explored novel governance arrangements, institutional developmentsand the effects of interactions...... of the argument is that there is anintimate relationship between seeing, knowing and governing, and that digitalisation anddatafication processes fundamentally shape how we make things visible or invisible, knowableor unknowable and governable or ungovernable. Having articulated this conceptual argument...

  1. Reveal or conceal?

    DEFF Research Database (Denmark)

    Giones, Ferran; Bjørnåli, Ekaterina; Billström, Anders

    2017-01-01

    with customers and other stakeholders. Nevertheless, we know little about how legitimacy is built and how new entrants build legitimacy in complex technology-intensive industries. In this research we explore how Norwegian cleantech firms use signaling and strategic actions to build legitimacy. We analyze five...... cases while investigating their actions in different phases of the venture’s evolution. The results suggest that, contrary to signaling theory expectations, young clean-tech firms do not always build legitimacy by conveying information on their strengths. Instead, we observe that they use signaling...... strategies to address the specific concerns of different stakeholders. This is very much contingent upon the evolutionary stage of the venture and the firm’s current weaknesses....

  2. Application of deep geophysical data to the discussion on the relationship between deep faults, concealed over thrust napped structure and uranium metallogenesis in central-southern Jiangxi

    International Nuclear Information System (INIS)

    Jiang Jinyuan; Qi Liang

    1999-01-01

    Based on the comparative analysis and study on 10 profiles of telluric electromagnetic sounding (MT) and regional gravimetric, magnetic data and Moho surface, the deep geological-tectonic pattern of the central-southern Jiangxi is discussed. It is suggested that: the studied region belongs to the Soyth-China block; in the area along Pingxiang-Guangfeng, at the border with Yangzi block an approximately EW-trending mantle concave-mantle slope zone occurs; the NNE-NE trending mantle uplift-mantle slope-mantle concave structure is developed within the South-China block; deep fault zones are represented by variation sites of Moho surface. Then, a series of deep structures is inferred including the approximately EW-striking Pingxian-Guangfeng deep fault zone, the NNE-striking Fuzhou-Anyuan deep fault zone, the NNE-trending Fengcheng-Dayu deep fault zone, as well as the NE-striking Yudu-Ningdu over thrust napped and sliding thrust structural systems, the approximately E W-trending Le'an-Nancheng over thrust napped structural systems etc. According to the distribution of known uranium mineralizations it is confirmed that close time-space relation exists between the uranium metallogenesis and variations of Moho surface, and over thrust napped structures, providing clues for locating concealed uranium deposits

  3. Channels as Objects in Concurrent Object-Oriented Programming

    Directory of Open Access Journals (Sweden)

    Joana Campos

    2011-10-01

    Full Text Available There is often a sort of a protocol associated to each class, stating when and how certain methods should be called. Given that this protocol is, if at all, described in the documentation accompanying the class, current mainstream object-oriented languages cannot provide for the verification of client code adherence against the sought class behaviour. We have defined a class-based concurrent object-oriented language that formalises such protocols in the form of usage types. Usage types are attached to class definitions, allowing for the specification of (1 the available methods, (2 the tests clients must perform on the result of methods, and (3 the object status - linear or shared - all of which depend on the object's state. Our work extends the recent approach on modular session types by eliminating channel operations, and defining the method call as the single communication primitive in both sequential and concurrent settings. In contrast to previous works, we define a single category for objects, instead of distinct categories for linear and for shared objects, and let linear objects evolve into shared ones. We introduce a standard sync qualifier to prevent thread interference in certain operations on shared objects. We formalise the language syntax, the operational semantics, and a type system that enforces by static typing that methods are called only when available, and by a single client if so specified in the usage type. We illustrate the language via a complete example.

  4. Ultrasound stratification of the FDG-avid thyroid nodule

    International Nuclear Information System (INIS)

    Beech, P.; Lavender, I.; Jong, I.; Soo, G.; Ramdave, S.; Chong, A.; Nandurkar, D.

    2016-01-01

    Aim: To determine whether the malignancy risk in an 2-["1"8F]-fluoro-2-deoxy-D-glucose (FDG)-avid thyroid nodule can be stratified according to the presence or absence of suspicious ultrasound features and thereby identify which nodules require further cytological assessment. Materials and methods: A retrospective review of FDG-positron-emission tomography (PET) combined with computed tomography (CT) studies with FDG-avid thyroid nodules (defined as FDG uptake greater than blood pool) that were further assessed with ultrasound and fine-needle aspiration cytology or surgery was performed. FDG-avid thyroid nodules were classified as having either suspicious ultrasound features (marked hypo-echogenicity, irregular margins, microcalcifications, marked hypervascularity, or nodules that were taller than they were wide) or no suspicious ultrasound features and these findings were correlated with the subsequent cytological results. Results: Forty-eight FDG-avid thyroid nodules were assessed. On cytological assessment five nodules were malignant (10.4%), nine were indeterminate (18.75%), and 34 were benign (70.8%). On ultrasound, 24 (50%) had no suspicious features and 24 (50%) had one or more suspicious features. Of the nodules with no suspicious features, 22 (91.6%) were benign, two (8.3%) were indeterminate, and none were malignant. Of the nodules with suspicious features, five (20.8%) were malignant, seven (29.1%) were indeterminate, and 12 (50%) were benign. The absence of suspicious ultrasound features demonstrated a strong association with benign cytology (p=0.009). Out of the suspicious sonographic features, marked hypoechoic appearance (p=0.02), irregular margins (p=0.009), and taller than wide morphology (p=0.04) were statistically most significantly associated with malignancy. Conclusion: The rate of malignancy in FDG-avid thyroid nodules is low in the absence of specific suspicious ultrasound features. The SUV values are non-discriminatory to differentiate

  5. Use of a Parasitic Wasp as a Biosensor

    Directory of Open Access Journals (Sweden)

    Dawn Olson

    2014-05-01

    Full Text Available Screening cargo for illicit substances is in need of rapid high-throughput inspection systems that accurately identify suspicious cargo. Here we investigate the ability of a parasitic wasp, Microplitis croceipes to detect and respond to methyl benzoate, the volatile component of cocaine, by examining their response to training concentrations, their sensitivity at low concentrations, and their ability to detect methyl benzoate when two concealment substances (green tea and ground coffee are added to the testing arena. Utilizing classical associative learning techniques with sucrose as reward, we found that M. croceipes learns individual concentrations of methyl benzoate, and they can generalize this learning to concentrations 100× lower than the training concentration. Their sensitivity to methyl benzoate is very low at an estimated 3 ppb. They are also able to detect methyl benzoate when covered completely by green tea, but were not able to detect methyl benzoate when covered completely by coffee grounds. Habituation to the tea and coffee odors prior to testing improves their responses, resulting in effective detection of methyl benzoate covered by the coffee grounds. With the aid of the portable device called ‘the wasp hound’, the wasps appear to have potential to be effective on-site biosensors for the detection of cocaine.

  6. DIFFERENTIATING PERIMORTEM AND POSTMORTEM BURNING

    Directory of Open Access Journals (Sweden)

    Brahmaji Master

    2015-01-01

    Full Text Available One of the most challenging cases in forensic medicine is ascertaining the cause of death of burnt bodies under suspicious circumstances. The key questions that arise at the time of investigation include: 1  Was the person alive or dead prior to fire accident?  Did the victim die because of burn?  If death was not related to burns, could burns play a role in causing death?  Were the burns sustained accidentally, did the person commit suicide or was the person murdered?  Are the circumstances suggesting an attempt to conceal crime?  How was the fire started?  How was the victim identified?  In case of mass fatalities, who died first? Postmortem burning of corpses is supposed to be one of the ways to hide a crime. Differentiating the actual cause of death in burn patients is therefore important. Medical examiners usually focus on the defining the changes that occur in tissues while forensic anthropologists deal with the changes related to the bone with or without any the influence of other tissues. Under the circumstances of fire, differentiating the perimortem trauma from that of postmortem cause of bone fractures is vital in determining the cause and motive of death

  7. Leder und Pelz am Ende des Mittelalters und zu Beginn der Neuzeit

    DEFF Research Database (Denmark)

    Atzbach, Rainer

    In the center of the former imperial town Kempten thousands of everyday objects had been discovered. The thesis analyzes the leather and fur finds, which had been concealed between the late 15th and the late 16th century in blind floors and between the walls of a group of late medieval citizen...

  8. Transformation & Metamorphosis

    Science.gov (United States)

    Lott, Debra

    2009-01-01

    The sculptures of Canadian artist Brian Jungen are a great inspiration for a lesson on creating new forms. Jungen transforms found objects into unique creations without fully concealing their original form or purpose. Frank Stella's sculpture series, including "K.132,2007" made of stainless steel and spray paint, is another great example of…

  9. 18F-deoxyglucose-PET in the detection of recurrence in head and neck cancer

    International Nuclear Information System (INIS)

    Chen Yingrui; Li Weixiong; Gu Meixin; Xie Songxi

    2002-01-01

    Objective: To evaluate 18 F-deoxyglucose-positron emission tomography (FDG-PET) in the detection of suspicious recurrence in head and neck cancers, as compared with CT/MRI imaging. Methods: Thirty-seven patients with clinically suspicious recurrences in head and neck cancers underwent FDG-PET, with 34 checked with CT/MRI imaging. The final diagnosis of recurrence were proved by pathology or clinical following-up. Results: FDG-PET detected recurrence successfully in 32 of 37 (86.5%) patients with 3 false positives and 2 false negatives. The FDG-PET sensitivity, specificity and accuracy in defining local recurrence were 91.7%, 76.9%, 86.5%, respectively; and those of CT/MRI were 68.2%, 75.0%, 61.8%, respectively. Conclusion: In comparison with CT/MRI, FDG-PET possesses a high accuracy in detecting recurrence in head and neck cancers

  10. Metastatic prostate adenocarcinoma penis: Case report

    Directory of Open Access Journals (Sweden)

    Pablo Santiago Caicedo

    2014-08-01

    Full Text Available Objective: Describe a case report of a patient with prostatic adenocarcinoma metastatic to penis due to shortage reports of similar cases to perform a literature review. Methods: We identified a case of a patient with prostatic adenocarcinoma, who during de the course of a cystoscopy at Hospital Universitario San Jose (Third-level Public Hospital in Popayan, Colombia a suspicious nodule of malignancy was observed in the penis. We described the clinical case in order to proceed to a literature search for the discussion. Results: 72-year-old patient diagnosed with prostatic adenocarcinoma Gleason Score 4+5=9, treated with bilateral orchiectomy and a suspicious nodule of malignancy incidentally observed in the penis, currently undergoing palliative care with Karnofsky score of 30 points. Conclusion: cutaneous metastases are rare; indicate longstanding disease and poor prognosis.

  11. Submillimetre wave imaging and security: imaging performance and prediction

    Science.gov (United States)

    Appleby, R.; Ferguson, S.

    2016-10-01

    Within the European Commission Seventh Framework Programme (FP7), CONSORTIS (Concealed Object Stand-Off Real-Time Imaging for Security) has designed and is fabricating a stand-off system operating at sub-millimetre wave frequencies for the detection of objects concealed on people. This system scans people as they walk by the sensor. This paper presents the top level system design which brings together both passive and active sensors to provide good performance. The passive system operates in two bands between 100 and 600GHz and is based on a cryogen free cooled focal plane array sensor whilst the active system is a solid-state 340GHz radar. A modified version of OpenFX was used for modelling the passive system. This model was recently modified to include realistic location-specific skin temperature and to accept animated characters wearing up to three layers of clothing that move dynamically, such as those typically found in cinematography. Targets under clothing have been modelled and the performance simulated. The strengths and weaknesses of this modelling approach are discussed.

  12. Real-world objects are more memorable than photographs of objects

    Directory of Open Access Journals (Sweden)

    Jacqueline C Snow

    2014-10-01

    Full Text Available Research studies in psychology typically use two-dimensional (2D images of objects as proxies for real-world three-dimensional (3D stimuli. There are, however, a number of important differences between real objects and images that could influence cognition and behavior. Although human memory has been studied extensively, only a handful of studies have used real objects in the context of memory and virtually none have directly compared memory for real objects versus their 2D counterparts. Here we examined whether or not episodic memory is influenced by the format in which objects are displayed. We conducted two experiments asking participants to freely recall, and to recognize, a set of 44 common household objects. Critically, the exemplars were displayed to observers in one of three viewing conditions: real-world objects, colored photographs, or black and white line drawings. Stimuli were closely matched across conditions for size, orientation, and illumination. Surprisingly, recall and recognition performance was significantly better for real objects compared to colored photographs or line drawings (for which memory performance was equivalent. We replicated this pattern in a second experiment comparing memory for real objects versus color photos, when the stimuli were matched for viewing angle across conditions. Again, recall and recognition performance was significantly better for the real objects than matched color photos of the same items. Taken together, our data suggest that real objects are more memorable than pictorial stimuli. Our results highlight the importance of studying real-world object cognition and raise the potential for applied use in developing effective strategies for education, marketing, and further research on object-related cognition.

  13. Object-relational database design-exploiting object orientation at the ...

    African Journals Online (AJOL)

    This paper applies the object-relational database paradigm in the design of a Health Management Information System. The class design, mapping of object classes to relational tables, the representation of inheritance hierarchies, and the appropriate database schema are all examined. Keywords: object relational ...

  14. Object formation in visual working memory: Evidence from object-based attention.

    Science.gov (United States)

    Zhou, Jifan; Zhang, Haihang; Ding, Xiaowei; Shui, Rende; Shen, Mowei

    2016-09-01

    We report on how visual working memory (VWM) forms intact perceptual representations of visual objects using sub-object elements. Specifically, when objects were divided into fragments and sequentially encoded into VWM, the fragments were involuntarily integrated into objects in VWM, as evidenced by the occurrence of both positive and negative object-based attention effects: In Experiment 1, when subjects' attention was cued to a location occupied by the VWM object, the target presented at the location of that object was perceived as occurring earlier than that presented at the location of a different object. In Experiment 2, responses to a target were significantly slower when a distractor was presented at the same location as the cued object (Experiment 2). These results suggest that object fragments can be integrated into objects within VWM in a manner similar to that of visual perception. Copyright © 2016 Elsevier B.V. All rights reserved.

  15. 78 FR 76656 - Agency Information Collection Activities: Proposed Collection; Comments Requested: Reports of...

    Science.gov (United States)

    2013-12-18

    ... Collection Activities: Proposed Collection; Comments Requested: Reports of Suspicious Orders or Theft/Loss of... Suspicious Orders or Theft/Loss of Listed Chemicals/Machines. (3) Agency form number, if any, and the... suspicious orders and thefts is provided in writing on an as needed basis and does not occur using a form...

  16. The tacit concept of competence in J.S. Mill's On Liberty | Nys | South ...

    African Journals Online (AJOL)

    Mill is often the object of schizophrenic interpretation: he is either interpreted as a fierce proponent of negative freedom, i.e. a prototypical liberal who professes neutrality with regard to different conceptions of the good, or as a concealed moralist whose ultimate goal is to construct society on the basis of a particular and thick ...

  17. Objective-C

    CERN Document Server

    DeVoe, Jiva

    2011-01-01

    A soup-to-nuts guide on the Objective-C programming language. Objective-C is the language behind Cocoa and Cocoa Touch, which is the Framework of applications written for the Macintosh, iPod touch, iPhone, and iPad platforms. Part of the Developer Reference series covering the hottest Apple topics, this book covers everything from the basics of the C language to advanced aspects of Apple development. You'll examine Objective-C and high-level subjects of frameworks, threading, networking, and much more.: Covers the basics of the C language and then quickly moves onto Objective-C and more advanc

  18. Effects of Selected Object Characteristics on Object Permanence Test Performance.

    Science.gov (United States)

    Lingle, Kathleen M.; Lingle, John H.

    A study was conducted to investigate the degree to which both object familiarity and motivational factors influence infants' search behavior in an object permanence test. Infants' search behavior for an unfamiliar test object was compared with search behavior for (a) an experientially familiar object that each infant had played with daily for a…

  19. Real Objects Can Impede Conditional Reasoning but Augmented Objects Do Not.

    Science.gov (United States)

    Sato, Yuri; Sugimoto, Yutaro; Ueda, Kazuhiro

    2018-03-01

    In this study, Knauff and Johnson-Laird's (2002) visual impedance hypothesis (i.e., mental representations with irrelevant visual detail can impede reasoning) is applied to the domain of external representations and diagrammatic reasoning. We show that the use of real objects and augmented real (AR) objects can control human interpretation and reasoning about conditionals. As participants made inferences (e.g., an invalid one from "if P then Q" to "P"), they also moved objects corresponding to premises. Participants who moved real objects made more invalid inferences than those who moved AR objects and those who did not manipulate objects (there was no significant difference between the last two groups). Our results showed that real objects impeded conditional reasoning, but AR objects did not. These findings are explained by the fact that real objects may over-specify a single state that exists, while AR objects suggest multiple possibilities. Copyright © 2017 Cognitive Science Society, Inc.

  20. Creating Objects and Object Categories for Studying Perception and Perceptual Learning

    Science.gov (United States)

    Hauffen, Karin; Bart, Eugene; Brady, Mark; Kersten, Daniel; Hegdé, Jay

    2012-01-01

    In order to quantitatively study object perception, be it perception by biological systems or by machines, one needs to create objects and object categories with precisely definable, preferably naturalistic, properties1. Furthermore, for studies on perceptual learning, it is useful to create novel objects and object categories (or object classes) with such properties2. Many innovative and useful methods currently exist for creating novel objects and object categories3-6 (also see refs. 7,8). However, generally speaking, the existing methods have three broad types of shortcomings. First, shape variations are generally imposed by the experimenter5,9,10, and may therefore be different from the variability in natural categories, and optimized for a particular recognition algorithm. It would be desirable to have the variations arise independently of the externally imposed constraints. Second, the existing methods have difficulty capturing the shape complexity of natural objects11-13. If the goal is to study natural object perception, it is desirable for objects and object categories to be naturalistic, so as to avoid possible confounds and special cases. Third, it is generally hard to quantitatively measure the available information in the stimuli created by conventional methods. It would be desirable to create objects and object categories where the available information can be precisely measured and, where necessary, systematically manipulated (or 'tuned'). This allows one to formulate the underlying object recognition tasks in quantitative terms. Here we describe a set of algorithms, or methods, that meet all three of the above criteria. Virtual morphogenesis (VM) creates novel, naturalistic virtual 3-D objects called 'digital embryos' by simulating the biological process of embryogenesis14. Virtual phylogenesis (VP) creates novel, naturalistic object categories by simulating the evolutionary process of natural selection9,12,13. Objects and object categories created

  1. Learning Object Repositories

    Science.gov (United States)

    Lehman, Rosemary

    2007-01-01

    This chapter looks at the development and nature of learning objects, meta-tagging standards and taxonomies, learning object repositories, learning object repository characteristics, and types of learning object repositories, with type examples. (Contains 1 table.)

  2. Object-based spatial attention when objects have sufficient depth cues.

    Science.gov (United States)

    Takeya, Ryuji; Kasai, Tetsuko

    2015-01-01

    Attention directed to a part of an object tends to obligatorily spread over all of the spatial regions that belong to the object, which may be critical for rapid object-recognition in cluttered visual scenes. Previous studies have generally used simple rectangles as objects and have shown that attention spreading is reflected by amplitude modulation in the posterior N1 component (150-200 ms poststimulus) of event-related potentials, while other interpretations (i.e., rectangular holes) may arise implicitly in early visual processing stages. By using modified Kanizsa-type stimuli that provided less ambiguity of depth ordering, the present study examined early event-related potential spatial-attention effects for connected and separated objects, both of which were perceived in front of (Experiment 1) and in back of (Experiment 2) the surroundings. Typical P1 (100-140 ms) and N1 (150-220 ms) attention effects of ERP in response to unilateral probes were observed in both experiments. Importantly, the P1 attention effect was decreased for connected objects compared to separated objects only in Experiment 1, and the typical object-based modulations of N1 were not observed in either experiment. These results suggest that spatial attention spreads over a figural object at earlier stages of processing than previously indicated, in three-dimensional visual scenes with multiple depth cues.

  3. Ikke-markerede reklamer på Instagram

    OpenAIRE

    Madsen, Nanna Bay; Mølgaard, Ida Nicole; Andersen, Møller; Emilie, Freja; Tworek, Nynne Billesbølle; Arenstorff, von; Sofie, Anna; Faarup, Astrid; Rasmussen, Josefine Løvig

    2014-01-01

    This project concerns concealed advertising on the social network Instagram. The purpose of the project is to generate knowledge about concealed advertising and the preconditions for its existence on Instagram. This is done in order to create greater awareness of concealed advertising in social networks. The project encompasses empirical data formed in three focus groups, in which users of In-stagram present their attitudes towards and experience with concealed advertising on Instagram. The p...

  4. BL Lacertae objects

    International Nuclear Information System (INIS)

    Disney, M.J.; Veron, P.

    1977-01-01

    The properties of BL Lacertae objects are discussed including their spectra, variability, and brightness. The historical development of observation, and the conclusion that these objects are possibly quasar-related objects rather than variable stars as originally supposed are treated. The possible mechanisms for the unusual luminosity of these objects are considered

  5. Conceptual Coherence Affects Phonological Activation of Context Objects During Object Naming

    NARCIS (Netherlands)

    Oppermann, F.; Jescheniak, J.D.; Schriefers, H.J.

    2008-01-01

    In 4 picture-word interference experiments, speakers named a target object that was presented with a context object. Using auditory distractors that were phonologically related or unrelated either to the target object or the context object, the authors assessed whether phonological processing was

  6. Seeing Objects as Faces Enhances Object Detection.

    Science.gov (United States)

    Takahashi, Kohske; Watanabe, Katsumi

    2015-10-01

    The face is a special visual stimulus. Both bottom-up processes for low-level facial features and top-down modulation by face expectations contribute to the advantages of face perception. However, it is hard to dissociate the top-down factors from the bottom-up processes, since facial stimuli mandatorily lead to face awareness. In the present study, using the face pareidolia phenomenon, we demonstrated that face awareness, namely seeing an object as a face, enhances object detection performance. In face pareidolia, some people see a visual stimulus, for example, three dots arranged in V shape, as a face, while others do not. This phenomenon allows us to investigate the effect of face awareness leaving the stimulus per se unchanged. Participants were asked to detect a face target or a triangle target. While target per se was identical between the two tasks, the detection sensitivity was higher when the participants recognized the target as a face. This was the case irrespective of the stimulus eccentricity or the vertical orientation of the stimulus. These results demonstrate that seeing an object as a face facilitates object detection via top-down modulation. The advantages of face perception are, therefore, at least partly, due to face awareness.

  7. Seeing Objects as Faces Enhances Object Detection

    Directory of Open Access Journals (Sweden)

    Kohske Takahashi

    2015-09-01

    Full Text Available The face is a special visual stimulus. Both bottom-up processes for low-level facial features and top-down modulation by face expectations contribute to the advantages of face perception. However, it is hard to dissociate the top-down factors from the bottom-up processes, since facial stimuli mandatorily lead to face awareness. In the present study, using the face pareidolia phenomenon, we demonstrated that face awareness, namely seeing an object as a face, enhances object detection performance. In face pareidolia, some people see a visual stimulus, for example, three dots arranged in V shape, as a face, while others do not. This phenomenon allows us to investigate the effect of face awareness leaving the stimulus per se unchanged. Participants were asked to detect a face target or a triangle target. While target per se was identical between the two tasks, the detection sensitivity was higher when the participants recognized the target as a face. This was the case irrespective of the stimulus eccentricity or the vertical orientation of the stimulus. These results demonstrate that seeing an object as a face facilitates object detection via top-down modulation. The advantages of face perception are, therefore, at least partly, due to face awareness.

  8. Implications of perspective in teaching objects first and object design

    DEFF Research Database (Denmark)

    Christensen, Henrik Bærbak

    2005-01-01

    There are an increasing number of books published on the important topics of "object-oriented programming" and "object-oriented design" for use in education. However, object-orientation can be viewed from a number of different perspectives---each perspective having its benefits and liabilities...

  9. Associative recognition and the hippocampus: differential effects of hippocampal lesions on object-place, object-context and object-place-context memory.

    Science.gov (United States)

    Langston, Rosamund F; Wood, Emma R

    2010-10-01

    The hippocampus is thought to be required for the associative recognition of objects together with the spatial or temporal contexts in which they occur. However, recent data showing that rats with fornix lesions perform as well as controls in an object-place task, while being impaired on an object-place-context task (Eacott and Norman (2004) J Neurosci 24:1948-1953), suggest that not all forms of context-dependent associative recognition depend on the integrity of the hippocampus. To examine the role of the hippocampus in context-dependent recognition directly, the present study tested the effects of large, selective, bilateral hippocampus lesions in rats on performance of a series of spontaneous recognition memory tasks: object recognition, object-place recognition, object-context recognition and object-place-context recognition. Consistent with the effects of fornix lesions, animals with hippocampus lesions were impaired only on the object-place-context task. These data confirm that not all forms of context-dependent associative recognition are mediated by the hippocampus. Subsequent experiments suggested that the object-place task does not require an allocentric representation of space, which could account for the lack of impairment following hippocampus lesions. Importantly, as the object-place-context task has similar spatial requirements, the selective deficit in object-place-context recognition suggests that this task requires hippocampus-dependent neural processes distinct from those required for allocentric spatial memory, or for object memory, object-place memory or object-context memory. Two possibilities are that object, place, and context information converge only in the hippocampus, or that recognition of integrated object-place-context information requires a hippocampus-dependent mode of retrieval, such as recollection. © 2009 Wiley-Liss, Inc.

  10. Chains of securitization

    Directory of Open Access Journals (Sweden)

    Marieke de Goede

    2017-12-01

    Full Text Available Securitization has a dual rationality that twins a financial sense to one of modern statecraft and national security. This forum contribution advocates a focus on material practices as a means of further exploring the entanglement of finance and security. In particular, it advances a notion of ‘chains of securitization’, arguing that such a concept provides researchers with a concrete way to analyze how ‘financial’ objects, such as derivatives, are assembled to generate (insecurities, as well as how ‘security’ objects, such as suspicious transactions, are assembled across public/private domains.

  11. Multiple Object Permanence Tracking: Maintenance, Retrieval and Transformation of Dynamic Object Representations

    OpenAIRE

    Saiki, Jun

    2008-01-01

    Multiple object permanence tracking (MOPT) task revealed that our ability of maintaining and transforming multiple representations of complex feature-bound objects is limited to handle only 1-2 objects. Often reported capacity of 3-5 objects likely reflects memory for partial representations of objects and simple cases such as just color and their locations. Also, performance in multiple object tracking (MOT) task is likely mediated by spatiotemporal indices, not by feature-bound object repre...

  12. Motivational Objects in Natural Scenes (MONS): A Database of >800 Objects.

    Science.gov (United States)

    Schomaker, Judith; Rau, Elias M; Einhäuser, Wolfgang; Wittmann, Bianca C

    2017-01-01

    In daily life, we are surrounded by objects with pre-existing motivational associations. However, these are rarely controlled for in experiments with natural stimuli. Research on natural stimuli would therefore benefit from stimuli with well-defined motivational properties; in turn, such stimuli also open new paths in research on motivation. Here we introduce a database of Motivational Objects in Natural Scenes (MONS). The database consists of 107 scenes. Each scene contains 2 to 7 objects placed at approximately equal distance from the scene center. Each scene was photographed creating 3 versions, with one object ("critical object") being replaced to vary the overall motivational value of the scene (appetitive, aversive, and neutral), while maintaining high visual similarity between the three versions. Ratings on motivation, valence, arousal and recognizability were obtained using internet-based questionnaires. Since the main objective was to provide stimuli of well-defined motivational value, three motivation scales were used: (1) Desire to own the object; (2) Approach/Avoid; (3) Desire to interact with the object. Three sets of ratings were obtained in independent sets of observers: for all 805 objects presented on a neutral background, for 321 critical objects presented in their scene context, and for the entire scenes. On the basis of the motivational ratings, objects were subdivided into aversive, neutral, and appetitive categories. The MONS database will provide a standardized basis for future studies on motivational value under realistic conditions.

  13. Exploring the relationship between object realism and object-based attention effects.

    Science.gov (United States)

    Roque, Nelson; Boot, Walter R

    2015-09-01

    Visual attention prioritizes processing of locations in space, and evidence also suggests that the benefits of attention can be shaped by the presence of objects (object-based attention). However, the prevalence of object-based attention effects has been called into question recently by evidence from a large-sampled study employing classic attention paradigms (Pilz et al., 2012). We conducted two experiments to explore factors that might determine when and if object-based attention effects are observed, focusing on the degree to which the concreteness and realism of objects might contribute to these effects. We adapted the classic attention paradigm first reported by Egly, Driver, and Rafal (1994) by replacing abstract bar stimuli in some conditions with objects that were more concrete and familiar to participants: items of silverware. Furthermore, we varied the realism of these items of silverware, presenting either cartoon versions or photo-realistic versions. Contrary to predictions, increased realism did not increase the size of object-based effects. In fact, no clear object-based effects were observed in either experiment, consistent with previous failures to replicate these effects in similar paradigms. While object-based attention may exist, and may have important influences on how we parse the visual world, these and other findings suggest that the two-object paradigm typically relied upon to study object-based effects may not be the best paradigm to investigate these issues. Copyright © 2015 Elsevier B.V. All rights reserved.

  14. Herbig-Haro objects

    International Nuclear Information System (INIS)

    Schwartz, R.D.

    1983-01-01

    Progress in the understanding of Herbig-Haro (HH) objects is reviewed. The results of optical studies of the proper motions and alignments, variability, and polarization of HH objects and the results of spectroscopic studies are discussed. Ground-based infrared studies and far-infrared observations are reviewed. Findings on the properties of molecular clouds associated with HH objects, on gas flows associated with HH IR stars, on maser emission, and on radio continuum observations are considered. A history of proposed excitation mechanisms for HH objects is briefly presented, and the salient shock-wave calculations aimed at synthesizing the spectra of HH objects are summarized along with hypotheses that have been advanced about the origin of the objects. 141 references

  15. Being seen or being watched? A psychoanalytic perspective on body dysmorphia.

    Science.gov (United States)

    Lemma, Alessandra

    2009-08-01

    The focus of this paper is on individuals who present as excessively preoccupied with their body, perceiving some aspect(s) to be 'ugly' such that they feel compelled to alter and/or conceal this 'ugly' body part. These difficulties are understood as symptoms of an underlying narcissistic disturbance. The author suggests that the relative pervasiveness of an identification with a 'super'-ego accounts for the degree of severity of the disturbance (increasing the compulsion to alter and/or conceal the hated body part) and that it has implications for the patient's accessibility in analytic treatment. Understanding the vicissitudes of the development of the body-self in the context of the earliest relationship with the 'object of desire' is core to helping these patients because of the quality of the identifications that ensue and that are then enacted the transference.

  16. Neutron tomography of axially symmetric objects using 14 MeV neutrons from a portable neutron generator

    Energy Technology Data Exchange (ETDEWEB)

    Andersson, P., E-mail: peter.andersson@physics.uu.se; Andersson-Sunden, E.; Sjöstrand, H.; Jacobsson-Svärd, S. [Department of Physics and Astronomy, Division of Applied Nuclear Physics, Uppsala University, Lägerhyddsgatan 1, 751 20 Uppsala (Sweden)

    2014-08-01

    In nuclear boiling water reactor cores, the distribution of water and steam (void) is essential for both safety and efficiency reasons. In order to enhance predictive capabilities, void distribution assessment is performed in two-phase test-loops under reactor-relevant conditions. This article proposes the novel technique of fast-neutron tomography using a portable deuterium-tritium neutron generator to determine the time-averaged void distribution in these loops. Fast neutrons have the advantage of high transmission through the metallic structures and pipes typically concealing a thermal-hydraulic test loop, while still being fairly sensitive to the water/void content. However, commercially available fast-neutron generators also have the disadvantage of a relatively low yield and fast-neutron detection also suffers from relatively low detection efficiency. Fortunately, some loops are axially symmetric, a property which can be exploited to reduce the amount of data needed for tomographic measurement, thus limiting the interrogation time needed. In this article, three axially symmetric test objects depicting a thermal-hydraulic test loop have been examined; steel pipes with outer diameter 24 mm, thickness 1.5 mm, and with three different distributions of the plastic material POM inside the pipes. Data recorded with the FANTOM fast-neutron tomography instrument have been used to perform tomographic reconstructions to assess their radial material distribution. Here, a dedicated tomographic algorithm that exploits the symmetry of these objects has been applied, which is described in the paper. Results are demonstrated in 20 rixel (radial pixel) reconstructions of the interior constitution and 2D visualization of the pipe interior is demonstrated. The local POM attenuation coefficients in the rixels were measured with errors (RMS) of 0.025, 0.020, and 0.022 cm{sup −1}, solid POM attenuation coefficient. The accuracy and precision is high enough to provide a useful

  17. Neutron tomography of axially symmetric objects using 14 MeV neutrons from a portable neutron generator.

    Science.gov (United States)

    Andersson, P; Andersson-Sunden, E; Sjöstrand, H; Jacobsson-Svärd, S

    2014-08-01

    In nuclear boiling water reactor cores, the distribution of water and steam (void) is essential for both safety and efficiency reasons. In order to enhance predictive capabilities, void distribution assessment is performed in two-phase test-loops under reactor-relevant conditions. This article proposes the novel technique of fast-neutron tomography using a portable deuterium-tritium neutron generator to determine the time-averaged void distribution in these loops. Fast neutrons have the advantage of high transmission through the metallic structures and pipes typically concealing a thermal-hydraulic test loop, while still being fairly sensitive to the water/void content. However, commercially available fast-neutron generators also have the disadvantage of a relatively low yield and fast-neutron detection also suffers from relatively low detection efficiency. Fortunately, some loops are axially symmetric, a property which can be exploited to reduce the amount of data needed for tomographic measurement, thus limiting the interrogation time needed. In this article, three axially symmetric test objects depicting a thermal-hydraulic test loop have been examined; steel pipes with outer diameter 24 mm, thickness 1.5 mm, and with three different distributions of the plastic material POM inside the pipes. Data recorded with the FANTOM fast-neutron tomography instrument have been used to perform tomographic reconstructions to assess their radial material distribution. Here, a dedicated tomographic algorithm that exploits the symmetry of these objects has been applied, which is described in the paper. Results are demonstrated in 20 rixel (radial pixel) reconstructions of the interior constitution and 2D visualization of the pipe interior is demonstrated. The local POM attenuation coefficients in the rixels were measured with errors (RMS) of 0.025, 0.020, and 0.022 cm(-1), solid POM attenuation coefficient. The accuracy and precision is high enough to provide a useful

  18. The Influence of New European Union Driver’s License Legislation on Reporting of Severe Hypoglycemia by Patients With Type 1 Diabetes

    DEFF Research Database (Denmark)

    Pedersen-Bjergaard, Ulrik; Færch, Louise; Allingbjerg, Marie-Louise

    2015-01-01

    OBJECTIVE: We test the hypotheses that the implementation in Denmark of new, stricter European Union (EU) legislation on driver's licensing, with the purpose to improve traffic safety in January 2012, has reduced the self-reported rate of severe hypoglycemia in a routine clinical setting...... of concealed severe hypoglycemia may impair the safety of affected patients and unintentionally paradoxically reduce the general traffic safety....

  19. The Reviewing of Object Files: Object-Specific Integration of Information.

    Science.gov (United States)

    Kahneman, Daniel; And Others

    1992-01-01

    Seven experiments involving a total of 203 college students explored a form of object-specific priming and established a robust object-specific benefit that indicates that a new stimulus will be named faster if it physically matches a previous stimulus seen as part of the same perceptual object. (SLD)

  20. Effect of objective function on multi-objective inverse planning of radiation therapy

    International Nuclear Information System (INIS)

    Li Guoli; Wu Yican; Song Gang; Wang Shifang

    2006-01-01

    There are two kinds of objective functions in radiotherapy inverse planning: dose distribution-based and Dose-Volume Histogram (DVH)-based functions. The treatment planning in our days is still a trial and error process because the multi-objective problem is solved by transforming it into a single objective problem using a specific set of weights for each object. This work investigates the problem of objective function setting based on Pareto multi-optimization theory, and compares the effect on multi-objective inverse planning of those two kinds of objective functions including calculation time, converge speed, etc. The basis of objective function setting on inverse planning is discussed. (authors)

  1. Ultrasonography-guided core needle biopsy for the thyroid nodule: does the procedure hold any benefit for the diagnosis when fine-needle aspiration cytology analysis shows inconclusive results?

    Science.gov (United States)

    Hahn, S Y; Han, B-K; Ko, E Y; Ko, E S

    2013-01-01

    Objective: We evaluated the diagnostic role of ultrasonography-guided core needle biopsy (CNB) according to ultrasonography features of thyroid nodules that had inconclusive ultrasonography-guided fine-needle aspiration (FNA) results. Methods: A total of 88 thyroid nodules in 88 patients who underwent ultrasonography-guided CNB because of previous inconclusive FNA results were evaluated. The patients were classified into three groups based on ultrasonography findings: Group A, which was suspicious for papillary thyroid carcinoma (PTC); Group B, which was suspicious for follicular (Hurthle cell) neoplasm; and Group C, which was suspicious for lymphoma. The final diagnoses of the thyroid nodules were determined by surgical confirmation or follow-up after ultrasonography-guided CNB. Results: Of the 88 nodules, the malignant rate was 49.1% in Group A, 12.0% in Group B and 90.0% in Group C. The rates of conclusive ultrasonography-guided CNB results after previous incomplete ultrasonography-guided FNA results were 96.2% in Group A, 64.0% in Group B and 90.0% in Group C (p=0.001). 12 cases with inconclusive ultrasonography-guided CNB results were finally diagnosed as 8 benign lesions, 3 PTCs and 1 lymphoma. The number of previous ultrasonography-guided FNA biopsies was not significantly different between the conclusive and the inconclusive result groups of ultrasonography-guided CNB (p=0.205). Conclusion: Ultrasonography-guided CNB has benefit for the diagnosis of thyroid nodules with inconclusive ultrasonography-guided FNA results. However, it is still not helpful for the differential diagnosis in 36% of nodules that are suspicious for follicular neoplasm seen on ultrasonography. Advances in knowledge: This study shows the diagnostic contribution of ultrasonography-guided CNB as an alternative to repeat ultrasonography-guided FNA or surgery. PMID:23564885

  2. Prostate cancer diagnosis: Efficacy of a simple electromagnetic MRI-TRUS fusion method to target biopsies

    International Nuclear Information System (INIS)

    Jelidi, Amina; Ohana, Mickael; Labani, Aïssam; Alemann, Guillaume; Lang, Herve; Roy, Catherine

    2017-01-01

    Highlights: • A very simple electromagnetic device for fusion with MRI examination during TRUS guided biopsies increases the detection of clinically significant prostate cancer. • This device has advantages: a short time for the fusion registration, no additional cumbersome material and no intense training to be fluent with. • Low or intermediate suspicious area for prostate carcinoma on mpMRI can be due to benign histological abnormalities or high grade prostatic intraepithelial neoplasia. - Abstract: Objective: To assess that transrectal ultrasound guidance (TRUS) targeted biopsies (TB) aimed with an easy to use electronic real-time fusion registration device have a higher rate of prostate cancer (PC) detection than standard biopsies (SB). Material and methods: This prospective study included 130 patients referred for TRUS biopsies after suspicious MRI. They underwent 16-core SB and 2 to 3 cores in each MRI suspicious area, using a fusion software. We noted SB and TB positivity for PC and Gleason score (GS). We used the McNemar test to compare SB and TB, with a statistical significance p < 0.05. Results: Among 130 patients, 68.5% had PC. Additional time due to the fusion registration was 3.3 min. One hundred fifteen patients (88.4%) had pathological findings on the histological analysis (prostate cancer n = 89, others n = 26). TB diagnosed PC in 75 patients with negative SB. Positivity rate for PC was significantly higher for TB than SB (p = 0.03). Among highly suspicious MRI lesions, detection rate of histological abnormalities using SB and TB was 96% with 79.7% of PC. Most PC that TB diagnosed alone were clinically significant (86.3%). Conclusion: TRUS biopsies performed with a simple MRI and US electronic fusion is an unrestrainedly method to increase PC diagnosis.

  3. Vicarious learning from human models in monkeys.

    Science.gov (United States)

    Falcone, Rossella; Brunamonti, Emiliano; Genovesio, Aldo

    2012-01-01

    We examined whether monkeys can learn by observing a human model, through vicarious learning. Two monkeys observed a human model demonstrating an object-reward association and consuming food found underneath an object. The monkeys observed human models as they solved more than 30 learning problems. For each problem, the human models made a choice between two objects, one of which concealed a piece of apple. In the test phase afterwards, the monkeys made a choice of their own. Learning was apparent from the first trial of the test phase, confirming the ability of monkeys to learn by vicarious observation of human models.

  4. Financial incentive does not affect P300 (in response to certain episodic and semantic probe stimuli) in the Complex Trial Protocol (CTP) version of the Concealed Information Test (CIT) in detection of malingering.

    Science.gov (United States)

    Rosenfeld, J Peter; Labkovsky, Elena; Davydova, Elena; Ward, Anne; Rosenfeld, Lauren

    2017-05-01

    Previous research indicated that the skin conductance response of the autonomic nervous system in the Concealed Information Test (CIT) is typically increased in subjects who are financially and otherwise incentivized to defeat the CIT (the paradoxical "motivational impairment" effect). This is not the case for RT-based CITs, nor P300 tests based on the three-stimulus protocol for detection of cognitive malingering (although these are not the same as CITs). The present report is the first attempt to study the effect of financial motivation on the P300-based Complex Trial Protocol using both episodic and semantic memory probe and irrelevant stimuli. The Test of Memory Malingering (TOMM) was used to validate behavioral differences between the two groups we created by offering one (paid) group but not another (unpaid) group a financial reward for beating our tests. Group behavioral differences on the TOMM did confirm group manipulations. Probe-minus-irrelevant P300 differences did not differ between groups, although as previously, semantic memory-evoked P300s were larger than episodic memory-evoked P300s. © 2017 Society for Psychophysiological Research.

  5. Motivational Objects in Natural Scenes (MONS: A Database of >800 Objects

    Directory of Open Access Journals (Sweden)

    Judith Schomaker

    2017-09-01

    Full Text Available In daily life, we are surrounded by objects with pre-existing motivational associations. However, these are rarely controlled for in experiments with natural stimuli. Research on natural stimuli would therefore benefit from stimuli with well-defined motivational properties; in turn, such stimuli also open new paths in research on motivation. Here we introduce a database of Motivational Objects in Natural Scenes (MONS. The database consists of 107 scenes. Each scene contains 2 to 7 objects placed at approximately equal distance from the scene center. Each scene was photographed creating 3 versions, with one object (“critical object” being replaced to vary the overall motivational value of the scene (appetitive, aversive, and neutral, while maintaining high visual similarity between the three versions. Ratings on motivation, valence, arousal and recognizability were obtained using internet-based questionnaires. Since the main objective was to provide stimuli of well-defined motivational value, three motivation scales were used: (1 Desire to own the object; (2 Approach/Avoid; (3 Desire to interact with the object. Three sets of ratings were obtained in independent sets of observers: for all 805 objects presented on a neutral background, for 321 critical objects presented in their scene context, and for the entire scenes. On the basis of the motivational ratings, objects were subdivided into aversive, neutral, and appetitive categories. The MONS database will provide a standardized basis for future studies on motivational value under realistic conditions.

  6. How to Convert a Flavor of Quantum Bit Commitment

    DEFF Research Database (Denmark)

    Crepeau, Claude; Legare, Frédéric; Salvail, Louis

    2001-01-01

    In this paper we show how to convert a statistically binding but computationally concealing quantum bit commitment scheme into a computationally binding but statistically concealing QBC scheme. For a security parameter n, the construction of the statistically concealing scheme requires O(n2......) executions of the statistically binding scheme. As a consequence, statistically concealing but computationally binding quantum bit commitments can be based upon any family of quantum one-way functions. Such a construction is not known to exist in the classical world....

  7. Beginning Objective-C

    CERN Document Server

    Dovey, James

    2012-01-01

    Objective-C is today's fastest growing programming language, at least in part due to the popularity of Apple's Mac, iPhone and iPad. Beginning Objective-C is for you if you have some programming experience, but you're new to the Objective-C programming language and you want a modern-and fast-way forwards to your own coding projects. Beginning Objective-C offers you a modern programmer's perspective on Objective-C courtesy of two of the best iOS and Mac developers in the field today, and gets you programming to the best of your ability in this important language.  It gets you rolling fast into

  8. Epicardial fat volume is correlated with coronary lesion and its severity

    OpenAIRE

    Bo, Xiaohong; Ma, Likun; Fan, Jili; Jiang, Zhe; Zhou, Yuansong; Zhang, Lei; Li, Wanjun

    2015-01-01

    Objective: To evaluate the correlation of epicardial adipose tissue volume (EATV) with the coronary artery lesion and its severity. Methods: Inpatients with suspicious stable angina of coronary heart lesion were recruited. For patients with coronary artery lesions in CTA, further coronary angiography (CAG) was performed to evaluate the coronary artery lesion. Gensini scoring system was employed to assess the severity of coronary artery lesions. Results: Patients were classified as coronary he...

  9. Criminal Organizations and Illicit Trafficking in Guatemala’s Border Communities

    Science.gov (United States)

    2011-12-01

    soccer fields; they provided local citizens money for their children’s parties and for medical emergencies; and—as the case studies show—they provided...economy of the location. The three municipalities selected have experienced signs of prosperity with suspicious origins ( soccer teams that compete on...primary objective of this program is to improve the quality of life for children under 15 years old in the areas of health, education, and nutrition

  10. Designing the Object Game

    DEFF Research Database (Denmark)

    Filip, Diane; Lindegaard, Hanne

    2016-01-01

    The Object Game is an exploratory design game and an experiment of developing a tangible object that can spark dialogue and retrospection between collaborative partners and act as a boundary object. The objective of this article is to show and elaborate on the development of the Object Game......, and to provide case examples of the game in action. The Object Game has two parts – Story-building and Co-rating of objects – with the aim of stimulating a collaborative reflection on knowledge sharing with different objects. In Story-building, the participants visualize their knowledge sharing process...... these facilitated knowledge transfer, knowledge exchange, knowledge generation, and knowledge integration. The participants collaborative reflected on their use of different objects for knowledge sharing and learn which objects have been effective (and which have not been effective) in their collaborative...

  11. A Psychoacoustic-Based Multiple Audio Object Coding Approach via Intra-Object Sparsity

    Directory of Open Access Journals (Sweden)

    Maoshen Jia

    2017-12-01

    Full Text Available Rendering spatial sound scenes via audio objects has become popular in recent years, since it can provide more flexibility for different auditory scenarios, such as 3D movies, spatial audio communication and virtual classrooms. To facilitate high-quality bitrate-efficient distribution for spatial audio objects, an encoding scheme based on intra-object sparsity (approximate k-sparsity of the audio object itself is proposed in this paper. The statistical analysis is presented to validate the notion that the audio object has a stronger sparseness in the Modified Discrete Cosine Transform (MDCT domain than in the Short Time Fourier Transform (STFT domain. By exploiting intra-object sparsity in the MDCT domain, multiple simultaneously occurring audio objects are compressed into a mono downmix signal with side information. To ensure a balanced perception quality of audio objects, a Psychoacoustic-based time-frequency instants sorting algorithm and an energy equalized Number of Preserved Time-Frequency Bins (NPTF allocation strategy are proposed, which are employed in the underlying compression framework. The downmix signal can be further encoded via Scalar Quantized Vector Huffman Coding (SQVH technique at a desirable bitrate, and the side information is transmitted in a lossless manner. Both objective and subjective evaluations show that the proposed encoding scheme outperforms the Sparsity Analysis (SPA approach and Spatial Audio Object Coding (SAOC in cases where eight objects were jointly encoded.

  12. Cost Effective Regional Ballistic Missile Defense

    Science.gov (United States)

    2016-02-16

    deploying advanced air defense systems18, such as the Russian S-300 and S-500, and concealing them in hardened, camouflaged sites, such as extensive... Russian objections to the European Phased Adaptive Approach (EPAA) and fund homeland defense priorities.39 Furthermore, the PTSS system was also... Theatre Ballistic Missile Defence Capability Becomes Operational,” Jane’s Missiles & Rockets, 1 February 2011. 55 Joseph W. Kirschbaum, REGIONAL MISSILE

  13. Early object relations into new objects.

    Science.gov (United States)

    Downey, T W

    2001-01-01

    Two strands of change are suggested by this review, one maturational, the other therapeutic or developmental (Hartmann and Kris, 1945). By "maturational" I mean to suggest energies that infuse the individual from earliest life in a manner that includes object relations, but for the healthy exercise of which object relations per se need not be of central and crucial importance. Within wide limits such energies may be delayed until growth conditions prevail without significant distortion of certain of the organism's ego functions. Therapeutic change is analogous to developmental change in that both involve the crucial presence of another to release energies. In therapeutic change these are energies that have been repressed beyond the reach of developmental dynamics. In everyday development crisis and synthesis alternate in conjunction with new and emerging objects to add to the psychological structures brought to the fore by maturation. In many instances, as we see with John, over time and in a less focussed manner, developmental changes can approximate therapeutic change and visa versa. Freud-Dann in their "experiment" pursued one line, in which the equipmental delay brought on by extremely adverse living circumstances was redressed by providing an interpersonally enriching, loving, developmentally facilitating milieu. The sketches of individual children and John's subsequent story provide a perspective into what becomes the stuff of growth and what remains the stuff of neurosis. The developmental reserves and ego resilience of these children were impressive but probably not extraordinary. Usual growth ensued as soon as they were provided with the rich soil of Bulldogs Bank instead of the desert sand of the Tereszin concentration camp. However, no one can escape such adverse circumstances without having taken in the stuff of neurosis. Affects and percepts that were not assimilatable or even available to consciousness at the time remain buried in the unconscious

  14. First-Class Object Sets

    DEFF Research Database (Denmark)

    Ernst, Erik

    Typically, objects are monolithic entities with a fixed interface. To increase the flexibility in this area, this paper presents first-class object sets as a language construct. An object set offers an interface which is a disjoint union of the interfaces of its member objects. It may also be used...... for a special kind of method invocation involving multiple objects in a dynamic lookup process. With support for feature access and late-bound method calls object sets are similar to ordinary objects, only more flexible. The approach is made precise by means of a small calculus, and the soundness of its type...

  15. Objective lens

    Science.gov (United States)

    Olczak, Eugene G. (Inventor)

    2011-01-01

    An objective lens and a method for using same. The objective lens has a first end, a second end, and a plurality of optical elements. The optical elements are positioned between the first end and the second end and are at least substantially symmetric about a plane centered between the first end and the second end.

  16. Elegant objects

    CERN Document Server

    Bugayenko, Yegor

    2017-01-01

    There are 23 practical recommendations for object-oriented programmers. Most of them are completely against everything you've read in other books. For example, static methods, NULL references, getters, setters, and mutable classes are called evil. Compound variable names, validators, private static literals, configurable objects, inheritance, annotations, MVC, dependency injection containers, reflection, ORM and even algorithms are our enemies.

  17. Complex biological testing of ground water quality in the area of sewage settler filtration fields of JSC 'Almaty Kanty'

    International Nuclear Information System (INIS)

    Vetrinskaya, N.I.; Goldobina, E.A.; Kosmukhambetov, A.R.; Kulikova, O.V.; Kozlova, N.V.; Ismailova, Zh.B.

    2001-01-01

    Results are given on the ground water ecological quality estimation of operating survey boreholes of JSC 'Almaty Kanty' industrial enterprise filtration fields using different methods of biological testing. Proved that various biological objects reacted differently onto the toxins present in the water. Concealment of toxic effect was performed at short-period testing at several testing objects (stimulation). Revealed during long period tests, that ground water from all the boreholes surveyed is not ecologically clean and pure, and can bring damage for ecosystem of water reservoirs adjacent and sources of drinking water if migration happens. (author)

  18. Microwave and millimeter-wave remote sensing for security applications

    CERN Document Server

    Nanzer, Jeffrey

    2012-01-01

    Microwave and millimeter-wave remote sensing techniques are fast becoming a necessity in many aspects of security as detection and classification of objects or intruders becomes more difficult. This groundbreaking resource offers you expert guidance in this burgeoning area. It provides you with a thorough treatment of the principles of microwave and millimeter-wave remote sensing for security applications, as well as practical coverage of the design of radiometer, radar, and imaging systems. You learn how to design active and passive sensors for intruder detection, concealed object detection,

  19. The research of Digital Holographic Object Wave Field Reconstruction in Image and Object Space

    Institute of Scientific and Technical Information of China (English)

    LI Jun-Chang; PENG Zu-Jie; FU Yun-Chang

    2011-01-01

    @@ For conveniently detecting objects of different sizes using digital holography, usual measurements employ the object wave transformed by an optical system with different magnifications to fit charge coupled devices (CCDs), then the object field reconstruction involves the diffraction calculation of the optic wave passing through the optical system.We propose two methods to reconstruct the object field.The one is that, when the object is imaging in an image space in which we reconstruct the image of the object field, the object field can be expressed according to the object-image relationship.The other is that, when the object field reaching CCD is imaged in an object space in which we reconstruct the object field, the optical system is described by introducing matrix optics in this paper.The reconstruction formulae which easily use classic diffraction integral are derived.Finally, experimental verifications are also accomplished.%For conveniently detecting objects of different sizes using digital holography, usual measurements employ the object wave transformed by an optical system with different magnifications to fit charge coupled devices (CCDs), then the object Reid reconstruction involves the diffraction calculation of the optic wave passing through the optical system. We propose two methods to reconstruct the object field. The one is that, when the object is imaging in an image space in which we reconstruct the image of the object field, the object field can be expressed according to the object-image relationship. The other is that, when the object field reaching CCD is imaged in an object space in which we reconstruct the object field, the optical system is described by introducing matrix optics in this paper. The reconstruction formulae which easily use classic diffraction integral are derived. Finally, experimental verifications are also accomplished.

  20. A unified computational model of the development of object unity, object permanence, and occluded object trajectory perception.

    Science.gov (United States)

    Franz, A; Triesch, J

    2010-12-01

    The perception of the unity of objects, their permanence when out of sight, and the ability to perceive continuous object trajectories even during occlusion belong to the first and most important capacities that infants have to acquire. Despite much research a unified model of the development of these abilities is still missing. Here we make an attempt to provide such a unified model. We present a recurrent artificial neural network that learns to predict the motion of stimuli occluding each other and that develops representations of occluded object parts. It represents completely occluded, moving objects for several time steps and successfully predicts their reappearance after occlusion. This framework allows us to account for a broad range of experimental data. Specifically, the model explains how the perception of object unity develops, the role of the width of the occluders, and it also accounts for differences between data for moving and stationary stimuli. We demonstrate that these abilities can be acquired by learning to predict the sensory input. The model makes specific predictions and provides a unifying framework that has the potential to be extended to other visual event categories. Copyright © 2010 Elsevier Inc. All rights reserved.

  1. Objects in Motion

    Science.gov (United States)

    Damonte, Kathleen

    2004-01-01

    One thing scientists study is how objects move. A famous scientist named Sir Isaac Newton (1642-1727) spent a lot of time observing objects in motion and came up with three laws that describe how things move. This explanation only deals with the first of his three laws of motion. Newton's First Law of Motion says that moving objects will continue…

  2. A comparison of moving object detection methods for real-time moving object detection

    Science.gov (United States)

    Roshan, Aditya; Zhang, Yun

    2014-06-01

    Moving object detection has a wide variety of applications from traffic monitoring, site monitoring, automatic theft identification, face detection to military surveillance. Many methods have been developed across the globe for moving object detection, but it is very difficult to find one which can work globally in all situations and with different types of videos. The purpose of this paper is to evaluate existing moving object detection methods which can be implemented in software on a desktop or laptop, for real time object detection. There are several moving object detection methods noted in the literature, but few of them are suitable for real time moving object detection. Most of the methods which provide for real time movement are further limited by the number of objects and the scene complexity. This paper evaluates the four most commonly used moving object detection methods as background subtraction technique, Gaussian mixture model, wavelet based and optical flow based methods. The work is based on evaluation of these four moving object detection methods using two (2) different sets of cameras and two (2) different scenes. The moving object detection methods have been implemented using MatLab and results are compared based on completeness of detected objects, noise, light change sensitivity, processing time etc. After comparison, it is observed that optical flow based method took least processing time and successfully detected boundary of moving objects which also implies that it can be implemented for real-time moving object detection.

  3. Spatially Rearranged Object Parts Can Facilitate Perception of Intact Whole Objects

    Directory of Open Access Journals (Sweden)

    Laura eCacciamani

    2014-05-01

    Full Text Available The familiarity of an object depends on the spatial arrangement of its parts; when the parts are spatially rearranged, they form a novel, unrecognizable configuration. Yet the same collection of parts comprises both the familiar and novel configuration. Is it possible that the collection of familiar parts activates a representation of the intact familiar configuration even when they are spatially rearranged? We presented novel configurations as primes before test displays that assayed effects on figure-ground perception from memories of intact familiar objects. In our test displays, two equal-area regions shared a central border; one region depicted a portion of a familiar object. Previous research with such displays has shown that participants are more likely to perceive the region depicting a familiar object as the figure and the abutting region as its ground when the familiar object is depicted in its upright orientation rather than upside down. The novel primes comprised either the same or a different collection of parts as the familiar object in the test display (part-rearranged and control primes, respectively. We found that participants were more likely to perceive the familiar region as figure in upright vs. inverted displays following part-rearranged primes but not control primes. Thus, priming with a novel configuration comprising the same familiar parts as the upcoming figure-ground display facilitated orientation-dependent effects of object memories on figure assignment. Similar results were obtained when the spatially rearranged collection of parts was suggested on the groundside of the prime’s border, suggesting that familiar parts in novel configurations access the representation of their corresponding intact whole object before figure assignment. These data demonstrate that familiar parts access memories of familiar objects even when they are arranged in a novel configuration.

  4. Spatially rearranged object parts can facilitate perception of intact whole objects.

    Science.gov (United States)

    Cacciamani, Laura; Ayars, Alisabeth A; Peterson, Mary A

    2014-01-01

    The familiarity of an object depends on the spatial arrangement of its parts; when the parts are spatially rearranged, they form a novel, unrecognizable configuration. Yet the same collection of parts comprises both the familiar and novel configuration. Is it possible that the collection of familiar parts activates a representation of the intact familiar configuration even when they are spatially rearranged? We presented novel configurations as primes before test displays that assayed effects on figure-ground perception from memories of intact familiar objects. In our test displays, two equal-area regions shared a central border; one region depicted a portion of a familiar object. Previous research with such displays has shown that participants are more likely to perceive the region depicting a familiar object as the figure and the abutting region as its ground when the familiar object is depicted in its upright orientation rather than upside down. The novel primes comprised either the same or a different collection of parts as the familiar object in the test display (part-rearranged and control primes, respectively). We found that participants were more likely to perceive the familiar region as figure in upright vs. inverted displays following part-rearranged primes but not control primes. Thus, priming with a novel configuration comprising the same familiar parts as the upcoming figure-ground display facilitated orientation-dependent effects of object memories on figure assignment. Similar results were obtained when the spatially rearranged collection of parts was suggested on the groundside of the prime's border, suggesting that familiar parts in novel configurations access the representation of their corresponding intact whole object before figure assignment. These data demonstrate that familiar parts access memories of familiar objects even when they are arranged in a novel configuration.

  5. General object recognition is specific: Evidence from novel and familiar objects.

    Science.gov (United States)

    Richler, Jennifer J; Wilmer, Jeremy B; Gauthier, Isabel

    2017-09-01

    In tests of object recognition, individual differences typically correlate modestly but nontrivially across familiar categories (e.g. cars, faces, shoes, birds, mushrooms). In theory, these correlations could reflect either global, non-specific mechanisms, such as general intelligence (IQ), or more specific mechanisms. Here, we introduce two separate methods for effectively capturing category-general performance variation, one that uses novel objects and one that uses familiar objects. In each case, we show that category-general performance variance is unrelated to IQ, thereby implicating more specific mechanisms. The first approach examines three newly developed novel object memory tests (NOMTs). We predicted that NOMTs would exhibit more shared, category-general variance than familiar object memory tests (FOMTs) because novel objects, unlike familiar objects, lack category-specific environmental influences (e.g. exposure to car magazines or botany classes). This prediction held, and remarkably, virtually none of the substantial shared variance among NOMTs was explained by IQ. Also, while NOMTs correlated nontrivially with two FOMTs (faces, cars), these correlations were smaller than among NOMTs and no larger than between the face and car tests themselves, suggesting that the category-general variance captured by NOMTs is specific not only relative to IQ, but also, to some degree, relative to both face and car recognition. The second approach averaged performance across multiple FOMTs, which we predicted would increase category-general variance by averaging out category-specific factors. This prediction held, and as with NOMTs, virtually none of the shared variance among FOMTs was explained by IQ. Overall, these results support the existence of object recognition mechanisms that, though category-general, are specific relative to IQ and substantially separable from face and car recognition. They also add sensitive, well-normed NOMTs to the tools available to study

  6. Binding Objects to Locations: The Relationship between Object Files and Visual Working Memory

    Science.gov (United States)

    Hollingworth, Andrew; Rasmussen, Ian P.

    2010-01-01

    The relationship between object files and visual working memory (VWM) was investigated in a new paradigm combining features of traditional VWM experiments (color change detection) and object-file experiments (memory for the properties of moving objects). Object-file theory was found to account for a key component of object-position binding in VWM:…

  7. BL Lacertae objects

    International Nuclear Information System (INIS)

    Miller, J.S.

    1978-01-01

    An overview is given of the principal characteristics and problems associated with the prototype BL Lacertae. The most important characteristics of this group and its relevance, the consideration of a few particular objects in moderate detail, the relation between these objects QSOs, and normal galaxies, and finally the possible physical nature of BL Lac objects and the important questions they raise are treated. 15 references

  8. Multi objective multi refinery optimization with environmental and catastrophic failure effects objectives

    Science.gov (United States)

    Khogeer, Ahmed Sirag

    2005-11-01

    Petroleum refining is a capital-intensive business. With stringent environmental regulations on the processing industry and declining refining margins, political instability, increased risk of war and terrorist attacks in which refineries and fuel transportation grids may be targeted, higher pressures are exerted on refiners to optimize performance and find the best combination of feed and processes to produce salable products that meet stricter product specifications, while at the same time meeting refinery supply commitments and of course making profit. This is done through multi objective optimization. For corporate refining companies and at the national level, Intea-Refinery and Inter-Refinery optimization is the second step in optimizing the operation of the whole refining chain as a single system. Most refinery-wide optimization methods do not cover multiple objectives such as minimizing environmental impact, avoiding catastrophic failures, or enhancing product spec upgrade effects. This work starts by carrying out a refinery-wide, single objective optimization, and then moves to multi objective-single refinery optimization. The last step is multi objective-multi refinery optimization, the objectives of which are analysis of the effects of economic, environmental, product spec, strategic, and catastrophic failure. Simulation runs were carried out using both MATLAB and ASPEN PIMS utilizing nonlinear techniques to solve the optimization problem. The results addressed the need to debottleneck some refineries or transportation media in order to meet the demand for essential products under partial or total failure scenarios. They also addressed how importing some high spec products can help recover some of the losses and what is needed in order to accomplish this. In addition, the results showed nonlinear relations among local and global objectives for some refineries. The results demonstrate that refineries can have a local multi objective optimum that does not

  9. Rectal water contrast transvaginal ultrasound versus double-contrast barium enema in the diagnosis of bowel endometriosis

    OpenAIRE

    Jiang, Jipeng; Liu, Ying; Wang, Kun; Wu, Xixiang; Tang, Ying

    2017-01-01

    Objectives The aim of study was to compare the accuracy between rectal water contrast transvaginal ultrasound (RWC-TVS) and double-contrast barium enema (DCBE) in evaluating the bowel endometriosis presence as well as its extent. Design and setting 198 patients at reproductive age with suspicious bowel endometriosis were included. Physicians in two groups specialised at endometriosis performed RWC-TVS as well as DCBE before laparoscopy and both groups were blinded to other groups’ results. Fi...

  10. INDIRECT LABOR COSTS AND IMPLICATIONS FOR OVERHEAD ALLOCATION

    OpenAIRE

    Bea Chiang

    2013-01-01

    Cost accounting typically allocates indirect labor cost to cost object based on direct labor hours. The allocation process implicitly assumes that indirect labor costs vary proportionally with direct labor hours. The assumption of a linear relationship between indirect and direct labor is particularly suspicious at low production volume levels because there tends to be a fixed component in indirect labor. The linearity assumption is also challenged by recent increasing complexity of indirect ...

  11. Specification of Concurrent Objects

    DEFF Research Database (Denmark)

    Sørensen, Morten U.

    relation over two objects and an event. In the model, objects can be composed by parallel composition, encapsulation, and hiding of operations. Refinement between objects is defined as fair trace inclusion.A specification language is presented where objects can be specified operationally by abstract...

  12. Moderate financial incentive does not appear to influence the P300 Concealed Information Test (CIT) effect in the Complex Trial Protocol (CTP) version of the CIT in a forensic scenario, while affecting P300 peak latencies and behavior.

    Science.gov (United States)

    Rosenfeld, J Peter; Sitar, Evan; Wasserman, Joshua; Ward, Anne

    2018-03-01

    Previous research indicated that the skin conductance response (SCR) of the Autonomic Nervous System (ANS) in the Concealed Information Test (CIT) is typically increased in subjects who are financially and otherwise incentivized to defeat the CIT (the paradoxical "motivational impairment" effect). This is not the case for RT-based CITs, nor for P300 tests based on the 3-stimulus protocol or Complex Trial Protocol for detection of cognitive malingering (although these are not the same as forensic CITs). The present report extends earlier studies of malingerers by running five groups of subjects (15-16 per group yielding 78 total) in a mock crime (forensic) scenario: paid (to beat the test) and unpaid, instructed and uninstructed, and simply guilty. There was no evidence that the "CIT effect" (probe-minus-irrelevant P300 differences) differed among groups, although behavioral differences among groups were seen. Copyright © 2018 Elsevier B.V. All rights reserved.

  13. Degree of skin denervation and its correlation to objective thermal sensory test in leprosy patients.

    Directory of Open Access Journals (Sweden)

    Ismael Alves Rodrigues Júnior

    Full Text Available BACKGROUND: Leprosy is an infectious disease affecting skin and peripheral nerves resulting in increased morbidity and physical deformities. Early diagnosis provides opportune treatment and reduces its complications, relying fundamentally on the demonstration of impaired sensation in suggestive cutaneous lesions. The loss of tactile sensitivity in the lesions is preceded by the loss of thermal sensitivity, stressing the importance of the thermal test in the suspicious lesions approach. The gold-standard method for the assessment of thermal sensitivity is the quantitative sensory test (QST. Morphological study may be an alternative approach to access the thin nerve fibers responsible for thermal sensitivity transduction. The few studies reported in leprosy patients pointed out a rarefaction of thin dermo-epidermal fibers in lesions, but used semi-quantitative evaluation methods. METHODOLOGY/PRINCIPAL FINDINGS: This work aimed to study the correlation between the degree of thermal sensitivity impairment measured by QST and the degree of denervation in leprosy skin lesions, evaluated by immunohistochemistry anti-PGP 9.5 and morphometry. Twenty-two patients were included. There were significant differences in skin thermal thresholds among lesions and contralateral skin (cold, warm, cold induced pain and heat induced pain. The mean reduction in the density of intraepidermal and subepidermal fibers in lesions was 79.5% (SD = 19.6 and 80.8% (SD = 24.9, respectively. CONCLUSIONS/SIGNIFICANCE: We observed a good correlation between intraepidermal and subepidermal fibers deficit, but no correlation between these variables and those accounting for the degree of impairment in thermal thresholds, since the thin fibers rarefaction was homogeneously intense in all patients, regardless of the degree of sensory deficit. We believe that the homogeneously intense denervation in leprosy lesions should be objective of further investigations focused on its

  14. Vicarious learning from human models in monkeys.

    Directory of Open Access Journals (Sweden)

    Rossella Falcone

    Full Text Available We examined whether monkeys can learn by observing a human model, through vicarious learning. Two monkeys observed a human model demonstrating an object-reward association and consuming food found underneath an object. The monkeys observed human models as they solved more than 30 learning problems. For each problem, the human models made a choice between two objects, one of which concealed a piece of apple. In the test phase afterwards, the monkeys made a choice of their own. Learning was apparent from the first trial of the test phase, confirming the ability of monkeys to learn by vicarious observation of human models.

  15. Propelling Extended Objects

    Science.gov (United States)

    Humbert, Richard

    2010-01-01

    A force acting on just part of an extended object (either a solid or a volume of a liquid) can cause all of it to move. That motion is due to the transmission of the force through the object by its material. This paper discusses how the force is distributed to all of the object by a gradient of stress or pressure in it, which creates the local…

  16. Trusted Objects

    International Nuclear Information System (INIS)

    CAMPBELL, PHILIP L.; PIERSON, LYNDON G.; WITZKE, EDWARD L.

    1999-01-01

    In the world of computers a trusted object is a collection of possibly-sensitive data and programs that can be allowed to reside and execute on a computer, even on an adversary's machine. Beyond the scope of one computer we believe that network-based agents in high-consequence and highly reliable applications will depend on this approach, and that the basis for such objects is what we call ''faithful execution.''

  17. Objects, materiality and meaning

    DEFF Research Database (Denmark)

    Lenau, Torben Anker; Lindegaard, Hanne

    2008-01-01

    The present research work investigates the relation between physical objects, their materiality, understood as the physical substances they are made from, and the communication from the objects. In product design of physical objects the communicative aspects are just as important as the function...... of the object, and the designers aim is therefore to tune both in order to achieve a desired goal. To do so the designer basically has 2 options: Alteration of the physical shape of the object and the selection of materials. Through the manipulation of shape and materials can symbolic and sensory information...... be written into the object. The materials are therefore carriers of communication, even though this is dependent of the cultural context and the environment which the object will be part of. However the designer has only minor influence on those....

  18. Protein Nano-Object Integrator: Generating atomic-style objects for use in molecular biophysics

    Science.gov (United States)

    Smith, Nicholas David Fenimore

    As researchers obtain access to greater and greater amounts of computational power, focus has shifted towards modeling macroscopic objects while still maintaining atomic-level details. The Protein Nano-Object Integrator (ProNOI) presented here has been designed to provide a streamlined solution for creating and designing macro-scale objects with atomic-level details to be used in molecular simulations and tools. To accomplish this, two different interfaces were developed: a Protein Data Bank (PDB), PDB-focused interface for generating regularly-shaped three-dimensional atomic objects and a 2D image-based interface for tracing images with irregularly shaped objects and then extracting three-dimensional models from these images. Each interface is dependent upon the C++ backend utility for generating the objects and ensures that the output is consistent across each program. The objects are exported in a standard PDB format which allows for the visualization and manipulation of the objects via standard tools available in Molecular Computational Biophysics.

  19. Reasoning about Function Objects

    Science.gov (United States)

    Nordio, Martin; Calcagno, Cristiano; Meyer, Bertrand; Müller, Peter; Tschannen, Julian

    Modern object-oriented languages support higher-order implementations through function objects such as delegates in C#, agents in Eiffel, or closures in Scala. Function objects bring a new level of abstraction to the object-oriented programming model, and require a comparable extension to specification and verification techniques. We introduce a verification methodology that extends function objects with auxiliary side-effect free (pure) methods to model logical artifacts: preconditions, postconditions and modifies clauses. These pure methods can be used to specify client code abstractly, that is, independently from specific instantiations of the function objects. To demonstrate the feasibility of our approach, we have implemented an automatic prover, which verifies several non-trivial examples.

  20. Paradigms in object recognition

    International Nuclear Information System (INIS)

    Mutihac, R.; Mutihac, R.C.

    1999-09-01

    A broad range of approaches has been proposed and applied for the complex and rather difficult task of object recognition that involves the determination of object characteristics and object classification into one of many a priori object types. Our paper revises briefly the three main different paradigms in pattern recognition, namely Bayesian statistics, neural networks, and expert systems. (author)

  1. Representing revolution: icons of industrialization.

    Science.gov (United States)

    Fara, Patricia

    2006-03-01

    Appreciating pictures entails a consideration not only of the people, objects and landscape that their artists have chosen to portray, but also an imagining of what has been excluded. The term 'Industrial Revolution' has been given multiple meanings, and this article (part of the Science in the Industrial Revolution series) explores some of these by exposing the messages concealed inside some of the most enduring images of the Revolution.

  2. Database Independent Migration of Objects into an Object-Relational Database

    CERN Document Server

    Ali, A; Munir, K; Waseem-Hassan, M; Willers, I

    2002-01-01

    CERN's (European Organization for Nuclear Research) WISDOM project [1] deals with the replication of data between homogeneous sources in a Wide Area Network (WAN) using the extensible Markup Language (XML). The last phase of the WISDOM (Wide-area, database Independent Serialization of Distributed Objects for data Migration) project [2], indicates the future directions for this work to be to incorporate heterogeneous sources as compared to homogeneous sources as described by [3]. This work will become essential for the CERN community once the need to transfer their legacy data to some other source, other then Objectivity [4], arises. Oracle 9i - an Object-Relational Database (including support for abstract data types, ADTs) appears to be a potential candidate for the physics event store in the CERN CMS experiment as suggested by [4] & [5]. Consequently this database has been selected for study. As a result of this work the HEP community will get a tool for migrating their data from Objectivity to Oracle9i.

  3. R-FCN Object Detection Ensemble based on Object Resolution and Image Quality

    DEFF Research Database (Denmark)

    Rasmussen, Christoffer Bøgelund; Nasrollahi, Kamal; Moeslund, Thomas B.

    2017-01-01

    Object detection can be difficult due to challenges such as variations in objects both inter- and intra-class. Additionally, variations can also be present between images. Based on this, research was conducted into creating an ensemble of Region-based Fully Convolutional Networks (R-FCN) object d...

  4. Evolution of poor reporting and inadequate methods over time in 20 920 randomised controlled trials included in Cochrane reviews: research on research study.

    Science.gov (United States)

    Dechartres, Agnes; Trinquart, Ludovic; Atal, Ignacio; Moher, David; Dickersin, Kay; Boutron, Isabelle; Perrodeau, Elodie; Altman, Douglas G; Ravaud, Philippe

    2017-06-08

    Objective  To examine how poor reporting and inadequate methods for key methodological features in randomised controlled trials (RCTs) have changed over the past three decades. Design  Mapping of trials included in Cochrane reviews. Data sources  Data from RCTs included in all Cochrane reviews published between March 2011 and September 2014 reporting an evaluation of the Cochrane risk of bias items: sequence generation, allocation concealment, blinding, and incomplete outcome data. Data extraction  For each RCT, we extracted consensus on risk of bias made by the review authors and identified the primary reference to extract publication year and journal. We matched journal names with Journal Citation Reports to get 2014 impact factors. Main outcomes measures  We considered the proportions of trials rated by review authors at unclear and high risk of bias as surrogates for poor reporting and inadequate methods, respectively. Results  We analysed 20 920 RCTs (from 2001 reviews) published in 3136 journals. The proportion of trials with unclear risk of bias was 48.7% for sequence generation and 57.5% for allocation concealment; the proportion of those with high risk of bias was 4.0% and 7.2%, respectively. For blinding and incomplete outcome data, 30.6% and 24.7% of trials were at unclear risk and 33.1% and 17.1% were at high risk, respectively. Higher journal impact factor was associated with a lower proportion of trials at unclear or high risk of bias. The proportion of trials at unclear risk of bias decreased over time, especially for sequence generation, which fell from 69.1% in 1986-1990 to 31.2% in 2011-14 and for allocation concealment (70.1% to 44.6%). After excluding trials at unclear risk of bias, use of inadequate methods also decreased over time: from 14.8% to 4.6% for sequence generation and from 32.7% to 11.6% for allocation concealment. Conclusions  Poor reporting and inadequate methods have decreased over time, especially for sequence generation

  5. Objects of consciousness

    Directory of Open Access Journals (Sweden)

    Donald David Hoffman

    2014-06-01

    Full Text Available Current models of visual perception typically assume that human vision estimates true properties of physical objects, properties that exist even if unperceived. However, recent studies of perceptual evolution, using evolutionary games and genetic algorithms, reveal that natural selection often drives true perceptions to extinction when they compete with perceptions tuned to fitness rather than truth: Perception guides adaptive behavior; it does not estimate a preexisting physical truth. Moreover, shifting from evolutionary biology to quantum physics, there is reason to disbelieve in preexist-ing physical truths: Certain interpretations of quantum theory deny that dynamical properties of physical objects have defi-nite values when unobserved. In some of these interpretations the observer is fundamental, and wave functions are com-pendia of subjective probabilities, not preexisting elements of physical reality. These two considerations, from evolutionary biology and quantum physics, suggest that current models of object perception require fundamental reformulation. Here we begin such a reformulation, starting with a formal model of consciousness that we call a conscious agent. We develop the dynamics of interacting conscious agents, and study how the perception of objects and space-time can emerge from such dynamics. We show that one particular object, the quantum free particle, has a wave function that is identical in form to the harmonic functions that characterize the asymptotic dynamics of conscious agents; particles are vibrations not of strings but of interacting conscious agents. This allows us to reinterpret physical properties such as position, momentum, and energy as properties of interacting conscious agents, rather than as preexisting physical truths. We sketch how this approach might extend to the perception of relativistic quantum objects, and to classical objects of macroscopic scale.

  6. The probability of object-scene co-occurrence influences object identification processes.

    Science.gov (United States)

    Sauvé, Geneviève; Harmand, Mariane; Vanni, Léa; Brodeur, Mathieu B

    2017-07-01

    Contextual information allows the human brain to make predictions about the identity of objects that might be seen and irregularities between an object and its background slow down perception and identification processes. Bar and colleagues modeled the mechanisms underlying this beneficial effect suggesting that the brain stocks information about the statistical regularities of object and scene co-occurrence. Their model suggests that these recurring regularities could be conceptualized along a continuum in which the probability of seeing an object within a given scene can be high (probable condition), moderate (improbable condition) or null (impossible condition). In the present experiment, we propose to disentangle the electrophysiological correlates of these context effects by directly comparing object-scene pairs found along this continuum. We recorded the event-related potentials of 30 healthy participants (18-34 years old) and analyzed their brain activity in three time windows associated with context effects. We observed anterior negativities between 250 and 500 ms after object onset for the improbable and impossible conditions (improbable more negative than impossible) compared to the probable condition as well as a parieto-occipital positivity (improbable more positive than impossible). The brain may use different processing pathways to identify objects depending on whether the probability of co-occurrence with the scene is moderate (rely more on top-down effects) or null (rely more on bottom-up influences). The posterior positivity could index error monitoring aimed to ensure that no false information is integrated into mental representations of the world.

  7. The follicular variant of papillary thyroid carcinoma: Characteristics of preoperative ultrasonography and cytology

    International Nuclear Information System (INIS)

    Yoon, Jung Hyun; Kwon, Hyeong Ju; Kim, Eun Kyung; Moon, Hee Jung; Kwak, Jin Young

    2016-01-01

    The goal of this study was to validate the ultrasonography (US) and cytopathological features that are used in the diagnosis of the follicular variant of papillary thyroid carcinoma (FVPTC) and to characterize the role of BRAFV600E mutation analysis in the diagnosis of FVPTC. From May 2012 to February 2014, 40 thyroid nodules from 40 patients (mean age, 56.2 years; range, 26 to 81 years) diagnosed with FVPTC were included in this study. The US features of the nodules were analyzed and the nodules were classified as probably benign or suspicious for malignancy. Twenty-three thyroid nodules (57.5%) underwent BRAFV600E mutation analysis. Clinical information and histopathologic results were obtained by reviewing the medical records of the patients. Thirty nodules (75.0%) were classified as suspicious for malignancy, while 10 (25.0%) were classified as probably benign. Seven of the eight nodules (87.5%) with atypia of undetermined significance/follicular lesion of undetermined significance (AUS/FLUS) cytology showed suspicious US features, while one of the two nodules (50.0%) with follicular neoplasm cytology presented suspicious US features. Five of the 23 nodules (21.7%) that underwent BRAFV600E mutation analysis had positive results, all of which were diagnosed as suspicious for malignancy or malignant based on cytology. None of the nodules with benign, AUS/FLUS, or follicular neoplasm cytology were positive for the BRAFV600E mutation. US features allow nodules to be classified as suspicious for malignancy, and the presence of suspicious US features in nodules with ambiguous cytology may aid in the diagnosis of FVPTC. BRAFV600E mutation analysis is of limited value in the diagnosis of FVPTC

  8. The follicular variant of papillary thyroid carcinoma: Characteristics of preoperative ultrasonography and cytology

    Energy Technology Data Exchange (ETDEWEB)

    Yoon, Jung Hyun; Kwon, Hyeong Ju; Kim, Eun Kyung; Moon, Hee Jung; Kwak, Jin Young [Severance Hospital, Yonsei University College of Medicine, Seoul (Korea, Republic of)

    2016-01-15

    The goal of this study was to validate the ultrasonography (US) and cytopathological features that are used in the diagnosis of the follicular variant of papillary thyroid carcinoma (FVPTC) and to characterize the role of BRAFV600E mutation analysis in the diagnosis of FVPTC. From May 2012 to February 2014, 40 thyroid nodules from 40 patients (mean age, 56.2 years; range, 26 to 81 years) diagnosed with FVPTC were included in this study. The US features of the nodules were analyzed and the nodules were classified as probably benign or suspicious for malignancy. Twenty-three thyroid nodules (57.5%) underwent BRAFV600E mutation analysis. Clinical information and histopathologic results were obtained by reviewing the medical records of the patients. Thirty nodules (75.0%) were classified as suspicious for malignancy, while 10 (25.0%) were classified as probably benign. Seven of the eight nodules (87.5%) with atypia of undetermined significance/follicular lesion of undetermined significance (AUS/FLUS) cytology showed suspicious US features, while one of the two nodules (50.0%) with follicular neoplasm cytology presented suspicious US features. Five of the 23 nodules (21.7%) that underwent BRAFV600E mutation analysis had positive results, all of which were diagnosed as suspicious for malignancy or malignant based on cytology. None of the nodules with benign, AUS/FLUS, or follicular neoplasm cytology were positive for the BRAFV600E mutation. US features allow nodules to be classified as suspicious for malignancy, and the presence of suspicious US features in nodules with ambiguous cytology may aid in the diagnosis of FVPTC. BRAFV600E mutation analysis is of limited value in the diagnosis of FVPTC.

  9. Piles of objects

    KAUST Repository

    Hsu, Shu-Wei

    2010-01-01

    We present a method for directly modeling piles of objects in multi-body simulations. Piles of objects represent some of the more interesting, but also most time-consuming portion of simulation. We propose a method for reducing computation in many of these situations by explicitly modeling the piles that the objects may form into. By modeling pile behavior rather than the behavior of all individual objects, we can achieve realistic results in less time, and without directly modeling the frictional component that leads to desired pile shapes. Our method is simple to implement and can be easily integrated with existing rigid body simulations. We observe notable speedups in several rigid body examples, and generate a wider variety of piled structures than possible with strict impulse-based simulation. © 2010 ACM.

  10. Part Objects and Their Location

    DEFF Research Database (Denmark)

    Madsen, Ole Lehrmann; Møller-Pedersen, Birger

    1992-01-01

    The notion of location of part objects is introduced, yielding a reference to the containing object. Combined with locally defined objects and classes (block structure), singularly defined part objects, and references to part objects, it is a powerful language mechanism for defining objects...

  11. Object-Oriented Plan Representation for the OMWG C2 Object Schema

    National Research Council Canada - National Science Library

    Reeves, Robert

    1997-01-01

    .... Chapter II discusses the theory and practice of modern Object Oriented modeling. The structure and conventions of object programming are covered as well as a method for information system abstraction...

  12. Object permanence in lemurs.

    Science.gov (United States)

    Deppe, Anja M; Wright, Patricia C; Szelistowski, William A

    2009-03-01

    Object permanence, the ability to mentally represent objects that have disappeared from view, should be advantageous to animals in their interaction with the natural world. The objective of this study was to examine whether lemurs possess object permanence. Thirteen adult subjects representing four species of diurnal lemur (Eulemur fulvus rufus, Eulemur mongoz, Lemur catta and Hapalemur griseus) were presented with seven standard Piagetian visible and invisible object displacement tests, plus one single visible test where the subject had to wait predetermined times before allowed to search, and two invisible tests where each hiding place was made visually unique. In all visible tests lemurs were able to find an object that had been in clear view before being hidden. However, when lemurs were not allowed to search for up to 25-s, performance declined with increasing time-delay. Subjects did not outperform chance on any invisible displacements regardless of whether hiding places were visually uniform or unique, therefore the upper limit of object permanence observed was Stage 5b. Lemur species in this study eat stationary foods and are not subject to stalking predators, thus Stage 5 object permanence is probably sufficient to solve most problems encountered in the wild.

  13. The visual extent of an object: suppose we know the object locations

    NARCIS (Netherlands)

    Uijlings, J.R.R.; Smeulders, A.W.M.; Scha, R.J.H.

    2012-01-01

    The visual extent of an object reaches beyond the object itself. This is a long standing fact in psychology and is reflected in image retrieval techniques which aggregate statistics from the whole image in order to identify the object within. However, it is unclear to what degree and how the visual

  14. An Introduction to Object-Oriented Programming with a Didactic Microworld: "objectKarel"

    Science.gov (United States)

    Xinogalos, Stelios; Satratzemi, Maya; Dagdilelis, Vassilios

    2006-01-01

    The objects-first strategy to teaching programming has prevailed over the imperative-first and functional-first strategies during the last decade. However, the objects-first strategy has created added difficulties to both the teaching and learning of programming. In an attempt to confront these difficulties and support the objects-first strategy…

  15. Factors that influence disclosure of hearing loss in the workplace.

    Science.gov (United States)

    Southall, Kenneth; Jennings, Mary Beth; Gagné, Jean-Pierre

    2011-10-01

    The objective of the study was to identify factors that lead individuals to conceal or disclose their hearing loss in the workplace. A qualitative research paradigm called qualitative description was selected to address this issue. Twelve people who had an adult onset hearing loss, and were gainfully employed, participated in audio-recorded semi-structured interviews designed to probe issues related to disclosure of hearing loss. A photo elicitation interview technique was employed during the interviews. Content analyses were used to extract pertinent information from verbatim transcripts. Five recurring themes emerged as important considerations in relation to this topic: (1) perceived importance of the situation; (2) perceived sense of control; (3) community affiliation; (4) burden of communication; and (5) coexisting issues related to hearing loss. The findings are discussed in relation to other concealable stigmatizing traits, stigma-theory, and social-cognitive theory. The clinical implications of these findings are discussed, with particular emphasis placed on worker self-efficacy.

  16. Neural substrates of view-invariant object recognition developed without experiencing rotations of the objects.

    Science.gov (United States)

    Okamura, Jun-Ya; Yamaguchi, Reona; Honda, Kazunari; Wang, Gang; Tanaka, Keiji

    2014-11-05

    One fails to recognize an unfamiliar object across changes in viewing angle when it must be discriminated from similar distractor objects. View-invariant recognition gradually develops as the viewer repeatedly sees the objects in rotation. It is assumed that different views of each object are associated with one another while their successive appearance is experienced in rotation. However, natural experience of objects also contains ample opportunities to discriminate among objects at each of the multiple viewing angles. Our previous behavioral experiments showed that after experiencing a new set of object stimuli during a task that required only discrimination at each of four viewing angles at 30° intervals, monkeys could recognize the objects across changes in viewing angle up to 60°. By recording activities of neurons from the inferotemporal cortex after various types of preparatory experience, we here found a possible neural substrate for the monkeys' performance. For object sets that the monkeys had experienced during the task that required only discrimination at each of four viewing angles, many inferotemporal neurons showed object selectivity covering multiple views. The degree of view generalization found for these object sets was similar to that found for stimulus sets with which the monkeys had been trained to conduct view-invariant recognition. These results suggest that the experience of discriminating new objects in each of several viewing angles develops the partially view-generalized object selectivity distributed over many neurons in the inferotemporal cortex, which in turn bases the monkeys' emergent capability to discriminate the objects across changes in viewing angle. Copyright © 2014 the authors 0270-6474/14/3415047-13$15.00/0.

  17. Functional Object Analysis

    DEFF Research Database (Denmark)

    Raket, Lars Lau

    We propose a direction it the field of statistics which we will call functional object analysis. This subfields considers the analysis of functional objects defined on continuous domains. In this setting we will focus on model-based statistics, with a particularly emphasis on mixed......-effect formulations, where the observed functional signal is assumed to consist of both fixed and random functional effects. This thesis takes the initial steps toward the development of likelihood-based methodology for functional objects. We first consider analysis of functional data defined on high...

  18. A rigorous analysis of high-order electromagnetic invisibility cloaks

    International Nuclear Information System (INIS)

    Weder, Ricardo

    2008-01-01

    There is currently a great deal of interest in the invisibility cloaks recently proposed by Pendry et al that are based on the transformation approach. They obtained their results using first-order transformations. In recent papers, Hendi et al and Cai et al considered invisibility cloaks with high-order transformations. In this paper, we study high-order electromagnetic invisibility cloaks in transformation media obtained by high-order transformations from general anisotropic media. We consider the case where there is a finite number of spherical cloaks located in different points in space. We prove that for any incident plane wave, at any frequency, the scattered wave is identically zero. We also consider the scattering of finite-energy wave packets. We prove that the scattering matrix is the identity, i.e., that for any incoming wave packet the outgoing wave packet is the same as the incoming one. This proves that the invisibility cloaks cannot be detected in any scattering experiment with electromagnetic waves in high-order transformation media, and in particular in the first-order transformation media of Pendry et al. We also prove that the high-order invisibility cloaks, as well as the first-order ones, cloak passive and active devices. The cloaked objects completely decouple from the exterior. Actually, the cloaking outside is independent of what is inside the cloaked objects. The electromagnetic waves inside the cloaked objects cannot leave the concealed regions and vice versa, the electromagnetic waves outside the cloaked objects cannot go inside the concealed regions. As we prove our results for media that are obtained by transformation from general anisotropic materials, we prove that it is possible to cloak objects inside general crystals

  19. Gamifying Video Object Segmentation.

    Science.gov (United States)

    Spampinato, Concetto; Palazzo, Simone; Giordano, Daniela

    2017-10-01

    Video object segmentation can be considered as one of the most challenging computer vision problems. Indeed, so far, no existing solution is able to effectively deal with the peculiarities of real-world videos, especially in cases of articulated motion and object occlusions; limitations that appear more evident when we compare the performance of automated methods with the human one. However, manually segmenting objects in videos is largely impractical as it requires a lot of time and concentration. To address this problem, in this paper we propose an interactive video object segmentation method, which exploits, on one hand, the capability of humans to identify correctly objects in visual scenes, and on the other hand, the collective human brainpower to solve challenging and large-scale tasks. In particular, our method relies on a game with a purpose to collect human inputs on object locations, followed by an accurate segmentation phase achieved by optimizing an energy function encoding spatial and temporal constraints between object regions as well as human-provided location priors. Performance analysis carried out on complex video benchmarks, and exploiting data provided by over 60 users, demonstrated that our method shows a better trade-off between annotation times and segmentation accuracy than interactive video annotation and automated video object segmentation approaches.

  20. Piles of objects

    KAUST Repository

    Hsu, Shu-Wei; Keyser, John

    2010-01-01

    We present a method for directly modeling piles of objects in multi-body simulations. Piles of objects represent some of the more interesting, but also most time-consuming portion of simulation. We propose a method for reducing computation in many

  1. Object similarity affects the perceptual strategy underlying invariant visual object recognition in rats

    Directory of Open Access Journals (Sweden)

    Federica Bianca Rosselli

    2015-03-01

    Full Text Available In recent years, a number of studies have explored the possible use of rats as models of high-level visual functions. One central question at the root of such an investigation is to understand whether rat object vision relies on the processing of visual shape features or, rather, on lower-order image properties (e.g., overall brightness. In a recent study, we have shown that rats are capable of extracting multiple features of an object that are diagnostic of its identity, at least when those features are, structure-wise, distinct enough to be parsed by the rat visual system. In the present study, we have assessed the impact of object structure on rat perceptual strategy. We trained rats to discriminate between two structurally similar objects, and compared their recognition strategies with those reported in our previous study. We found that, under conditions of lower stimulus discriminability, rat visual discrimination strategy becomes more view-dependent and subject-dependent. Rats were still able to recognize the target objects, in a way that was largely tolerant (i.e., invariant to object transformation; however, the larger structural and pixel-wise similarity affected the way objects were processed. Compared to the findings of our previous study, the patterns of diagnostic features were: i smaller and more scattered; ii only partially preserved across object views; and iii only partially reproducible across rats. On the other hand, rats were still found to adopt a multi-featural processing strategy and to make use of part of the optimal discriminatory information afforded by the two objects. Our findings suggest that, as in humans, rat invariant recognition can flexibly rely on either view-invariant representations of distinctive object features or view-specific object representations, acquired through learning.

  2. Objectivity And Moral Relativism

    OpenAIRE

    Magni, Sergio Filippo

    2017-01-01

    The relativity of morals has usually been taken as an argument against the objectivity of ethics. However, a more careful analysis can show that there are forms of moral objectivism which have relativistic implications, and that moral relativism can be compatible with the objectivity of ethics. Such an objectivity is not always in contrast to moral relativism and it is possible to be relativists without having to give up the claim of objectivity in ethics

  3. Usage of Probabilistic and General Regression Neural Network for Early Detection and Prevention of Oral Cancer

    OpenAIRE

    Sharma, Neha; Om, Hari

    2015-01-01

    In India, the oral cancers are usually presented in advanced stage of malignancy. It is critical to ascertain the diagnosis in order to initiate most advantageous treatment of the suspicious lesions. The main hurdle in appropriate treatment and control of oral cancer is identification and risk assessment of early disease in the community in a cost-effective fashion. The objective of this research is to design a data mining model using probabilistic neural network and general regression neural...

  4. Repurposing learning object components

    NARCIS (Netherlands)

    Verbert, K.; Jovanovic, J.; Gasevic, D.; Duval, E.; Meersman, R.

    2005-01-01

    This paper presents an ontology-based framework for repurposing learning object components. Unlike the usual practice where learning object components are assembled manually, the proposed framework enables on-the-fly access and repurposing of learning object components. The framework supports two

  5. Redactions in protocols for drug trials: what industry sponsors concealed.

    Science.gov (United States)

    Marquardsen, Mikkel; Ogden, Michelle; Gøtzsche, Peter C

    2018-04-01

    Objective To describe the redactions in contemporary protocols for industry-sponsored randomised drug trials with patient relevant outcomes and to evaluate whether there was a legitimate rationale for the redactions. Design Cohort study. Under the Freedom of Information Act, we requested access to trial protocols approved by a research ethics committee in Denmark from October 2012 to March 2013. We received 17 consecutive protocols, which had been redacted before we got them, and nine protocols without redactions. In five additional cases, the companies refused to let the committees give us access, and in three other cases, documents were missing. Participants Not applicable. Setting Not applicable. Main outcome measure Amount and nature of redactions in 22 predefined key protocol variables. Results The redactions were most widespread in those sections of the protocol where there is empirical evidence of substantial problems with the trustworthiness of published drug trials: data analysis, handling of missing data, detection and analysis of adverse events, definition of the outcomes, interim analyses and premature termination of the study, sponsor's access to incoming data while the study is running, ownership to the data and investigators' publication rights. The parts of the text that were redacted differed widely, both between companies and within the same company. Conclusions We could not identify any legitimate rationale for the redactions. The current mistrust in industry-sponsored drug trials can only change if the industry offers unconditional access to its trial protocols and other relevant documents and data.

  6. Tracking multiple objects is limited only by object spacing, not by speed, time, or capacity.

    Science.gov (United States)

    Franconeri, S L; Jonathan, S V; Scimeca, J M

    2010-07-01

    In dealing with a dynamic world, people have the ability to maintain selective attention on a subset of moving objects in the environment. Performance in such multiple-object tracking is limited by three primary factors-the number of objects that one can track, the speed at which one can track them, and how close together they can be. We argue that this last limit, of object spacing, is the root cause of all performance constraints in multiple-object tracking. In two experiments, we found that as long as the distribution of object spacing is held constant, tracking performance is unaffected by large changes in object speed and tracking time. These results suggest that barring object-spacing constraints, people could reliably track an unlimited number of objects as fast as they could track a single object.

  7. Visual object recognition and tracking

    Science.gov (United States)

    Chang, Chu-Yin (Inventor); English, James D. (Inventor); Tardella, Neil M. (Inventor)

    2010-01-01

    This invention describes a method for identifying and tracking an object from two-dimensional data pictorially representing said object by an object-tracking system through processing said two-dimensional data using at least one tracker-identifier belonging to the object-tracking system for providing an output signal containing: a) a type of the object, and/or b) a position or an orientation of the object in three-dimensions, and/or c) an articulation or a shape change of said object in said three dimensions.

  8. Credit assignment between body and object probed by an object transportation task.

    Science.gov (United States)

    Kong, Gaiqing; Zhou, Zhihao; Wang, Qining; Kording, Konrad; Wei, Kunlin

    2017-10-17

    It has been proposed that learning from movement errors involves a credit assignment problem: did I misestimate properties of the object or those of my body? For example, an overestimate of arm strength and an underestimate of the weight of a coffee cup can both lead to coffee spills. Though previous studies have found signs of simultaneous learning of the object and of the body during object manipulation, there is little behavioral evidence about their quantitative relation. Here we employed a novel weight-transportation task, in which participants lift the first cup filled with liquid while assessing their learning from errors. Specifically, we examined their transfer of learning when switching to a contralateral hand, the second identical cup, or switching both hands and cups. By comparing these transfer behaviors, we found that 25% of the learning was attributed to the object (simply because of the use of the same cup) and 58% of the learning was attributed to the body (simply because of the use of the same hand). The nervous system thus seems to partition the learning of object manipulation between the object and the body.

  9. Associations Between Secret-Keeping and Quality of Life in Older Adults.

    Science.gov (United States)

    Maas, Joyce; Wismeijer, Andreas A J; Van Assen, Marcel A L M

    2018-01-01

    This study examined the effects of secrecy on quality of life in a sample consisting of older adults (>50 years; N = 301). Three key components of secrecy were examined with the Tilburg Secrecy Scale-25 (TSS25; possession of a secret, self-concealment, and cognitive preoccupation). The TSS25 distinguishes between the tendency to conceal personal information (self-concealment) and the tendency to worry or ruminate about the secret (cognitive preoccupation), thereby enabling investigation of the effects of secrecy on quality of life in detail. Confirming previous findings in younger samples, we found a positive effect of possession of a secret on quality of life, after controlling for both TSS25's self-concealment and cognitive preoccupation. This suggests that keeping secrets may have a positive association with quality of life in older adults as well, as long as they do not have the tendency to self-conceal and are not cognitively preoccupied with their secret.

  10. Cloaks and antiobject-independent illusion optics based on illusion media

    Science.gov (United States)

    Li, Zhou; Zang, XiaoFei; Cai, Bin; Shi, Cheng; Zhu, YiMing

    2013-11-01

    Based on the transformation optics, we propose a new strategy of illusion media consisting of homogeneous and anisotropic materials. By utilizing the illusion media, invisible cloak is theoretically realized, in which objects covered with the illusion media could not be detected. The cloak here allows neither the propagation of light around the concealed region nor compensates the scattering field of object outside the media. What the cloak does is to shift the region into another place where outside the trace of light, so that objects in that region can disappear. Another application of the illusion media is to create the antiobject-independent illusion optics which means that two objects appear to be like some other objects of our choice. Finite element simulations for two-dimensional cases have been performed to prove these ideas.

  11. Survivability via Control Objectives

    Energy Technology Data Exchange (ETDEWEB)

    CAMPBELL,PHILIP L.

    2000-08-11

    Control objectives open an additional front in the survivability battle. A given set of control objectives is valuable if it represents good practices, it is complete (it covers all the necessary areas), and it is auditable. CobiT and BS 7799 are two examples of control objective sets.

  12. Prospective comparison of T2w-MRI and dynamic-contrast-enhanced MRI, 3D-MR spectroscopic imaging or diffusion-weighted MRI in repeat TRUS-guided biopsies

    Energy Technology Data Exchange (ETDEWEB)

    Portalez, Daniel [Clinique Pasteur, 45, Department of Radiology, Toulouse (France); Rollin, Gautier; Mouly, Patrick; Jonca, Frederic; Malavaud, Bernard [Hopital de Rangueil, Department of Urology, Toulouse Cedex 9 (France); Leandri, Pierre [Clinique Saint Jean, 20, Department of Urology, Toulouse (France); Elman, Benjamin [Clinique Pasteur, 45, Department of Urology, Toulouse (France)

    2010-12-15

    To compare T2-weighted MRI and functional MRI techniques in guiding repeat prostate biopsies. Sixty-eight patients with a history of negative biopsies, negative digital rectal examination and elevated PSA were imaged before repeat biopsies. Dichotomous criteria were used with visual validation of T2-weighted MRI, dynamic contrast-enhanced MRI and literature-derived cut-offs for 3D-spectroscopy MRI (choline-creatine-to-citrate ratio >0.86) and diffusion-weighted imaging (ADC x 10{sup 3} mm{sup 2}/s < 1.24). For each segment and MRI technique, results were rendered as being suspicious/non-suspicious for malignancy. Sextant biopsies, transition zone biopsies and at least two additional biopsies of suspicious areas were taken. In the peripheral zones, 105/408 segments and in the transition zones 19/136 segments were suspicious according to at least one MRI technique. A total of 28/68 (41.2%) patients were found to have cancer. Diffusion-weighted imaging exhibited the highest positive predictive value (0.52) compared with T2-weighted MRI (0.29), dynamic contrast-enhanced MRI (0.33) and 3D-spectroscopy MRI (0.25). Logistic regression showed the probability of cancer in a segment increasing 12-fold when T2-weighted and diffusion-weighted imaging MRI were both suspicious (63.4%) compared with both being non-suspicious (5.2%). The proposed system of analysis and reporting could prove clinically relevant in the decision whether to repeat targeted biopsies. (orig.)

  13. Object recognition memory in zebrafish.

    Science.gov (United States)

    May, Zacnicte; Morrill, Adam; Holcombe, Adam; Johnston, Travis; Gallup, Joshua; Fouad, Karim; Schalomon, Melike; Hamilton, Trevor James

    2016-01-01

    The novel object recognition, or novel-object preference (NOP) test is employed to assess recognition memory in a variety of organisms. The subject is exposed to two identical objects, then after a delay, it is placed back in the original environment containing one of the original objects and a novel object. If the subject spends more time exploring one object, this can be interpreted as memory retention. To date, this test has not been fully explored in zebrafish (Danio rerio). Zebrafish possess recognition memory for simple 2- and 3-dimensional geometrical shapes, yet it is unknown if this translates to complex 3-dimensional objects. In this study we evaluated recognition memory in zebrafish using complex objects of different sizes. Contrary to rodents, zebrafish preferentially explored familiar over novel objects. Familiarity preference disappeared after delays of 5 mins. Leopard danios, another strain of D. rerio, also preferred the familiar object after a 1 min delay. Object preference could be re-established in zebra danios by administration of nicotine tartrate salt (50mg/L) prior to stimuli presentation, suggesting a memory-enhancing effect of nicotine. Additionally, exploration biases were present only when the objects were of intermediate size (2 × 5 cm). Our results demonstrate zebra and leopard danios have recognition memory, and that low nicotine doses can improve this memory type in zebra danios. However, exploration biases, from which memory is inferred, depend on object size. These findings suggest zebrafish ecology might influence object preference, as zebrafish neophobia could reflect natural anti-predatory behaviour. Copyright © 2015 Elsevier B.V. All rights reserved.

  14. Exhibiting Epistemic Objects

    DEFF Research Database (Denmark)

    Tybjerg, Karin

    2017-01-01

    of exhibiting epistemic objects that utilize their knowledge-generating potential and allow them to continue to stimulate curiosity and generate knowledge in the exhibition. The epistemic potential of the objects can then be made to work together with the function of the exhibition as a knowledge-generating set...

  15. Objects of Desire.

    Science.gov (United States)

    Zielinski, Dave

    2000-01-01

    Describes learning objects, also known as granules, chunks, or information nuggets, and likens them to help screens. Discusses concerns about how they can go wrong: (1) faulty pretest questions; (2) missing links in the learning object chain; (3) poor frames of reference; and (4) lack of customization. (JOW)

  16. Projekt objektu dřevostavby

    OpenAIRE

    Václavek, Lukáš

    2015-01-01

    This thesis deals with drafting a residential building wood based on existing supermar-ket which is located on a plot placement - concealed in the village Omice. According to the location of the parcel has been designed layout and shape solutions objectively. The next step was to propose design solutions and their compositions with the assessed thermal solution. Peripheral construction of residential house was assessed according to ČSN 730540 proposed residential building study documentation ...

  17. Differential Privacy and Machine Learning: a Survey and Review

    OpenAIRE

    Ji, Zhanglong; Lipton, Zachary C.; Elkan, Charles

    2014-01-01

    The objective of machine learning is to extract useful information from data, while privacy is preserved by concealing information. Thus it seems hard to reconcile these competing interests. However, they frequently must be balanced when mining sensitive data. For example, medical research represents an important application where it is necessary both to extract useful information and protect patient privacy. One way to resolve the conflict is to extract general characteristics of whole popul...

  18. Minimum Delay Moving Object Detection

    KAUST Repository

    Lao, Dong

    2017-11-09

    We present a general framework and method for detection of an object in a video based on apparent motion. The object moves relative to background motion at some unknown time in the video, and the goal is to detect and segment the object as soon it moves in an online manner. Due to unreliability of motion between frames, more than two frames are needed to reliably detect the object. Our method is designed to detect the object(s) with minimum delay, i.e., frames after the object moves, constraining the false alarms. Experiments on a new extensive dataset for moving object detection show that our method achieves less delay for all false alarm constraints than existing state-of-the-art.

  19. Minimum Delay Moving Object Detection

    KAUST Repository

    Lao, Dong

    2017-01-08

    We present a general framework and method for detection of an object in a video based on apparent motion. The object moves relative to background motion at some unknown time in the video, and the goal is to detect and segment the object as soon it moves in an online manner. Due to unreliability of motion between frames, more than two frames are needed to reliably detect the object. Our method is designed to detect the object(s) with minimum delay, i.e., frames after the object moves, constraining the false alarms. Experiments on a new extensive dataset for moving object detection show that our method achieves less delay for all false alarm constraints than existing state-of-the-art.

  20. Minimum Delay Moving Object Detection

    KAUST Repository

    Lao, Dong; Sundaramoorthi, Ganesh

    2017-01-01

    We present a general framework and method for detection of an object in a video based on apparent motion. The object moves relative to background motion at some unknown time in the video, and the goal is to detect and segment the object as soon it moves in an online manner. Due to unreliability of motion between frames, more than two frames are needed to reliably detect the object. Our method is designed to detect the object(s) with minimum delay, i.e., frames after the object moves, constraining the false alarms. Experiments on a new extensive dataset for moving object detection show that our method achieves less delay for all false alarm constraints than existing state-of-the-art.

  1. Object 'Ukryttya' 1986-2006

    International Nuclear Information System (INIS)

    Klyuchnikov, A.A.; Krasnov, V.A.; Rud'ko, V.M.; Shcherbin, V.N.

    2006-01-01

    This monograph summarizes the materials pertaining to 'Ukryttya' Object state. The results of researches of fuel containing materials conditions and of forecast of their future behavior are demonstrated, aerosol characterizations, mechanisms of production of liquid radioactive waste, radiation conditions at SO industrial site and NSC assembly site, as well as analysis of 'Ukryttya' Objects environmental impact, are performed. The conditions of 'Ukryttya' Object building structures are described. Preparation and realization of international projects for conversion of 'Ukryttya' Object into an ecologically safe system, including the 'Ukryttya' Implementation Plan (SIP), are considered

  2. Abstract Objects of Verbs

    DEFF Research Database (Denmark)

    2014-01-01

    Verbs do often take arguments of quite different types. In an orthodox type-theoretic framework this results in an extreme polysemy of many verbs. In this article, it is shown that this unwanted consequence can be avoided when a theory of "abstract objects" is adopted according to which...... these objects represent non-objectual entities in contexts from which they are excluded by type restrictions. Thus these objects are "abstract'' in a functional rather than in an ontological sense: they function as representatives of other entities but they are otherwise quite normal objects. Three examples...

  3. The significance of enlarged cervical lymph nodes in diagnosing thyroid cancer

    Directory of Open Access Journals (Sweden)

    Hossam Eldin Mohamed

    2016-01-01

    Conclusion: ECLN are associated with an increased likelihood of thyroid malignancy in the patients undergoing evaluation of a suspicious nodule. The risk of malignancy in thyroid nodules increases with the presence of suspicious ultrasonographic features on cervical lymph nodes.

  4. Object-Oriented Type Systems

    DEFF Research Database (Denmark)

    Schwartzbach, Michael Ignatieff; Palsberg, Jens

    a type system that generalizes and explains them. The theory is based on an idealized object-oriented language called BOPL (Basic Object Programming Language), containing common features of the above languages. A type system, type inference algorithm, and typings of inheritance and genericity......Object-Oriented Type Systems Jens Palsberg and Michael I. Schwartzbach Aarhus University, Denmark Type systems are required to ensure reliability and efficiency of software. For object-oriented languages, typing is an especially challenging problem because of inheritance, assignment, and late...... are provided for BOPL. Throughout, the results are related to the languages on which BOPL is based. This text offers advanced undergraduates and professional software developers a sound understanding of the key aspects of object-oriented type systems. All algorithms are implemented in a freely available...

  5. CODAS object monitoring service

    International Nuclear Information System (INIS)

    Wheatley, M.R.; Rainford, M.

    2001-01-01

    The primary Control and Data Acquisition System (CODAS) of JET is based on a TCP/IP network of more than 150 computers. The CODAS computers provide the JET machine control and data acquisition for over 70,000 digital and analog signals. The Object Monitoring Service (OMS) is used by applications for monitoring objects for presentation to the JET machine operators and for the operation of individual software components (such as valve state, access control, mimic definition changes and internal data distribution). Each server typically handles connections from around 60 clients monitoring upwards of 2000 objects. Some servers have over 150 clients and 5000 objects. Acquisition libraries are dynamically linked into a running server as required either to acquire data values for objects or to forward requests to other OMS servers. A mechanism involving dynamic linking allows new libraries to be integrated without stopping or changing running software. OMS provides a very reliable and highly successful 'data-type independent' means of monitoring many different objects. It allows applications to take advantage of new data sources, without the need to change existing code

  6. Connection-based and object-based grouping in multiple-object tracking: A developmental study.

    Science.gov (United States)

    Van der Hallen, Ruth; Reusens, Julie; Evers, Kris; de-Wit, Lee; Wagemans, Johan

    2018-03-30

    Developmental research on Gestalt laws has previously revealed that, even as young as infancy, we are bound to group visual elements into unitary structures in accordance with a variety of organizational principles. Here, we focus on the developmental trajectory of both connection-based and object-based grouping, and investigate their impact on object formation in participants, aged 9-21 years old (N = 113), using a multiple-object tracking paradigm. Results reveal a main effect of both age and grouping type, indicating that 9- to 21-year-olds are sensitive to both connection-based and object-based grouping interference, and tracking ability increases with age. In addition to its importance for typical development, these results provide an informative baseline to understand clinical aberrations in this regard. Statement of contribution What is already known on this subject? The origin of the Gestalt principles is still an ongoing debate: Are they innate, learned over time, or both? Developmental research has revealed how each Gestalt principle has its own trajectory and unique relationship to visual experience. Both connectedness and object-based grouping play an important role in object formation during childhood. What does this study add? The study identifies how sensitivity to connectedness and object-based grouping evolves in individuals, aged 9-21 years old. Using multiple-object tracking, results reveal that the ability to track multiple objects increases with age. These results provide an informative baseline to understand clinical aberrations in different types of grouping. © 2018 The Authors. British Journal of Developmental Psychology published by John Wiley & Sons Ltd on behalf of British Psychological Society.

  7. Nuclear Energy General Objectives

    International Nuclear Information System (INIS)

    2011-01-01

    One of the IAEA's statutory objectives is to 'seek to accelerate and enlarge the contribution of atomic energy to peace, health and prosperity throughout the world'. One way it achieves this objective is to issue publications in various series. Two of these series are the IAEA Nuclear Energy Series and the IAEA Safety Standards Series. According to Article III, paragraph A.6, of the IAEA Statute, the IAEA safety standards establish 'standards of safety for protection of health and minimization of danger to life and property.' The safety standards include the Safety Fundamentals, Safety Requirements and Safety Guides. These standards are primarily written in a regulatory style, and are binding on the IAEA for its own activities. The principal users are Member State regulatory bodies and other national authorities. The IAEA Nuclear Energy Series consists of reports designed to encourage and assist research on, and development and practical application of, nuclear energy for peaceful uses. This includes practical examples to be used by owners and operators of utilities in Member States, implementing organizations, academia and politicians, among others. The information is presented in guides, reports on the status of technology and advances, and best practices for peaceful uses of nuclear energy based on inputs from international experts. The series complements the IAEA's safety standards, and provides detailed guidance, experience, good practices and examples on the five areas covered in the IAEA Nuclear Energy Series. The Nuclear Energy Basic Principles is the highest level publication in the IAEA Nuclear Energy Series and describes the rationale and vision for the peaceful uses of nuclear energy. It presents eight Basic Principles on which nuclear energy systems should be based to fulfil nuclear energy's potential to help meet growing global energy needs. The Nuclear Energy Series Objectives are the second level publications. They describe what needs to be

  8. Characteristics and identification of sites of chagasic ventricular tachycardia by endocardial mapping

    Directory of Open Access Journals (Sweden)

    Távora Maria Zildany P.

    1999-01-01

    Full Text Available OBJECTIVE: To study electrophysiological characteristics that enable the identification and ablation of sites of chagasic tachycardia. METHODS: Thirty-one patients with chronic Chagas' heart disease and sustained ventricular tachycardia (SVT underwent electrophysiological study to map and ablate that arrhythmia. Fifteen patients had hemodinamically stable SVT reproducible by programmed ventricular stimulation, 9 men and 6 women with ages ranging from 37 to 67 years and ejection fraction varying from 0.17 to 0.64. Endocardial mapping was performed during SVT in all patients. Radiofrequency (RF current was applied to sites of presystolic activity of at least 30 ms. Entrainment was used to identify reentrant circuits. In both successful and unsuccessful sites of RF current application, electrogram and entrainment were analyzed. RESULTS: Entrainment was obtained during all mapped SVT. In 70.5% of the sites we observed concealed entrainment and ventricular tachycardia termination in the first 15 seconds of RF current application. In the unsuccessful sites, significantly earlier electrical activity was seen than in the successful ones. Concealed entrainment was significantly associated with ventricular tachycardia termination. Bystander areas were not observed. CONCLUSION: The reentrant mechanism was responsible for the genesis of all tachycardias. In 70.5% of the studied sites, the endocardial participation of the slow conducting zone of reentrant circuits was shown. Concealed entrainment was the main electrophysiological parameter associated with successful RF current application. There was no electrophysiological evidence of bystander regions in the mapped circuits of SVT.

  9. How learning might strengthen existing visual object representations in human object-selective cortex.

    Science.gov (United States)

    Brants, Marijke; Bulthé, Jessica; Daniels, Nicky; Wagemans, Johan; Op de Beeck, Hans P

    2016-02-15

    Visual object perception is an important function in primates which can be fine-tuned by experience, even in adults. Which factors determine the regions and the neurons that are modified by learning is still unclear. Recently, it was proposed that the exact cortical focus and distribution of learning effects might depend upon the pre-learning mapping of relevant functional properties and how this mapping determines the informativeness of neural units for the stimuli and the task to be learned. From this hypothesis we would expect that visual experience would strengthen the pre-learning distributed functional map of the relevant distinctive object properties. Here we present a first test of this prediction in twelve human subjects who were trained in object categorization and differentiation, preceded and followed by a functional magnetic resonance imaging session. Specifically, training increased the distributed multi-voxel pattern information for trained object distinctions in object-selective cortex, resulting in a generalization from pre-training multi-voxel activity patterns to after-training activity patterns. Simulations show that the increased selectivity combined with the inter-session generalization is consistent with a training-induced strengthening of a pre-existing selectivity map. No training-related neural changes were detected in other regions. In sum, training to categorize or individuate objects strengthened pre-existing representations in human object-selective cortex, providing a first indication that the neuroanatomical distribution of learning effects depends upon the pre-learning mapping of visual object properties. Copyright © 2015 Elsevier Inc. All rights reserved.

  10. 76 FR 79114 - Privacy Act of 1974: Implementation of Exemptions; DOT/ALL 23-Information Sharing Environment...

    Science.gov (United States)

    2011-12-21

    ...] Privacy Act of 1974: Implementation of Exemptions; DOT/ALL 23-- Information Sharing Environment (ISE... titled, ``DOT/ALL 23--Information Sharing Environment (ISE) Suspicious Activity Reporting (SAR... exempts portions of the ``DOT/ALL 23--Information Sharing Environment (ISE) Suspicious Activity Reporting...

  11. 77 FR 47163 - Agency Information Collection Activities; Submission for OMB Review; Comment Request

    Science.gov (United States)

    2012-08-07

    ... reduce paperwork and respondent burden, invites the general public and other Federal agencies to take... currently approved Minimum Security Devices and Procedures, Reports of Suspicious Activities, and Bank... collection titled: ``Minimum Security Devices and Procedures, Reports of Suspicious Activities, and Bank...

  12. Focused Cardiac Ultrasound Using a Pocket-Size Device in the Emergency Room

    Directory of Open Access Journals (Sweden)

    Frederico José Neves Mancuso

    2014-12-01

    Full Text Available Background: Cardiovascular urgencies are frequent reasons for seeking medical care. Prompt and accurate medical diagnosis is critical to reduce the morbidity and mortality of these conditions. Objective: To evaluate the use of a pocket-size echocardiography in addition to clinical history and physical exam in a tertiary medical emergency care. Methods: One hundred adult patients without known cardiac or lung diseases who sought emergency care with cardiac complaints were included. Patients with ischemic changes in the electrocardiography or fever were excluded. A focused echocardiography with GE Vscan equipment was performed after the initial evaluation in the emergency room. Cardiac chambers dimensions, left and right ventricular systolic function, intracardiac flows with color, pericardium, and aorta were evaluated. Results: The mean age was 61 ± 17 years old. The patient complaint was chest pain in 51 patients, dyspnea in 32 patients, arrhythmia to evaluate the left ventricular function in ten patients, hypotension/dizziness in five patients and edema in one patient. In 28 patients, the focused echocardiography allowed to confirm the initial diagnosis: 19 patients with heart failure, five with acute coronary syndrome, two with pulmonary embolism and two patients with cardiac tamponade. In 17 patients, the echocardiography changed the diagnosis: ten with suspicious of heart failure, two with pulmonary embolism suspicious, two with hypotension without cause, one suspicious of acute coronary syndrome, one of cardiac tamponade and one of aortic dissection. Conclusion: The focused echocardiography with pocket-size equipment in the emergency care may allow a prompt diagnosis and, consequently, an earlier initiation of the therapy.

  13. Two Types of Visual Objects

    Directory of Open Access Journals (Sweden)

    Skrzypulec Błażej

    2015-06-01

    Full Text Available While it is widely accepted that human vision represents objects, it is less clear which of the various philosophical notions of ‘object’ adequately characterizes visual objects. In this paper, I show that within contemporary cognitive psychology visual objects are characterized in two distinct, incompatible ways. On the one hand, models of visual organization describe visual objects in terms of combinations of features, in accordance with the philosophical bundle theories of objects. However, models of visual persistence apply a notion of visual objects that is more similar to that endorsed in philosophical substratum theories. Here I discuss arguments that might show either that only one of the above notions of visual objects is adequate in the context of human vision, or that the category of visual objects is not uniform and contains entities properly characterized by different philosophical conceptions.

  14. Non-convex multi-objective optimization

    CERN Document Server

    Pardalos, Panos M; Žilinskas, Julius

    2017-01-01

    Recent results on non-convex multi-objective optimization problems and methods are presented in this book, with particular attention to expensive black-box objective functions. Multi-objective optimization methods facilitate designers, engineers, and researchers to make decisions on appropriate trade-offs between various conflicting goals. A variety of deterministic and stochastic multi-objective optimization methods are developed in this book. Beginning with basic concepts and a review of non-convex single-objective optimization problems; this book moves on to cover multi-objective branch and bound algorithms, worst-case optimal algorithms (for Lipschitz functions and bi-objective problems), statistical models based algorithms, and probabilistic branch and bound approach. Detailed descriptions of new algorithms for non-convex multi-objective optimization, their theoretical substantiation, and examples for practical applications to the cell formation problem in manufacturing engineering, the process design in...

  15. The internal/external issue what is an outer object? Another person as object and as separate other in object relations models.

    Science.gov (United States)

    Zachrisson, Anders

    2013-01-01

    The question of what we mean by the term outer object has its roots in the epistemological foundation of psychoanalysis. From the very beginning, Freud's view was Kantian, and psychoanalysis has kept that stance, as it seems. The author reviews the internal/external issue in Freud's thinking and in the central object relations theories (Klein, Winnicott, and Bion). On this background he proposes a simple model to differentiate the concept of object along one central dimension: internal object, external object, and actual person. The main arguments are: (1) there is no direct, unmediated perception of the actual person--the experience of the other is always affected by the perceiver's subjectivity; (2) in intense transference reactions and projections, the perception of the person is dominated by the qualities of an inner object--and the other person "becomes" an external object for the perceiver; (3) when this distortion is less dominating, the other person to a higher degree remains a separate other--a person in his or her own right. Clinical material illustrates these phenomena, and a graphical picture of the model is presented. Finally with the model as background, the author comments on a selection of phenomena and concepts such as unobjectionable transference, "the third position," mourning and loneliness. The way that the internal colours and distorts the external is of course a central preoccupation of psychoanalysis generally. (Spillius et al., 2011, p. 326)

  16. Propensity to Click on Suspicious Links

    DEFF Research Database (Denmark)

    Sudzina, Frantisek; Pavlicek, Antonin

    2017-01-01

    such behavior. Big Five Inventory traits (extraversion, agreeableness, conscientiousness, neuroticism, openness to experience) and narcissism were used. Impact of openness to experience was significant at 0.05 level, and of narcissism 0.1 level. Significance of remaining independent variables was above 0.......1. Openness to experience was linked positively linked to responsible behavior, narcissism was negatively linked....

  17. EC suspicious of Latvian audit results

    Index Scriptorium Estoniae

    2011-01-01

    Alates 1. novembrist 2010 ei ole Läti Euroopa Liidu Solidaarsusfondist finantseerimist saanud, kuigi selle abil läbiviidavad projektid pole peatatud, kuna see oli riigi otsus. Finantseerimine peaks taastuma juunis, kui Euroopa Komisjoniga lepitakse riigi rahanduse juhtimis- ja järelevalveprogrammis kokku

  18. Object oriented programming

    International Nuclear Information System (INIS)

    Kunz, P.F.

    1990-01-01

    This paper is an introduction to object oriented programming techniques. It tries to explain the concepts by using analogies with traditional programming. The object oriented approach not inherently difficult, but most programmers find a relatively high threshold in learning it. Thus, this paper will attempt to convey the concepts with examples rather than explain the formal theory

  19. Registration of Space Objects

    Science.gov (United States)

    Schmidt-Tedd, Bernhard

    2017-07-01

    Space objects are subject to registration in order to allocate "jurisdiction and control" over those objects in the sovereign-free environment of outer space. This approach is similar to the registration of ships in view of the high sea and for aircrafts with respect to the international airspace. Registration is one of the basic principles of space law, starting with UN General Assembly Resolution 1721 B (XVI) of December 20, 1961, followed by Resolution 1962 (XVIII) of December 13, 1963, then formulated in Article VIII of the Outer Space Treaty of 1967 and as specified in the Registration Convention of 1975. Registration of space objects can be seen today as a principle of customary international law, relevant for each spacefaring state. Registration is divided into a national and an international level. The State Party establishes a national registry for its space objects, and those registrations have to be communicated via diplomatic channel to the UN Register of space objects. This UN Register is handled by the UN Office for Outer Space Affairs (UNOOSA) and is an open source of information for space objects worldwide. Registration is linked to the so-called launching state of the relevant space object. There might be more than one launching state for the specific launch event, but only one state actor can register a specific space object. The state of registry gains "jurisdiction and control" over the space object and therefore no double registration is permissible. Based on the established UN Space Law, registration practice was subject to some adaptions due to technical developments and legal challenges. After the privatization of the major international satellite organizations, a number of non-registrations had to be faced. The state actors reacted with the UN Registration Practice Resolution of 2007 as elaborated in the Legal Subcommittee of UNCOPUOS, the Committee for the Peaceful Use of Outer Space. In this context an UNOOSA Registration Information

  20. Factors affecting infants' manual search for occluded objects and the genesis of object permanence.

    Science.gov (United States)

    Moore, M Keith; Meltzoff, Andrew N

    2008-04-01

    Two experiments systematically examined factors that influence infants' manual search for hidden objects (N=96). Experiment 1 used a new procedure to assess infants' search for partially versus totally occluded objects. Results showed that 8.75-month-old infants solved partial occlusions by removing the occluder and uncovering the object, but these same infants failed to use this skill on total occlusions. Experiment 2 used sound-producing objects to provide a perceptual clue to the objects' hidden location. Sound clues significantly increased the success rate on total occlusions for 10-month-olds, but not for 8.75-month-olds. An identity development account is offered for why infants succeed on partial occlusions earlier than total occlusions and why sound helps only the older infants. We propose a mechanism for how infants use object identity as a basis for developing a notion of permanence. Implications are drawn for understanding the dissociation between looking time and search assessments of object permanence.

  1. Minimum Delay Moving Object Detection

    KAUST Repository

    Lao, Dong

    2017-05-14

    This thesis presents a general framework and method for detection of an object in a video based on apparent motion. The object moves, at some unknown time, differently than the “background” motion, which can be induced from camera motion. The goal of proposed method is to detect and segment the object as soon it moves in an online manner. Since motion estimation can be unreliable between frames, more than two frames are needed to reliably detect the object. Observing more frames before declaring a detection may lead to a more accurate detection and segmentation, since more motion may be observed leading to a stronger motion cue. However, this leads to greater delay. The proposed method is designed to detect the object(s) with minimum delay, i.e., frames after the object moves, constraining the false alarms, defined as declarations of detection before the object moves or incorrect or inaccurate segmentation at the detection time. Experiments on a new extensive dataset for moving object detection show that our method achieves less delay for all false alarm constraints than existing state-of-the-art.

  2. A Monte-Carlo study of landmines detection by neutron backscattering method

    International Nuclear Information System (INIS)

    Maucec, M.; De Meijer, R.J.

    2000-01-01

    The use of Monte-Carlo simulations for modelling a simplified landmine detector system with a 252 Cf- neutron source is presented in this contribution. Different aspects and variety of external conditions, affecting the localisation and identification of a buried suspicious object (such as landmine) have been tested. Results of sensitivity calculations confirm that the landmine detection methods, based on the analysis of the backscattered neutron radiation can be applicable in higher density formations, with the mass fraction of present pore-water <15 %. (author)

  3. Object-based connectedness facilitates matching

    NARCIS (Netherlands)

    Koning, A.R.; Lier, R.J. van

    2003-01-01

    In two matching tasks, participants had to match two images of object pairs. Image-based (113) connectedness refers to connectedness between the objects in an image. Object-based (OB) connectedness refers to connectedness between the interpreted objects. In Experiment 1, a monocular depth cue

  4. Abstract Objects of Verbs

    DEFF Research Database (Denmark)

    Robering, Klaus

    2014-01-01

    Verbs do often take arguments of quite different types. In an orthodox type-theoretic framework this results in an extreme polysemy of many verbs. In this article, it is shown that this unwanted consequence can be avoided when a theory of "abstract objects" is adopted according to which these obj......Verbs do often take arguments of quite different types. In an orthodox type-theoretic framework this results in an extreme polysemy of many verbs. In this article, it is shown that this unwanted consequence can be avoided when a theory of "abstract objects" is adopted according to which...... these objects represent non-objectual entities in contexts from which they are excluded by type restrictions. Thus these objects are "abstract'' in a functional rather than in an ontological sense: they function as representatives of other entities but they are otherwise quite normal objects. Three examples...

  5. First-Class Object Sets

    DEFF Research Database (Denmark)

    Ernst, Erik

    2009-01-01

    Typically, an object is a monolithic entity with a fixed interface.  To increase flexibility in this area, this paper presents first-class object sets as a language construct.  An object set offers an interface which is a disjoint union of the interfaces of its member objects.  It may also be use...... to a mainstream virtual machine in order to improve on the support for family polymorphism.  The approach is made precise by means of a small calculus, and the soundness of its type system has been shown by a mechanically checked proof in Coq....

  6. Object Knowledge Modulates Colour Appearance

    Directory of Open Access Journals (Sweden)

    Christoph Witzel

    2011-01-01

    Full Text Available We investigated the memory colour effect for colour diagnostic artificial objects. Since knowledge about these objects and their colours has been learned in everyday life, these stimuli allow the investigation of the influence of acquired object knowledge on colour appearance. These investigations are relevant for questions about how object and colour information in high-level vision interact as well as for research about the influence of learning and experience on perception in general. In order to identify suitable artificial objects, we developed a reaction time paradigm that measures (subjective colour diagnosticity. In the main experiment, participants adjusted sixteen such objects to their typical colour as well as to grey. If the achromatic object appears in its typical colour, then participants should adjust it to the opponent colour in order to subjectively perceive it as grey. We found that knowledge about the typical colour influences the colour appearance of artificial objects. This effect was particularly strong along the daylight axis.

  7. Object knowledge modulates colour appearance

    Science.gov (United States)

    Witzel, Christoph; Valkova, Hanna; Hansen, Thorsten; Gegenfurtner, Karl R

    2011-01-01

    We investigated the memory colour effect for colour diagnostic artificial objects. Since knowledge about these objects and their colours has been learned in everyday life, these stimuli allow the investigation of the influence of acquired object knowledge on colour appearance. These investigations are relevant for questions about how object and colour information in high-level vision interact as well as for research about the influence of learning and experience on perception in general. In order to identify suitable artificial objects, we developed a reaction time paradigm that measures (subjective) colour diagnosticity. In the main experiment, participants adjusted sixteen such objects to their typical colour as well as to grey. If the achromatic object appears in its typical colour, then participants should adjust it to the opponent colour in order to subjectively perceive it as grey. We found that knowledge about the typical colour influences the colour appearance of artificial objects. This effect was particularly strong along the daylight axis. PMID:23145224

  8. Media, journalism, objectivity

    Directory of Open Access Journals (Sweden)

    Vlajki Emil

    2013-01-01

    Full Text Available This is the text around the themes: Media and Journalism, are confronted two directions of opinions: humanism and elitism. Humanism believes that media and journalism must be metaphysically objective: able to tell the truth regardless of time, place and terms of events. Another approach, elitism, is connected with Hegel's philosophy of history. Hegel's conceptual apparatus includes: Idea, History dialectic, 'cunning mind,' self- development and self-realization. In this context, media and journalism are considered as organic unity, an inseparable part of some dialectical totality. More specifically media and journalism can be objective only if they defend concrete ideological assumptions of society to which they belong. Any other understanding of these two concepts is non-objective, mere moralizing and / or demagoguery.

  9. Hardware Objects for Java

    DEFF Research Database (Denmark)

    Schoeberl, Martin; Thalinger, Christian; Korsholm, Stephan

    2008-01-01

    Java, as a safe and platform independent language, avoids access to low-level I/O devices or direct memory access. In standard Java, low-level I/O it not a concern; it is handled by the operating system. However, in the embedded domain resources are scarce and a Java virtual machine (JVM) without...... an underlying middleware is an attractive architecture. When running the JVM on bare metal, we need access to I/O devices from Java; therefore we investigate a safe and efficient mechanism to represent I/O devices as first class Java objects, where device registers are represented by object fields. Access...... to those registers is safe as Java’s type system regulates it. The access is also fast as it is directly performed by the bytecodes getfield and putfield. Hardware objects thus provide an object-oriented abstraction of low-level hardware devices. As a proof of concept, we have implemented hardware objects...

  10. Object recognition with video-theodolites and without targeting the object

    International Nuclear Information System (INIS)

    Kahmen, H.; Seixas, A. de

    1999-01-01

    At the Department of Applied Geodesy and Engineering Geodesy (TU Vienna) an new kind of theodolite measurement system is under development, enabling measurements with an accuracy of 1:30.000 with and without targeting the object. The main goal is, to develop an intelligent multi-sensor system. Thus an operator is only needed to supervise the system. Results are gained on-sine and can be stored in a CAD system. If no artificial targets are used identification of points has to be performed by the Master-Theodolite. The method, used in our project, is based on interest operators. The Slave-Theodolite has to track the master by searching for homologous regions. The before described method can only be used, if there is some texture on the surface of the object. If that is not fulfilled, a 'grid-line-method' can be used, to get informations about the surface of the object. In the case of a cartesian co-ordinate system, for instance, the grid-lines can be chosen by the operator before the measurement process is started. The theodolite-measurement system is then able to detect the grid-lines and to find the positions where the grid-lines intersect the surface of the object. This system could be used for positioning the different components of a particle accelerator. (author)

  11. Object recognition with video-theodolites and without targeting the object

    Energy Technology Data Exchange (ETDEWEB)

    Kahmen, H.; Seixas, A. de [University of Technology Vienna, Institute of Geodesy and Geophysics, Vienna (Austria)

    1999-07-01

    At the Department of Applied Geodesy and Engineering Geodesy (TU Vienna) an new kind of theodolite measurement system is under development, enabling measurements with an accuracy of 1:30.000 with and without targeting the object. The main goal is, to develop an intelligent multi-sensor system. Thus an operator is only needed to supervise the system. Results are gained on-sine and can be stored in a CAD system. If no artificial targets are used identification of points has to be performed by the Master-Theodolite. The method, used in our project, is based on interest operators. The Slave-Theodolite has to track the master by searching for homologous regions. The before described method can only be used, if there is some texture on the surface of the object. If that is not fulfilled, a 'grid-line-method' can be used, to get informations about the surface of the object. In the case of a cartesian co-ordinate system, for instance, the grid-lines can be chosen by the operator before the measurement process is started. The theodolite-measurement system is then able to detect the grid-lines and to find the positions where the grid-lines intersect the surface of the object. This system could be used for positioning the different components of a particle accelerator. (author)

  12. Utilities objectives

    International Nuclear Information System (INIS)

    Cousin, Y.; Fabian, H.U.

    1996-01-01

    The policy of French and german utilities is to make use of nuclear energy as a long term, competitive and environmentally friendly power supply. The world electricity generation is due to double within the next 30 years. In the next 20 to 30 years the necessity of nuclear energy will be broadly recognized. More than for most industries, to deal properly with nuclear energy requires the combination of a consistent political will, of a proper institutional framework, of strong and legitimate control authorities, of a sophisticated industry and of operators with skilled management and human resources. One of the major risk facing nuclear energy is the loss of competitiveness. This can be achieved only through the combination of an optimized design, a consistent standardization, a proper industrial partnership and a stable long term strategy. Although the existing plants in Western Europe are already very safe, the policy is clearly to enhance the safety of the next generation of nuclear plants which are designing today. The French and German utilities have chosen an evolutionary approach based on experience and proven technologies, with an enhanced defense in depth and an objective of easier operation and maintenance. The cost objective is to maintain and improve what has been achieved in the best existing power plants in both countries. This calls for rational choices and optimized design to meet the safety objectives, a strong standardization policy, short construction times, high availability and enough flexibility to enable optimization of the fuel cycle throughout the lifetime of the plants. The conceptual design phase has proven that the French and German teams from industry and from the utilities are able to pursue both the safety and the cost objectives, basing their decision on a rational approach which could be accepted by the safety authorities. (J.S.)

  13. Tracking in Object Action Space

    DEFF Research Database (Denmark)

    Krüger, Volker; Herzog, Dennis

    2013-01-01

    the space of the object affordances, i.e., the space of possible actions that are applied on a given object. This way, 3D body tracking reduces to action tracking in the object (and context) primed parameter space of the object affordances. This reduces the high-dimensional joint-space to a low...

  14. Dynamic Scheduling of Object Invocations in Distributed Object Oriented Real-Time Systems

    DEFF Research Database (Denmark)

    Jørgensen, Bo Nørregaard; Joosen, Wouter

    1998-01-01

    This paper describes some of the issues that we investigate in order to develop distributed object computing middleware for application domains where timely cooperation and coordination between objects are crucial for guaranteeing correct system behavior. In particular, issues on admission contro...

  15. What Makes an Object Memorable?

    KAUST Repository

    Dubey, Rachit

    2016-02-19

    Recent studies on image memorability have shed light on what distinguishes the memorability of different images and the intrinsic and extrinsic properties that make those images memorable. However, a clear understanding of the memorability of specific objects inside an image remains elusive. In this paper, we provide the first attempt to answer the question: what exactly is remembered about an image? We augment both the images and object segmentations from the PASCAL-S dataset with ground truth memorability scores and shed light on the various factors and properties that make an object memorable (or forgettable) to humans. We analyze various visual factors that may influence object memorability (e.g. color, visual saliency, and object categories). We also study the correlation between object and image memorability and find that image memorability is greatly affected by the memorability of its most memorable object. Lastly, we explore the effectiveness of deep learning and other computational approaches in predicting object memorability in images. Our efforts offer a deeper understanding of memorability in general thereby opening up avenues for a wide variety of applications. © 2015 IEEE.

  16. What Makes an Object Memorable?

    KAUST Repository

    Dubey, Rachit; Peterson, Joshua; Khosla, Aditya; Yang, Ming-Hsuan; Ghanem, Bernard

    2016-01-01

    Recent studies on image memorability have shed light on what distinguishes the memorability of different images and the intrinsic and extrinsic properties that make those images memorable. However, a clear understanding of the memorability of specific objects inside an image remains elusive. In this paper, we provide the first attempt to answer the question: what exactly is remembered about an image? We augment both the images and object segmentations from the PASCAL-S dataset with ground truth memorability scores and shed light on the various factors and properties that make an object memorable (or forgettable) to humans. We analyze various visual factors that may influence object memorability (e.g. color, visual saliency, and object categories). We also study the correlation between object and image memorability and find that image memorability is greatly affected by the memorability of its most memorable object. Lastly, we explore the effectiveness of deep learning and other computational approaches in predicting object memorability in images. Our efforts offer a deeper understanding of memorability in general thereby opening up avenues for a wide variety of applications. © 2015 IEEE.

  17. A validated set of tool pictures with matched objects and non-objects for laterality research.

    Science.gov (United States)

    Verma, Ark; Brysbaert, Marc

    2015-01-01

    Neuropsychological and neuroimaging research has established that knowledge related to tool use and tool recognition is lateralized to the left cerebral hemisphere. Recently, behavioural studies with the visual half-field technique have confirmed the lateralization. A limitation of this research was that different sets of stimuli had to be used for the comparison of tools to other objects and objects to non-objects. Therefore, we developed a new set of stimuli containing matched triplets of tools, other objects and non-objects. With the new stimulus set, we successfully replicated the findings of no visual field advantage for objects in an object recognition task combined with a significant right visual field advantage for tools in a tool recognition task. The set of stimuli is available as supplemental data to this article.

  18. Nuclear Fuel Cycle Objectives

    International Nuclear Information System (INIS)

    2013-01-01

    One of the IAEA's statutory objectives is to 'seek to accelerate and enlarge the contribution of atomic energy to peace, health and prosperity throughout the world'. One way this objective is achieved is through the publication of a range of technical series. Two of these are the IAEA Nuclear Energy Series and the IAEA Safety Standards Series. According to Article III.A.6 of the IAEA Statute, the safety standards establish 'standards of safety for protection of health and minimization of danger to life and property'. The safety standards include the Safety Fundamentals, Safety Requirements and Safety Guides. These standards are written primarily in a regulatory style, and are binding on the IAEA for its own programmes. The principal users are the regulatory bodies in member States and other national authorities. The IAEA Nuclear Energy Series comprises reports designed to encourage and assist R and D on, and application of, nuclear energy for peaceful uses. This includes practical examples to be used by owners and operators of utilities in member States, implementing organizations, academia and government officials, among others. This information is presented in guides, reports on technology status and advances, and best practices for peaceful uses of nuclear energy based on inputs from international experts. The IAEA Nuclear Energy Series complements the IAEA Safety Standards Series. The Nuclear Energy Basic Principles is the highest level publication in the IAEA Nuclear Energy Series, and describes the rationale and vision for the peaceful uses of nuclear energy. It presents eight Basic Principles on which nuclear energy systems should be based to fulfil nuclear energy's potential to help meet growing global energy needs. The Nuclear Energy Series Objectives are the second level publications. They describe what needs to be considered and the specific goals to be achieved at different stages of implementation, all of which are consistent with the Basic Principles

  19. Investigation of nuclear power safety objects

    International Nuclear Information System (INIS)

    2003-09-01

    It is a report of ground and concept of nuclear safety objects and future issues in Japan, which has investigated by the Committee of Experts on Investigation of Nuclear Safety Objects in the Nuclear Safety Research Association. The report consisted of member of committee, main conclusions and five chapters. The first chapter contains construction of safety objects and range of object, the second chapter qualitative safety objects, the third chapter quantitative safety objects, the forth subsiding objects and the fifth other items under consideration. The qualitative safety objects on individual and society, the quantitative one on effects on health and social cost, aspect of safety objects, relation between radiation protection and safety objects, practical objective values and earthquake are stated. (S.Y.)

  20. 12 CFR Appendix J to Part 334 - Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

    Science.gov (United States)

    2010-01-01

    ... consumer reporting agencies or service providers, such as fraud detection services; (2) The presentation of suspicious documents; (3) The presentation of suspicious personal identifying information, such as a... merchandise that is easily convertible to cash (e.g., electronics equipment or jewelry); or b. The customer...

  1. Object grammars and random generation

    Directory of Open Access Journals (Sweden)

    I. Dutour

    1998-12-01

    Full Text Available This paper presents a new systematic approach for the uniform random generation of combinatorial objects. The method is based on the notion of object grammars which give recursive descriptions of objects and generalize context-freegrammars. The application of particular valuations to these grammars leads to enumeration and random generation of objects according to non algebraic parameters.

  2. Cognitive object recognition system (CORS)

    Science.gov (United States)

    Raju, Chaitanya; Varadarajan, Karthik Mahesh; Krishnamurthi, Niyant; Xu, Shuli; Biederman, Irving; Kelley, Troy

    2010-04-01

    We have developed a framework, Cognitive Object Recognition System (CORS), inspired by current neurocomputational models and psychophysical research in which multiple recognition algorithms (shape based geometric primitives, 'geons,' and non-geometric feature-based algorithms) are integrated to provide a comprehensive solution to object recognition and landmarking. Objects are defined as a combination of geons, corresponding to their simple parts, and the relations among the parts. However, those objects that are not easily decomposable into geons, such as bushes and trees, are recognized by CORS using "feature-based" algorithms. The unique interaction between these algorithms is a novel approach that combines the effectiveness of both algorithms and takes us closer to a generalized approach to object recognition. CORS allows recognition of objects through a larger range of poses using geometric primitives and performs well under heavy occlusion - about 35% of object surface is sufficient. Furthermore, geon composition of an object allows image understanding and reasoning even with novel objects. With reliable landmarking capability, the system improves vision-based robot navigation in GPS-denied environments. Feasibility of the CORS system was demonstrated with real stereo images captured from a Pioneer robot. The system can currently identify doors, door handles, staircases, trashcans and other relevant landmarks in the indoor environment.

  3. Identification of computer graphics objects

    Directory of Open Access Journals (Sweden)

    Rossinskyi Yu.M.

    2016-04-01

    Full Text Available The article is devoted to the use of computer graphics methods in problems of creating drawings, charts, drafting, etc. The widespread use of these methods requires the development of efficient algorithms for the identification of objects of drawings. The article analyzes the model-making algorithms for this problem and considered the possibility of reducing the time using graphics editing operations. Editing results in such operations as copying, moving and deleting objects specified images. These operations allow the use of a reliable identification of images of objects methods. For information on the composition of the image of the object along with information about the identity and the color should include information about the spatial location and other characteristics of the object (the thickness and style of contour lines, fill style, and so on. In order to enable the pixel image analysis to structure the information it is necessary to enable the initial code image objects color. The article shows the results of the implementation of the algorithm of encoding object identifiers. To simplify the process of building drawings of any kind, and reduce time-consuming, method of drawing objects identification is proposed based on the use as the ID information of the object color.

  4. Objectives and Outcomes

    Energy Technology Data Exchange (ETDEWEB)

    Segalman, D.J.

    1998-11-30

    I have recently become involved in the ABET certification process under the new system - ABET 2000. This system relies heavily on concepts of Total Quality Management (TQM). It encourages each institution to define its objectives in terms of its own mission and then create a coherent program based on it. The prescribed steps in setting up the new system at an engineering institution are: o identification of constituencies G definition of mission. It is expected that the department's mission will be consistent with that of the overall institution, but containing some higher resolution language appropriate to that particular discipline of the engineering profession. o statement of objectives consistent with the mission 3G~~\\vED " enumeration of desired, and preferably measurable, outcomes of the process that would ~ `=. verify satisfaction of the objectives. ~~~ 07 !398 o establish performance standards for each outcome. o creation of appropriate feedback loops to assure that the objectives are still consistent with Q$YT1 the mission, that the outcomes remain consistent with the objectives, and that the curriculum and the teaching result in those outcomes. It is my assertion that once the institution verbalizes a mission, enumerated objectives naturally flow from that mission. (We shall try to demonstrate by example.) Further, if the mission uses the word "engineer", one would expect that word also to appear in at least one of the objectives. The objective of producing engineers of any sort must -by decree - involve the presence of the ABET criteria in the outcomes list. In other words, successful satisfaction of the ABET items a-k are a necessary subset of the measure of success in producing engineers. o We shall produce bachelor level engineers whose training in the core topics of chemical (or electrical, or mechanical) engineering is recognized to be among the best in the nation. o We shall provide an opportunity for our students to gain

  5. An evaluation of state firearm regulations and homicide and suicide death rates

    OpenAIRE

    Rosengart, M; Cummings, P; Nathens, A; Heagerty, P; Maier, R; Rivara, F

    2005-01-01

    Objective: To determine if any of five different state gun laws were associated with firearm mortality: (1) "shall issue" laws permitting an individual to carry a concealed weapon unless restricted by another statute; (2) a minimum age of 21 years for handgun purchase; (3) a minimum age of 21 years for private handgun possession; (4) one gun a month laws which restrict handgun purchase frequency; and (5) junk gun laws which ban the sale of certain cheaply constructed handguns.

  6. Response Pattern Based on the Amplitude of Ear Canal Recorded Cochlear Microphonic Waveforms across Acoustic Frequencies in Normal Hearing Subjects

    OpenAIRE

    Zhang, Ming

    2012-01-01

    Low-frequency otoacoustic emissions (OAEs) are often concealed by acoustic background noise such as those from a patient’s breathing and from the environment during recording in clinics. When using electrocochleaography (ECochG or ECoG), such as cochlear microphonics (CMs), acoustic background noise do not contaminate the recordings. Our objective is to study the response pattern of CM waveforms (CMWs) to explore an alternative approach in assessing cochlear functions. In response to a 14-mse...

  7. Does long-term object priming depend on the explicit detection of object identity at encoding?

    Directory of Open Access Journals (Sweden)

    Carlos Alexandre Gomes

    2015-03-01

    Full Text Available It is currently unclear whether objects have to be explicitly identified at encoding for reliable behavioural long-term object priming to occur. We conducted two experiments that investigated long-term object and non-object priming using a selective-attention encoding manipulation that reduces explicit object identification. In Experiment 1, participants either counted dots flashed within an object picture (shallow encoding or engaged in an animacy task (deep encoding at study, whereas, at test, they performed an object-decision task. Priming, as measured by reaction times, was observed for both types of encoding, and was of equivalent magnitude. In Experiment 2, non-object priming (faster reaction times for studied relative to unstudied non-objects was also obtained under the same selective-attention encoding manipulation as in Experiment 1, and the magnitude of the priming effect was equivalent between experiments. In contrast, we observed a linear decrement in recognition memory accuracy across conditions (deep encoding of Experiment 1 > shallow encoding Experiment 1 > shallow encoding of Experiment 2, suggesting that priming was not contaminated by explicit memory strategies. We argue that our results are more consistent with the identification/production framework than the perceptual/conceptual distinction, and we conclude that priming of pictures largely ignored at encoding can be subserved by the automatic retrieval of two types of instances: one at the motor-level and another at an object-decision level.

  8. Experimental Object-Oriented Modelling

    DEFF Research Database (Denmark)

    Hansen, Klaus Marius

    through, e.g., technical prototyping and active user involvement. We introduce and examine “experimental object-oriented modelling” as the intersection of these practices. The contributions of this thesis are expected to be within three perspectives on models and modelling in experimental system...... development: Grounding We develop an empirically based conceptualization of modelling and use of models in system development projects characterized by a high degree of uncertainty in requirements and point to implications for tools and techniques for modelling in such a setting. Techniques We introduce......This thesis examines object-oriented modelling in experimental system development. Object-oriented modelling aims at representing concepts and phenomena of a problem domain in terms of classes and objects. Experimental system development seeks active experimentation in a system development project...

  9. Factors Affecting Infants’ Manual Search for Occluded Objects and the Genesis of Object Permanence

    Science.gov (United States)

    Moore, M. Keith; Meltzoff, Andrew N.

    2009-01-01

    Two experiments systematically examined factors that influence infants’ manual search for hidden objects (N = 96). Experiment 1 used a new procedure to assess infants’ search for partially versus totally occluded objects. Results showed that 8.75-month-old infants solved partial occlusions by removing the occluder and uncovering the object, but these same infants failed to use this skill on total occlusions. Experiment 2 used sound-producing objects to provide a perceptual clue to the objects’ hidden location. Sound clues significantly increased the success rate on total occlusions for 10-month-olds, but not for 8.75-month-olds. An identity development account is offered for why infants succeed on partial occlusions earlier than total occlusions and why sound helps only the older infants. We propose a mechanism for how infants use object identity as a basis for developing a notion of permanence. Implications are drawn for understanding the dissociation between looking-time and search assessments of object permanence. PMID:18036668

  10. Child sexual abuse among adolescents in southeast Nigeria: A concealed public health behavioral issue

    Science.gov (United States)

    C, Manyike Pius; M, Chinawa Josephat; Elias, Aniwada; I, Odutola Odetunde; Awoere, Chinawa T.

    2015-01-01

    Background and Objective: Child sexual abuse among adolescents is an often overlooked issue in pediatrics, yet it is a major cause of low self esteem and stigmatization in adolescents. The objective of this study was to determine the socioeconomic determinant and pattern of child sexual abuse among adolescent attending secondary schools in South East Nigeria. Methods: This was a cross-sectional study that was carried out among children in three secondary schools in Enugu and Ebonyi states of Nigeria. Five hundred and six adolescents who met inclusion criteria were consecutively recruited into our prospective study between June and October, 2014. Results: One hundred and ninety nine (40 %) of the respondents had been abused and the commonest form of abuse was to look at pornographic pictures, drawings, films, videotapes or magazine 93(18.4%). Fifty eight (11.5%) adolescents stated that they were abused once with age at first exposure being 7-12 years 57 (11.4%). When grouped together, family members and relatives are perpetrators of child sexual abuse. There was significant difference in sex abuse between males and females (p=0.014) while there were no significant difference for age (p=0.157) and social class (p=0.233). Conclusion: Overall prevalence and one time prevalence rates of sexual abuse among adolescents in south east Nigeria was 40% and 11.5% respectively with male perpetrators. There is no link between socioeconomic class, age and child sexual abuse among adolescents. PMID:26430412

  11. Postural and Object-Oriented Experiences Advance Early Reaching, Object Exploration, and Means-End Behavior

    Science.gov (United States)

    Lobo, Michele A.; Galloway, James C.

    2008-01-01

    The effects of 3 weeks of social (control), postural, or object-oriented experiences on 9- to 21-week-old infants' (N = 42) reaching, exploration, and means-end behaviors were assessed. Coders recorded object contacts, mouthing, fingering, attention, and affect from video. Postural and object-oriented experiences advanced reaching, haptic…

  12. Telescopic Partial Dentures-Concealed Technology

    OpenAIRE

    Bhagat, Tushar Vitthalrao; Walke, Ashwini Nareshchandra

    2015-01-01

    The ideal goal of good dentist is to restore the missing part of oral structure, phonetics, his look and the most important is restored the normal health of the patient, which is hampered due to less or insufficient intake of food. Removable partial denture (RPD) treatment option is considered as a notion, which precludes the inevitability of ?floating plastic? in edentulous mouth, that many times fail to fulfill the above essential of the patients. In modern dentistry, though the dental impl...

  13. Telescopic Partial Dentures-Concealed Technology.

    Science.gov (United States)

    Bhagat, Tushar Vitthalrao; Walke, Ashwini Nareshchandra

    2015-09-01

    The ideal goal of good dentist is to restore the missing part of oral structure, phonetics, his look and the most important is restored the normal health of the patient, which is hampered due to less or insufficient intake of food. Removable partial denture (RPD) treatment option is considered as a notion, which precludes the inevitability of "floating plastic" in edentulous mouth, that many times fail to fulfill the above essential of the patients. In modern dentistry, though the dental implants or fixed partial denture is the better options, but they have certain limitations. However, overdentures and particularly telescopic denture is the overlooked technology in dentistry that would be a boon for such needy patients. Telescopic denture is especially indicated in the distal edentulous area with minimum two teeth bilaterally present with a good amount of periodontal support. This treatment modality is sort of preventive prosthodontics remedy, which in a conservative manner preserve the remaining teeth and helps in conservation of alveolar bone ultimately. There are two tenets related to this option, one is constant conservation edentulous ridge around the retained tooth and the most important is the endless existence of periodontal sensory action that directs and monitor gnathodynamic task. In this option the primary coping or inner coping are cemented on the prepared tooth, and a similar removable outer or inner telescopic crown placed tightly by using a mechanism of tenso-friction, this is firmly attached to a removable RPD in place without moving or rocking of the prosthesis, which is the common compliant of almost all patients of RPD. Copings are also protecting the abutment from tooth decay and also offers stabilization and maintaining of the outer crown. The outer crown engages the inner coping and gives as an anchor for the remainder of the dentition. This work is the review of telescopic prosthesis which is well supported by the case discussion, and designates the utilization of favorable retained tooth/teeth as abutment that drastically minimized alveolar bone resorption beneath the prosthesis and give the maximum tactile sensation of natural teeth to the patient, which is not possible with other type of RPD.

  14. A Patient with Difficulty of Object Recognition: Semantic Amnesia for Manipulable Objects

    Directory of Open Access Journals (Sweden)

    A. Yamadori

    1992-01-01

    Full Text Available We studied a patient who had recognition difficulty for manipulable objects. MRI showed a lesion in the left occipito-parietotemporal area. Differential diagnosis of agnosia, aphasia and apraxia is discussed. We believe this “object meaning amnesia” constitutes a distinct subtype of semantic amnesia.

  15. Multi-objective compared to single-objective optimization with application to model validation and uncertainty quantification

    Energy Technology Data Exchange (ETDEWEB)

    Schulze-Riegert, R.; Krosche, M.; Stekolschikov, K. [Scandpower Petroleum Technology GmbH, Hamburg (Germany); Fahimuddin, A. [Technische Univ. Braunschweig (Germany)

    2007-09-13

    History Matching in Reservoir Simulation, well location and production optimization etc. is generally a multi-objective optimization problem. The problem statement of history matching for a realistic field case includes many field and well measurements in time and type, e.g. pressure measurements, fluid rates, events such as water and gas break-throughs, etc. Uncertainty parameters modified as part of the history matching process have varying impact on the improvement of the match criteria. Competing match criteria often reduce the likelihood of finding an acceptable history match. It is an engineering challenge in manual history matching processes to identify competing objectives and to implement the changes required in the simulation model. In production optimization or scenario optimization the focus on one key optimization criterion such as NPV limits the identification of alternatives and potential opportunities, since multiple objectives are summarized in a predefined global objective formulation. Previous works primarily focus on a specific optimization method. Few works actually concentrate on the objective formulation and multi-objective optimization schemes have not yet been applied to reservoir simulations. This paper presents a multi-objective optimization approach applicable to reservoir simulation. It addresses the problem of multi-objective criteria in a history matching study and presents analysis techniques identifying competing match criteria. A Pareto-Optimizer is discussed and the implementation of that multi-objective optimization scheme is applied to a case study. Results are compared to a single-objective optimization method. (orig.)

  16. Multiple-object permanence tracking: limitation in maintenance and transformation of perceptual objects.

    Science.gov (United States)

    Saiki, Jun

    2002-01-01

    Research on change blindness and transsaccadic memory revealed that a limited amount of information is retained across visual disruptions in visual working memory. It has been proposed that visual working memory can hold four to five coherent object representations. To investigate their maintenance and transformation in dynamic situations, I devised an experimental paradigm called multiple-object permanence tracking (MOPT) that measures memory for multiple feature-location bindings in dynamic situations. Observers were asked to detect any color switch in the middle of a regular rotation of a pattern with multiple colored disks behind an occluder. The color-switch detection performance dramatically declined as the pattern rotation velocity increased, and this effect of object motion was independent of the number of targets. The MOPT task with various shapes and colors showed that color-shape conjunctions are not available in the MOPT task. These results suggest that even completely predictable motion severely reduces our capacity of object representations, from four to only one or two.

  17. Protein Nano-Object Integrator (ProNOI for generating atomic style objects for molecular modeling

    Directory of Open Access Journals (Sweden)

    Smith Nicholas

    2012-12-01

    Full Text Available Abstract Background With the progress of nanotechnology, one frequently has to model biological macromolecules simultaneously with nano-objects. However, the atomic structures of the nano objects are typically not available or they are solid state entities. Because of that, the researchers have to investigate such nano systems by generating models of the nano objects in a manner that the existing software be able to carry the simulations. In addition, it should allow generating composite objects with complex shape by combining basic geometrical figures and embedding biological macromolecules within the system. Results Here we report the Protein Nano-Object Integrator (ProNOI which allows for generating atomic-style geometrical objects with user desired shape and dimensions. Unlimited number of objects can be created and combined with biological macromolecules in Protein Data Bank (PDB format file. Once the objects are generated, the users can use sliders to manipulate their shape, dimension and absolute position. In addition, the software offers the option to charge the objects with either specified surface or volumetric charge density and to model them with user-desired dielectric constants. According to the user preference, the biological macromolecule atoms can be assigned charges and radii according to four different force fields: Amber, Charmm, OPLS and PARSE. The biological macromolecules and the atomic-style objects are exported as a position, charge and radius (PQR file, or if a default dielectric constant distribution is not selected, it is exported as a position, charge, radius and epsilon (PQRE file. As illustration of the capabilities of the ProNOI, we created a composite object in a shape of a robot, aptly named the Clemson Robot, whose parts are charged with various volumetric charge densities and holds the barnase-barstar protein complex in its hand. Conclusions The Protein Nano-Object Integrator (ProNOI is a convenient tool for

  18. Auditory signal design for automatic number plate recognition system

    NARCIS (Netherlands)

    Heydra, C.G.; Jansen, R.J.; Van Egmond, R.

    2014-01-01

    This paper focuses on the design of an auditory signal for the Automatic Number Plate Recognition system of Dutch national police. The auditory signal is designed to alert police officers of suspicious cars in their proximity, communicating priority level and location of the suspicious car and

  19. 78 FR 50077 - Intent To Request Renewal From OMB of One Current Public Collection of Information: Pipeline...

    Science.gov (United States)

    2013-08-16

    ... operators for vulnerability identification and analysis and trend analysis. Since the 2011 issuance of the... assets; Suspicious phone calls from people asking about the vulnerabilities or security practices of a... used by the TSA to analyze trends in suspicious activities. This analysis is incorporated into TSA's...

  20. SODA: Smart Objects, Dumb Archives

    Science.gov (United States)

    Nelson, Michael L.; Maly, Kurt; Zubair, Mohammad; Shen, Stewart N. T.

    2004-01-01

    We present the Smart Object, Dumb Archive (SODA) model for digital libraries (DLs). The SODA model transfers functionality traditionally associated with archives to the archived objects themselves. We are exploiting this shift of responsibility to facilitate other DL goals, such as interoperability, object intelligence and mobility, and heterogeneity. Objects in a SODA DL negotiate presentation of content and handle their own terms and conditions. In this paper we present implementations of our smart objects, buckets, and our dumb archive (DA). We discuss the status of buckets and DA and how they are used in a variety of DL projects.