WorldWideScience

Sample records for suspicious concealed object

  1. ISAR for concealed objects imaging

    Science.gov (United States)

    Zhuravlev, A.; Razevig, V.; Vasiliev, I.; Ivashov, S.; Voronin, V.

    2015-03-01

    A new promising architecture of microwave personnel screening system is analyzed in this paper with numerical simulations. This architecture is based on the concept of inverse aperture synthesis applied to a naturally moving person. The extent of the synthetic aperture is formed by a stationary vertical linear antenna array and by a length of subject's trajectory as he moves in the vicinity of this antenna array. The coherent radar signal processing is achieved by a synchronous 3D video-sensor whose data are used to track the subject. The advantages of the proposed system architecture over currently existing systems are analyzed. Synthesized radar images are obtained by numerical simulations with a human torso model with concealed objects. Various aspects of the system architecture are considered, including: advantages of using sparse antenna arrays to decrease the number of antenna elements, the influence of positioning errors of body surface due to outer clothing. It was shown that detailed radar images of concealed objects can be obtained with a narrow-band signal due to the depth information available from the 3D video sensor. The considered ISAR architecture is considered perspective to be used on infrastructure objects owing to its superior qualities: highest throughput, small footprint, simple design of the radar sub-system, non-required co-operation of the subject.

  2. Impulse radar imaging system for concealed object detection

    Science.gov (United States)

    Podd, F. J. W.; David, M.; Iqbal, G.; Hussain, F.; Morris, D.; Osakue, E.; Yeow, Y.; Zahir, S.; Armitage, D. W.; Peyton, A. J.

    2013-10-01

    Electromagnetic systems for imaging concealed objects at checkpoints typically employ radiation at millimetre and terahertz frequencies. These systems have been shown to be effective and provide a sufficiently high resolution image. However there are difficulties and current electromagnetic systems have limitations particularly in accurately differentiating between threat and innocuous objects based on shape, surface emissivity or reflectivity, which are indicative parameters. In addition, water has a high absorption coefficient at millimetre wavelength and terahertz frequencies, which makes it more difficult for these frequencies to image through thick damp clothing. This paper considers the potential of using ultra wideband (UWB) in the low gigahertz range. The application of this frequency band to security screening appears to be a relatively new field. The business case for implementing the UWB system has been made financially viable by the recent availability of low-cost integrated circuits operating at these frequencies. Although designed for the communication sector, these devices can perform the required UWB radar measurements as well. This paper reports the implementation of a 2 to 5 GHz bandwidth linear array scanner. The paper describes the design and fabrication of transmitter and receiver antenna arrays whose individual elements are a type of antipodal Vivaldi antenna. The antenna's frequency and angular response were simulated in CST Microwave Studio and compared with laboratory measurements. The data pre-processing methods of background subtraction and deconvolution are implemented to improve the image quality. The background subtraction method uses a reference dataset to remove antenna crosstalk and room reflections from the dataset. The deconvolution method uses a Wiener filter to "sharpen" the returned echoes which improves the resolution of the reconstructed image. The filter uses an impulse response reference dataset and a signal

  3. Objective Methods for Reliable Detection of Concealed Depression

    Directory of Open Access Journals (Sweden)

    Cynthia eSolomon

    2015-04-01

    Full Text Available Recent research has shown that it is possible to automatically detect clinical depression from audio-visual recordings. Before considering integration in a clinical pathway, a key question that must be asked is whether such systems can be easily fooled. This work explores the potential of acoustic features to detect clinical depression in adults both when acting normally and when asked to conceal their depression. Nine adults diagnosed with mild to moderate depression as per the Beck Depression Inventory (BDI-II and Patient Health Questionnaire (PHQ-9 were asked a series of questions and to read a excerpt from a novel aloud under two different experimental conditions. In one, participants were asked to act naturally and in the other, to suppress anything that they felt would be indicative of their depression. Acoustic features were then extracted from this data and analysed using paired t-tests to determine any statistically significant differences between healthy and depressed participants. Most features that were found to be significantly different during normal behaviour remained so during concealed behaviour. In leave-one-subject-out automatic classification studies of the 9 depressed subjects and 8 matched healthy controls, an 88% classification accuracy and 89% sensitivity was achieved. Results remained relatively robust during concealed behaviour, with classifiers trained on only non-concealed data achieving 81% detection accuracy and 75% sensitivity when tested on concealed data. These results indicate there is good potential to build deception-proof automatic depression monitoring systems.

  4. Preventing shoulder-surfing attack with the concept of concealing the password objects' information.

    Science.gov (United States)

    Ho, Peng Foong; Kam, Yvonne Hwei-Syn; Wee, Mee Chin; Chong, Yu Nam; Por, Lip Yee

    2014-01-01

    Traditionally, picture-based password systems employ password objects (pictures/icons/symbols) as input during an authentication session, thus making them vulnerable to "shoulder-surfing" attack because the visual interface by function is easily observed by others. Recent software-based approaches attempt to minimize this threat by requiring users to enter their passwords indirectly by performing certain mental tasks to derive the indirect password, thus concealing the user's actual password. However, weaknesses in the positioning of distracter and password objects introduce usability and security issues. In this paper, a new method, which conceals information about the password objects as much as possible, is proposed. Besides concealing the password objects and the number of password objects, the proposed method allows both password and distracter objects to be used as the challenge set's input. The correctly entered password appears to be random and can only be derived with the knowledge of the full set of password objects. Therefore, it would be difficult for a shoulder-surfing adversary to identify the user's actual password. Simulation results indicate that the correct input object and its location are random for each challenge set, thus preventing frequency of occurrence analysis attack. User study results show that the proposed method is able to prevent shoulder-surfing attack.

  5. Multispectral illumination and image processing techniques for active millimeter-wave concealed object detection.

    Science.gov (United States)

    Zhang, Lixiao; Stiens, Johan; Elhawil, Amna; Vounckx, Roger

    2008-12-01

    Active millimeter-wave imaging systems for concealed object detection offer the possibility of much higher image contrast than passive systems, especially in indoor applications. By studying active millimeter-wave images of different test objects derived in the W band, we show that multispectral illumination is critical to the detectability of targets. We also propose to use image change detection techniques, including image differencing, normalized difference vegetation index, and principle component analysis to process the multispectral millimeter-wave images. The results demonstrate that multispectral illumination can significantly reveal the object features hidden by image artifacts and improve the appearance of the objects.

  6. Video inpainting with short-term windows: application to object removal and error concealment.

    Science.gov (United States)

    Ebdelli, Mounira; Le Meur, Olivier; Guillemot, Christine

    2015-10-01

    In this paper, we propose a new video inpainting method which applies to both static or free-moving camera videos. The method can be used for object removal, error concealment, and background reconstruction applications. To limit the computational time, a frame is inpainted by considering a small number of neighboring pictures which are grouped into a group of pictures (GoP). More specifically, to inpaint a frame, the method starts by aligning all the frames of the GoP. This is achieved by a region-based homography computation method which allows us to strengthen the spatial consistency of aligned frames. Then, from the stack of aligned frames, an energy function based on both spatial and temporal coherency terms is globally minimized. This energy function is efficient enough to provide high quality results even when the number of pictures in the GoP is rather small, e.g. 20 neighboring frames. This drastically reduces the algorithm complexity and makes the approach well suited for near real-time video editing applications as well as for loss concealment applications. Experiments with several challenging video sequences show that the proposed method provides visually pleasing results for object removal, error concealment, and background reconstruction context.

  7. Remote concealing any arbitrary objects with multi-folded transformation optics

    CERN Document Server

    Zheng, Bin; Hao, Ran; Zhang, Xianmin; Liu, Xu; Li, Erping; Chen, Hongsheng

    2015-01-01

    Remote concealing any arbitrary object is a very interesting topic but is still impossible so far. In this Letter, we introduce a novel way to design a remote cloaking device that is applicable to any object at a certain distance. This is achieved by using multi-folded transformation optics in which we remotely generate a zero-field region that no field can penetrate inside but it will not disturb the far-field scattering electromagnetic field. As a result, any object in such zero-field region can stay or move freely but remains invisible. Our proposed idea can be further extended to design an object independent remote illusion optics, which can transform any arbitrary objects into another object without knowing the details of the objects. The proposed multi-folded transformation optics will be very useful in the design of remote devices.

  8. Stand-off spatial offset Raman spectroscopy for the detection of concealed content in distant objects.

    Science.gov (United States)

    Zachhuber, Bernhard; Gasser, Christoph; Chrysostom, Engelene tH; Lendl, Bernhard

    2011-12-15

    A pulsed (4.4 ns pulse length) frequency-doubled Nd:YAG laser operated at 10 Hz was used to generate Raman scattering of samples at a distance of 12 m. The scattered light was collected by a 6 in. telescope, and the Raman spectrum was recorded using an Acton SP-2750 spectrograph coupled to a gated intensified charge-coupled device (ICCD) detector. Applying a spatial offset between the point where the laser hit the sample and the focus of the telescope on the sample enabled collection of Raman photons that were predominantly generated inside the sample and not from its surface. This is especially effective when the content of concealed objects should be analyzed. High-quality Raman spectra could be recorded, within 10 s of data acquisition, from a solid (NaClO(3)) as well as a liquid (isopropyl alcohol) placed inside a 1.5 mm thick opaque low-density polyethylene (LDPE) plastic bottle. The applied spatial offset was also advantageous in cases where the surface of the container was highly fluorescent. In such a situation, Raman spectra of the sample could not be recorded when the sampling volume (telescope observation field) coincided with the focus of the excitation laser. However, with the use of a spatial offset of some millimeters, a clear Raman spectrum of the content (isopropyl alcohol) in a strongly fluorescent plastic container was obtained.

  9. SUSPICIOUS POST

    CERN Multimedia

    Relations with the Host States Service

    2001-01-01

    If you receive a suspicious letter or package in the post, please do not open it and contact the Fire Brigade Tel. 74444. They will contact the CERN Medical Service. This is especially important in today's current situation with regard to the Anthrax scare. For further information, the Permanent Mission of Switzerland to the International Organisations in Geneva recommends the following web sites:   http://www.admin.ch/ch/f/cf/brennpunkt/03.html http://www.who.int/emc-documents/zoonoses/whoemczdi986c.html

  10. Can methodological requirements be fulfilled when studying concealed or unethical research objects? The case of astroturfing

    Directory of Open Access Journals (Sweden)

    Sophie BOULAY

    2013-12-01

    Full Text Available Scientific soundness is key in the development of research designs. Methodological choices bear the responsibility to demonstrate its obtainment. However, it is challenging to abide by these standards while dealing with hidden, masked or unethical objects. In this article, we share the various strategies employed to aim at a sound scientific process in spite of astroturfing’s characteristics and of the methodological orientations it dictates. Facing the dilemma between the importance of scientific value and the richness of inductive and exploratory approaches, we question the influence of positivist research standards in communication studies. We fear these requirements may limit their development.

  11. Remote laser drilling and sampling system for the detection of concealed explosives

    Science.gov (United States)

    Wild, D.; Pschyklenk, L.; Theiß, C.; Holl, G.

    2017-05-01

    The detection of hazardous materials like explosives is a central issue in national security in the field of counterterrorism. One major task includes the development of new methods and sensor systems for the detection. Many existing remote or standoff methods like infrared or raman spectroscopy find their limits, if the hazardous material is concealed in an object. Imaging technologies using x-ray or terahertz radiation usually yield no information about the chemical content itself. However, the exact knowledge of the real threat potential of a suspicious object is crucial for disarming the device. A new approach deals with a laser drilling and sampling system for the use as verification detector for suspicious objects. Central part of the system is a miniaturised, diode pumped Nd:YAG laser oscillator-amplifier. The system allows drilling into most materials like metals, synthetics or textiles with bore hole diameters in the micron scale. During the drilling process, the hazardous material can be sampled for further investigation with suitable detection methods. In the reported work, laser induced breakdown spectroscopy (LIBS) is used to monitor the drilling process and to classify the drilled material. Also experiments were carried out to show the system's ability to not ignite even sensitive explosives like triacetone triperoxide (TATP). The detection of concealed hazardous material is shown for different explosives using liquid chromatography and ion mobility spectrometry.

  12. Standoff detection of concealed handguns

    Science.gov (United States)

    Rezgui, Nacer; Andrews, David; Bowring, Nicholas; Harmer, Stuart; Southgate, Matthew

    2008-04-01

    An active technique for the standoff detection and identification of concealed conducting items such as handguns and knives is presented. This technique entails illuminating an object with wide range stepped millimetre wave radiation and inducing a local electromagnetic field comprised of a superposition of modes. The coupling to these modes from the illuminating and scattered fields is, in general, frequency dependent and this forms the basis for the detection and identification of conducting items. The object needs to be fully illuminated if a full spectrum of modes and therefore a full frequency response are to be excited and collected. The scattered EM power is measured at "stand off" distance of several metres as the illuminating field is frequency swept and patterns in frequency response characteristic to the target item being sought are looked for. This system relies on contributions from the aspect independent late time responses employed by Baum1 together with aspect independent information derived specifically from gun barrels and polarisation from scattering effects. This technique is suitable for a deployable gun and concealed weapons detection system and does not rely on imaging techniques for determining the presence of a gun. Experimental sets of responses from typical metal or partially conducting objects such as keys, mobile phones and concealed handguns are presented at a range of frequencies.

  13. An integrated framework for detecting suspicious behaviors in video surveillance

    Science.gov (United States)

    Zin, Thi Thi; Tin, Pyke; Hama, Hiromitsu; Toriu, Takashi

    2014-03-01

    In this paper, we propose an integrated framework for detecting suspicious behaviors in video surveillance systems which are established in public places such as railway stations, airports, shopping malls and etc. Especially, people loitering in suspicion, unattended objects left behind and exchanging suspicious objects between persons are common security concerns in airports and other transit scenarios. These involve understanding scene/event, analyzing human movements, recognizing controllable objects, and observing the effect of the human movement on those objects. In the proposed framework, multiple background modeling technique, high level motion feature extraction method and embedded Markov chain models are integrated for detecting suspicious behaviors in real time video surveillance systems. Specifically, the proposed framework employs probability based multiple backgrounds modeling technique to detect moving objects. Then the velocity and distance measures are computed as the high level motion features of the interests. By using an integration of the computed features and the first passage time probabilities of the embedded Markov chain, the suspicious behaviors in video surveillance are analyzed for detecting loitering persons, objects left behind and human interactions such as fighting. The proposed framework has been tested by using standard public datasets and our own video surveillance scenarios.

  14. Concealed weapons detection using electromagnetic resonances

    Science.gov (United States)

    Hunt, Allen R.; Hogg, R. Douglas; Foreman, William

    1998-12-01

    Concealed weapons pose a significant threat to both law enforcement and security agency personnel. The uncontrolled environments associated with peacekeeping and the move toward relaxation of concealed weapons laws here in the U.S. provide a strong motivation for developing weapons detection technologies which are noninvasive and can function noncooperatively. Existing weapons detection systems are primarily oriented to detecting metal and require the cooperation of the person being searched. The new generation of detectors under development that focuses primarily on imaging methods, faces problems associated with privacy issues. There remains a need for a weapons detector which is portable, detects weapons remotely, avoids the issues associated with privacy rights, can tell the difference between car keys and a knife, and is affordable enough that one can be issued to every peacekeeper and law enforcement officer. AKELA is developing a concealed weapons detector that uses wideband radar techniques to excite natural electromagnetic resonances that characterize the size, shape, and material composition of an object. Neural network processing is used to classify the difference between weapons and nuisance objects. We have constructed both time and frequency domain test systems and used them to gather experimental data on a variety of armed and unarmed individuals. These experiments have been performed in an environment similar to the operational environment. Preliminary results from these experiments show that it is possible to detect a weapon being carried by an individual from a distance of 10 to 15 feet, and to detect a weapon being concealed behind the back. The power required is about 100 milliwatts. A breadboard system is being fabricated and will be used by AKELA and our law enforcement partner to gather data in operationally realistic situations. While a laptop computer will control the breadboard system, the wideband radar electronics will fit in a box the

  15. Disease concealment: Experiences of thalassemia patients and their caregivers

    Directory of Open Access Journals (Sweden)

    Pouraboli B

    2014-11-01

    Full Text Available Background and Objective: Disclosure of disease is one of the most complex challenges for individuals who live with thalassemia. This issue is associated with being stigmatized. It is usually associated with anxiety, fear, and negative reactions of other people. Exploring the experience of concealment resulting from thalassemia-related stigma and designing effective interventions is the key to effective treatment and caring of these patients. The present study was conducted to explain the experiences of thalassemia patients and their caregivers concerning disease concealment due to stigmatization. Materials and Method: This qualitative study performed through conventional content analysis approach. The 21 participants with major thalassemia and their caregivers were selected through purposive sampling. The research was performed in the medical facility of Samen Alhojaj, Kerman, Iran, during 2012-2013. Data were gathered through unstructured interviews and field notes. Data analysis was done using conventional content analysis approach Results: The concept of concealment experienced by patients and their caregivers included the reasons for concealment (disease as a barrier for goal achievement, patient’s personal traits as a barrier for disease disclosure, parents tendency for disease concealment, wrong behaviors and beliefs of the society due to stigmatization of the disease, strategies for concealment (secret caring and lying, and concealment outcomes (physical exhaustion, mental stress, deprivation of support. Conclusion: Patients’ experiences related to thalassemia stigmatization indicated that these patients not only experience adverse physical and mental outcomes of the disease, but also deal with the disease concealment resulting from social stigmatization. The results of the current study can be an introduction to planning interventions to resolve social problems of these patients and help promote their quality of life.

  16. Revealing and Concealing in Antiquity

    DEFF Research Database (Denmark)

    Secrecy and the act of concealing and revealing knowledge effectually segregate the initiated and the uninitiated. The act of sharing or hiding knowledge plays a central role in all human relations private or public, political or religious. This volume explores the concept of secrecy and its impl...

  17. (aspiration cytology and mammography) of clinically suspicious ...

    African Journals Online (AJOL)

    Combined assessment. (aspiration cytology and mammography) of clinically suspicious breast masses. W. F. van Wyk, D. M. Dent, E. Anne Hacking,. Genevieve Learmonth, R. E. Kottler,. C. Anne Gudgeon, A. Tiltman. We examined the safety and utility of the combined assessment of aspiration cytology and mammography ...

  18. Unattended Monitoring of Suspicious Behaviour for Route Surveillance

    NARCIS (Netherlands)

    Schoemaker, R.M.; Sandbrink, R.D.J.; Voorthuijsen, G.P. van

    2010-01-01

    A priori information on suspicious behaviour is extremely valuable for countering threats involving improvised explosive devices (IEDs). Suspicious activities along routes during expeditionary operations can be monitored by unattended networks using simple sensing nodes that can gather data for

  19. Theory of the Concealed Information Test

    NARCIS (Netherlands)

    Verschuere, B.; Ben-Shakhar, G.; Verschuere, B.; Ben-Shakhar, G.; Meijer, E.

    2011-01-01

    It is now well established that physiological measures can be validly used to detect concealed information. An important challenge is to elucidate the underlying mechanisms of concealed information detection. We review theoretical approaches that can be broadly classified in two major categories:

  20. Color image fusion for concealed weapon detection

    NARCIS (Netherlands)

    Toet, A.

    2003-01-01

    Recent advances in passive and active imaging sensor technology offer the potential to detect weapons that are concealed underneath a person's clothing or carried along in bags. Although the concealed weapons can sometimes easily be detected, it can be difficult to perceive their context, due to the

  1. Increase in perceived case suspiciousness due to local contrast optimisation in digital screening mammography.

    NARCIS (Netherlands)

    Visser, R.; Veldkamp, W.J.H.; Beijerinck, D.; Bun, P.A.; Deurenberg, J.J.; Imhof-Tas, M.W.; Schuur, K.H.; Snoeren, M.M.; Heeten, G.J. den; Karssemeijer, N.; Broeders, M.J.M.

    2012-01-01

    OBJECTIVES: To determine the influence of local contrast optimisation on diagnostic accuracy and perceived suspiciousness of digital screening mammograms. METHODS: Data were collected from a screening region in the Netherlands and consisted of 263 digital screening cases (153 recalled,110 normal).

  2. [Advances in the studies of concealed penis].

    Science.gov (United States)

    Fan, Sheng-hai; Li, Xue-de

    2015-09-01

    Concealed penis is usually found in children, which affects the patients both physiologically and psychologically. Some of the patients are wrongly treated by circumcision, which may bring about serious consequences to the sexual life of the patients in their adulthood. In the recent years, this disease has been receiving more and more attention from both doctors and parents. However, controversies remain as to its classification, pathogenesis, pathology, and treatment. This paper focuses on the understanding and advances in the studies of concealed penis.

  3. Validation of the Body Concealment Scale for Scleroderma (BCSS): Replication in the Scleroderma Patient-centered Intervention Network (SPIN) Cohort

    NARCIS (Netherlands)

    Jewett, L.R.; Kwakkenbos, C.M.C.; Carrier, M.E.; Malcarne, V.L.; Harcourt, D.; Rumsey, N.; Mayes, M.D.; Assassi, S.; Körner, A.; Fox, R.S.; Gholizadeh, S.; Mills, S.D.; Fortune, C.; Thombs, B.D.

    2017-01-01

    Body concealment is an important component of appearance distress for individuals with disfiguring conditions, including scleroderma. The objective was to replicate the validation study of the Body Concealment Scale for Scleroderma (BCSS) among 897 scleroderma patients. The factor structure of the

  4. Could plate tectonics on Venus be concealed by volcanic deposits

    Science.gov (United States)

    Kaula, W. M.; Muradian, L. M.

    1982-01-01

    The present investigation is supplementary to a study reported by Kaula and Phillips (1981). From an analysis of Pioneer Venus altimetry, Kaula and Phillips had inferred that any heat loss from the planet by plate tectonics must be small compared to that from the earth. However, it has been suggested by others that plate tectonic may exist on Venus, but that the expected 'square root of s' dependence of the topographic drop off is not observed because it is concealed by lava flows. The present investigation has the objective to conduct an examination whether this suggestion of concealment by lava flow is correct. On the basis of the performed analysis, it is concluded that the results obtained by Kaula and Phillips appear to be well justified.

  5. Minimising bias in the forensic evaluation of suspicious paediatric injury.

    Science.gov (United States)

    Skellern, Catherine

    2015-08-01

    In the rules of evidence in all legal jurisdictions, medical experts are required to maintain objectivity when providing opinions. When interpreting medical evidence, doctors must recognise, acknowledge and manage uncertainties to ensure their evidence is reliable to legal decision-makers. Even in the forensic sciences such as DNA analysis, implicit bias has been shown to influence how results are interpreted from cognitive and contextual biases unconsciously operating. In cases involving allegations of child abuse there has been significant exposure in the media, popular magazines, legal journals and in the published medical literature debating the reliability of medical evidence given in these proceedings. In these cases judges have historically been critical of experts they perceived had sacrificed objectivity for advocacy by having an investment in a 'side'. This paper firstly discusses the issue of bias then describes types of cognitive biases identified from psychological research applied to forensic evidence including adversarial bias, context bias, confirmation bias and explains how terminology can influence the communication of opinion. It follows with previously published guidelines of how to reduce the risk of bias compromising objectivity in forensic practices then concludes with my own recommendations of practices that can be used by child protection paediatricians and within an organisation when conducting forensic evaluations of suspicious childhood injury to improve objectivity in formulation of opinion evidence. Crown Copyright © 2015. Published by Elsevier Ltd. All rights reserved.

  6. AN IMPROVED EXEMPLAR-BASED IMAGE INPAINTING ALGORITHM FOR ERROR CONCEALMENT

    Directory of Open Access Journals (Sweden)

    Hwang Byongsu

    2017-08-01

    Full Text Available Error concealment is an important technique to improve the video quality in case that the video frame is corrupted during transmission. A spatial error concealment algorithm based on the improved exemplar-based image inpainting is presented. Each corrupted macroblock is separated into sixteen 4×4 blocks, and a 4×4 block-based image inpainting is used for error concealment. In the exemplar-based inpainting process the best matching patch is determined by calculating the weighted sum of squared differences for the available patch regions which includes already concealed blocks. Experimental results show that our proposed method achieves better quality in terms of objective and subjective evaluations compared with the previous algorithms.

  7. Actinomyces israelii May Produce Vulvar Lesions Suspicious for Malignancy

    Directory of Open Access Journals (Sweden)

    2006-01-01

    Full Text Available Background. We present a case of Actinomyces israelii causing vulvar mass suspicious for malignancy in a postmenopausal woman. Case. A 60 year-old woman presented due to a firm, nonmobile, 10 cm vulvar mass, which had been rapidly enlarging for 5 months. The mass was painful, with localized pruritus and sinus tracts oozing of serosanguinous fluid. Biopsy and cultures revealed a ruptured epidermal inclusion cyst containing granulation tissue and Actinomyces israelii. Conclusion. Actinomyces israelii may produce vulvar lesions that are suspicious for malignancy. Thus, biopsies and cultures are both mandatory while evaluating vulvar masses suspicious for malignancy.

  8. Actinomyces israelii May Produce Vulvar Lesions Suspicious for Malignancy

    Science.gov (United States)

    McElroy, Jennifer Y.; Gorens, Marsha E.; Jackson, Lisa N.; Stigger, Danielle; Becker, Teresa; Sheiner, Eyal

    2006-01-01

    Background. We present a case of Actinomyces israelii causing vulvar mass suspicious for malignancy in a postmenopausal woman. Case. A 60 year-old woman presented due to a firm, nonmobile, 10 cm vulvar mass, which had been rapidly enlarging for 5 months. The mass was painful, with localized pruritus and sinus tracts oozing of serosanguinous fluid. Biopsy and cultures revealed a ruptured epidermal inclusion cyst containing granulation tissue and Actinomyces israelii. Conclusion. Actinomyces israelii may produce vulvar lesions that are suspicious for malignancy. Thus, biopsies and cultures are both mandatory while evaluating vulvar masses suspicious for malignancy. PMID:17093351

  9. Video error concealment using block matching and frequency selective extrapolation algorithms

    Science.gov (United States)

    P. K., Rajani; Khaparde, Arti

    2017-06-01

    Error Concealment (EC) is a technique at the decoder side to hide the transmission errors. It is done by analyzing the spatial or temporal information from available video frames. It is very important to recover distorted video because they are used for various applications such as video-telephone, video-conference, TV, DVD, internet video streaming, video games etc .Retransmission-based and resilient-based methods, are also used for error removal. But these methods add delay and redundant data. So error concealment is the best option for error hiding. In this paper, the error concealment methods such as Block Matching error concealment algorithm is compared with Frequency Selective Extrapolation algorithm. Both the works are based on concealment of manually error video frames as input. The parameter used for objective quality measurement was PSNR (Peak Signal to Noise Ratio) and SSIM(Structural Similarity Index). The original video frames along with error video frames are compared with both the Error concealment algorithms. According to simulation results, Frequency Selective Extrapolation is showing better quality measures such as 48% improved PSNR and 94% increased SSIM than Block Matching Algorithm.

  10. Modified penoplasty for concealed penis in children.

    Science.gov (United States)

    Yang, Tianyou; Zhang, Liyu; Su, Cheng; Li, Zhongmin; Wen, Yingquan

    2013-09-01

    To report a modified penoplasty technique for concealed penis in children. Between January 2006 and June 2012, 201 cases of concealed penis were surgically repaired with modified penoplasty. The modified penoplasty technique consisted of 3 major steps: (1) degloved the penile skin and excised the inner prepuce, (2) advanced penoscrotal skin to cover penile shaft, and (3) fixed the penis base and reconstructed the penoscrotal angle. Two hundred one cases of concealed penis were enrolled in this study over a period of 6 years. Mean age at the time of surgery was 5.3 years (range 1-13 years) and mean operative time was 40 minutes (range 30-65minutes). All patients were routinely followed up at 1, 3, and 6 months after surgery. Most patients developed postoperative edema and were resolved within 1 month, whereas 20 cases developed prolonged postoperative edema, especially at the site of frenulum, which took 3 months to be resolved. Ten cases had retraction after surgery. No erection difficulties were recorded. Patients/parents reported better hygiene and improved visualization and accessibility of penis after surgery and were satisfied with the cosmetic outcome. The result of this study shows that the modified penoplasty technique is a simple, safe, and effective procedure for concealed penis with satisfied cosmetic outcome. Copyright © 2013 Elsevier Inc. All rights reserved.

  11. Management of concealed penis with modified penoplasty.

    Science.gov (United States)

    Xu, Jian-Guo; Lv, Chuan; Wang, Yu-Chong; Zhu, Ji; Xue, Chun-Yu

    2015-03-01

    To investigate the effect of penile degloving in combination with penoscrotal angle reconstruction for the correction of concealed penis. A foreskin circumcision incision was made along the coronal sulcus. After a sharp dissection under the superficial layer of tunica albuginea, the penile shaft was degloved to release the fibrous bands of the tunica dartos. Through a longitudinal incision or Z-plasty at the penoscrotal junction, securing of the tunica albuginea to the proximal tunica dartos was performed. The penoscrotal angle was reconstructed. This procedure effectively corrected the concealed penis, while correcting other problems such as phimosis. From August 2008 to August 2013, we performed 41 procedures for concealed penis. Correction was successful in all patients with an improved median length of 2.1 cm in the flaccid state. Follow-up ranged from 6 months to 2 years, and satisfactory cosmetic outcomes were obtained without scars or erectile discomfort. Our technique includes degloving and penoscrotal angle reconstruction, which provides proper visualization for fixation of the penile base. The longitudinal or Z-plasty incision also opened the degloving dead cavity, which was good for drainage. The procedure is straight forward with good functional and cosmetic outcomes and is thus ideal for correction of the concealed penis. Copyright © 2015 Elsevier Inc. All rights reserved.

  12. College Students' Reasons for Concealing Suicidal Ideation

    Science.gov (United States)

    Burton Denmark, Adryon; Hess, Elaine; Becker, Martin Swanbrow

    2012-01-01

    Self-reported reasons for concealing suicidal ideation were explored using data from a national survey of undergraduate and graduate students: 558 students indicated that they seriously considered attempting suicide during the previous year and did not tell anyone about their suicidal thoughts. Content analysis of students' qualitative responses…

  13. Concealment of Child Sexual Abuse in Sports

    Science.gov (United States)

    Hartill, Mike

    2013-01-01

    When the sexual abuse of children is revealed, it is often found that other nonabusing adults were aware of the abuse but failed to act. During the past twenty years or so, the concealment of child sexual abuse (CSA) within organizations has emerged as a key challenge for child protection work. Recent events at Pennsylvania State University (PSU)…

  14. Thyroid nodules with highly suspicious ultrasonographic features, but with benign cytology on two occasions: is malignancy still possible?

    Energy Technology Data Exchange (ETDEWEB)

    Rosario, Pedro Weslley; Calsolari, Maria Regina, E-mail: pedrowsrosario@gmail.com [Santa Casa de Belo Horizonte, MG (Brazil)

    2016-11-01

    There is no information about the frequency of malignancy specifically in the case of thyroid nodules with highly suspicious sonographic features, but with two fine needle aspiration (FNA) showing benign cytology. This was the objective of the study. Subjects and methods: We report the results of 105 patients with thyroid nodules considered 'highly suspicious' according to the ultrasonographic classification of American Thyroid Association, in whom FNA revealed benign cytology on two occasions (interval of 6 months). Results: Thyroidectomy was performed in 11 cases due to desire of the patient or significant growth of the nodule. In these patients, cytology continued to be benign in 9, was non-diagnostic in 1, and suspicious in 1. Histology revealed papillary carcinoma in only one nodule. In patients in whom a third FNA was obtained for this study (n = 94), cytology continued to be benign in 86, became non-diagnostic in 5, indeterminate in 2, and suspicious in 1. The last 8 patients (with non-benign cytology) were submitted to thyroidectomy and histology revealed malignancy in only one nodule. Conclusion: The rate of malignancy found here for nodules with highly suspicious sonographic features, even after two FNA showing benign cytology, was 2%. We believe that in these cases, the continuation of follow-up consisting of ultrasound at intervals of 2 years may still be adequate. (author)

  15. Objectivity

    CERN Document Server

    Daston, Lorraine

    2010-01-01

    Objectivity has a history, and it is full of surprises. In Objectivity, Lorraine Daston and Peter Galison chart the emergence of objectivity in the mid-nineteenth-century sciences--and show how the concept differs from its alternatives, truth-to-nature and trained judgment. This is a story of lofty epistemic ideals fused with workaday practices in the making of scientific images. From the eighteenth through the early twenty-first centuries, the images that reveal the deepest commitments of the empirical sciences--from anatomy to crystallography--are those featured in scientific atlases, the compendia that teach practitioners what is worth looking at and how to look at it. Galison and Daston use atlas images to uncover a hidden history of scientific objectivity and its rivals. Whether an atlas maker idealizes an image to capture the essentials in the name of truth-to-nature or refuses to erase even the most incidental detail in the name of objectivity or highlights patterns in the name of trained judgment is a...

  16. Medical makeup for concealing facial scars.

    Science.gov (United States)

    Mee, Donna; Wong, Brian J F

    2012-10-01

    Surgical, laser, and pharmacological therapies are all used to correct scars and surgical incisions, though have limits with respect to how well facial skin can be restored or enhanced. The use of cosmetics has long been a relevant adjunct to all scar treatment modalities. In recent years, technical advancements in the chemistry and composition of cosmetic products have provided the patient with a broader range of products to employ for concealing scars. This review will provide an overview of contemporary methods for concealing facial scars, birthmarks, and pigmentary changes without the use of traditional/dated, heavy appearing camouflage products. Additionally, general guidelines and information will be provided with respect to identifying competent makeup artists for care of the medical patient. The article by no means is meant to be a tutorial, but rather serves as a starting point in this allied field of medicine. Thieme Medical Publishers 333 Seventh Avenue, New York, NY 10001, USA.

  17. Detection of hidden objects using a real-time 3-D millimeter-wave imaging system

    Science.gov (United States)

    Rozban, Daniel; Aharon, Avihai; Levanon, Assaf; Abramovich, Amir; Yitzhaky, Yitzhak; Kopeika, N. S.

    2014-10-01

    Millimeter (mm)and sub-mm wavelengths or terahertz (THz) band have several properties that motivate their use in imaging for security applications such as recognition of hidden objects, dangerous materials, aerosols, imaging through walls as in hostage situations, and also in bad weather conditions. There is no known ionization hazard for biological tissue, and atmospheric degradation of THz radiation is relatively low for practical imaging distances. We recently developed a new technology for the detection of THz radiation. This technology is based on very inexpensive plasma neon indicator lamps, also known as Glow Discharge Detector (GDD), that can be used as very sensitive THz radiation detectors. Using them, we designed and constructed a Focal Plane Array (FPA) and obtained recognizable2-dimensional THz images of both dielectric and metallic objects. Using THz wave it is shown here that even concealed weapons made of dielectric material can be detected. An example is an image of a knife concealed inside a leather bag and also under heavy clothing. Three-dimensional imaging using radar methods can enhance those images since it can allow the isolation of the concealed objects from the body and environmental clutter such as nearby furniture or other people. The GDDs enable direct heterodyning between the electric field of the target signal and the reference signal eliminating the requirement for expensive mixers, sources, and Low Noise Amplifiers (LNAs).We expanded the ability of the FPA so that we are able to obtain recognizable 2-dimensional THz images in real time. We show here that the THz detection of objects in three dimensions, using FMCW principles is also applicable in real time. This imaging system is also shown here to be capable of imaging objects from distances allowing standoff detection of suspicious objects and humans from large distances.

  18. Detection of hazardous liquids concealed in glass, plastic, and aluminum containers

    Science.gov (United States)

    Ramirez, Michael L.; Ortiz, William; Ruiz, Orlando; Pacheco-Londoño, Leonardo; Hernández-Rivera, Samuel P.

    2007-04-01

    The use of liquid explosives by terrorists has raised the attention to the use of hazardous liquids as threats to people, buildings and transportation systems. Hazardous liquids such as explosive mixtures, flammables or even chemical warfare agents (CWA) can be concealed in common containers and pass security checks undetected. This work presents three non invasive, non destructive detection approaches that can be used to characterize the content of common liquid containers and detect if the liquid is the intended or a concealed hazardous liquid. Fiber optic coupled Raman spectroscopy and Stand off Raman spectroscopy were used to inspect the content of glass and plastic bottles and thermal conductivity was used to asses the liquid inside aluminum cans. Raman spectroscopy experiments were performed at 532 nm, 488 nm and 785 nm excitation wavelengths. The hazardous liquids under consideration included CWA simulant DMMP, hydrogen peroxide, acetone, cyclohexane, ethanol and nitric acid. These techniques have potential use as a detector for hazardous liquids at a check point or to inspect suspicious bottles from a distance.

  19. Concealed Threat Detection at Multiple Frames-per-second

    Energy Technology Data Exchange (ETDEWEB)

    Chang, J T

    2005-11-08

    In this LDRD project, our research purpose is to investigate the science and technology necessary to enable real-time array imaging as a rapid way to detect hidden threats through obscurants such as smoke, fog, walls, doors, and clothing. The goal of this research is to augment the capabilities of protective forces in concealed threat detection. In the current context, threats include people as well as weapons. In most cases, security personnel must make very fast assessments of a threat based upon limited amount of data. Among other attributes, UWB has been shown and quantified to penetrate and propagate through many materials (wood, some concretes, non-metallic building materials, some soils, etc.) while maintaining high range resolution. We have build collaborations with university partners and government agencies. We have considered the impact of psychometrics on target recognition and identification. Specifically we have formulated images in real-time that will engage the user's vision system in a more active way to enhance image interpretation capabilities. In this project, we are researching the use of real time (field programmable gate arrays) integrated with high resolution (cm scale), ultra wide band (UWB) electromagnetic signals for imaging personnel through smoke and walls. We evaluated the ability of real-time UWB imaging for detecting smaller objects, such as concealed weapons that are carried by the obscured personnel. We also examined the cognitive interpretation process of real time UWB electromagnetic images.

  20. 75 FR 75586 - Confidentiality of Suspicious Activity Reports

    Science.gov (United States)

    2010-12-03

    ... FinCEN and the OCC, the OTS proposed to modify the general introduction in its rules to state that....'' The introduction also would indicate that SAR information may not be disclosed, except as authorized... ordinary course of the banks' business, on which the report of suspicious activity was based''); Cotton v...

  1. Interpersonal hostility and suspicious thinking in obsessive-compulsive disorder.

    Science.gov (United States)

    Tellawi, Ghazel; Williams, Monnica T; Chasson, Gregory S

    2016-09-30

    Individuals with obsessive-compulsive disorder (OCD) may struggle with hostility and suspicious thinking, but this has not been the subject of much research. The purpose of this study is to examine the relationship between hostility, suspicious thinking, and OCD severity. Participants included 66 outpatients in treatment for OCD, 27 in treatment for other disorders, and 68 students (n=161). All completed the Inventory of Hostility and Suspicious Thinking (IHS), a measure of psychotic thinking/paranoia, the Obsessive Compulsive Inventory-Revised (OCI-R), the Beck Depression Inventory (BDI-II), and the Beck Anxiety Inventory (BAI). As expected, the IHS was significantly positively correlated with the BAI and BDI-II. Additionally, regression analyses revealed that individuals with OCD have higher levels of hostility than students. Hostility was also significantly positively associated with increased OCD severity. Hostility and suspicious thoughts are prominent in anxiety disorders in general, and thus necessitate continued research. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  2. Money laundering: correlation between risk assessment and suspicious transactions

    Directory of Open Access Journals (Sweden)

    Sonja Cindori

    2013-06-01

    Full Text Available The risk assessment system was introduced in the Republic of Croatia in 2009, as a result of harmonization with international standards, especially the Directive 2005/60/EC on the prevention of the use of the financial system for the purpose of money laundering and terrorist financing. Risk assessment is an extensive concept which requires not only a legislative framework, but also the application of numerous criteria for its effective implementation in practice. Among these criteria are suspicious transactions, closely related to the assessment of the customer, transaction, product or service.The undeniable contribution of suspicious transactions to the quality of the risk assessment system will be confirmed by a statistical analysis of a number of West and East European countries. A combination of strict, but sufficiently flexible legal provisions governing the system for prevention of money laundering and terrorist financing and a statistical analysis of reported suspicious transactions will lead to conclusions that either support or represent criticism of the efficiency of application of the risk assessment system in practice.The aforementioned statistical analysis will show whether suspicious transactions are a reliable criterion for the risk assessment analysis, and whether they can be considered the only such criterion. There is a possibility that the findings of the analysis will be contradictory to those of some international studies.

  3. A novel technique of concealed penis repair.

    Science.gov (United States)

    Kim, Jung Jun; Lee, Dong-Gi; Park, Kwan Hyun; Baek, Minki

    2014-04-01

    The correction of concealed penis requires challenging surgical techniques. We describe a novel technique involving inner preputial skin substitution after degloving through a ventral approach that allows sufficient penile skin coverage and evaluated the efficacy and safety of our technique. From February 2009 to March 2009, 12 boys with concealed penises underwent correction via our novel technique. We administered a questionnaire about penile size, morphology, and voiding status to parents to evaluate their satisfaction with the results. The mean age of patients at the time of operation was 4.71 ± 4.01 years, and the mean duration of follow-up was 5.11 ± 1.45 months. Parental satisfaction grades (0 to 4) concerning penile size increased from 1.00 ± 1.04 to 2.83 ± 0.94 (p = 0.002) after surgery, penile morphology from 1.00 ± 0.95 to 3.00 ± 0.85 (p = 0.001), and voiding status from 1.08 ± 1.00 to 3.33 ± 0.78 (p penis was demonstrated to be technically feasible and safe. It provides a good cosmetic appearance and excellent parental satisfaction ratings regarding size, morphology, and voiding function. Georg Thieme Verlag KG Stuttgart · New York.

  4. Self-envy and the concealment of inner resources.

    Science.gov (United States)

    Berman, A

    1999-01-01

    Self-envy refers to envy of one's own inner resources. This term is an adjunct to the psychodynamic understanding of developmental self-arrest, defined as deliberate and defensive impairment of one's own abilities and accomplishments and the concealment of inner resources. The article suggests possible explanations for the formation of self-envy, emphasizing the formation of envious object representations and the construction of a part of the personality based on these introjections. The effects of self-envy on patient therapist relations are also described, focusing on two particular manifestations: attachment to the therapist as a defense against self-envy and attacking the therapeutic contract as one of the patient's assets. Excerpts from a case study are included.

  5. Schizotypy and mindfulness: Magical thinking without suspiciousness characterizes mindfulness meditators

    Directory of Open Access Journals (Sweden)

    Elena Antonova

    2016-09-01

    Full Text Available Despite growing evidence for demonstrated efficacy of mindfulness in various disorders, there is a continuous concern about the relationship between mindfulness practice and psychosis. As schizotypy is part of the psychosis spectrum, we examined the relationship between long-term mindfulness practice and schizotypy in two independent studies. Study 1 included 24 experienced mindfulness practitioners (19 males from the Buddhist tradition (meditators and 24 meditation-naïve individuals (all males. Study 2 consisted of 28 meditators and 28 meditation-naïve individuals (all males. All participants completed the Schizotypal Personality Questionnaire (Raine, 1991, a self-report scale containing 9 subscales (ideas of reference, excessive social anxiety, magical thinking, unusual perceptual experiences, odd/eccentric behavior, no close friends, odd speech, constricted affect, suspiciousness. Participants of study 2 also completed the Five-Facet Mindfulness Questionnaire which assesses observing (Observe, describing (Describe, acting with awareness (Awareness, non-judging of (Non-judgment and non-reactivity to inner experience (Non-reactivity facets of trait mindfulness. In both studies, meditators scored significantly lower on suspiciousness and higher on magical thinking compared to meditation-naïve individuals and showed a trend towards lower scores on excessive social anxiety. Excessive social anxiety correlated negatively with Awareness and Non-judgment; and suspiciousness with Awareness, Non-judgment and Non-reactivity facets across both groups. The two groups did not differ in their total schizotypy score. We conclude that mindfulness practice is not associated with an overall increase in schizotypal traits. Instead, the pattern suggests that mindfulness meditation, particularly with an emphasis on the Awareness, Non-judgment and Non-reactivity aspects, may help to reduce suspiciousness and excessive social anxiety.

  6. Schizotypy and mindfulness: Magical thinking without suspiciousness characterizes mindfulness meditators.

    Science.gov (United States)

    Antonova, Elena; Amaratunga, Kavitha; Wright, Bernice; Ettinger, Ulrich; Kumari, Veena

    2016-09-01

    Despite growing evidence for demonstrated efficacy of mindfulness in various disorders, there is a continuous concern about the relationship between mindfulness practice and psychosis. As schizotypy is part of the psychosis spectrum, we examined the relationship between long-term mindfulness practice and schizotypy in two independent studies. Study 1 included 24 experienced mindfulness practitioners (19 males) from the Buddhist tradition (meditators) and 24 meditation-naïve individuals (all males). Study 2 consisted of 28 meditators and 28 meditation-naïve individuals (all males). All participants completed the Schizotypal Personality Questionnaire (Raine, 1991), a self-report scale containing 9 subscales (ideas of reference, excessive social anxiety, magical thinking, unusual perceptual experiences, odd/eccentric behavior, no close friends, odd speech, constricted affect, suspiciousness). Participants of study 2 also completed the Five-Facet Mindfulness Questionnaire which assesses observing (Observe), describing (Describe), acting with awareness (Awareness), non-judging of (Non-judgment) and non-reactivity to inner experience (Non-reactivity) facets of trait mindfulness. In both studies, meditators scored significantly lower on suspiciousness and higher on magical thinking compared to meditation-naïve individuals and showed a trend towards lower scores on excessive social anxiety. Excessive social anxiety correlated negatively with Awareness and Non-judgment; and suspiciousness with Awareness, Non-judgment and Non-reactivity facets across both groups. The two groups did not differ in their total schizotypy score. We conclude that mindfulness practice is not associated with an overall increase in schizotypal traits. Instead, the pattern suggests that mindfulness meditation, particularly with an emphasis on the Awareness, Non-judgment and Non-reactivity aspects, may help to reduce suspiciousness and excessive social anxiety.

  7. Neural Correlates of Suspiciousness and Interactions with Anxiety during Emotional and Neutral Word Processing

    Directory of Open Access Journals (Sweden)

    Joscelyn E Fisher

    2014-06-01

    Full Text Available Suspiciousness is usually classified as a symptom of psychosis, but it also occurs in depression and anxiety disorders. Though how suspiciousness overlaps with depression is not obvious, suspiciousness does seem to overlap with anxious apprehension and anxious arousal (e.g., verbal iterative processes and vigilance about environmental threat. However, suspiciousness also has unique characteristics (e.g., concern about harm from others and vigilance about social threat. Given that both anxiety and suspiciousness have been associated with abnormalities in emotion processing, it is unclear whether it is the unique characteristics of suspiciousness or the overlap with anxiety that drive abnormalities in emotion processing.. Event-related brain potentials were obtained during an emotion-word Stroop task. Results indicated that suspiciousness interacts with anxious apprehension to modulate initial stimulus perception processes. Suspiciousness is associated with attention to all stimuli regardless of emotion content. In contrast, anxious arousal is associated with a later response to emotion stimuli only. These results suggest that suspiciousness and anxious apprehension share overlapping processes, but suspiciousness alone is associated with a hyperactive early vigilance response. Depression did not interact with suspiciousness to predict response to emotion stimuli. These findings suggest that it may be informative to assess suspiciousness in conjunction with anxiety in order to better understand how these symptoms interact and contribute to dysfunctional emotion processing.

  8. Disclosure and Concealment of Sexual Orientation and the Mental Health of Non-Gay-Identified, Behaviorally-Bisexual Men

    Science.gov (United States)

    Schrimshaw, Eric W.; Siegel, Karolynn; Downing, Martin J.; Parsons, Jeffrey T.

    2013-01-01

    Objective Although bisexual men report lower levels of mental health relative to gay men, few studies have examined the factors that contribute to bisexual men’s mental health. Bisexual men are less likely to disclose, and more likely to conceal (i.e., a desire to hide), their sexual orientation than gay men. Theory suggests that this may adversely impact their mental health. This report examined the factors associated with disclosure and with concealment of sexual orientation, the association of disclosure and concealment with mental health, and the potential mediators (i.e., internalized homophobia, social support) of this association with mental health. Method An ethnically-diverse sample of 203 non-gay-identified, behaviorally-bisexual men who do not disclose their same-sex behavior to their female partners were recruited in New York City to complete a single set of self-report measures. Results Concealment was associated with higher income, a heterosexual identification, living with a wife or girlfriend, more frequent sex with women, and less frequent sex with men. Greater concealment, but not disclosure to friends and family, was significantly associated with lower levels of mental health. Multiple mediation analyses revealed that both internalized homophobia and general emotional support significantly mediated the association between concealment and mental health. Conclusions The findings demonstrate that concealment and disclosure are independent constructs among bisexual men. Further, they suggest that interventions addressing concerns about concealment, emotional support, and internalized homophobia may be more beneficial for increasing the mental health of bisexual men than those focused on promoting disclosure. PMID:23276123

  9. "Suspicious" salivary gland FNA: Risk of malignancy and interinstitutional variability.

    Science.gov (United States)

    Maleki, Zahra; Miller, James Adam; Arab, Seyedeh Elham; Fadda, Guido; Bo, Ping; Wise, Olga; Rossi, Esther Diana; Jhala, Nirag; Ashish, Chandra; Ali, Syed Z; Wang, He

    2018-02-01

    Fine-needle aspiration (FNA) cytology is well accepted as a safe, reliable, minimally invasive, and cost-effective method for the diagnosis of salivary gland lesions. Salivary gland neoplasms are often difficult to diagnose because of morphologic heterogeneity and a variety of epithelial metaplastic changes. Hence, a number of salivary gland FNA specimens yield indeterminate results. For indeterminate FNA specimens, the suspicious-for-malignancy (SFM) category is used when a specific neoplasm falls short in quantity or quality for the criteria for malignancy. Therefore, the findings are not sufficient for a conclusive diagnosis of malignancy. This study was designed to evaluate the risk of malignancy (ROM) for the SFM group at 5 tertiary medical centers worldwide with the aforementioned criteria. Among 12,606 salivary gland FNA cases between 1997 and 2014, 276 (2.2%) were reported to be SFN. Specifically, 114 suspicious cases (41%) had histological follow-up. Histological follow-up of the 114 suspicious cases showed 95 malignant tumors indicating a risk of malignancy (ROM) of 83.3%. The ROM varied between 74% and 88% for the 5 participating institutions, and a Fisher's exact test with significance set to p<.05 showed no significant difference in ROM among the institutions (p = .78). Overall, 83.3% of SFM salivary gland FNA specimens turned out to be malignant; there was no significant interinstitutional variability in the ROMs. The SFM category for salivary gland FNA is very homogeneous, and the ROMs are quite similar worldwide. Cancer Cytopathol 2018;126:94-100. © 2017 American Cancer Society. © 2017 American Cancer Society.

  10. Diagnostic Value of Nucleolar Organizer Regions (AgNORs in Brush Biopsies of Suspicious Lesions of the Oral Cavity

    Directory of Open Access Journals (Sweden)

    Torsten W. Remmerbach

    2003-01-01

    Full Text Available Objective: The aim of this retrospective study was to report on the diagnostic accuracy of AgNOR‐analysis as an adjunctive diagnostic tool of conventional oral exfoliative cytology taken from suspicious lesions in our clinic. Study design: Cytological diagnoses obtained from brush biopsies of macroscopically suspicious lesions of the oral mucosa from 75 patients (final diagnoses: 53 histologically proven squamous cell carcinomas, 11 leukoplakias and other inflammatory oral lesions and from 11 patients with normal mucosa as a negative control group were compared with histological and/or clinical follow‐ups. Five smears were doubtful and seven suspicious for tumor cells in the cytologic report. Number of AgNOR's were counted in 100 squamous epithelial cell‐nuclei per slide after silver‐restaining. Results: Sensitivity of our cytological diagnosis alone on oral smears for the detection of squamous carcinomas was 92.5%, specificity 100%, positive predictive value was 100% and negative 84.6%. The best cut‐off value of the mean number of AgNOR dots per nucleus distinguishing benign from malignant cells was 4.8. The percentage of nuclei with more than three AgNORs had a cut‐off level of 70%. Applying these methods to twelve doubtful or suspicious cytological diagnoses we were able to correctly establish the diagnosis of malignancy in ten cases of histologically proven cancers and to reveal benignity in two histologically proven cases. Thus we achieved a positive and negative predictive value of 100% each. Conclusions: Smears from brushings of visible oral lesions, if clinically considered as suspicious for cancer, are an easily practicable, non‐invasive, painless, safe and accurate screening method for detection of oral cancerous lesions. We conclude that AgNOR‐analysis may be a useful adjunct to other methods in routine cytological diagnosis of oral cancer that can help to solve cytologically suspicious or doubtful cases. Colour

  11. Psychopathy and Physiological Detection of Concealed Information: A review

    Directory of Open Access Journals (Sweden)

    Bruno Verschuere

    2006-03-01

    Full Text Available The Concealed Information Test has been advocated as the preferred method for deception detection using the polygraph ("lie detector". The Concealed Information Test is argued to be a standardised, highly accurate psychophysiological test founded on the orienting reflex. The validity of polygraph tests for the assessment of psychopathic individuals has, however, been questioned. Two dimensions are said to underlie psychopathy: emotional detachment and antisocial behaviour. Distinct psychophysiological correlates are hypothesised in these facets of psychopathy. Emotional detachment is associated with deficient fear-potentiated startle, and antisocial behaviour with reduced orienting. Few studies have examined the effect of psychopathy on the validity of the Concealed Information Test. This review suggests that reduced orienting in high antisocial individuals is also found in the Concealed Information Test, thereby threatening its validity. Implications for criminal investigations, possible solutions and directions for future research will be discussed.

  12. Compressed Domain Packet Loss Concealment of Sinusoidally Coded Speech

    DEFF Research Database (Denmark)

    Rødbro, Christoffer A.; Christensen, Mads Græsbøll; Andersen, Søren Vang

    2003-01-01

    We consider the problem of packet loss concealment for voice over IP (VoIP). The speech signal is compressed at the transmitter using a sinusoidal coding scheme working at 8 kbit/s. At the receiver, packet loss concealment is carried out working directly on the quantized sinusoidal parameters......, based on time-scaling of the packets surrounding the missing ones. Subjective listening tests show promising results indicating the potential of sinusoidal speech coding for VoIP....

  13. Analysis of Coupling Effectiveness on Concealed Signal Cable Slot with Different Shapes

    Directory of Open Access Journals (Sweden)

    Chun-Jiang Shuai

    2014-01-01

    Full Text Available It is important to study the shielding effectiveness to reduce the electromagnetic interference and to protect electronic components. Taking the concealed signal cable which is set in shielding shell as the research object. The influence of different slot shapes on shielding effectiveness was analyzed by applying the mixed methods (Quadric FE-BEM. The results show that the coupling capacitance of a trapezoidal slot is the biggest, the one of rectangular slot is medium, and the one of a taper slot is the smallest for shielding pair cable, but their change trend are almost the same. In addition, with the various slot shapes width increasing, shielding pair cable coupling capacitance is little changed. The study is instructive for more effective to defense EMI and will improve the agricultural concealed shielding cable electromagnetic compatibility.

  14. Disclosure and Concealment of Sexual Orientation and the Mental Health of Non-Gay-Identified, Behaviorally Bisexual Men

    Science.gov (United States)

    Schrimshaw, Eric W.; Siegel, Karolynn; Downing, Martin J., Jr.; Parsons, Jeffrey T.

    2013-01-01

    Objective: Although bisexual men report lower levels of mental health relative to gay men, few studies have examined the factors that contribute to bisexual men's mental health. Bisexual men are less likely to disclose, and more likely to conceal (i.e., a desire to hide), their sexual orientation than gay men. Theory suggests that this may…

  15. Diagnostic Accuracy of Radiologic Scoring System for Evaluation of Suspicious Hirschsprung Disease in Children

    Science.gov (United States)

    Alehossein, Mehdi; Roohi, Ahad; Pourgholami, Masoud; Mollaeian, Mansour; Salamati, Payman

    2015-01-01

    Background: In 1996, Donovan and colleagues represented a scoring system for better prediction of Hirschsprung disease (HD). Objectives: Our objective was to devise another scoring system that uses a checklist of radiologic and clinical signs to determine the probability of HD in suspicious patients. Patients and Methods: In a diagnostic accuracy study, 55 children with clinical manifestations of HD that referred to a training hospital from 1998 to 2011 were assessed. A checklist was used to evaluate the items proposed by contrast enema (CE), based on six subscales, including transitional zone, rectosigmoid index (RSI), irregular contractions in aganglionic region, cobblestone appearance, filling defect due to fecaloid materials and lack of meconium defecation during the first 48 hours after birth. The patients were classified as high score and low score. Sensitivity, specificity, positive predictive value and negative predictive value of our scoring system were calculated for identifying HD, in comparison with pathologically proved or ruled out HD. Results: Of the 55 patients, 36 (65.4%) cases had HD and 19 (34.6%) cases were without HD. In the HD group, 32 patients showed high scores and four patients had low scores. The sensitivity and specificity of our diagnostic scoring system were 88.9% (95% CI: 78.6% - 99.1%) and 84.2% (95% CI: 68.7% - 100%), respectively. Moreover, positive predictive value (PPV) and negative predictive value (NPV) were 91.4% (95% CI: 82.1% - 100%) and 80% (95% CI: 62.5% - 97.5%), respectively. Conclusions: Our new scoring system of CE is a useful diagnostic method in HD. If a patient’s score is high, that patient is highly suspicious to HD and reversely, when one’s score is low, the patient presents a reduced probability to be diagnosed with HD. PMID:25901256

  16. Concealment of drugs in food and beverages in nursing homes: cross sectional study

    Science.gov (United States)

    Kirkevold, Øyvind; Engedal, Knut

    2005-01-01

    Objective To examine the practice of concealing drugs in patients' foodstuff in nursing homes. Design Cross sectional study with data collected by structured interview. Setting All five health regions in Norway. Participants Professional carers of 1362 patients in 160 regular nursing home units and 564 patients in 90 special care units for people with dementia. Main outcome measures Frequency of concealment of drugs; who decided to conceal the drugs; how this practice was documented in the patients' records; and what types of drugs were given this way. Results 11% of the patients in regular nursing home units and 17% of the patients in special care units for people with dementia received drugs mixed in their food or beverages at least once during seven days. In 95% of cases, drugs were routinely mixed in the food or beverages. The practice was documented in patients' records in 40% (96/241) of cases. The covert administration of drugs was more often documented when the physician took the decision to hide the drugs in the patient's foodstuff (57%; 27/47) than when the person who made the decision was unknown or not recorded (23%; 7/30). Patients who got drugs covertly more often received antiepileptics, antipsychotics, and anxiolytics compared with patients who were given their drugs openly. Conclusions The covert administration of drugs is common in Norwegian nursing homes. Routines for such practice are arbitrary, and the practice is poorly documented in the patients' records. PMID:15561732

  17. Method and apparatus for detecting concealed weapons

    Energy Technology Data Exchange (ETDEWEB)

    Kotter, Dale K.; Fluck, Frederick D.

    2006-03-14

    Apparatus for classifying a ferromagnetic object within a sensing area may include a magnetic field sensor that produces magnetic field data. A signal processing system operatively associated with the magnetic field sensor includes a neural network. The neural network compares the magnetic field data with magnetic field data produced by known ferromagnetic objects to make a probabilistic determination as to the classification of the ferromagnetic object within the sensing area. A user interface operatively associated with the signal processing system produces a user-discernable output indicative of the probabilistic determination of the classification of the ferromagnetic object within a sensing area.

  18. Concealed umbilical stoma: description of a modified technique.

    Science.gov (United States)

    Ben-Chaim, J; Rodriguez, R; Docimo, S G

    1995-09-01

    We describe a technique for creating a concealed umbilical stoma. The base of the umbilicus is used as a superiorly based skin flap that is incorporated into the spatulated stoma. Six patients have undergone diversion using this technique. The stoma was constructed from appendix in 4 cases, stomach in 1 and tapered ileum in 1. All patients achieved an easily catheterizable hidden umbilical stoma, are dry on clean intermittent catheterization and have had no stomatitis or peristomal hernia. This technique for creating a concealed umbilical stoma preserves the native appearance of the umbilicus and combines a superior cosmetic result with an easily catheterizable stoma.

  19. Suspiciousness and low self-esteem as predictors of misattributions of anger in schizophrenia spectrum disorders.

    Science.gov (United States)

    Lysaker, Paul Henry; Davis, Louanne Whitman; Tsai, Jack

    2009-04-30

    While it is widely recognized that many with schizophrenia have significant difficulties in correctly identifying the emotions of others, less is known about the causes and correlates of particular forms of misattribution, including mistakenly seeing anger in others. One possibility is that persons with high levels of suspiciousness and low levels of self-esteem are at risk to attribute their poor feelings about themselves to the malice of others. To explore this possibility, we identified 52 persons with a schizophrenia spectrum disorder who made significant numbers of errors on the Bell-Lysaker Emotional Recognition Test. We then performed a cluster analysis based on measures of suspiciousness from the Positive and Negative Syndrome Scale and self-esteem from the Rosenberg Self-Esteem Schedule, and found the following four groups: a) High Suspiciousness/High Self-Esteem; b) Mild Suspiciousness/High Self-Esteem; c) High Suspiciousness/Low Self-Esteem; and d) Minimal Suspiciousness/Low Self-Esteem. Comparisons between groups revealed that as predicted the High Suspiciousness/Low Self-Esteem group made significantly more misattributions of anger than other groups, even when levels of depression were controlled for statistically. Implications for addressing the misattributions of anger in schizophrenia are discussed.

  20. Geophysical Assessment of Two Collapsed and Concealed Septic ...

    African Journals Online (AJOL)

    A geophysical study was carried out in the vicinity of two collapsed and concealed septic tanks to delineate the structures responsible for their failure. Two-dimensional resistivity and seismic refraction tomography data were collected along a profile laid across the septic tanks. The data were collected using ABEM ...

  1. ID-check: Online concealed information test reveals true identity

    NARCIS (Netherlands)

    Verschuere, B.; Kleinberg, B.

    2016-01-01

    The Internet has already changed people's lives considerably and is likely to drastically change forensic research. We developed a web-based test to reveal concealed autobiographical information. Initial studies identified a number of conditions that affect diagnostic efficiency. By combining these

  2. Asouzu's phenomenon of concealment and Bacon's idols of the ...

    African Journals Online (AJOL)

    Asouzu's phenomenon of concealment and Bacon's idols of the mind: a paradox of Nigeria's leadership crisis. ... in the leadership structuring and engineering without conscious effort of extricating them has negatively affected socio-political, religious, cultural and economic growth and development of the Nigerian state.

  3. Do Children Understand That People Selectively Conceal or Express Emotion?

    Science.gov (United States)

    Hayashi, Hajimu; Shiomi, Yuki

    2015-01-01

    This study examined whether children understand that people selectively conceal or express emotion depending upon the context. We prepared two contexts for a verbal display task for 70 first-graders, 80 third-graders, 64 fifth-graders, and 71 adults. In both contexts, protagonists had negative feelings because of the behavior of the other…

  4. Cylindrical millimeter-wave imaging technique for concealed weapon detection

    Science.gov (United States)

    Sheen, David M.; McMakin, Douglas L.; Hall, Thomas E.

    1998-03-01

    A novel cylindrical millimeter-wave imaging technique has been developed at the Pacific Northwest National Laboratory for the detection of metallic and non-metallic concealed weapons. This technique uses a vertical array of millimeter- wave antennas which is mechanically swept around a person in a cylindrical fashion. The wideband millimeter-wave data is mathematically reconstructed into a series of high- resolution images of the person being screened. Clothing is relatively transparent to millimeter-wave illumination,whereas the human body and concealed items are reflective at millimeter wavelengths. Differences in shape and reflectivity are revealed in the images and allow a human operator to detect and identify concealed weapons. A full 360 degree scan is necessary to fully inspect a person for concealed items. The millimeter-wave images can be formed into a video animation sequence in which the person appears to rotate in front of a fixed illumination source.This is s convenient method for presenting the 3D image data for analysis. This work has been fully sponsored by the FAA. An engineering prototype based on the cylindrical imaging technique is presently under development. The FAA is currently opposed to presenting the image data directly to the operator due to personal privacy concerns. A computer automated system is desired to address this problem by eliminating operator viewing of the imagery.

  5. Concealment tactics among HIV-positive nurses in Uganda

    NARCIS (Netherlands)

    Kyakuwa, M.; Hardon, A.

    2012-01-01

    This paper is based on two-and-a-half years of ethnographic fieldwork in two rural Ugandan health centres during a period of ART scale-up. Around one-third of the nurses in these two sites were themselves HIV-positive but most concealed their status. We describe how a group of HIV-positive nurses

  6. Detecting concealed information in less than a second: response latency-based measures

    NARCIS (Netherlands)

    Verschuere, B.; de Houwer, J.; Verschuere, B.; Ben-Shakhar, G.; Meijer, E.

    2011-01-01

    Concealed information can be accurately assessed with physiological measures. To overcome the practical limitations of physiological measures, an assessment using response latencies has been proposed. At first sight, research findings on response latency based concealed information tests seem

  7. Exploiting synthetic aperture radar imagery for retrieving vibration signatures of concealed machinery

    Science.gov (United States)

    Pérez, Francisco; Campbell, Justin B.; Jaramillo, Monica; Dunkel, Ralf; Atwood, Thomas; Doerry, Armin; Gerstle, Walter H.; Santhanam, Balu; Hayat, Majeed M.

    2016-05-01

    It has been demonstrated that the instantaneous acceleration associated with vibrating objects that are directly imaged by synthetic aperture radar (SAR) can be estimated through the application of the discrete fractional Fourier transform (DFrFT) using the information contained in the complex SAR image. In general, vibration signatures may include, for example, the number of chirped sinusoids as well as their respective base frequencies and chirp rates. By further processing the DFrFT-processed data for clutter-noise rejection by means of pseudo- subspace methods, has been shown that the SAR-vibrometry method can be reliable as long as the signal-to-noise ratio (SNR) and the signal-to-clutter ratio (SCR) of the slow-time SAR signal at the range-line of interest exceeds 15dB. Meanwhile, the Nyquist theorem dictates that the maximum measurable vibration frequency is limited by half of the pulse-repetition frequency. This paper focuses on the detection and estimation of vibrations generated by machinery concealed within buildings and other structures. This is a challenging task in general because the vibration signatures of the source are typically altered by their housing structure; moreover, the SNR at the surface of the housing structure tends to be reduced. Here, experimental results for three different vibrating targets, including one concealed target, are reported using complex SAR images acquired by the General Atomics Lynx radar at resolutions of 1-ft and 4-in. The concealed vibrating target is actuated by a gear motor with an off-balance weight attached to it, which is enclosed by a wooden housing. The vibrations of the motor are transmitted to a chimney that extends above the housing structure. Using the SAR vibrometry approach, it is shown that it is possible to distinguish among the three vibrating objects based upon their vibration signatures.

  8. Transnasal Flexible Fiberoptic in-office Laryngeal Biopsies—Our Experience with 117 Patients with Suspicious Lesions

    Directory of Open Access Journals (Sweden)

    Jacob T. Cohen

    2014-04-01

    Full Text Available Objective: To compare pathologic results obtained via in-office transnasal fiberoptic laryngoscopy (TFL to those of subsequent direct laryngoscopy in order to assess the accuracy of TFL as a diagnostic tool. Patients: One hundred and seventeen patients with suspicious laryngeal lesions. Methods: All patients underwent in-office biopsies. All patients with malignant diagnosis were referred to treatment. All patients with benign diagnosis or carcinoma in situ were referred to direct laryngoscopy for definitive diagnosis. The pathological results of the specimens from both procedures were compared. Results: Adequate tissue for diagnostic purposes was obtained in 110 of 117 in-office transnasal fiberoptic laryngoscopy biopsies (94.0%. The biopsy results revealed invasive carcinoma in 42 patients (38.2%, carcinoma in situ (CIS in 17 patients (15.4%, and benign lesions in 51 patients (46.4%. All patients with benign pathologies and carcinoma in situ were referred to biopsy under direct laryngoscopy (five patients refused and were removed from the statistics. The final pathologies identified from the biopsies on direct laryngoscopy revealed that there was an underestimation of the transnasal fiberoptic laryngoscopy results in 33 patients (a false negative rate of 31.4%, 33/105 and an overestimation in one patient. The sensitivity of transnasal fiberoptic laryngoscopy biopsy compared with direct laryngoscopy biopsy was 70.6% and the specificity was 96.7%. Conclusions: TFL with biopsy is easy, safe, and cost-effective but raises serious doubts about its clinical value due to its low sensitivity rate for diagnosing suspicious lesions of the larynx. As such, it is recommended that all patients with a suspicious lesion diagnosed by TFL biopsy as being benign or CIS should be referred to direct laryngoscopy for verification of the findings.

  9. Campaign for Right to Carry Concealed Guns on Campuses Gains Traction

    Science.gov (United States)

    Wiseman, Rachel

    2012-01-01

    Five years after the Virginia Tech massacre prompted a student in Texas to start a Facebook page in favor of the right to carry concealed weapons on college campuses, the resulting group, Students for Concealed Carry, has advanced its cause. In more than a dozen states, legislation has been introduced to allow the carrying of concealed firearms on…

  10. Fine-needle aspiration of the thyroid: correlating suspicious cytology results with histological outcomes.

    Science.gov (United States)

    Baynes, Andrea L; Del Rio, Andres; McLean, Catriona; Grodski, Simon; Yeung, Meei J; Johnson, William R; Serpell, Jonathan W

    2014-05-01

    Fine-needle aspiration cytology (FNAC) assists the diagnosis of thyroid malignancy. A 'suspicious for malignancy' on FNAC creates a management dilemma. The aims of this study were to investigate the malignancy rate for patients with suspicious cytology, and to describe a management approach for those with a suspicious result. A retrospective review of prospectively collected data in an endocrine surgery database was undertaken. Patients undergoing thyroidectomy with preoperative FNAC from 1992 to 2012 were analysed. Preoperative FNAC was undertaken in 2,692 patients, and the FNAC result was 'suspicious for malignancy' in 94 (3.5 %) patients. Of these, 53 (56.4 %) were malignant, with the majority 44 (83.0 %) being papillary thyroid cancer. 48 patients went straight to total thyroidectomy, 40 patients had an initial diagnostic hemithyroidectomy, and 1 patient had a diagnostic isthmusectomy. 5 patients required reoperative total thyroidectomy as an initial procedure. Of the 94 suspicious cases, 55 were reported by an unknown, presumably non-expert, thyroid cytopathologist. 38 of these cases were available for review and re-reporting by an experienced cytopathologist. On review, 28 (73.7 %) were reclassified as cytologically malignant, and all of these were confirmed as malignant on subsequent histopathology. Suspicious cytology has a high risk of malignancy. Expert thyroid cytopathology can improve diagnostic accuracy and a preoperative malignant diagnosis should be pursued to enable one-stage surgery where possible.

  11. Anomaly and signature filtering improve classifier performance for detection of suspicious access to EHRs.

    Science.gov (United States)

    Kim, Jihoon; Grillo, Janice M; Boxwala, Aziz A; Jiang, Xiaoqian; Mandelbaum, Rose B; Patel, Bhakti A; Mikels, Debra; Vinterbo, Staal A; Ohno-Machado, Lucila

    2011-01-01

    Our objective is to facilitate semi-automated detection of suspicious access to EHRs. Previously we have shown that a machine learning method can play a role in identifying potentially inappropriate access to EHRs. However, the problem of sampling informative instances to build a classifier still remained. We developed an integrated filtering method leveraging both anomaly detection based on symbolic clustering and signature detection, a rule-based technique. We applied the integrated filtering to 25.5 million access records in an intervention arm, and compared this with 8.6 million access records in a control arm where no filtering was applied. On the training set with cross-validation, the AUC was 0.960 in the control arm and 0.998 in the intervention arm. The difference in false negative rates on the independent test set was significant, P=1.6×10(-6). Our study suggests that utilization of integrated filtering strategies to facilitate the construction of classifiers can be helpful.

  12. Predictive performance of BI-RADS magnetic resonance imaging descriptors in the context of suspicious (category 4 findings

    Directory of Open Access Journals (Sweden)

    João Ricardo Maltez de Almeida

    2016-06-01

    Full Text Available Abstract Objective: To determine the positive predictive value (PPV and likelihood ratio for magnetic resonance imaging (MRI characteristics of category 4 lesions, as described in the Breast Imaging Reporting and Data System (BI-RADS® lexicon, as well as to test the predictive performance of the descriptors using multivariate analysis and the area under the curve derived from a receiver operating characteristic (ROC curve. Materials and Methods: This was a double-blind review study of 121 suspicious findings from 98 women examined between 2009 and 2013. The terminology was based on the 2013 edition of the BI-RADS. Results: Of the 121 suspicious findings, 53 (43.8% were proven to be malignant lesions, with no significant difference between mass and non-mass enhancement (p = 0.846. The PPVs were highest for masses with a spiculated margin (71% and round shape (63%, whereas segmental distribution achieved a high PPV (80% for non-mass enhancement. Kinetic analyses performed poorly, except for type 3 curves applied to masses (PPV of 73%. Logistic regression models were significant for both patterns, although the results were better for masses, particularly when kinetic assessments were included (p = 0.015; pseudo R2 = 0.48; area under the curve = 90%. Conclusion: Some BI-RADS MRI descriptors have high PPV and good predictive performance-as demonstrated by ROC curve and multivariate analysis-when applied to BI-RADS category 4 findings. This may allow future stratification of this category.

  13. Effects of modified penoplasty for concealed penis in children.

    Science.gov (United States)

    Chen, Chao; Li, Ning; Luo, Yi-Ge; Wang, Hong; Tang, Xian-Ming; Chen, Jia-Bo; Dong, Chun-Qiang; Liu, Qiang; Dong, Kun; Su, Cheng; Yang, Ti-Quan

    2016-10-01

    To evaluate the effect of modified penoplasty in the management of concealed penis. We retrospectively reviewed 96 consecutive patients with concealed penis, which had been surgically corrected between July 2013 and July 2015. All patients underwent modified Shiraki phalloplasty. All patients were scheduled for regular follow-up at 1, 3, and 6 months after the surgery. Data on the patients' age, operative time, postoperative complications, and parents' satisfaction grade were collected and analyzed. The mean follow-up period was 17.4 months (range 7-31 months). The mean operative time was 63.2 ± 8.7 min. The mean perpendicular penile length was 1.89 ± 0.77 cm preoperatively and 4.42 ± 0.87 cm postoperatively, with an improved mean length of 2.5 ± 0.68 cm in the flaccid state postoperatively (p penis can achieve maximum utilization of prepuce to assure coverage of the exposed penile shaft. It has fewer complications, achieving marked asthetics, and functional improvement. It is a relatively ideal means for treating concealed penis.

  14. [Half-gloving cordectomy: a modified procedure for concealed penis].

    Science.gov (United States)

    Sun, Wei-Gui; Zheng, Qi-Chuan; Jiang, Kun

    2012-06-01

    To search for a simple surgical procedure for the treatment of concealed penis that may have better effect and less complications. We used a modified surgical method in the treatment of 58 patients with concealed penis aged from 3 to 15 (mean 6.8) years. The operation was simplified and involved the following steps: wholly unveiling the penis glans, half-degloving the foreskins, cutting off all the adhesive fibers up to the penile suspensory ligaments, and liberating the external penis. The operation was successful in all the patients, with the operative time of 15 -45 (mean 33) minutes, hospital stay of 2 - 5 (mean 3.5) days, but no complications except mild foreskin edema in 5 cases. The external penis was prolonged from 0.5 - 2.8 (mean 1.4) cm preoperatively to 3.2 - 8.5 (mean 3.9) cm postoperatively. The patients were followed up for 1 -3 years, all satisfied with the length and appearance of the penis, and their sexual and reproductive functions were normal. The modified surgical procedure for concealed penis is simple and effective, with desirable outcomes, few postoperative complications and no damage to sexual and reproductive functions.

  15. Correction of concealed penis with preservation of the prepuce.

    Science.gov (United States)

    Valioulis, I A; Kallergis, I C; Ioannidou, D C

    2015-10-01

    By definition, congenital concealed penis presents at birth. Children are usually referred to physicians because of parental anxiety caused by their child's penile size. Several surgical procedures have been described to treat this condition, but its correction is still technically challenging. The present study reports a simple surgical approach, which allows preservation of the prepuce. During the last 6 years, 18 children with concealed penis (according to the classification by Maizels et al.) have been treated in the present department (mean age 4.5 years, range 3-12 years). Patients with other conditions that caused buried penis were excluded from the study. The operation was performed through a longitudinal midline ventral incision, which was extended hemi-circumferentially at the penile base. The dysgenetic dartos was identified and its distal part was resected. Dissection of the corpora cavernosa was carried down to the suspensory ligament, which was sectioned. Buck's fascia was fixed to Scarpa's fascia and shaft skin was approximated in the midline. Penoscrotal angle was fashioned by Z-plasty or V-Y plasty. The median follow-up was 24 months (range 8-36). The postoperative edema was mild and resolved within a week. All children had good to excellent outcomes. The median pre-operative to postoperative difference in penile length in the flaccid state was 2.6 cm (range 2.0-3.5). No serious complications or recurrent penile retraction were noted. Recent literature mostly suggests that concealed penis is due to deficient proximal attachments of dysgenetic dartos. Consequences of this include: difficulties in maintaining proper hygiene, balanitis, voiding difficulties with prepuce ballooning and urine spraying, and embarrassment among peers. Surgical treatment for congenital concealed penis is warranted in children aged 3 years or older. The basis of the technique is the perception that in boys with congenital concealed penis, the penile integuments are normal

  16. Natural History of Pathologically Benign Cancer Suspicious Regions on Multiparametric Magnetic Resonance Imaging Following Targeted Biopsy.

    Science.gov (United States)

    Bryk, Darren J; Llukani, Elton; Huang, William C; Lepor, Herbert

    2015-11-01

    We determined the natural history of pathologically benign cancer suspicious regions on multiparametric magnetic resonance imaging following targeted biopsy. Between January 2012 and September 2014, 330 men underwent prostate multiparametric magnetic resonance imaging. A total of 533 cancer suspicious regions were identified and scored on a Likert scale of 1 to 5 based on suspicion for malignancy with 5 indicating the highest suspicion level. Following multiparametric magnetic resonance imaging all men underwent magnetic resonance imaging-ultrasound fusion targeted prostate biopsy using ProFuse software and the ei-Nav|Artemis system (innoMedicus, Cham, Switzerland), and a computer generated 12-core random biopsy. We analyzed a cohort of 34 men with a total of 51 cancer suspicious regions who had benign prostate biopsies and underwent repeat multiparametric magnetic resonance imaging and prostate specific antigen testing at 1 year. Changes in the greatest linear measurement, the suspicion score and serum prostate specific antigen were ascertained. During 1 year the suspicion score distribution and the mean greatest linear measurement of the cancer suspicious regions decreased significantly (p resonance imaging at 1 year in men with pathologically benign cancer suspicious regions should be discouraged since it is unlikely to influence management decisions. Copyright © 2015 American Urological Association Education and Research, Inc. Published by Elsevier Inc. All rights reserved.

  17. Increase in perceived case suspiciousness due to local contrast optimisation in digital screening mammography

    Energy Technology Data Exchange (ETDEWEB)

    Visser, Roelant; Schuur, Klaas H. [National Expert and Training Centre for Breast Cancer Screening, P.O. Box 6873, Nijmegen (Netherlands); Veldkamp, Wouter J.H.; Bun, Petra A.M. [National Expert and Training Centre for Breast Cancer Screening, P.O. Box 6873, Nijmegen (Netherlands); Leiden University Medical Center, Department of Radiology, Leiden (Netherlands); Beijerinck, David; Deurenberg, Jan J.M. [Centre/Mid-West, Utrecht (Netherlands); Imhof-Tas, Mechli W.; Snoeren, Miranda M.; Karssemeijer, Nico [Radboud University Nijmegen Medical Centre, Department of Radiology, Nijmegen (Netherlands); Heeten, Gerard J. den [National Expert and Training Centre for Breast Cancer Screening, P.O. Box 6873, Nijmegen (Netherlands); Academical Medical Center Amsterdam, Department of Radiology, Amsterdam (Netherlands); Broeders, Mireille J.M. [National Expert and Training Centre for Breast Cancer Screening, P.O. Box 6873, Nijmegen (Netherlands); Radboud University Nijmegen Medical Centre, Department of Epidemiology, Biostatistics and HTA, Nijmegen (Netherlands)

    2012-04-15

    To determine the influence of local contrast optimisation on diagnostic accuracy and perceived suspiciousness of digital screening mammograms. Data were collected from a screening region in the Netherlands and consisted of 263 digital screening cases (153 recalled,110 normal). Each case was available twice, once processed with a tissue equalisation (TE) algorithm and once with local contrast optimisation (PV). All cases had digitised previous mammograms. For both algorithms, the probability of malignancy of each finding was scored independently by six screening radiologists. Perceived case suspiciousness was defined as the highest probability of malignancy of all findings of a radiologist within a case. Differences in diagnostic accuracy of the processing algorithms were analysed by comparing the areas under the receiver operating characteristic curves (A{sub z}). Differences in perceived case suspiciousness were analysed using sign tests. There was no significant difference in A{sub z} (TE: 0.909, PV 0.917, P = 0.46). For all radiologists, perceived case suspiciousness using PV was higher than using TE more often than vice versa (ratio: 1.14-2.12). This was significant (P <0.0083) for four radiologists. Optimisation of local contrast by image processing may increase perceived case suspiciousness, while diagnostic accuracy may remain similar. (orig.)

  18. The concealed finds from the Mühlberg-Ensemble in Kempten (southern Germany)

    DEFF Research Database (Denmark)

    Atzbach, Rainer

    2012-01-01

    Concealed finds in buildings are a worldwide phenomenon. Since the 14th century, the angles of vaults, the dead space between ceilings and floors, walled niches and other voids in buildings have been used to dump waste, mostly on the occasion of rebuilding activities. In a few cases, careful...... deposits of single objects may reflect magical practices. All finds seem to bear an immediate connection to the former inhabitants. Their dating, based on building chronology and the excellent state of preservation, especially of organic finds, makes them an excellent source for archaeology and cultural...... history. This paper examines an exceptional collection of assemblages recovered from dead spaces within three adjacent buildings in the town of Kempten, southern Germany. It summarizes the major research project based on the wide variety of finds recovered, including numerous objects of wood, leather, fur...

  19. A novel statistical approach for detection of suspicious regions in digital mammogram

    Directory of Open Access Journals (Sweden)

    Z.A. Abo-Eleneen

    2013-07-01

    Full Text Available In this paper, we propose a novel algorithm to detect the suspicious regions on digital mammograms that based on the Fisher information measure. The proposed algorithm is tested different types and categories of mammograms (fatty, fatty-glandular and dense glandular within mini-MIAS database (Mammogram Image Analysis Society database (UK. The proposed method is compared with a different segmentation based information theoretical methods to demonstrate their effectiveness. The experimental results on mammography images showed the effectiveness in the detection of suspicious regions. This study can be a part of developing a computer-aided decision (CAD system for early detection of breast cancer.

  20. An Exploratory Investigation of Social Stigma and Concealment in Patients with Multiple Sclerosis.

    Science.gov (United States)

    Cook, Jonathan E; Germano, Adriana L; Stadler, Gertraud

    2016-01-01

    We conducted a preliminary investigation into dimensions of stigma and their relation to disease concealment in a sample of American adults living with multiple sclerosis (MS). Fifty-three adults with MS in the United States completed an online survey assessing anticipated, internalized, and isolation stigma, as well as concealment. Responses to all the scales were relatively low, on average, but above scale minimums (P stigma and concealment were highest. Anticipated stigma strongly predicted concealment. Many adults living with MS may be concerned that they will be the target of social stigma because of their illness. These concerns are associated with disease concealment. More research is needed to investigate how MS stigma and concealment may be independent contributors to health in patients with MS.

  1. Revaluation of breast cytology with pathologist on-site of lesions with suspicious sonographic features

    Energy Technology Data Exchange (ETDEWEB)

    Capalbo, Emanuela, E-mail: emanuelacapalbo@tiscalinet.it [Scuola di Specializzazione di Radiologia Diagnostica ed Interventistica, Università degli Studi di Milano Via Di Rudinì, Milano, 20142 Italy (Italy); Sajadidehkordi, Farideh, E-mail: faridehit@yahoo.it [Scuola di Specializzazione di Radiologia Diagnostica ed Interventistica, Università degli Studi di Milano Via Di Rudinì, Milano, 20142 Italy (Italy); Colombi, Claudio; Ticha, Vladimira; Moretti, Angela, E-mail: info.radiologia@sancarlo.mi.it [Dipartimento di Scienze Diagnostiche, UOC di Radiologia Diagnostica ed Interventistica, A.O San Carlo Borromeo. Via Pio II, 3, 20153 Milano (Italy); Peli, Michela, E-mail: peli.michela@gmail.com [Scuola di Specializzazione di Radiologia Diagnostica ed Interventistica, Università degli Studi di Milano Via Di Rudinì, Milano, 20142 Italy (Italy); Cosentino, Maria, E-mail: maria-cosentino@tiscali.it [Scuola di Specializzazione di Radiologia Diagnostica ed Interventistica, Università degli Studi di Milano Via Di Rudinì, Milano, 20142 Italy (Italy); Lovisatti, Maria, E-mail: marialovisatti@hotmail.com [Scuola di Specializzazione di Radiologia Diagnostica ed Interventistica, Università degli Studi di Milano Via Di Rudinì, Milano, 20142 Italy (Italy); Berti, Elisabetta, E-mail: eliberti@hotmail.it [Dipartimento di Scienze Diagnostiche, UOC di Anatomia Patologica, A.O San Carlo Borromeo. Via Pio II, 3, Milano 20153 (Italy); Cariati, Maurizio, E-mail: info.radiologia@sancarlo.mi.it [Dipartimento di Scienze Diagnostiche, UOC di Radiologia Diagnostica ed Interventistica, A.O San Carlo Borromeo. Via Pio II, 3, 20153 Milano (Italy)

    2013-09-15

    Objective: Evaluating correlation estimation between diagnostic ultrasound (U.S.) of breast lesions and fine needle aspiration cytology (FNAC), and the correlation between cytology and histology (I) of these lesions undergo surgery. Materials and methods: In 2010 we performed 1589 ultrasound breast. We identified 210 suspicious lesions to be subjected to FNAC, which was performed with pathologist on site, and extemporaneous analysis of the sample to assess their appropriateness. We classified the lesions in 5 ultrasound (U) classes according to the criteria defined by Echographic BIRADS Lexicon. The results of cytology were classified in 5 classes (C) according to the guidelines of F.O.N.Ca.M. Then we evaluated the diagnostic correlation between U.S. and FNAC, and between FNAC and Histology. Results: The distribution of lesions in U classes was: 57U2, 55U3, 36U4 and 62U5. The diagnostic concordance between U and FNAC was 96.7%, with a sensitivity of 98%, specificity 93%, negative and positive predictive value respectively of 94.9% and 97.3%, and diagnostic accuracy of 96.6%. The 98 patients with C4-C5 lesions were subjected to surgery and the histology confirmed high-grade malignancy of lesions with a concordance of 99.7%. Conclusions: Having achieved high diagnostic concordance between U and FNAC, and then between FNAC and histology, we may say that the FNAC, less invasive and traumatic for the patient than needle biopsy (CB), may be still a valid method when performed with pathologist on-site to assess the adequacy of the sample taken.

  2. Concealed Handgun Licensing and Crime in Four States

    Directory of Open Access Journals (Sweden)

    Charles D. Phillips

    2015-01-01

    Full Text Available Firearm policy in the United States has long been a serious policy issue. Much of the previous research on crime and firearms focused on the effects of states’ passage of concealed handgun licensing (CHL legislation. Today, given the proliferation of CHL legislation and growing strength of the “pro-gun” movement, the primary policy focus has changed. State legislators now face issues concerning whether and how to increase access to CHLs. Because of this transformation, this research moves away from the research tradition focused on the effect of a legislative change allowing CHLs. Instead, we consider two issues more policy relevant in the current era: What are the dynamics behind CHL licensing? Do increases in concealed handgun licensing affect crime rates? Using county-level data, we found that the density of gun dealers and other contextual variables, rather than changing crime rates, had a significant effect on increases of the rates at which CHLs were issued. We also found no significant effect of CHL increases on changes in crime rates. This research suggests that the rate at which CHLs are issued and crime rates are independent of one another—crime does not drive CHLs; CHLs do not drive crime.

  3. Error Concealment using Data Hiding in Wireless Image Transmission

    Directory of Open Access Journals (Sweden)

    A. Akbari

    2016-11-01

    Full Text Available The transmission of image/video over unreliable medium like wireless networks generally results in receiving a damaged image/video. In this paper, a novel image error concealment scheme based on the idea of data hiding and Set Partitioning In Hierarchical Trees (SPIHT coding is investigated. In the encoder side, the coefficients of wavelet decomposed image are partitioned into “perfect trees”. The SPIHT coder is applied to encode each per-fect tree independently and generate an efficiently compressed reference code. This code is then embedded into the coefficients of another perfect tree which is located in a different place, using a robust data hiding scheme based on Quantization Index Modulation (QIM. In the decoder side, if a part of the image is lost, the algorithm extracts the embedded code for reference trees related to this part to reconstruct the lost information. Performance results show that for an error prone transmission, the proposed technique is promising to efficiently conceal the lost areas of the transmitted image.

  4. A Concealed Car Extraction Method Based on Full-Waveform LiDAR Data

    Directory of Open Access Journals (Sweden)

    Chuanrong Li

    2016-01-01

    Full Text Available Concealed cars extraction from point clouds data acquired by airborne laser scanning has gained its popularity in recent years. However, due to the occlusion effect, the number of laser points for concealed cars under trees is not enough. Thus, the concealed cars extraction is difficult and unreliable. In this paper, 3D point cloud segmentation and classification approach based on full-waveform LiDAR was presented. This approach first employed the autocorrelation G coefficient and the echo ratio to determine concealed cars areas. Then the points in the concealed cars areas were segmented with regard to elevation distribution of concealed cars. Based on the previous steps, a strategy integrating backscattered waveform features and the view histogram descriptor was developed to train sample data of concealed cars and generate the feature pattern. Finally concealed cars were classified by pattern matching. The approach was validated by full-waveform LiDAR data and experimental results demonstrated that the presented approach can extract concealed cars with accuracy more than 78.6% in the experiment areas.

  5. Temporal spying and concealing process in fibre-optic data transmission systems through polarization bypass

    Science.gov (United States)

    Bony, P. Y.; Guasoni, M.; Morin, P.; Sugny, D.; Picozzi, A.; Jauslin, H. R.; Pitois, S.; Fatome, J.

    2014-08-01

    Recent research has been focused on the ability to manipulate a light beam in such a way to hide, namely to cloak, an event over a finite time or localization in space. The main idea is to create a hole or a gap in the spatial or time domain so as to allow for an object or data to be kept hidden for a while and then to be restored. By enlarging the field of applications of this concept to telecommunications, researchers have recently reported the possibility to hide transmitted data in an optical fibre. Here we report the first experimental demonstration of perpetual temporal spying and blinding process of optical data in fibre-optic transmission line based on polarization bypass. We successfully characterize the performance of our system by alternatively copying and then concealing 100% of a 10-Gb s-1 transmitted signal.

  6. Temporal spying and concealing process in fibre-optic data transmission systems through polarization bypass.

    Science.gov (United States)

    Bony, P Y; Guasoni, M; Morin, P; Sugny, D; Picozzi, A; Jauslin, H R; Pitois, S; Fatome, J

    2014-08-19

    Recent research has been focused on the ability to manipulate a light beam in such a way to hide, namely to cloak, an event over a finite time or localization in space. The main idea is to create a hole or a gap in the spatial or time domain so as to allow for an object or data to be kept hidden for a while and then to be restored. By enlarging the field of applications of this concept to telecommunications, researchers have recently reported the possibility to hide transmitted data in an optical fibre. Here we report the first experimental demonstration of perpetual temporal spying and blinding process of optical data in fibre-optic transmission line based on polarization bypass. We successfully characterize the performance of our system by alternatively copying and then concealing 100% of a 10-Gb s(-1) transmitted signal.

  7. 31 CFR 103.20 - Reports by money services businesses of suspicious transactions.

    Science.gov (United States)

    2010-07-01

    ... immediate attention, such as ongoing money laundering schemes, the money services business shall immediately... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Reports by money services businesses of suspicious transactions. 103.20 Section 103.20 Money and Finance: Treasury Regulations Relating to...

  8. 31 CFR 103.15 - Reports by mutual funds of suspicious transactions.

    Science.gov (United States)

    2010-07-01

    ... FINANCIAL RECORDKEEPING AND REPORTING OF CURRENCY AND FOREIGN TRANSACTIONS Reports Required To Be Made § 103.15 Reports by mutual funds of suspicious transactions. (a) General. (1) Every investment company (as... pursuant to that Act (for purposes of this section, a “mutual fund”), shall file with the Financial Crimes...

  9. Increase in perceived case suspiciousness due to local contrast optimisation in digital screening mammography

    NARCIS (Netherlands)

    Visser, Roelant; Veldkamp, Wouter J. H.; Beijerinck, David; Bun, Petra A. M.; Deurenberg, Jan J. M.; Imhof-Tas, Mechli W.; Schuur, Klaas H.; Snoeren, Miranda M.; den Heeten, Gerard J.; Karssemeijer, Nico; Broeders, Mireille J. M.

    2012-01-01

    To determine the influence of local contrast optimisation on diagnostic accuracy and perceived suspiciousness of digital screening mammograms. Data were collected from a screening region in the Netherlands and consisted of 263 digital screening cases (153 recalled,110 normal). Each case was

  10. Anomaly detection driven active learning for identifying suspicious tracks and events in WAMI video

    Science.gov (United States)

    Miller, David J.; Natraj, Aditya; Hockenbury, Ryler; Dunn, Katherine; Sheffler, Michael; Sullivan, Kevin

    2012-06-01

    We describe a comprehensive system for learning to identify suspicious vehicle tracks from wide-area motion (WAMI) video. First, since the road network for the scene of interest is assumed unknown, agglomerative hierarchical clustering is applied to all spatial vehicle measurements, resulting in spatial cells that largely capture individual road segments. Next, for each track, both at the cell (speed, acceleration, azimuth) and track (range, total distance, duration) levels, extreme value feature statistics are both computed and aggregated, to form summary (p-value based) anomaly statistics for each track. Here, to fairly evaluate tracks that travel across different numbers of spatial cells, for each cell-level feature type, a single (most extreme) statistic is chosen, over all cells traveled. Finally, a novel active learning paradigm, applied to a (logistic regression) track classifier, is invoked to learn to distinguish suspicious from merely anomalous tracks, starting from anomaly-ranked track prioritization, with ground-truth labeling by a human operator. This system has been applied to WAMI video data (ARGUS), with the tracks automatically extracted by a system developed in-house at Toyon Research Corporation. Our system gives promising preliminary results in highly ranking as suspicious aerial vehicles, dismounts, and traffic violators, and in learning which features are most indicative of suspicious tracks.

  11. Clinical experiences with photoacoustic breast imaging: the appearance of suspicious lesions

    NARCIS (Netherlands)

    Heijblom, M.

    2014-01-01

    This thesis describes photoacoustic (PA) imaging of suspicious breast lesions. In PA imaging, the tissue of interest is illuminated by short pulses of laser light, usually in the near infrared (NIR) regime. Upon absorption by primarily the tumor vasculature, the light causes a small temperature

  12. 75 FR 63545 - Proposed Collection; Comment Request; Bank Secrecy Act Suspicious Activity Report Database...

    Science.gov (United States)

    2010-10-15

    ... derived through third party data as enhanced data if not provided and Country is US, Mexico or Canada and... corruption (domestic) h. Suspected public/private corruption (foreign) i. Suspicious use of informal value... Country is US, Mexico or Canada and ZIP/Postal Code is provided * 57. ZIP/Postal Code a. (check if...

  13. When concealed handgun licensees break bad: criminal convictions of concealed handgun licensees in Texas, 2001-2009.

    Science.gov (United States)

    Phillips, Charles D; Nwaiwu, Obioma; McMaughan Moudouni, Darcy K; Edwards, Rachel; Lin, Szu-hsuan

    2013-01-01

    We explored differences in criminal convictions between holders and nonholders of a concealed handgun license (CHL) in Texas. The Texas Department of Public Safety (DPS) provides annual data on criminal convictions of holders and nonholders of CHLs. We used 2001 to 2009 DPS data to investigate the differences in the distribution of convictions for these 2 groups across 9 types of criminal offenses. We calculated z scores for the differences in the types of crimes for which CHL holders and nonholders were convicted. CHL holders were much less likely than nonlicensees to be convicted of crimes. Most nonholder convictions involved higher-prevalence crimes (burglary, robbery, or simple assault). CHL holders' convictions were more likely to involve lower-prevalence crimes, such as sexual offenses, gun offenses, or offenses involving a death. Our results imply that expanding the settings in which concealed carry is permitted may increase the risk of specific types of crimes, some quite serious in those settings. These increased risks may be relatively small. Nonetheless, policymakers should consider these risks when contemplating reducing the scope of gun-free zones.

  14. Management of a Concealable Stigmatized Identity: A Qualitative Study of Concealment, Disclosure, and Role Flexing Among Young, Resilient Sexual and Gender Minority Individuals.

    Science.gov (United States)

    Bry, Laura Jane; Mustanski, Brian; Garofalo, Robert; Burns, Michelle Nicole

    2017-01-01

    Disclosure of a sexual or gender minority status has been associated with both positive and negative effects on wellbeing. Few studies have explored the disclosure and concealment process in young people. Interviews were conducted with 10 sexual and/or gender minority individuals, aged 18-22 years, of male birth sex. Data were analyzed qualitatively, yielding determinants and effects of disclosure and concealment. Determinants of disclosure included holding positive attitudes about one's identity and an implicit devaluation of acceptance by society. Coming out was shown to have both positive and negative effects on communication and social support and was associated with both increases and decreases in experiences of stigma. Determinants of concealment included lack of comfort with one's identity and various motivations to avoid discrimination. Concealment was also related to hypervigilance and unique strategies of accessing social support. Results are discussed in light of their clinical implications.

  15. The disclosure of concealable stigmas: Analysis anchored in trust

    Directory of Open Access Journals (Sweden)

    Ben Capell

    2016-12-01

    Full Text Available Prior research on the disclosure of concealable stigmas at work has mostly overlooked the moderating and mediating role of employees’ trust in their supervisor and organization at large. The absence of trust from this field of study limits organizational efforts to foster inclusion at work. Thus, this paper presents a framework for examining the multiple linkages between employees’ trust in their direct supervisors and their organization, and the disclosure decision. Trust is proposed to be embedded in intra and extra organizational context, both in terms of the legal framework and the HR policies and practices. On the basis of synthesis of the literature, the article extends previous research and reviews of diversity by providing systematic review and recommendations that can help promote diversity management efforts and ultimately contribute to employees’ well-being as well as positive organizational outcomes.

  16. Detection of lost alpha particle by concealed lost ion probe.

    Science.gov (United States)

    Okamoto, A; Isobe, M; Kitajima, S; Sasao, M

    2010-10-01

    Full orbit-following calculation is performed for the final orbit of the lost alpha particles, showing some orbits escaping from the last closed flux surface could be detected by a concealed lost ion probe (CLIP) installed under the shadow of the original first wall surface. While both passing and trapped orbits hit the same wall panel, detecting a trapped orbit by the CLIP is easier than detecting passing orbits. Whether the final orbit is detected or not is determined by the position of the reflection point. The CLIP successfully detects the trapped orbits, which are reflected before they hit to a first wall. Then the pitch angles of the orbits at the CLIP are close to and smaller than 90°. Optimization of the position of the CLIP in terms of broader detection window is investigated.

  17. The manifest but concealed background of our communication

    Directory of Open Access Journals (Sweden)

    Erkut SEZGIN

    2012-01-01

    Full Text Available That manifest background needs to be elucidated as against intentional memory and imagination habits structured by our learning and operating with rules and pictures (representations of language. That’s the background which is concealed by our very demonstrative forms of expressions meaning and speaking habits expressed by intentional gestures and gesticulations of meaning the surrounding differences and identities: As if they are self essential representative of their own truth and certainty, which is supposed to be meant by the demonstrative, intentional form of the expression. While on the other hand, such intentional demonstrative gestures and gesticulations of meaning operate as conditioned forms of expressions of truth beliefs of imagination and memory habits expressed in reaction to the differences and identities pictured (represented by names and descriptions in deep oblivion of the internal signifying connections of the Use of pictures.

  18. Concealing emotions: nurses' experiences with induced abortion care.

    Science.gov (United States)

    Yang, Cheng-Fang; Che, Hui-Lian; Hsieh, Hsin-Wan; Wu, Shu-Mei

    2016-05-01

    To explore the experiences of nurses involved with induced abortion care in the delivery room in Taiwan. Induced abortion has emotional, ethical and legal facets. In Taiwan, several studies have addressed the ethical issues, abortion methods and women's experiences with abortion care. Although abortion rates have increased, there has been insufficient attention on the views and experiences of nurses working in the delivery room who are involved with induced abortion care. Qualitative, semistructured interviews. This study used a purposive sampling method. In total, 22 nurses involved with induced abortion care were selected. Semistructured interviews with guidelines were conducted, and the content analysis method was used to analyse the data. Our study identified one main theme and five associated subthemes: concealing emotions, which included the inability to refuse, contradictory emotions, mental unease, respect for life and self-protection. This is the first specific qualitative study performed in Taiwan to explore nurses' experiences, and this study also sought to address the concealing of emotions by nurses when they perform induced abortion care, which causes moral distress and creates ethical dilemmas. The findings of this study showed that social-cultural beliefs profoundly influence nurses' values and that the rights of nurses are neglected. The profession should promote small-group and case-study discussions, the clarification of values and reflective thinking among nurses. Continued professional education that provides stress relief will allow nurses to develop self-healing and self-care behaviours, which will enable them to overcome the fear of death while strengthening pregnancy termination counselling, leading to better quality professional care. © 2016 John Wiley & Sons Ltd.

  19. Impact of active concealment of stigmatized identities on physical and psychological quality of life.

    Science.gov (United States)

    Quinn, Diane M; Weisz, Bradley M; Lawner, Elizabeth K

    2017-11-01

    Despite theoretical support for the relationship between disclosure (or "outness") and positive health outcomes for people with concealable stigmatized identities, research using outness to predict health elicits weak to inconsistent relationships. In the current research we argue that it is the need to frequently conceal that predicts negative health consequences, rather than outness. A sample of adults recruited from Amazon's Mechanical Turk reported on mental illness, chronic physical illness, or minority sexual orientation (N = 288) concealment. Participants were surveyed on their levels of outness (in general and to specific others), their frequency of active concealment of the identity, and their physical and psychological quality of life (as measured by the WHOQOL-BREF). All surveys were completed from IP addresses in the United States in 2014. Results showed that the extent of active concealment predicted self-reported psychological (β = -0.32, p < 0.001) and physical QOL (β = -0.28, p < 0.001) over and above general levels of outness and outness to specific others, neither of which were significant predictors with concealment in the model. By examining the need for active concealment, researchers may be better positioned to predict and intervene to improve health outcomes for people with concealable stigmatized identities. Copyright © 2017 Elsevier Ltd. All rights reserved.

  20. 27 CFR 447.62 - False statements or concealment of facts.

    Science.gov (United States)

    2010-04-01

    ... concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO... IMPLEMENTS OF WAR Penalties, Seizures and Forfeitures § 447.62 False statements or concealment of facts. Any... fact or fails to state a material fact required to be stated therein or necessary to make the...

  1. Women with onset of epilepsy prior to marriage: disclose or conceal?

    Science.gov (United States)

    Santosh, Deetha; Kumar, T Santosh; Sarma, P Sankara; Radhakrishnan, Kurupath

    2007-05-01

    We inquired reasons for concealment/disclosure of the history of epilepsy during marriage negotiations and marriage outcomes of 82 consecutive women attending a tertiary referral center based epilepsy clinic in Kerala, southern India. At the time of marriage, 55% concealed and 45% disclosed the history of epilepsy. Majority of those who concealed admitted that they did so fearing breakup of marriage negotiations, and majority of those who disclosed did so to forestall the consequences after marriage of concealing. Compared to those who disclosed, the prevalence of divorce, separation and disturbed marriages were significantly higher among those who concealed. Honest prospective communication during marriage negotiations about epilepsy is important for preserving subsequent married life.

  2. Regulatory focus moderates the social performance of individuals who conceal a stigmatized identity.

    Science.gov (United States)

    Newheiser, Anna-Kaisa; Barreto, Manuela; Ellemers, Naomi; Derks, Belle; Scheepers, Daan

    2015-12-01

    People often choose to hide a stigmatized identity to avoid bias. However, hiding stigma can disrupt social interactions. We considered whether regulatory focus qualifies the social effects of hiding stigma by examining interactions in which stigmatized participants concealed a devalued identity from non-stigmatized partners. In the Prevention Focus condition, stigmatized participants were instructed to prevent a negative impression by concealing the identity; in the Promotion Focus condition, they were instructed to promote a positive impression by concealing the identity; in the Control condition, they were simply asked to conceal the identity. Both non-stigmatized partners and independent raters rated the interactions more positively in the Promotion Focus condition. Thus, promotion focus is interpersonally beneficial for individuals who conceal a devalued identity. © 2015 The British Psychological Society.

  3. Punch 'scoring': a technique that facilitates melanoma diagnosis of clinically suspicious pigmented lesions.

    Science.gov (United States)

    Grogan, Judith; Cooper, Caroline L; Dodds, Tristan J; Guitera, Pascale; Menzies, Scott W; Scolyer, Richard A

    2017-08-10

    Early recognition and accurate diagnosis underpins melanoma survival. Identifying early melanomas arising in association with pre-existing lesions is often challenging. Clinically suspicious foci, however small, must be identified and examined histologically. This study assessed the accuracy of punch biopsy 'scoring' of suspicious foci in excised atypical pigmented skin lesions to identify early melanomas. Forty-one excised pigmented skin lesions with a clinically/dermoscopically focal area of concern for melanoma, with the suspicious focus marked prior to excision with a punch biopsy 'score' (a partial incision into the skin surface), were analysed. Melanoma was diagnosed in nine of 41 cases (22%). In eight of nine cases (89%) the melanoma was associated with a naevus, and in seven of nine (88%) cases the melanoma was identified preferentially by the scored focus. In six of nine cases (67%), the melanoma was entirely encompassed by the scored focus. In one case of melanoma in situ, the diagnostic material was identified only on further levelling through the scored focus. In 28 of 32 of non-melanoma cases (88%), the scored focus identified either diagnostic features of a particular lesion or pathological features that correlated with the clinical impression of change/atypia including altered architecture or distribution of pigmentation, features of irritation or regression. The 'punch scoring technique' allows direct clinicopathological correlation and facilitates early melanoma diagnosis by focusing attention on clinically suspicious areas. Furthermore, it does not require special expertise in ex-vivo clinical techniques for implementation. Nevertheless, in some cases examination of the lesion beyond the scored focus is also necessary to make a diagnosis of melanoma. © 2017 John Wiley & Sons Ltd.

  4. Sonographic scoring of solid thyroid nodules: effects of nodule size and suspicious cervical lymph node.

    Science.gov (United States)

    Unsal, Ozlem; Akpinar, Meltem; Turk, Bilge; Ucak, Irmak; Ozel, Alper; Kayaoglu, Semra; Uslu Coskun, Berna

    Ultrasound is the most frequently used imaging method to evaluate thyroid nodules. Sonographic characteristics of thyroid nodules which are concerning for malignancy are important to define the need for fine needle aspiration biopsy or open surgery. To evaluate malignancy risk of solid thyroid nodules through sonographic scoring. The effects of nodule size ≥2cm and associated pathologic cervical lymph node in scoring were examined in addition to generally excepted suspicious features. Medical data of 123 patients underwent thyroid surgery were reviewed, and 89 patients (58 females, 31 males) were included in the study. The presence and absence of each suspicious sonographic feature of thyroid nodules were scored as 1 and 0, respectively. Total ultrasound score was obtained by adding the positive ultrasound findings. Differently from the literature, nodule size ≥2cm and associated pathologic cervical node were added in scoring criteria. The diagnostic performance of nodule characteristics for malignancy and the effect of total US score to discriminate malignant and benign disease were calculated. A significant relationship was found between malignancy and hypoechogenity, border irregularity, intranodular vascularity, and microcalcification (p<0.05). Pathologic cervical node was observed predominantly in association with malignant nodules. Positive predictive value of suspicious cervical node for malignancy was 67%, similar to microcalcification. Nodule size ≥2cm was not distinctive for diagnosis of malignancy. The number of suspicious sonographic features obtained with receiver operating characteristic analysis to discriminate between malignant and benign disease was three. Sonographic scoring of thyroid nodules is an effective method for predicting malignancy. The authors suggest including associated pathologic node in the scoring criteria. Further studies with larger cohorts will provide more evidence about its importance in sonographic scoring. Copyright

  5. Utilizing Social Media to Further the Nationwide Suspicious Activity Reporting Initiative

    Science.gov (United States)

    2012-09-01

    Initiative NYPD New York Police Department OSINT Open Source Intelligence P2P Peer to Patent SAR Suspicious Activity Report SMS Short Message (or...Media as an Open-Source Intelligence Tool Several government documents outline the use of social media as an Open Source intelligence tool ( OSINT ...social media to be an OSINT tool that federal, state, and local law enforcement agencies should use to develop timely, relevant, and actionable

  6. Separating Facts from Fiction: Linguistic Models to Classify Suspicious and Trusted News Posts on Twitter

    Energy Technology Data Exchange (ETDEWEB)

    Volkova, Svitlana; Shaffer, Kyle J.; Jang, Jin Yea; Hodas, Nathan O.

    2017-07-30

    Pew research polls report 62 percent of U.S. adults get news on social media (Gottfried and Shearer, 2016). In a December poll, 64 percent of U.S. adults said that “made-up news” has caused a “great deal of confusion” about the facts of current events (Barthel et al., 2016). Fabricated stories spread in social media, ranging from deliberate propaganda to hoaxes and satire, contributes to this confusion in addition to having serious effects on global stability. In this work we build predictive models to classify 130 thousand news tweets as suspicious or verified, and predict four subtypes of suspicious news – satire, hoaxes, clickbait and propaganda. We demonstrate that neural network models trained on tweet content and social network interactions outperform lexical models. Unlike previous work on deception detection, we find that adding syntax and grammar features to our models decreases performance. Incorporating linguistic features, including bias and subjectivity, improves classification results, however social interaction features are most informative for finer-grained separation between our four types of suspicious news posts.

  7. Decomposition of Concealed and Exposed Porcine Remains in the North Carolina Piedmont.

    Science.gov (United States)

    Cammack, J A; Cohen, A C; Kreitlow, K L; Roe, R M; Watson, D W

    2016-01-01

    We examined the decomposition and subsequent insect colonization of small pig carrion (Sus scrofa (L.)) placed in concealed and open environments during spring, summer, and fall in Raleigh, North Carolina, as a model for juvenile human remains. Remains were concealed in simulated attics in three manners, ranging from minimal to well-concealed. Concealment had a significant effect on the insect community colonizing the remains across all three seasons; the beetles Necrobia rufipes (DeGeer) (Cleridae) and Dermestes maculatus (DeGeer) (Coleoptera: Dermestidae) were the only species indicative of remains located indoors, whereas numerous fly (Diptera: Calliphoridae, Muscidae, Sepsidae, and Piophilidae) and beetle (Coleoptera: Silphidae, Staphylinidae, and Histeridae) species and an ant species (Hymenoptera: Formicidae, Prenolepis sp.) were indicative of remains located outdoors. Season also significantly affected the insect species, particularly the blow flies (Diptera: Calliphoridae) colonizing remains: Lucilia illustris (Meigen) was indicative of the spring, Cochliomyia macellaria (F.) and Chrysomya megacephala (F.) were indicative of the summer, and Calliphora vicina Robineau-Desvoidy and Calliphora vomitoria (L.) were indicative of the fall. In addition, across all seasons, colonization was delayed by 35–768 h, depending on the degree of concealment. These differences among the insect communities across seasons and concealment treatments, and the effects of concealment on colonization indicate that such information is important and should to be considered when analyzing entomological evidence for criminal investigations.

  8. Use of intravenous antiarrhythmics to identify concealed Brugada syndrome

    Directory of Open Access Journals (Sweden)

    Brugada Ramon

    2000-08-01

    Full Text Available Abstract Cardiology has recently witnessed the production of an overwhelming amount of data through the advances made in genetics and molecular biology research. Understanding of genetics has tremendous potential to aid in the prevention, diagnosis and treatment of the majority of diseases. Despite the high level of publicity for research discoveries, clinicians have had difficulty in discriminating between what is still basic research and what can be applied to patients. The fact is that we still lack the technology to perform genetic testing in a time frame that is acceptable to clinicians. Meanwhile, then, the only option is to rely on clinical tests that can help us better stratify the individuals at risk for a disease. For example, Brugada syndrome has benefited tremendously from genetics and molecular biology since its initial description in 1992. Genetics will provide a more definitive diagnosis for the disease in the future. For the time being, though, research has shown that the administration of an intravenous class I antiarrhythmic is very useful in identifying patients with a concealed form of the disease.

  9. The Concealed Information Test is Susceptible to Misleading Information.

    Science.gov (United States)

    Volz, Katja; Bahr, Lisa-Marie; Heinrichs, Markus; Vaitl, Dieter; Ambach, Wolfgang

    2017-12-15

    An approach toward detecting hidden knowledge is the Concealed Information Test (CIT). It relies on the memory of crime-relevant information. This study investigated whether its validity is susceptible to memory distortion by misleading information. A misleading information paradigm was employed to distort memory prior to an interrogation with a CIT. Forty-one participants watched a video with specific crime-related information. After a 1-week retention interval, misleading information was introduced. Afterward, a CIT was performed, followed by a threefold memory test. When misleading information was presented, memory performance was reduced, and no physiological response differences between crime-relevant and crime-irrelevant information were found. Without presenting misleading information, physiological responses differed between responses to crime-relevant and crime-irrelevant information. However, responses in all physiological measures also differed between misleading and irrelevant information. The results indicate that the CIT is susceptible to misleading information, which reduces its validity in specific constellations. © 2017 American Academy of Forensic Sciences.

  10. Diffusion-weighted magnetic resonance imaging in the assessment of ovarian masses with suspicious features: Strengths and challen

    Directory of Open Access Journals (Sweden)

    Sahar Mansour

    2015-12-01

    Conclusion: DWI supported by conventional MRI data can confirm or exclude malignancy in suspicious ovarian masses. The combined analysis of quantitative and qualitative criteria and knowledge of the sequence pitfalls are required.

  11. Experimental Assessment of Linear Sampling and Factorization Methods for Microwave Imaging of Concealed Targets

    Directory of Open Access Journals (Sweden)

    M. N. Akıncı

    2015-01-01

    Full Text Available Shape reconstruction methods are particularly well suited for imaging of concealed targets. Yet, these methods are rarely employed in real nondestructive testing applications, since they generally require the electrical parameters of outer object as a priori knowledge. In this regard, we propose an approach to relieve two well known shape reconstruction algorithms, which are the linear sampling and the factorization methods, from the requirement of the a priori knowledge on electrical parameters of the surrounding medium. The idea behind this paper is that if a measurement of the reference medium (a medium which can approximate the material, except the inclusion can be supplied to these methods, reconstructions with very high qualities can be obtained even when there is no information about the electrical parameters of the surrounding medium. Taking the advantage of this idea, we consider that it is possible to use shape reconstruction methods in buried object detection. To this end, we perform several experiments inside an anechoic chamber to verify the approach against real measurements. Accuracy and stability of the obtained results show that both the linear sampling and the factorization methods can be quite useful for various buried obstacle imaging problems.

  12. Rating Emotion Communication: Display and Concealment as Effects of Culture, Gender, Emotion Type, and Relationship

    Directory of Open Access Journals (Sweden)

    Arne Vikan

    2009-01-01

    Full Text Available Students from a collectivistic (Brazilian, n= 401 and an individualistic (Norwegian, n= 418culture rated their ability to display and conceal anger, sadness, and anxiety in relation to immediate family, partner, friends, and "other persons." Norwegians showed higher display ratings for anger and sadness, and higher concealment ratings for anger and anxiety. Display ratings were much higher, and concealment ratings much lower in relation to close persons than in relation to "other persons." A culture x relationship interaction was that Brazilian' ratings suggested more emotional openness to friends than to family and partner, whereas Norwegians showed the inverse patterns. Gender differences supported previous research by showing higher display and lower concealment ratings, and less differentiation between relationships by females.

  13. The Effects of Concealing Academic Achievement Information on Adolescents’ Self-Concept

    National Research Council Canada - National Science Library

    Zhang, Baoshan; Wang, Mo; Li, Juan; Yu, Guoliang; Bi, Yan-Ling

    2011-01-01

    ... or not. Results showed that participants with low academic achievement in the concealing-achievement-information condition had higher levels of state self-esteem and more self-representation suppression...

  14. An event study on the concealment of the blending ratio of waste paper.

    Science.gov (United States)

    Yamaguchi, Keiko

    2009-05-01

    We conducted an event study on the concealment of the blending ratio of waste paper with virgin pulp in Japan. By investigating 10 companies in the paper industry between May 30, 2007 and January 18, 2008, we clearly show that stock prices of the relevant companies were affected by the news on the concealment of the blending ratio of waste paper. In addition, the impact of the second event was found to be greater than that of the first event. Therefore, the concealment of major companies negatively affects the stock prices of non-major companies, which did not conceal information during this period. Thus, bad news is negatively assessed by the market, and this influence has spread in the paper industry in general.

  15. Concealing Emotions at Work Is Associated with Allergic Rhinitis in Korea.

    Science.gov (United States)

    Seok, Hongdeok; Yoon, Jin-Ha; Won, Jong-Uk; Lee, Wanhyung; Lee, June-Hee; Jung, Pil Kyun; Roh, Jaehoon

    2016-01-01

    Concealing emotions at work can cause considerable psychological stress. While there is extensive research on the adverse health effects of concealing emotions and the association between allergic diseases and stress, research has not yet investigated whether concealing emotions at work is associated with allergic rhinitis. Allergic rhinitis is a common disease in many industrialized countries, and its prevalence is increasing. Thus, our aim was to determine the strength of this association using data from three years (2007-2009) of the 4th Korean National Health and Nutrition Examination Survey. Participants (aged 20-64) were 8,345 individuals who were economically active and who had completed the questionnaire items on concealing emotions at work. Odds ratio (OR) and 95% confidence intervals (95% CIs) were calculated for allergic rhinitis using logistic regression models. Among all participants, 3,140 subjects (37.6%) reported concealing their emotions at work: 1,661 men and 1,479 women. The OR (95% CIs) for allergic rhinitis among those who concealed emotions at work versus those who did not was 1.318 (1.148-1.512). Stratified by sex, the OR (95% CIs) was 1.307 (1.078-1.585) among men and 1.346 (1.105-1.639) among women. Thus, individuals who concealed their emotions at work were significantly more likely to have a diagnosis of AR in comparison to those who did not. Because concealing emotions at work has adverse health effects, labor policies that aim to reduce this practice are needed.

  16. Reprogramming to pluripotency can conceal somatic cell chromosomal instability.

    Directory of Open Access Journals (Sweden)

    Masakazu Hamada

    Full Text Available The discovery that somatic cells are reprogrammable to pluripotency by ectopic expression of a small subset of transcription factors has created great potential for the development of broadly applicable stem-cell-based therapies. One of the concerns regarding the safe use of induced pluripotent stem cells (iPSCs in therapeutic applications is loss of genomic integrity, a hallmark of various human conditions and diseases, including cancer. Structural chromosome defects such as short telomeres and double-strand breaks are known to limit reprogramming of somatic cells into iPSCs, but whether defects that cause whole-chromosome instability (W-CIN preclude reprogramming is unknown. Here we demonstrate, using aneuploidy-prone mouse embryonic fibroblasts (MEFs in which chromosome missegregation is driven by BubR1 or RanBP2 insufficiency, that W-CIN is not a barrier to reprogramming. Unexpectedly, the two W-CIN defects had contrasting effects on iPSC genomic integrity, with BubR1 hypomorphic MEFs almost exclusively yielding aneuploid iPSC clones and RanBP2 hypomorphic MEFs karyotypically normal iPSC clones. Moreover, BubR1-insufficient iPSC clones were karyotypically unstable, whereas RanBP2-insufficient iPSC clones were rather stable. These findings suggest that aneuploid cells can be selected for or against during reprogramming depending on the W-CIN gene defect and present the novel concept that somatic cell W-CIN can be concealed in the pluripotent state. Thus, karyotypic analysis of somatic cells of origin in addition to iPSC lines is necessary for safe application of reprogramming technology.

  17. Examination of Biological Effects of Magnetic Field Concealed by Gravity

    Science.gov (United States)

    Yamashita, M.; Tomita-Yokotani, K.; Hashimoto, H.; Nakamura, T.

    Response of biological systems against combined environment of zero-gravity and zero-magnetic field should be examined as the baseline to investigate biological effects of magnetic field that might be concealed by gravity. Space offers unique opportunities to conduct such study because long term microgravity is available for the scientific use. However, magnetic environment has been neither well controlled nor documented both in space and ground based experiments. Biological specimen is exposed to the various magnetic field of Earth during the revolutions in orbit. The profile of magnetic field varying in time depends on the orbital parameters and attitude of the space platform. Furthermore, the onboard 1 G control group is subjected to centrifugation spinning where magnetic field varies differently from the microgravity experiment group. It can not be accepted as the 1 G control in terms of magnetic environment. We propose experiment set up to shield exotic magnetic field experienced in orbiting space experiment platform. Thin film of amorphous metal or alloys has shielding capability, and is feasible to implement for space experimentation. In order to simulate zero-gravity and zero-magnetic field on ground, we developed a 3D- clinostat that equips a magnetic shielding layer for specimen. In order to evaluate effects of normal magnetic field of Earth, steady magnetic field is induced at the site of specimen inside the shield layer either in orbit or on 3D-clinostat. To fill the matrix of experimental design, 1 G control under the magnetic shielded condition, and 1 G control that is exposed to the normal field should be taken. Degree of magnetic shielding magnitude required for plant studies and other issues were examined by the preliminary experiments using a 3D-clinostat for the studies of etiolated seedlings.

  18. [Abortion in unsafe conditions. Concealment, illegality, corruption and negligence].

    Science.gov (United States)

    Ortiz Ortega, A

    1993-01-01

    "Abortion practiced under conditions of risk" is a phrase used to refer to illegal abortion. The phrase does not highlight the disappearance of risk when legislation changes. Rather, it calls attention to the fact that legal restrictions significantly increase dangers while failing to discourage women determined to terminate pregnancies. The International Planned Parenthood Federation defines abortion under conditions of risk as the use of nonoptimal technology, lack of counseling and services to orient the woman's decision and provide postabortion counseling, and the limitation of freedom to make the decision. The phrase encompasses concealment, illegality, corruption, and negligence. It is designed to impose a reproductive health perspective in response to an unresolved social conflict. Steps have been developed to improve the situation of women undergoing abortion even without a change in its legal status. Such steps include training and purchase of equipment for treatment of incomplete abortions and development of counseling and family planning services. The central difficulty of abortion induced in conditions of risk derives from the laws imposing the need for secrecy. In Mexico, the abortion decision belongs to the government and the society, while individual absorb the consequences of the practice of abortion. Public decision making about abortion is dominated by the concept that the female has an obligation to carry any pregnancy to term. Women who interfere with male descendency and practice a sexuality distinct from reproduction are made to pay a price in health and emotional balance. Resolution of the problem of abortion will require new concepts in terms of legal status, public health issues, and the rights of women. The problem becomes more pressing as abortion becomes more common in a country anxious to advance in the demographic transition. Only a commitment to the reproductive health of women and the full development of their rights as citizens will

  19. Phishing suspiciousness in older and younger adults: The role of executive functioning.

    Directory of Open Access Journals (Sweden)

    Brandon E Gavett

    Full Text Available Phishing is the spoofing of Internet websites or emails aimed at tricking users into entering sensitive information, with such goals as financial or identity theft. The current study sought to determine whether age is associated with increased susceptibility to phishing and whether tests of executive functioning can predict phishing susceptibility. A total of 193 cognitively intact participants, 91 younger adults and 102 older adults, were primarily recruited through a Psychology department undergraduate subject pool and a gerontology research registry, respectively. The Executive Functions Module from the Neuropsychological Assessment Battery and the Iowa Gambling Task were the primary cognitive predictors of reported phishing suspiciousness. Other predictors included age group (older vs. younger, sex, education, race, ethnicity, prior knowledge of phishing, prior susceptibility to phishing, and whether or not browsing behaviors were reportedly different in the laboratory setting versus at home. A logistic regression, which accounted for a 22.7% reduction in error variance compared to the null model and predicted phishing suspiciousness with 73.1% (95% CI [66.0, 80.3] accuracy, revealed three statistically significant predictors: the main effect of education (b = 0.58, SE = 0.27 and the interactions of age group with prior awareness of phishing (b = 2.31, SE = 1.12 and performance on the Neuropsychological Assessment Battery Mazes test (b = 0.16, SE = 0.07. Whether or not older adults reported being suspicious of the phishing attacks used in this study was partially explained by educational history and prior phishing knowledge. This suggests that simple educational interventions may be effective in reducing phishing vulnerability. Although one test of executive functioning was found useful for identifying those at risk of phishing susceptibility, four tests were not found to be useful; these results speak to the need for more ecologically valid

  20. Phishing suspiciousness in older and younger adults: The role of executive functioning

    Science.gov (United States)

    Zhao, Rui; John, Samantha E.; Bussell, Cara A.; Roberts, Jennifer R.; Yue, Chuan

    2017-01-01

    Phishing is the spoofing of Internet websites or emails aimed at tricking users into entering sensitive information, with such goals as financial or identity theft. The current study sought to determine whether age is associated with increased susceptibility to phishing and whether tests of executive functioning can predict phishing susceptibility. A total of 193 cognitively intact participants, 91 younger adults and 102 older adults, were primarily recruited through a Psychology department undergraduate subject pool and a gerontology research registry, respectively. The Executive Functions Module from the Neuropsychological Assessment Battery and the Iowa Gambling Task were the primary cognitive predictors of reported phishing suspiciousness. Other predictors included age group (older vs. younger), sex, education, race, ethnicity, prior knowledge of phishing, prior susceptibility to phishing, and whether or not browsing behaviors were reportedly different in the laboratory setting versus at home. A logistic regression, which accounted for a 22.7% reduction in error variance compared to the null model and predicted phishing suspiciousness with 73.1% (95% CI [66.0, 80.3]) accuracy, revealed three statistically significant predictors: the main effect of education (b = 0.58, SE = 0.27) and the interactions of age group with prior awareness of phishing (b = 2.31, SE = 1.12) and performance on the Neuropsychological Assessment Battery Mazes test (b = 0.16, SE = 0.07). Whether or not older adults reported being suspicious of the phishing attacks used in this study was partially explained by educational history and prior phishing knowledge. This suggests that simple educational interventions may be effective in reducing phishing vulnerability. Although one test of executive functioning was found useful for identifying those at risk of phishing susceptibility, four tests were not found to be useful; these results speak to the need for more ecologically valid tools in

  1. Self-Concealment Mediates the Relationship Between Perfectionism and Attitudes Toward Seeking Psychological Help Among Adolescents.

    Science.gov (United States)

    Abdollahi, Abbas; Hosseinian, Simin; Beh-Pajooh, Ahmad; Carlbring, Per

    2017-01-01

    One of the biggest barriers in treating adolescents with mental health problems is their refusing to seek psychological help. This study was designed to examine the relationships between two forms of perfectionism, self-concealment and attitudes toward seeking psychological help and to test the mediating role of self-concealment in the relationship between perfectionism and attitudes toward seeking psychological help among Malaysian high school students. The participants were 475 Malaysian high school students from four high schools in Kuala Lumpur, Malaysia. Structural equation modelling results indicated that high school students with high levels of socially prescribed perfectionism, high levels of self-concealment, and low levels of self-oriented perfectionism reported negative attitudes toward seeking psychological help. Bootstrapping analysis showed that self-concealment emerged as a significant, full mediator in the link between socially prescribed perfectionism and attitudes toward seeking psychological help. Moderated mediation analysis also examined whether the results generalized across men and women. The results revealed that male students with socially prescribed perfectionism are more likely to engage in self-concealment, which in turn, leads to negative attitudes toward seeking psychological help more than their female counterparts. The results suggested that students high in socially prescribed perfectionism were more likely to engage in self-concealment and be less inclined to seek psychological help.

  2. Informing cancer patient based on his type of personality: the suspicious (paranoid) patient.

    Science.gov (United States)

    Kallergis, G

    2013-01-01

    Imparting bad news had always been an unpleasant task for the physician, as shown from ancient years to our days. In the healthcare sector and as far as the cancer patient is concerned, the imparting of bad news is performed by the patient's doctor within a therapeutic relationship of course. The fundamental question is how a therapist could tailor the information to any patient and if "Is it possible to determine who should be told what, when and how ?". The aim of this paper was to describe the suspicious character or type of personality thoroughly so that any physician can make a diagnosis and tailor the information strategy to the patient's needs. As method of research was used the qualitative method through groups with doctors and nurses, while research within groups lasted for 5 years. The degree of informing of the suspicious personality in the range "minimal - small - medium - large - very large" is : the degree of denial varies between large and very large. The degree of informing varies between medium and small and sometimes minimal. Informing the Family: The hardest family to deal with. Pay attention to litigious mania. Avoid confrontation or be drawn into agreeing with the family views.

  3. Automated linking of suspicious findings between automated 3D breast ultrasound volumes

    Science.gov (United States)

    Gubern-Mérida, Albert; Tan, Tao; van Zelst, Jan; Mann, Ritse M.; Karssemeijer, Nico

    2016-03-01

    Automated breast ultrasound (ABUS) is a 3D imaging technique which is rapidly emerging as a safe and relatively inexpensive modality for screening of women with dense breasts. However, reading ABUS examinations is very time consuming task since radiologists need to manually identify suspicious findings in all the different ABUS volumes available for each patient. Image analysis techniques to automatically link findings across volumes are required to speed up clinical workflow and make ABUS screening more efficient. In this study, we propose an automated system to, given the location in the ABUS volume being inspected (source), find the corresponding location in a target volume. The target volume can be a different view of the same study or the same view from a prior examination. The algorithm was evaluated using 118 linkages between suspicious abnormalities annotated in a dataset of ABUS images of 27 patients participating in a high risk screening program. The distance between the predicted location and the center of the annotated lesion in the target volume was computed for evaluation. The mean ± stdev and median distance error achieved by the presented algorithm for linkages between volumes of the same study was 7.75±6.71 mm and 5.16 mm, respectively. The performance was 9.54±7.87 and 8.00 mm (mean ± stdev and median) for linkages between volumes from current and prior examinations. The proposed approach has the potential to minimize user interaction for finding correspondences among ABUS volumes.

  4. Validation of the EULAR definition of arthralgia suspicious for progression to rheumatoid arthritis.

    Science.gov (United States)

    Burgers, Leonie E; Siljehult, Filip; Ten Brinck, Robin M; van Steenbergen, Hanna W; Landewé, Robert B M; Rantapää-Dahlqvist, Solbritt; van der Helm-van Mil, Annette H M

    2017-12-01

    Recently a EULAR-taskforce defined arthralgia suspicious for progression to RA, in order to allow inclusion of homogeneous sets of arthralgia patients in clinical studies. This longitudinal study aimed (i) to validate this definition in arthralgia patients in whom rheumatologists felt that imminent RA was more likely than other arthralgias [clinically suspect arthralgia (CSA)], that is, the target population fulfilling the entry criterion, and (ii) to explore the performance in arthralgia patients who were referred to secondary care prior to rheumatological evaluation, hence ignoring the entry criterion. The definition was assessed in 241 Dutch patients identified with CSA by rheumatologists and 113 patients referred to the Umeå university hospital with recent-onset arthralgia in small joints. The external reference was arthritis development definition (⩾3/7 parameters present) had an increased risk for developing arthritis compared with definition-negative CSA patients (hazard ratio = 2.1, 95% CI: 0.9, 4.7). The sensitivity was 84% and the positive predictive value 30%. In arthralgia patients in whom the definition was applied before rheumatological evaluation, a positive definition was neither sensitive (10%) nor predictive (positive predictive value 3%). The EULAR definition of arthralgia suspicious for progression to RA is sensitive when used to support the rheumatologist's opinion on imminent RA. This validation study shows that the definition, when used as designed, further homogenizes patients that rheumatologists consider at risk for RA. To arrive at a high specificity, the clinical definition needs to be combined with biomarkers.

  5. The value of preoperative ultrasound guided fine-needle aspiration cytology of radiologically suspicious axillary lymph nodes in breast cancer

    Directory of Open Access Journals (Sweden)

    Torill Sauer

    2014-01-01

    Full Text Available Background: Preoperative ultrasound (US and eventually US-guided fine-needle aspiration cytology (FNAC of suspicious axillary lymph nodes (ALN is a standard procedure in the work-up of suspicious breast lesions. Preoperative US FNAC may prevent sentinel node biopsy (SNB procedure in 24-30% of patients with early stage breast carcinoma. The aim of this study was to evaluate the institutional results of this preoperative diagnostic procedure. Materials and Methods: A total of 182 cases of preoperative FNAC of suspicious ALN where retrieved from the pathology files. The results were compared with the final histology and staging. False negative (FN FNAC cases were reviewed and possibly missed metastatic cases (2 were immunostained with the epithelial marker AE1/AE3. Results: There were no false positives, whereas 16 cases were FN. In all but one case the FN′s represented sampling error. Half of the 16 FN cases in this series were macrometastases. Discussion: About 83% of the preoperatively aspirated cases were N+, indicating that a radiologically suspicious ALN has a very high risk of being metastatic. Preoperative US guided FNAC from radiologically suspicious ALN is highly efficient in detecting metastases. Depending on national guidelines, a preoperative, positive ALN FNAC might help to stratify the patients as to SNB and/or ALN dissection.

  6. A new surgical technique for concealed penis using an advanced musculocutaneous scrotal flap.

    Science.gov (United States)

    Han, Dong-Seok; Jang, Hoon; Youn, Chang-Shik; Yuk, Seung-Mo

    2015-06-19

    Until recently, no single, universally accepted surgical method has existed for all types of concealed penis repairs. We describe a new surgical technique for repairing concealed penis by using an advanced musculocutaneous scrotal flap. From January 2010 to June 2014, we evaluated 12 patients (12-40 years old) with concealed penises who were surgically treated with an advanced musculocutaneous scrotal flap technique after degloving through a ventral approach. All the patients were scheduled for regular follow-up at 6, 12, and 24 weeks postoperatively. The satisfaction grade for penile size, morphology, and voiding status were evaluated using a questionnaire preoperatively and at all of the follow-ups. Information regarding complications was obtained during the postoperative hospital stay and at all follow-ups. The patients' satisfaction grades, which included the penile size, morphology, and voiding status, improved postoperatively compared to those preoperatively. All patients had penile lymphedema postoperatively; however, this disappeared within 6 weeks. There were no complications such as skin necrosis and contracture, voiding difficulty, or erectile dysfunction. Our advanced musculocutaneous scrotal flap technique for concealed penis repair is technically easy and safe. In addition, it provides a good cosmetic appearance, functional outcomes and excellent postoperative satisfaction grades. Lastly, it seems applicable in any type of concealed penis, including cases in which the ventral skin defect is difficult to cover.

  7. Visualization of suspicious lesions in breast MRI based on intelligent neural systems

    Science.gov (United States)

    Twellmann, Thorsten; Lange, Oliver; Nattkemper, Tim Wilhelm; Meyer-Bäse, Anke

    2006-05-01

    Intelligent medical systems based on supervised and unsupervised artificial neural networks are applied to the automatic visualization and classification of suspicious lesions in breast MRI. These systems represent an important component of future sophisticated computer-aided diagnosis systems and enable the extraction of spatial and temporal features of dynamic MRI data stemming from patients with confirmed lesion diagnosis. By taking into account the heterogenity of the cancerous tissue, these techniques reveal the malignant, benign and normal kinetic signals and and provide a regional subclassification of pathological breast tissue. Intelligent medical systems are expected to have substantial implications in healthcare politics by contributing to the diagnosis of indeterminate breast lesions by non-invasive imaging.

  8. Student Perceptions of Auditor Responses to Evidence of Suspicious Activities: An Experimental Assessment

    Directory of Open Access Journals (Sweden)

    David S Murphy

    2015-12-01

    Full Text Available This study assessed student perceptions of auditor responses to evidence that a client failed to respond appropriately to suspicious activities that could indicate money laundering. Subjects were presented with a series of randomized cases in which partner type (new vs. experienced, firm type (regional vs. international and audit fee materiality (not material, material to the local office only, material to the firm were manipulated asked to indicate their perceptions of the likelihood that an audit partner would discuss such evidence with the client, and the likelihood that the issue would be disclosed by the auditor. Both partner type and audit fee materiality was found to have significant effects on perceived likelihoods.

  9. NIR spectroscopy with multivariate calibration and lock-in amplification to detect chemicals concealed behind fabrics

    Science.gov (United States)

    Saleem, Aamer; Canal, Céline; Hutchins, David A.; Green, Roger J.

    2011-05-01

    The detection of specific chemicals when concealed behind a layer of clothing is reported using near infrared (NIR) spectroscopy. Concealment modifies the spectrum of a particular chemical when recorded at stand-off ranges of three meters in a diffuse reflection experiment. The subsequent analysis to identify a particular chemical has involved employing calibration models such as principal component regression (PCR) and partial least squares regression (PLSR). Additionally, detection has been attempted with good results using neural networks. The latter technique serves to overcome nonlinearities in the calibration/training dataset, affording more robust modelling. Finally, lock-in amplification of spectral data collected in through-transmission arrangement has been shown to allow detection at SNR as low as -60dB. The work has been shown to both allow detection of specific chemicals concealed behind a single intervening layer of fabric material, and to estimate the concentration of certain liquids.

  10. [Devine's technique with free skin grafting for concealed penis with prepuce deficit].

    Science.gov (United States)

    Xu, Xiao-Wen; Xu, Yao-Ting; Shen, Zhi-Jie; Li, Du-Jian; Gu, Wei; Huang, Ru-Qiang

    2011-07-01

    To investigate the clinical effect of Devine's technique with free skin grafting in the treatment of concealed penis with prepuce deficit. This study included 7 children with concealed penis, aged 6 - 15 (mean 8.6) years, 6 of them treated by circumcision previously. All the patients underwent Devine's operation to resect the inelasticity sarcolemma and lengthen the penis. The length of prepuce deficit ranged from 2 to 4 cm. Intermediate split thickness skin grafts of the corresponding length were taken from the femoribus internus to wrap up the tunica albuginea penis, followed by the procedures of saturation, encapsulation and fixation. Surgery time ranged from 70 to 120 minutes, averaging 90.5 minutes. The penis was prolonged about 2 - 4 cm after surgery. A 6-month follow-up revealed desirable penile appearance and normal penile erection. Devine's technique with free skin grafting from the femoribus internus is an ideal treatment for concealed penis with prepuce deficit.

  11. Introducing a Model for Suspicious Behaviors Detection in Electronic Banking by Using Decision Tree Algorithms

    Directory of Open Access Journals (Sweden)

    Rohulla Kosari Langari

    2014-02-01

    Full Text Available Change the world through information technology and Internet development, has created competitive knowledge in the field of electronic commerce, lead to increasing in competitive potential among organizations. In this condition The increasing rate of commercial deals developing guaranteed with speed and light quality is due to provide dynamic system of electronic banking until by using modern technology to facilitate electronic business process. Internet banking is enumerate as a potential opportunity the fundamental pillars and determinates of e-banking that in cyber space has been faced with various obstacles and threats. One of this challenge is complete uncertainty in security guarantee of financial transactions also exist of suspicious and unusual behavior with mail fraud for financial abuse. Now various systems because of intelligence mechanical methods and data mining technique has been designed for fraud detection in users’ behaviors and applied in various industrial such as insurance, medicine and banking. Main of article has been recognizing of unusual users behaviors in e-banking system. Therefore, detection behavior user and categories of emerged patterns to paper the conditions for predicting unauthorized penetration and detection of suspicious behavior. Since detection behavior user in internet system has been uncertainty and records of transactions can be useful to understand these movement and therefore among machine method, decision tree technique is considered common tool for classification and prediction, therefore in this research at first has determinate banking effective variable and weight of everything in internet behaviors production and in continuation combining of various behaviors manner draw out such as the model of inductive rules to provide ability recognizing of different behaviors. At least trend of four algorithm Chaid, ex_Chaid, C4.5, C5.0 has compared and evaluated for classification and detection of exist

  12. Combining the P300-complex trial-based concealed information test and the reaction time-based autobiographical implicit association test in concealed memory detection.

    Science.gov (United States)

    Hu, Xiaoqing; Rosenfeld, J Peter

    2012-08-01

    Despite the P300-concealed information test's validity in detecting concealed memory when it is conducted immediately after the mock crime, whether the P300-CIT's detection efficiency is moderated by time delay remains unknown. Here, we conducted a mock crime study in which guilty participants were tested immediately after the mock crime or 1 month later. An innocent group was also tested. Assuming that the autobiographical Implicit Association Test (aIAT) and the P300-CIT rely on nonoverlapping mechanisms for memory detection, participants were tested using both the P300-CIT and the reaction time (RT)-based aIAT. Results suggested that the sensitivity of both tests remains even after the 1-month delay. The indicators from the RT-aIAT and P300-CIT were uncorrelated, thus combining P300-CIT and aIAT data further increased the efficiency of memory detection. Copyright © 2012 Society for Psychophysiological Research.

  13. Error Concealment for 3-D DWT Based Video Codec Using Iterative Thresholding

    DEFF Research Database (Denmark)

    Belyaev, Evgeny; Forchhammer, Søren; Codreanu, Marian

    2017-01-01

    Error concealment for video coding based on a 3-D discrete wavelet transform (DWT) is considered. We assume that the video sequence has a sparse representation in a known basis different from the DWT, e.g., in a 2-D discrete cosine transform basis. Then, we formulate the concealment problem as l1......-norm minimization and solve it utilizing an iterative thresholding algorithm. Comparing different thresholding operators, we show that video block-matching and 3-D filtering provide the best reconstruction by utilizing spatial similarity within a frame and temporal similarity between neighbor frames...

  14. [Sarcolemma tissue of prepubertal concealed penis: pathological characterization and clinical implication].

    Science.gov (United States)

    Chen, Hai-Tao; Yang, Xing-Hai

    2013-03-01

    To evaluate the histopathological characteristics and clinical implication of sarcolemma tissue in prepubertal concealed penis. After measurement of the penile length, 10 prepubertal children with congenital concealed penis underwent modified Devine's operation (treatment group), and another 10 normal prepubertal children received circumcision (control group). The anatomic features of the penile sarcolemma tissue was observed intraoperatively, and its fibrosis was evaluated by Masson trichrome staining. The penile length of the treatment group was significantly shorter than that of the control group preoperatively ([1.49 +/- 0.17 ] cm vs [4.26 +/- 0.23 ] cm, P penis, and the key to its management is drastic removal of all the fibrous sarcolemma tissue.

  15. The Role of Conventional Bronchoscopy in the Workup of Suspicious CT Scan Screen-Detected Pulmonary Nodules

    NARCIS (Netherlands)

    van't Westeinde, Susan C.; Horeweg, Nanda; Vernhout, Rene M.; Groen, Harry J. M.; Lammers, Jan-Willem J.; Weenink, Carla; Nackaerts, Kristiaan; Oudkerk, Matthijs; Mali, Willem; Thunnissen, Frederik B.; de Koning, Harry J.; van Klaveren, Rob J.

    Background: Up to 50% of the participants in CT scan lung cancer screening trials have at least one pulmonary nodule. To date, the role of conventional bronchoscopy in the workup of suspicious screen-detected pulmonary nodules is unknown. If a bronchoscopic evaluation could be eliminated, the

  16. The role of conventional bronchoscopy in the workup of suspicious CT scan screen-detected pulmonary nodules

    NARCIS (Netherlands)

    S.C. van 't Westeinde (Susan); N. Horeweg (Nanda); R. Vernhout (Rene); H.J.M. Groen (Henk); J.-W.J. Lammers (Jan-Willem); C. Weenink (Carla); K. Nackaerts (Kristiaan); M. Oudkerk (Matthijs); W.P. Mali (Willem); F.B.J.M. Thunnissen (Frederik); H.J. de Koning (Harry); R.J. van Klaveren (Rob)

    2012-01-01

    textabstractBackground: Up to 50% of the participants in CT scan lung cancer screening trials have at least one pulmonary nodule. To date, the role of conventional bronchoscopy in the workup of suspicious screen-detected pulmonary nodules is unknown. If a bronchoscopic evaluation could be

  17. Anxiety and Related Disorders and Concealment in Sexual Minority Young Adults.

    Science.gov (United States)

    Cohen, Jeffrey M; Blasey, Christine; Barr Taylor, C; Weiss, Brandon J; Newman, Michelle G

    2016-01-01

    Sexual minorities face greater exposure to discrimination and rejection than heterosexuals. Given these threats, sexual minorities may engage in sexual orientation concealment in order to avoid danger. This social stigma and minority stress places sexual minorities at risk for anxiety and related disorders. Given that three fourths of anxiety disorder onset occurs before the age of 24, the current study investigated the symptoms of generalized anxiety disorder, social phobia, panic disorder, posttraumatic stress disorder, and depression in sexual minority young adults relative to their heterosexual peers. Secondarily, the study investigated sexual orientation concealment as a predictor of anxiety and related disorders. A sample of 157 sexual minority and 157 heterosexual young adults matched on age and gender completed self-report measures of the aforementioned disorders, and indicated their level of sexual orientation concealment. Results revealed that sexual minority young adults reported greater symptoms relative to heterosexuals across all outcome measures. There were no interactions between sexual minority status and gender, however, women had higher symptoms across all disorders. Sexual minority young women appeared to be at the most risk for clinical levels of anxiety and related disorders. In addition, concealment of sexual orientation significantly predicted symptoms of social phobia. Implications are offered for the cognitive and behavioral treatment of anxiety and related disorders in this population. Copyright © 2015. Published by Elsevier Ltd.

  18. Temporal spying and concealing process in fibre-optic data transmission systems through polarization bypass

    National Research Council Canada - National Science Library

    Bony, P Y; Guasoni, M; Morin, P; Sugny, D; Picozzi, A; Jauslin, H R; Pitois, S; Fatome, J

    2014-01-01

    .... Here we report the first experimental demonstration of perpetual temporal spying and blinding process of optical data in fibre-optic transmission line based on polarization bypass. We successfully characterize the performance of our system by alternatively copying and then concealing 100% of a 10-Gb s(-1) transmitted signal.

  19. What's on your mind? Recent advances in memory detection using the Concealed Information Test

    NARCIS (Netherlands)

    Verschuere, B.; Meijer, E.H.

    2014-01-01

    Lie detectors can be applied in a wide variety of settings. But this advantage comes with a considerable cost: False positives. The applicability of the Concealed Information Test (CIT) is more limited, yet when it can be applied, the risk of false accusations can be set a priori at a very low

  20. How Many More Guns?: Estimating the Effect of Allowing Licensed Concealed Handguns on a College Campus

    Science.gov (United States)

    Bouffard, Jeffrey A.; Nobles, Matt R.; Wells, William; Cavanaugh, Michael R.

    2012-01-01

    Among other arguments, advocates for lifting bans on carrying concealed handguns on campus propose that this would increase the prevalence of legitimately carried handguns, which might then deter crimes or be used to intervene in campus shooting incidents like the one that took place at Virginia Tech in 2007. Opponents suggest that increased…

  1. The Effects of Concealing Academic Achievement Information on Adolescents' Self-Concept

    Science.gov (United States)

    Zhang, Baoshan; Wang, Mo; Li, Juan; Yu, Guoliang; Bi, Yan-Ling

    2011-01-01

    Using an experimental design, the effect of concealing academic achievement information on adolescents' self-concept was examined in the current study. Specifically, adolescents with low academic achievement and adolescents with average to high academic achievement (N = 129) were randomly assigned to different interview contexts wherein…

  2. A neighbourhood analysis based technique for real-time error concealment in H.264 intra pictures

    Science.gov (United States)

    Beesley, Steven T. C.; Grecos, Christos; Edirisinghe, Eran

    2007-02-01

    H.264s extensive use of context-based adaptive binary arithmetic or variable length coding makes streams highly susceptible to channel errors, a common occurrence over networks such as those used by mobile devices. Even a single bit error will cause a decoder to discard all stream data up to the next fixed length resynchronisation point, the worst scenario is that an entire slice is lost. In cases where retransmission and forward error concealment are not possible, a decoder should conceal any erroneous data in order to minimise the impact on the viewer. Stream errors can often be spotted early in the decode cycle of a macroblock which if aborted can provide unused processor cycles, these can instead be used to conceal errors at minimal cost, even as part of a real time system. This paper demonstrates a technique that utilises Sobel convolution kernels to quickly analyse the neighbourhood surrounding erroneous macroblocks before performing a weighted multi-directional interpolation. This generates significantly improved statistical (PSNR) and visual (IEEE structural similarity) results when compared to the commonly used weighted pixel value averaging. Furthermore it is also computationally scalable, both during analysis and concealment, achieving maximum performance from the spare processing power available.

  3. Productive and Inclusive? How Documentation Concealed Racialising Practices in a Diversity Project

    Science.gov (United States)

    Miller, Melinda G.

    2014-01-01

    This article examines how documentation concealed racialising practices in a diversity project that was seen to be productive and inclusive. Documentation examples are taken from a doctoral study about embedding Indigenous perspectives in early childhood education curricula in two Australian urban childcare centres. In place of reporting examples…

  4. Fear Perceptions in Public Parks: Interactions of Environmental Concealment, the Presence of People Recreating, and Gender

    Science.gov (United States)

    Jorgensen, Lisa J.; Ellis, Gary D.; Ruddell, Edward

    2013-01-01

    This research examined the effect of concealment (environmental cues), presence or absence of people recreating (social cues), and gender on individuals' fear of crime in a community park setting. Using a 7-point single-item indicator, 732 participants from two samples (540 park visitors and 192 college students) rated their estimates of fear of…

  5. Remembering or Concealing Mythical and Historical Events in the Cityscape of Early Roman Ephesus

    DEFF Research Database (Denmark)

    Mortensen, Eva

    2015-01-01

    The cityscape of early Roman Ephesus incorporated and referenced narratives from the city’s past. But there are some gaps in the stories being told. Do these gaps in the narratives demonstrate an intentional concealment of segments of the city’s history? This article discusses the meanings...... of these narrative lacunae using a combination of the archaeological record and the literary sources....

  6. Concealment of type 1 diabetes at work in Finland: a mixed-method study.

    Science.gov (United States)

    Hakkarainen, Pirjo; Munir, Fehmidah; Moilanen, Leena; Räsänen, Kimmo; Hänninen, Vilma

    2018-01-13

    To explore the possible reasons for concealing type 1 diabetes (T1D) at work. The main set of data came from a cross-sectional survey (response rate 49.3%), the participants of which were 688 wage earners with T1D. Concealment of T1D was measured by asking respondents have they ever during their working career hidden their diabetes from their (A) colleagues and (B) line manager. Furthermore, semistructured interviews (n=20) were conducted to obtain deeper understanding. Questionnaire data were analysed using logistic regression analyses and qualitative interviews with inductive thematic analysis. About 30% of wage earners with T1D had concealed their condition during their working career from their colleagues and almost 20% from their line manager. Individuals aged 18-44 years age were more likely to conceal their T1D from their colleagues than older workers during their working career. Not disclosing T1D to the extended family (OR 5.24 (95% CI 2.06 to 13.35)), feeling an outsider at work (OR 2.47 (95% CI 1.58 to 3.84)), being embarrassed by receiving special attention at work (OR 1.99 (95% CI 1.33 to 2.96)) and neglecting treatment at work (OR 1.59 (95% CI 1.01 to 2.48)) were all associated with concealment of T1D from colleagues. The youngest age group of 18-24 years were more likely to conceal their T1D from their line managers than the older age groups during their working career. Not disclosing T1D to the extended family (OR 4.41 (95% CI 1.72 to 11.32)), feeling like an outsider at work (OR 2.51 (1.52 to 4.14)) and being embarrassed by receiving special attention at work (OR 1.81 (95% CI 1.13 to 2.91)) were associated with concealment of T1D from line managers. From the interviews, five main themes related to concealment emerged, expressing fears related to the consequences of telling: (1) being perceived as weak, (2) job discrimination, (3) unwanted attention, (4) being seen as a person who uses their T1D for seeking advantages and (5) losing privacy. A

  7. SU-F-R-25: Automatic Identification of Suspicious Recurrent/residual Disease Regions After Prostatectomy

    Energy Technology Data Exchange (ETDEWEB)

    Parra, N A; Abramowitz, M; Pollack, A; Stoyanova, R [University of Miami, Miami, FL (United States)

    2016-06-15

    Purpose: To automatically identify and outline suspicious regions of recurrent or residual disease in the prostate bed using Dynamic Contrast Enhanced-MRI (DCE-MRI) in patients after prostatectomy. Methods: Twenty-two patients presenting for salvage radiotherapy and with identified Gross Tumor Volume (GTV) in the prostate bed were retrospectively analyzed. The MRI data consisted of Axial T2weighted-MRI (T2w) of the pelvis: resolution 1.25×1.25×2.5 mm; Field of View (FOV): 320×320 mm; slice thickness=2.5mm; 72 slices; and Dynamic Contrast Enhanced MRI (DCE-MRI)–12 series of T1w with identical spatial resolution to T2w and at 30–34s temporal resolution. Unsupervised pattern recognition was used to decompose the 4D DCE data as the product W.H of weights W of k patterns H. A well-perfused pattern Hwp was identified and the weight map Wwp associated to Hwp was used to delineate suspicious volumes. Threshold of Wwp set at mean(Wwp)+S*std(Wwp), S=1,1.5,2 and 2.5 defined four volumes labeled as DCE1.0 to DCE2.5. These volumes were displayed on T2w and, along with GTV, were correlated with the highest pre-treatment PSA values, and with pharmacokinetic analysis constants. Results: GTV was significantly correlated with DCE2.0(ρ= 0.60, p<0.003), and DCE 2.5 (ρ=0.58, p=0.004)). Significant correlation was found between highest pre-treatment PSA and GTV(ρ=0.42, p<0.049), DCE2.0(ρ= 0.52, p<0.012), and DCE 2.5 (ρ=0.67, p<<0.01)). Kruskal-Wallis analysis showed that Ktrans median value was statistically different between non-specific prostate bed tissue NSPBT and both GTV (p<<0.001) and DCE2.5 (p<<0.001), but while median Ve was statistically different between DCE2.5 and NSPBT (p=0.002), it was not statistically different between GTV and NSPBT (p=0.054), suggesting that automatic volumes capture more accurately the area of malignancy. Conclusion: Software developed for identification and visualization of suspicions regions in DCE-MRI from post-prostatectomy patients has

  8. Automatic detection of suspicious behavior of pickpockets with track-based features in a shopping mall

    Science.gov (United States)

    Bouma, Henri; Baan, Jan; Burghouts, Gertjan J.; Eendebak, Pieter T.; van Huis, Jasper R.; Dijk, Judith; van Rest, Jeroen H. C.

    2014-10-01

    Proactive detection of incidents is required to decrease the cost of security incidents. This paper focusses on the automatic early detection of suspicious behavior of pickpockets with track-based features in a crowded shopping mall. Our method consists of several steps: pedestrian tracking, feature computation and pickpocket recognition. This is challenging because the environment is crowded, people move freely through areas which cannot be covered by a single camera, because the actual snatch is a subtle action, and because collaboration is complex social behavior. We carried out an experiment with more than 20 validated pickpocket incidents. We used a top-down approach to translate expert knowledge in features and rules, and a bottom-up approach to learn discriminating patterns with a classifier. The classifier was used to separate the pickpockets from normal passers-by who are shopping in the mall. We performed a cross validation to train and evaluate our system. In this paper, we describe our method, identify the most valuable features, and analyze the results that were obtained in the experiment. We estimate the quality of these features and the performance of automatic detection of (collaborating) pickpockets. The results show that many of the pickpockets can be detected at a low false alarm rate.

  9. [Establishment of confirmatory test for suspicious hepatitis B surface antigen positive samples].

    Science.gov (United States)

    Chen, Lin; Rong, Yang; Liu, Jia; Xu, Jun; Guo, Jing-Xia; Song, Yong-Ji; Zhao, Jing; Liu, Ai-Xia; Yang, Li-Hua; Li, Bo-An; Mao, Yuan-Li

    2012-08-01

    Establish a confirmatory test based on ELISA, and use to verify the authenticity of HBsAg weak positive samples, pick and get rid of the false result, and avoid the mistake diagnosis. The particles (reagent A) coated by streptavidin and biotinylated HBsAb (reagent B) were mixed in different proportions, then neutralized with serum whose the COI of HBsAg > 20 by ELISA in order to identify the activity of HBsAb in confirmatory reagent. 30 pieces of HBsAg weak positive serum neutralized with the confirmatory reagent, the serum were considered to be positive if rate of decline of HBsAg COI > 50%. The results were compared to Roche confirmatory Kit. Confirmatory reagent was able to neutralized with HBsAg. 24 of 30 pieces of HBsAg weak positive samples were judged to be positive, while 6 poeces were negative. The ELISA comfirm method is fully consistent with Roche confirmatory Kit. The ELISA confirmatory test for suspicious HBsAg positive samples is a simple, accurate and low cost initial validation method, After further clinical trials, should be widely applied.

  10. Adaptive Suspicious Prevention for Defending DoS Attacks in SDN-Based Convergent Networks.

    Science.gov (United States)

    Dao, Nhu-Ngoc; Kim, Joongheon; Park, Minho; Cho, Sungrae

    2016-01-01

    The convergent communication network will play an important role as a single platform to unify heterogeneous networks and integrate emerging technologies and existing legacy networks. Although there have been proposed many feasible solutions, they could not become convergent frameworks since they mainly focused on converting functions between various protocols and interfaces in edge networks, and handling functions for multiple services in core networks, e.g., the Multi-protocol Label Switching (MPLS) technique. Software-defined networking (SDN), on the other hand, is expected to be the ideal future for the convergent network since it can provide a controllable, dynamic, and cost-effective network. However, SDN has an original structural vulnerability behind a lot of advantages, which is the centralized control plane. As the brains of the network, a controller manages the whole network, which is attractive to attackers. In this context, we proposes a novel solution called adaptive suspicious prevention (ASP) mechanism to protect the controller from the Denial of Service (DoS) attacks that could incapacitate an SDN. The ASP is integrated with OpenFlow protocol to detect and prevent DoS attacks effectively. Our comprehensive experimental results show that the ASP enhances the resilience of an SDN network against DoS attacks by up to 38%.

  11. Adaptive Suspicious Prevention for Defending DoS Attacks in SDN-Based Convergent Networks.

    Directory of Open Access Journals (Sweden)

    Nhu-Ngoc Dao

    Full Text Available The convergent communication network will play an important role as a single platform to unify heterogeneous networks and integrate emerging technologies and existing legacy networks. Although there have been proposed many feasible solutions, they could not become convergent frameworks since they mainly focused on converting functions between various protocols and interfaces in edge networks, and handling functions for multiple services in core networks, e.g., the Multi-protocol Label Switching (MPLS technique. Software-defined networking (SDN, on the other hand, is expected to be the ideal future for the convergent network since it can provide a controllable, dynamic, and cost-effective network. However, SDN has an original structural vulnerability behind a lot of advantages, which is the centralized control plane. As the brains of the network, a controller manages the whole network, which is attractive to attackers. In this context, we proposes a novel solution called adaptive suspicious prevention (ASP mechanism to protect the controller from the Denial of Service (DoS attacks that could incapacitate an SDN. The ASP is integrated with OpenFlow protocol to detect and prevent DoS attacks effectively. Our comprehensive experimental results show that the ASP enhances the resilience of an SDN network against DoS attacks by up to 38%.

  12. Effectiveness of autofluorescence to identify suspicious oral lesions--a prospective, blinded clinical trial.

    Science.gov (United States)

    Koch, Felix Peter; Kaemmerer, Peer W; Biesterfeld, Stefan; Kunkel, Martin; Wagner, Wilfried

    2011-12-01

    Regular screening through white light inspection of the entire oral mucosa is the most important examination method to identify precancerous lesions and early oral carcinoma. Additionally, the physiologic autofluorescence of the oral mucosa has been described as a novel screening method for the detection of mucosal lesions that are not visible by white light. This study aimed to evaluate the sensitivity and specificity of the autofluorescence examination. Seventy-eight patients were examined in this study. All of them suffered from suspicious oral mucosal lesions. Two different investigation methods were applied: the standard examination by white light and an examination by a novel light source of 400 nm that evoked a green light emission (>500 nm) in normal mucosa. It was proposed that malignant oral mucosal lesions show different autofluorescence characteristics than the green autofluorescence of healthy mucosa. Red autofluorescence indicated SCC with a sensitivity of 20% and a specificity of 98%. The results showed that dysplasia and carcinoma could be identified with a sensitivity of 96% and a specificity of 18% by using the autofluorescence method. The sensitivity decreased according to the grade of mucosal keratosis and was influenced by the localisation of the lesion. In conclusion, benign as well as malignant oral lesions could not be distinguished by a diminished autofluorescence signal. A red autofluorescence signal, however, could indicate cancerous processes of the oral mucosa.

  13. Typing the atypical: Diagnostic issues and predictive markers in suspicious prostate lesions.

    Science.gov (United States)

    Sanguedolce, Francesca; Cormio, Antonella; Musci, Giovanni; Troiano, Francesco; Carrieri, Giuseppe; Bufo, Pantaleo; Cormio, Luigi

    2017-08-01

    As much as 5% of prostate biopsies yield findings equivocal for malignancy even for skilled uropathologist; such "grey zone" lesions have been addressed in many ways, although the acronym ASAP (atypical small acinar proliferation) is the most widely used when referring to an atypical focus suspicious, but not diagnostic, for malignancy. Since the introduction of this diagnostic category more than 20 years ago, debate has ensued over its histological characterization and clinical significance. Pathology reporting of ASAP, commonly based on strict morphological criteria and traditional immunohistochemical markers such as basal cell antibodies, has been improved by recent availability of novel immunohistochemical markers such as AMACR and ERG. Further pathological issues, such as the role of pre-analytical variables, number of tissue levels, interobserver variability, and association with prostatic intraepithelial neoplasia also play a role in the optimal assessment of ASAP. Apart from diagnostic issues, a major issue is ASAP predictive value for prostate cancer on repeat biopsy. Therefore, attempts have been made to identify clinical and biological parameters that could predict subsequent diagnosis of malignancy as well as define time and modality of repeat biopsy. Finally, pathological features of cancers detected after a previous ASAP diagnosis are compared with those diagnosed at first prostate biopsy.

  14. FDG PET and other imaging modalities in the primary diagnosis of suspicious breast lesions

    Energy Technology Data Exchange (ETDEWEB)

    Scheidhauer, K.; Seemann, M.D. [Department of Nuclear Medicine, Klinikum rechts der Isar der Technischen Universitaet Muenchen, Ismaninger Strasse 22, 81675, Munich (Germany); Walter, C. [Department of Diagnostic Radiology, Krankenhaus der Barmherzigen Brueder, Trier (Germany)

    2004-06-01

    Mammography is the primary imaging modality for screening of breast cancer and evaluation of breast lesions (T staging). Ultrasonography is an adjunctive tool for mammographically suspicious lesions, in patients with mastopathy and as guidance for reliable histological diagnosis with percutaneous biopsy. Dynamic enhanced magnetic resonance mammography (MRM) has a high sensitivity for the detection of breast cancer, but also a high false positive diagnosis rate. In the literature, MRM is reported to have a sensitivity of 86-96%, a specificity of 64-91%, an accuracy of 79-93%, a positive predictive value (PPV) of 77-92% and a negative predictive value (NPV) of 75-94%. In unclarified cases, metabolic imaging using fluorine-18 fluorodeoxyglucose positron emission tomography (FDG PET) can be performed. In the literature, FDG PET is reported to have a sensitivity of 64-96%, a specificity of 73-100%, an accuracy of 70-97%, a PPV of 81-100% and an NPV of 52-89%. Furthermore, PET or PET/CT using FDG has an important role in the assessment of N and M staging of breast cancer, the prediction of tumour response in patients with locally advanced breast cancer receiving neoadjuvant chemotherapy, and the differentiation of scar and cancer recurrence. Other functional radionuclide-based diagnostic tools, such as scintimammography with sestamibi, peptide scintigraphy or immunoscintigraphy, have a lower accuracy than FDG PET and, therefore, are appropriate only for exceptional indications. (orig.)

  15. Error in laboratory report data for platelet count assessment in patients suspicious for dengue: a note from observation

    Directory of Open Access Journals (Sweden)

    Somsri Wiwanitkit

    2016-08-01

    Full Text Available Dengue is a common tropical infection that is still a global health threat. An important laboratory parameter for the management of dengue is platelet count. Platelet count is an useful test for diagnosis and following up on dengue. However, errors in laboratory reports can occur. This study is a retrospective analysis on laboratory report data of complete blood count in cases with suspicious dengue in a medical center within 1 month period during the outbreak season on October, 2015. According to the studied period, there were 184 requests for complete blood count for cases suspected for dengue. From those 184 laboratory report records, errors can be seen in 12 reports (6.5%. This study demonstrates that there are considerable high rate of post-analytical errors in laboratory reports. Interestingly, the platelet count in those erroneous reports can be unreliable and ineffective or problematic when it is used for the management of dengue suspicious patients.

  16. Out and healthy: Being more "out" about a concealable stigmatized identity may boost the health benefits of social support.

    Science.gov (United States)

    Weisz, Bradley M; Quinn, Diane M; Williams, Michelle K

    2016-12-01

    This research examined whether the relationship between perceived social support and health would be moderated by level of outness for people living with different concealable stigmatized identities (mental illness, substance abuse, domestic violence, rape, or childhood abuse). A total of 394 people living with a concealable stigmatized identity completed a survey. Consistent with hypotheses, at high levels of outness, social support predicted better health; at low levels of outness, social support was less predictive of health. People concealing a stigmatized identity may only be able to reap the health benefits of social support if they are "out" about the stigmatized identity. © The Author(s) 2015.

  17. Malignancy rate of biopsied suspicious bone lesions identified on FDG PET/CT

    Energy Technology Data Exchange (ETDEWEB)

    Adams, Hugo J.A.; Kwee, Thomas C. [University Medical Center Utrecht, Department of Radiology and Nuclear Medicine, Utrecht (Netherlands); Klerk, John M.H. de [Meander Medical Center, Department of Nuclear Medicine, Amersfoort (Netherlands); Heggelman, Ben G.F. [Meander Medical Center, Department of Radiology, Amersfoort (Netherlands); Dubois, Stefan V. [Meander Medical Center, Department of Pathology, Amersfoort (Netherlands)

    2016-07-15

    To determine the malignancy rate of bone lesions identified on FDG PET/CT in patients who have undergone CT-guided biopsy because of the suspicion of malignancy. This single-centre retrospective study spanned eight consecutive years and included all patients who underwent both FDG PET/CT and CT-guided bone biopsy because of the suspicion of malignancy. The positive predictive value (PPV) for malignancy was calculated, and different patient and imaging characteristics were compared between malignant and benign bone lesions. Of 102 included patients with bone lesions that all showed FDG uptake exceeding mediastinal uptake, bone biopsy showed a malignant lesion in 91 patients, yielding a PPV for malignancy of 89.2 % (95 % CI 81.7 - 93.9 %). In the 94 patients with bone lesions that showed FDG uptake exceeding liver uptake, bone biopsy showed a malignant lesion in 83 patients, yielding a PPV for malignancy of 88.3 % (95 % CI 80.1 - 93.5 %). Higher age, bone marrow replacement of the lesion seen on CT, expansion of the lesion seen on CT, and presence of multifocal lesions on FDG PET/CT were significantly more frequent in patients with malignant lesions than in those with benign bone lesions (P = 0.044, P = 0.009, P = 0.015, and P = 0.019, respectively). Furthermore, there was a trend towards a higher incidence of cortical destruction (P = 0.056) and surrounding soft tissue mass (P = 0.063) in patients with malignant bone lesions. The PPV for malignancy of suspicious bone lesions identified on FDG PET/CT is not sufficiently high to justify changes in patient management without histopathological confirmation. Nevertheless, ancillary patient and imaging characteristics may increase the likelihood of a malignant bone lesion. (orig.)

  18. Autofluorescence guided diagnostic evaluation of suspicious oral mucosal lesions: opportunities, limitations, and pitfalls

    Science.gov (United States)

    Vigneswaran, Nadarajah

    2011-03-01

    Wide-filed autofluorescence examination is currently considered as a standard of care for screening and diagnostic evaluation of early neoplastic changes of the skin, cervix, lung, bladder, gastrointestinal tract and oral cavity. Naturally occurring fluorophores within the tissue absorb UV and visible light and can re-emit some of this light at longer wavelengths in the form of fluorescence. This non-invasive tissue autofluorescence imaging is used in optical diagnostics, especially in the early detection of cancer. Usually, malignant transformation is associated with thickening of the epithelium, enhanced cellular density due to increased nuclear cytoplasmic ratio which may attenuate the excitation leading to a decrease in collagen autofluorescence. Hence, dysplastic and cancerous tissues often exhibit decreased blue-green autofluorescence and appear darker compared to uninvolved mucosa. Currently, there are three commercially available devices to examine tissue autofluorescence in the oral cavity. In this study we used the oral cancer screening device IdentafiTM 3000 to examine the tissue reflectance and autofluorescence of PML and confounding lesions of the oral cavity. Wide-field autofluorescence imaging enables rapid inspection of large mucosal surfaces, to aid in recognition of suspicious lesions and may also help in discriminate the PML (class 1) from some of the confounding lesions (class II). However, the presence of inflammation or pigments is also associated with loss of stromal autofluorescence, and may give rise to false-positive results with widefield fluorescence imaging. Clinicians who use these autofluorescence based oral cancer screening devices should be aware about the benign oral mucosal lesions that may give false positivity so that unnecessary patient's anxiety and the need for scalpel biopsy can be eliminated.

  19. Fiber Optic Coupled Raman Based Detection of Hazardous Liquids Concealed in Commercial Products

    Directory of Open Access Journals (Sweden)

    Michael L. Ramírez-Cedeño

    2012-01-01

    Full Text Available Raman spectroscopy has been widely proposed as a technique to nondestructively and noninvasively interrogate the contents of glass and plastic bottles. In this work, Raman spectroscopy is used in a concealed threat scenario where hazardous liquids have been intentionally mixed with common consumer products to mask its appearance or spectra. The hazardous liquids under consideration included the chemical warfare agent (CWA simulant triethyl phosphate (TEP, hydrogen peroxide, and acetone as representative of toxic industrial compounds (TICs. Fiber optic coupled Raman spectroscopy (FOCRS and partial least squares (PLS algorithm analysis were used to quantify hydrogen peroxide in whiskey, acetone in perfume, and TEP in colored beverages. Spectral data was used to evaluate if the hazardous liquids can be successfully concealed in consumer products. Results demonstrated that FOC-RS systems were able to discriminate between nonhazardous consumer products and mixtures with hazardous materials at concentrations lower than 5%.

  20. [Family members' concealing and silencing in the care of children under antiretroviral therapy].

    Science.gov (United States)

    Gomes, Antônio Marcos Tosoli; Cabral, Ivone Evangelista

    2010-01-01

    The aims of this paper were unveiling the caregiver's everyday life of caring for children under antiretroviral therapy (ARVT), and analyzing the dimensions of care them. Qualitative research was conducted with a creative-sensitive method including seven family members and data were treated through discourse analysis. These family members' everyday life in the medication implementation was marked by concealing and silencing. The first one was represented by linguistic regularities, as expressions and acronyms do not appear in their enunciation, and also in the way their lives are organized facing stigma and bias related to the ARVT. The last one occurred in the relationship with children, as when family members were questioned about the medication, they answered in an evasive way. Concealing and silencing related to child HIV/AIDS are themes which need to be approached by nurses in their caring and health education interventions.

  1. Error Concealment Method Based on Motion Vector Prediction Using Particle Filters

    Directory of Open Access Journals (Sweden)

    B. Hrusovsky

    2011-09-01

    Full Text Available Video transmitted over unreliable environment, such as wireless channel or in generally any network with unreliable transport protocol, is facing the losses of video packets due to network congestion and different kind of noises. The problem is becoming more important using highly effective video codecs. Visual quality degradation could propagate into subsequent frames due to redundancy elimination in order to obtain high compression ratio. Since the video stream transmission in real time is limited by transmission channel delay, it is not possible to retransmit all faulty or lost packets. It is therefore inevitable to conceal these defects. To reduce the undesirable effects of information losses, the lost data is usually estimated from the received data, which is generally known as error concealment problem. This paper discusses packet loss modeling in order to simulate losses during video transmission, packet losses analysis and their impacts on the motion vectors losses.

  2. A Novel Technique of Error Concealment Method Selection in Texture Images Using ALBP Classifier

    Directory of Open Access Journals (Sweden)

    Z. Tothova

    2010-06-01

    Full Text Available There are many error concealment techniques for image processing. In the paper, the focus is on restoration of image with missing blocks or macroblocks. Different methods can be optimal for different kinds of images. In recent years, great attention was dedicated to textures, and specific methods were developed for their processing. Many of them use classification of textures as an integral part. It is also of an advantage to know the texture classification to select the best restoration technique. In the paper, selection based on texture classification with advanced local binary patterns and spatial distribution of dominant patterns is proposed. It is shown, that for classified textures, optimal error concealment method can be selected from predefined ones, resulting then in better restoration. For testing, three methods of extrapolation and texture synthesis were used.

  3. Children's Lie-Telling to Conceal a Parent's Transgression: Legal Implications

    OpenAIRE

    Talwar, Victoria; Lee, Kang; Bala, Nicholas; Lindsay, R. C. L.

    2004-01-01

    Children's lie-telling behavior to conceal the transgression of a parent was examined in 2 experiments. In Experiment 1 (N = 137), parents broke a puppet and told their children (3–11-year-olds) not to tell anyone. Children answered questions about the event. Children's moral understanding of truth- and lie-telling was assessed by a second interviewer and the children then promised to tell the truth (simulating court competence examination procedures). Children were again questioned about wha...

  4. Evolution of Computer Virus Concealment and Anti-Virus Techniques: A Short Survey

    OpenAIRE

    Rad, Babak Bashari; Masrom, Maslin; Ibrahim, Suhaimi

    2011-01-01

    This paper presents a general overview on evolution of concealment methods in computer viruses and defensive techniques employed by anti-virus products. In order to stay far from the anti-virus scanners, computer viruses gradually improve their codes to make them invisible. On the other hand, anti-virus technologies continually follow the virus tricks and methodologies to overcome their threats. In this process, anti-virus experts design and develop new methodologies to make them stronger, mo...

  5. An Improved Motion JPEG2000 Decoder for Error Concealment of Segmentation Symbol Faults

    Directory of Open Access Journals (Sweden)

    Hashemi MahmoudReza

    2008-01-01

    Full Text Available The motion JPEG2000 (MJP2 video coding standard uses intraframe compression and provides practical features such as fast coding, easy editing, and error robustness. Error robustness and concealment are some of the crucial requirements of any decoder in error prone applications. In this paper, a new error concealment method for MJP2 decoder has been proposed. The proposed method exploits the remaining temporal redundancies within the MJP2 coded video sequences for error concealment. The realized MJP2 decoder is able to detect and remove the artifacts produced by highly damaged bit planes that were not detected by the segmentation symbol, one of the error resilience tools in MJP2. Simulation results indicate that the proposed decoder can effectively remove such artifacts in the decoded erroneous MJP2 bit streams and improve the PSNR of the corrupted frames by up to 6.8 dB. An average of 0.2 dB improvement has been observed over a relatively large number of test cases and various error rates.

  6. An Improved Motion JPEG2000 Decoder for Error Concealment of Segmentation Symbol Faults

    Directory of Open Access Journals (Sweden)

    Mahmoud Reza Hashemi

    2008-03-01

    Full Text Available The motion JPEG2000 (MJP2 video coding standard uses intraframe compression and provides practical features such as fast coding, easy editing, and error robustness. Error robustness and concealment are some of the crucial requirements of any decoder in error prone applications. In this paper, a new error concealment method for MJP2 decoder has been proposed. The proposed method exploits the remaining temporal redundancies within the MJP2 coded video sequences for error concealment. The realized MJP2 decoder is able to detect and remove the artifacts produced by highly damaged bit planes that were not detected by the segmentation symbol, one of the error resilience tools in MJP2. Simulation results indicate that the proposed decoder can effectively remove such artifacts in the decoded erroneous MJP2 bit streams and improve the PSNR of the corrupted frames by up to 6.8 dB. An average of 0.2 dB improvement has been observed over a relatively large number of test cases and various error rates.

  7. Hydrogeological Studies to Identify the Trend of Concealed Section of the North Tabriz Fault (Iran).

    Science.gov (United States)

    Rajabpour, Hossein; Vaezihir, Abdorreza

    2017-05-01

    The North Tabriz Fault (NTF) is the predominant regional-scale tectonic structure in the northwest of Iran. In the east side of the city of Tabriz, a portion of the fault trend has been completely concealed by recent sediments and urbanization. In this paper, some hydrogeological methods are used to locate the concealed sector. As is clear from the pumping tests results, despite the fact that the northern observation wells were closer to the pumping wells than the southern ones, they have not been affected by pumping. Conversely, all southern wells were affected by pumping and displayed decline of the water table. In addition, obvious differences in groundwater levels combined with clear differences in groundwater quality within a short distance across the probable fault trend are sufficient reasons for the presence of the fault that behaves as a barrier to groundwater lateral flows. Significant change in the elevation of the bedrock base of the aquifer over less than 200 m suggests that the fault has near vertical dip. These results indicate that the inferred trend of the NTF closely conforms to its actual trend. Therefore, the hydrogeological studies can be complementary tools to determine the position and trend of concealed faults. © 2016, National Ground Water Association.

  8. Image fusion based on millimeter-wave for concealed weapon detection

    Science.gov (United States)

    Zhu, Weiwen; Zhao, Yuejin; Deng, Chao; Zhang, Cunlin; Zhang, Yalin; Zhang, Jingshui

    2010-11-01

    This paper describes a novel multi sensors image fusion technology which is presented for concealed weapon detection (CWD). It is known to all, because of the good transparency of the clothes at millimeter wave band, a millimeter wave radiometer can be used to image and distinguish concealed contraband beneath clothes, for example guns, knives, detonator and so on. As a result, we adopt the passive millimeter wave (PMMW) imaging technology for airport security. However, in consideration of the wavelength of millimeter wave and the single channel mechanical scanning, the millimeter wave image has law optical resolution, which can't meet the need of practical application. Therefore, visible image (VI), which has higher resolution, is proposed for the image fusion with the millimeter wave image to enhance the readability. Before the image fusion, a novel image pre-processing which specifics to the fusion of millimeter wave imaging and visible image is adopted. And in the process of image fusion, multi resolution analysis (MRA) based on Wavelet Transform (WT) is adopted. In this way, the experiment result shows that this method has advantages in concealed weapon detection and has practical significance.

  9. Risk factors responsible for atrial fibrillation development between symptomatic patients with concealed or manifest atrioventricular accessory pathways

    Directory of Open Access Journals (Sweden)

    Mu Chen

    2015-06-01

    Conclusions: Results from this study demonstrate that the risk factors of AF are not homogenous between concealed and manifest APs, which might suggest heterogeneous pathogenesis of AF in these two types of APs.

  10. [Management of moderate to severe pediatric concealed penis in children by Devine's technique via incision between the penis and scrotum].

    Science.gov (United States)

    Zhang, Xin-Sheng; Liu, Shi-Xiong; Xiang, Xue-Yan; Zhang, Wen-Gang; Tang, Da-Xing

    2014-04-01

    To search for a simple and effective surgical approach to the management of moderate to severe pediatric concealed penis in children. We used Devine's technique via incision between the penis and scrotum in the treatment of 68 cases of moderate to severe pediatric concealed penis. The patients were aged 3 -13 (mean 6.5) years, 30 with moderate and 38 with severe pediatric concealed penis. This strategy achieved good near- and long-term effects and satisfactory appearance of the penis, which was similar to that of circumcision. At 3 months after surgery, the penile length was 3 - 5.2 cm, averaging (2.35 +/- 0.35) cm. Devine's technique via incision between the penis and scrotum is a simple and effective surgical option for moderate to severe pediatric concealed penis in children.

  11. Direct and indirect links between parenting styles, self-concealment (secrets), impaired control over drinking and alcohol-related outcomes.

    Science.gov (United States)

    Hartman, Jessica D; Patock-Peckham, Julie A; Corbin, William R; Gates, Jonathan R; Leeman, Robert F; Luk, Jeremy W; King, Kevin M

    2015-01-01

    Self-concealment reflects uncomfortable feelings, thoughts, and information people have about themselves that they avoid telling others (Larson & Chastain, 1990). According to Larson and Chastain (1990) these secrets range from the slightly embarrassing to the very distressing with an individual's most traumatic experiences often concealed. Parental attitudes including those involving self-disclosure are thought to be expressed in their choice of parenting style (Brand, Hatzinger, Beck, & Holsboer-Trachsler, 2009). The specific aim of this investigation was to examine the direct and indirect influences of parenting styles on self-concealment, impaired control over drinking (i.e. the inability to stop drinking when intended), alcohol use (quantity/frequency), and alcohol-related problems. A structural equation model with 419 (223 men, 196 women) university students was examined. Two and three path mediated effects were examined with the bias corrected bootstrap technique in Mplus. Having an authoritarian mother was directly linked to more self-concealment, while having an authoritative father was directly linked to less self-concealment. Higher levels of mother authoritarianism were indirectly linked to both increased alcohol use and alcohol-related problems through more self-concealment and more impaired control over drinking. Moreover, higher levels of father authoritativeness were indirectly linked to less alcohol use and alcohol-related problems through less self-concealment and less impaired control over drinking. These findings suggest that parenting styles influence vulnerabilities such as self-concealment in the impaired control over the drinking pathway to alcohol use and alcohol-related problems. Copyright © 2014 Elsevier Ltd. All rights reserved.

  12. Assessing law enforcement performance in behavior-based threat detection tasks involving a concealed weapon or device.

    Science.gov (United States)

    Sweet, Dawn M; Meissner, Christian A; Atkinson, Dominick J

    2017-10-01

    Across 3 experiments, we assessed the ability of law enforcement officers and naïve controls to detect the concealment of a weapon or device. Study 1 used a classic signal detection paradigm in which participants were asked to assess whether a target was concealing a neutered 9-mm handgun. Study 2 involved a compound signal detection paradigm in which participants assessed whether or not 1 of several individuals was concealing an unstable device in their backpack. Study 3 moved to a 2-alternative forced choice paradigm in which participants evaluated which of 2 targets was concealing an unstable device in his backpack. Across all 3 experiments we consistently found no significant differences in detection performance between law enforcement and naïve controls, although participants did perform above chance levels when response bias was free to vary. Furthermore, officers' years of experience was associated with a bias toward perceiving concealment. Given the frequency with which officers are asked to assess the concealment of weapons or devices, and therein to identify threats, our findings suggest the need for additional research to explore various factors (e.g., context, race of target, operational experience, etc.) likely related to performance on such tasks. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  13. Object and Objective Lost?

    DEFF Research Database (Denmark)

    Lopdrup-Hjorth, Thomas

    2015-01-01

    This paper explores the erosion and problematization of ‘the organization’ as a demarcated entity. Utilizing Foucault's reflections on ‘state-phobia’ as a source of inspiration, I show how an organization-phobia has gained a hold within Organization Theory (OT). By attending to the history...... of this organization-phobia, the paper argues that OT has become increasingly incapable of speaking about its core object. I show how organizations went from being conceptualized as entities of major importance to becoming theoretically deconstructed and associated with all kinds of ills. Through this history......, organizations as distinct entities have been rendered so problematic that they have gradually come to be removed from the center of OT. The costs of this have been rather significant. Besides undermining the grounds that gave OT intellectual credibility and legitimacy to begin with, the organization-phobia...

  14. Evaluation of coping strategies in established rheumatoid arthritis patients: emergence of concealment in an Asian cohort.

    Science.gov (United States)

    Chew, Elizabeth; Griva, Konstadina; Cheung, Peter P

    2016-11-01

    To evaluate coping strategies of Asian RA patients and their associations with health-related quality of life (HRQoL). A cross-sectional sample of patients with established RA was evaluated using measures of coping (Coping in Rheumatoid Arthritis Questionnaire [C-RAQ]; appraisal of coping effectiveness and helplessness), HRQoL (Mental and Physical Components [MCS/PCS] of the Short Form 12v2; Rheumatoid Arthritis Impact of Disease score [RAID]) and clinical/laboratory assessments. Principal component analysis was conducted to identify coping strategies. Multiple linear regression analyses were performed to evaluate the associations between coping strategies and HRQoL outcomes. The study sample comprised 101 patients, 81% female, 72.3% Chinese, mean age 54.2 ± 12.6 years. Five coping strategies were identified: Active problem solving (E = 5.36), Distancing (E = 2.30), Concealment (E = 1.89), Cognitive reframing (E = 1.55) and Emotional expression (E = 1.26). Concealment was consistently associated with PCS (rs = -0.23, P = 0.049), MCS (rs = -0.24, P = 0.04) and RAID (rs = 0.39, P coping effectiveness and helplessness (β = 0.20, P = 0.04). Emotional expression was associated with poorer physical HRQoL (PCS), after adjusting for disease severity, body mass index, coping effectiveness, helplessness and Concealment (β = -0.39, P coping-related helplessness was significant in multivariate correlates for PCS (β = -0.25, P = 0.036), MCS (β = -0.29, P = 0.02) and RAID (β = 0.53, P Emotional expression are associated with lower disease-specific HRQoL and physical HRQoL respectively, with the former coping strategy likely to be culture-specific. Interventions should tailor psychosocial support needs to address not only coping strategies, but patients' perception of their coping. © 2016 Asia Pacific League of Associations for Rheumatology and John Wiley & Sons Australia, Ltd.

  15. Experimental methods of indoor millimeter-wave radiometric imaging for personnel concealed contraband detection

    Science.gov (United States)

    Hu, Taiyang; Xiao, Zelong; Li, Hao; Lv, Rongchuan; Lu, Xuan

    2014-11-01

    The increasingly emerging terrorism attacks and violence crimes around the world have posed severe threats to public security, so carrying out relevant research on advanced experimental methods of personnel concealed contraband detection is crucial and meaningful. All of the advantages of imaging covertly, avoidance of interference with other systems, intrinsic property of being safe to persons under screening , and the superior ability of imaging through natural or manmade obscurants, have significantly combined to enable millimeter-wave (MMW) radiometric imaging to offer great potential in personnel concealed contraband detection. Based upon the current research status of MMW radiometric imaging and urgent demands of personnel security screening, this paper mainly focuses on the experimental methods of indoor MMW radiometric imaging. The reverse radiation noise resulting from super-heterodyne receivers seriously affects the image experiments carried out at short range, so both the generation mechanism and reducing methods of this noise are investigated. Then, the benefit of sky illumination no longer exists for the indoor radiometric imaging, and this leads to the decrease in radiometric temperature contrast between target and background. In order to enhance the radiometric temperature contrast for improving indoor imaging performance, the noise illumination technique is adopted in the indoor imaging scenario. In addition, the speed and accuracy of concealed contraband detection from acquired MMW radiometric images are usually restricted to the deficiencies in traditional artificial interpretation by security inspectors, thus an automatic recognition and location algorithm by integrating improved Fuzzy C-means clustering with moment invariants is put forward. A series of original results are also presented to demonstrate the significance and validity of these methods.

  16. Face and voice as social stimuli enhance differential physiological responding in a Concealed Information Test

    Directory of Open Access Journals (Sweden)

    Wolfgang eAmbach

    2012-11-01

    Full Text Available Attentional, intentional, and motivational factors are known to influence the physiological responses in a Concealed Information Test (CIT. Although concealing information is essentially a social action closely related to motivation, CIT studies typically rely on testing participants in an environment lacking of social stimuli: Subjects interact with a computer while sitting alone in an experimental room. To address this gap, we examined the influence of social stimuli on the physiological responses in a CIT.Seventy-one participants underwent a mock-crime experiment with a modified CIT. In a between-subjects design, subjects were either questioned acoustically by a pre-recorded male voice presented together with a virtual male experimenter’s uniform face or by a text field on the screen, which displayed the question devoid of face and voice. Electrodermal activity (EDA, respiration line length (RLL, phasic heart rate (pHR, and finger pulse waveform length (FPWL were registered. The Psychopathic Personality Inventory - Revised (PPI-R was administered in addition. The differential responses of RLL, pHR, and FPWL to probe vs. irrelevant items were greater in the condition with social stimuli than in the text condition; interestingly, the differential responses of EDA did not differ between conditions. No modulatory influence of the PPI-R sum or subscale scores was found.The results emphasize the relevance of social aspects in the process of concealing information and in its detection. Attentional demands as well as the participants’ motivation to avoid detection might be the important links between social stimuli and physiological responses in the CIT.

  17. Stochastic Modeling of the Spatiotemporal Wavelet Coefficients and Applications to Quality Enhancement and Error Concealment

    Directory of Open Access Journals (Sweden)

    Feideropoulou Georgia

    2004-01-01

    Full Text Available We extend a stochastic model of hierarchical dependencies between wavelet coefficients of still images to the spatiotemporal decomposition of video sequences, obtained by a motion-compensated wavelet decomposition. We propose new estimators for the parameters of this model which provide better statistical performances. Based on this model, we deduce an optimal predictor of missing samples in the spatiotemporal wavelet domain and use it in two applications: quality enhancement and error concealment of scalable video transmitted over packet networks. Simulation results show significant quality improvement achieved by this technique with different packetization strategies for a scalable video bit stream.

  18. {sup 99m}Tc sestamibi scintimammography. Screening mammographic non-palpable suspicious breast lesions: preliminary results

    Energy Technology Data Exchange (ETDEWEB)

    Bekis, R.; Derebek, E.; Degirmenci, B.; Durak, H. [Dokuz Eyluel Univ., Izmir (Turkey). Dept. of Nuclear Medicine; Balci, P. [Dokuz Eyluel Univ., Izmir (Turkey). Dept. of Radiology; Kocdor, M.A. [Dokuz Eyluel Univ., Izmir (Turkey). Dept. of Surgery; Canda, T. [Dokuz Eyluel Univ., Izmir (Turkey). Dept. of Pathology

    2004-02-01

    Aim: Investigation of the diagnostic role of technetium-99m methoxyisobutylisonitrile ({sup 99m}Tc estamibi) scintimammography in non-palpable, suspicious breast lesions described as microcalcification, mass and increased density using mammography. Patients, method: 35 women with non-palpable breast lesions were enrolled in the study. Anterior, left and right lateral, ipsilateral posterior oblique images were obtained 15 min after the injection of 740 MBq of {sup 99m}Tc sestamibi. All scintigraphic images were evaluated visually and focal increased {sup 99m}Tc sestamibi uptake was accepted as malignant lesion. Breast lesions were classified as microcalcification (13 women), mammographic mass (16 women) and increased density (6 women). Excisional biopsy was performed in all of them irrespective of the scintigraphic results: Results: The focally increased {sup 99m}Tc sestamibi uptake was seen in 11 breast lesions with malignant lesions and in 4 breast lesions with benign lesions. The diffuse uptake of {sup 99m}Tc sestamibi was seen in 18 breast lesions with benign lesions and 2 breast lesions with malignant lesions. There was no false positive result of {sup 99m}Tc sestamibi in microcalcification group and three was no false negative result of the mammographic mass and increased density groups. Conclusion: Scintimammography might be a complementary method in decision making for the non-palpable, suspicious breast lesions that were evaluated as microcalcification, mass and increased density mammograpically. (orig.)

  19. Can positron emission mammography help to identify clinically significant breast cancer in women with suspicious calcifications on mammography?

    Energy Technology Data Exchange (ETDEWEB)

    Bitencourt, Almir G.V.; Lima, Eduardo N.P.; Macedo, Bruna R.C.; Conrado, Jorge L.F.A.; Marques, Elvira F.; Chojniak, Rubens [A C Camargo Cancer Center-Department of Imaging, Sao Paulo, SP (Brazil)

    2017-05-15

    To evaluate the diagnostic accuracy of positron emission mammography (PEM) for identifying malignant lesions in patients with suspicious microcalcifications detected on mammography. A prospective, single-centre study that evaluated 40 patients with suspicious calcifications at mammography and indication for percutaneous or surgical biopsy, with mean age of 56.4 years (range: 28-81 years). Patients who agreed to participate in the study underwent PEM with 18F-fluorodeoxyglucose before the final histological evaluation. PEM findings were compared with mammography and histological findings. Most calcifications (n = 34; 85.0 %) were classified as BIRADS 4. On histology, there were 25 (62.5 %) benign and 15 (37.5 %) malignant lesions, including 11 (27.5 %) ductal carcinoma in situ (DCIS) and 4 (10 %) invasive carcinomas. On subjective analysis, PEM was positive in 15 cases (37.5 %) and most of these cases (n = 14; 93.3 %) were confirmed as malignant on histology. There was one false-positive result, which corresponded to a fibroadenoma, and one false negative, which corresponded to an intermediate-grade DCIS. PEM had a sensitivity of 93.3 %, specificity of 96.0 % and accuracy of 95 %. PEM was able to identify all invasive carcinomas and high-grade DCIS (nuclear grade 3) in the presented sample, suggesting that this method may be useful for further evaluation of patients with suspected microcalcifications. (orig.)

  20. A comparisonof lymphocytic thyroiditis with papillary thyroid carcinoma showing suspicious ultrasonographic findings in a background of heterogeneous parenchyma

    Energy Technology Data Exchange (ETDEWEB)

    Nam, Sang Yu; Shin, Jung Hee; Ko, Eun Young; Hahn, Soo Yeon [Dept. of Radiology, Samsung Medicine Center, Sungkyunkwan University School of Medicine, Seoul (Korea, Republic of)

    2015-01-15

    The aim of this study was to compare ultrasonographic features in patients with lymphocytic thyroiditis (LT) and papillary thyroid carcinoma (PTC) having suspicious thyroid nodule(s) in a background of heterogeneous parenchyma and to determine the clinical and radiological predictors of malignancy. We reviewed the cases of 100 patients who underwent ultrasonography between April 2011 and October 2012, and showed suspicious thyroid nodule(s) in a background of heterogeneous parenchyma. Eight patients who did not undergo ultrasonography-guided fineneedle aspiration cytology (FNAC) and 34 cases of follow-up ultrasonography after initial FNAC were excluded. We compared the benign and malignant nodules in terms of their clinical and radiological factors. For the 58 nodules including 31 LTs (53.4%) and 27 PTCs (46.6%), the mean tumor sizes of the two groups were 0.96 cm for LT and 0.97 cm for PTC. A univariate analysis revealed that PTCs were more frequent in patients younger than 45 years and having microcalcifications than was LT. An independent predictor of PTC after adjustment was an age of <45 years. LT mimics malignancy in a background of heterogeneous parenchyma on ultrasonography. A young age of <45 years is the most important predictor of malignancy in this condition.

  1. The ?Good Cop, Bad Cop? Effect in the RT-Based Concealed Information Test: Exploring the Effect of Emotional Expressions Displayed by a Virtual Investigator

    OpenAIRE

    Mihai Varga; George Visu-Petra; Mircea Miclea; Laura Visu-Petra

    2015-01-01

    Concealing the possession of relevant information represents a complex cognitive process, shaped by contextual demands and individual differences in cognitive and socio-emotional functioning. The Reaction Time-based Concealed Information Test (RT-CIT) is used to detect concealed knowledge based on the difference in RTs between denying recognition of critical (probes) and newly encountered (irrelevant) information. Several research questions were addressed in this scenario implemented after a ...

  2. Scattering suppression from arbitrary objects in spatially dispersive layered metamaterials

    Science.gov (United States)

    Shalin, Alexander S.; Ginzburg, Pavel; Orlov, Alexey A.; Iorsh, Ivan; Belov, Pavel A.; Kivshar, Yuri S.; Zayats, Anatoly V.

    2015-03-01

    Concealing objects by making them invisible to an external electromagnetic probe is coined by the term "cloaking." Cloaking devices, having numerous potential applications, are still facing challenges in realization, especially in the visible spectral range. In particular, inherent losses and extreme parameters of metamaterials required for the cloak implementation are the limiting factors. Here, we numerically demonstrate nearly perfect suppression of scattering from arbitrary-shaped objects in spatially dispersive metamaterial acting as an alignment-free concealing cover. We consider a realization of a metamaterial as a metal-dielectric multilayer and demonstrate suppression of scattering from an arbitrary object in forward and backward directions with perfectly preserved wave fronts and less than 10% absolute intensity change, despite spatial dispersion effects present in the composite metamaterial. Beyond the usual scattering suppression applications, the proposed configuration may be used for a simple realization of scattering-free detectors and sensors.

  3. Prostate needle biopsies containing prostatic intraepithelial neoplasia or atypical foci suspicious for carcinoma: implications for patient care.

    Science.gov (United States)

    Epstein, Jonathan I; Herawi, Mehsati

    2006-03-01

    We identified information critical for patient treatment on prostate needle biopsies diagnosed with prostatic intraepithelial neoplasia or atypical foci suspicious for carcinoma. A search was performed using the MEDLINE database and referenced lists of relevant studies to obtain articles addressing the significance of finding PIN or atypical foci suspicious for carcinoma on needle biopsy. There were certain results concerning PIN. 1) Low grade PIN should not be documented in pathology reports due to poor interobserver reproducibility and a relatively low risk of cancer following re-biopsy. 2) The expected incidence of HGPIN on needle biopsy is between 5% and 8%. 3) Although the diagnosis of HGPIN is subjective, interobserver reproducibility for its diagnosis is fairly high among urological pathologists, and yet only moderate among pathologists without special expertise in prostate pathology. 4) The median risk recorded in the literature for cancer following the diagnosis of HGPIN on needle biopsy is 24.1%, which is not much higher than the risk reported in the literature for repeat biopsy following a benign diagnosis. 5) The majority of publications that compared the risk of cancer in the same study following a needle biopsy diagnosis of HGPIN to the risk of cancer following a benign diagnosis on needle biopsy show no differences between the 2 groups. 6) Clinical and pathological parameters do not help stratify which men with HGPIN are at increased risk for a cancer diagnosis. 7) A major factor contributing to the decreased incidence of cancer following a diagnosis of HGPIN on needle biopsy in the contemporary era is related to increased needle biopsy core sampling, which detects many associated cancers on initial biopsy, such that re-biopsy, even with good sampling, does not detect many additional cancers. 8) It is recommended that men do not need routine repeat needle biopsy within the first year following the diagnosis of HGPIN, while further studies are needed

  4. The etiquette of endometriosis: stigmatisation, menstrual concealment and the diagnostic delay.

    Science.gov (United States)

    Seear, Kate

    2009-10-01

    Endometriosis is a chronic gynaecological condition of uncertain aetiology characterised by menstrual irregularities. Several studies have previously identified a lengthy delay experienced by patients between the first onset of symptoms and eventual diagnosis. Various explanations have been advanced for the diagnostic delay, with both doctors and women being implicated. Such explanations include that doctors normalise women's menstrual pain and that women might delay in seeking medical advice because they have difficulty distinguishing between 'normal' and 'abnormal' menstruation. It has been suggested that the diagnostic delay could be reduced if women were trained in how to distinguish between 'normal' and 'abnormal' menstrual cycles. In this paper I argue that whilst these may be factors in the diagnostic delay, women's reluctance to disclose problems associated with their menstrual cycle may be a more significant and hitherto neglected factor. I argue women are reluctant to disclose menstrual irregularities because menstruation is a 'discrediting attribute' (Goffman, 1963) and disclosure renders women vulnerable to stigmatisation. Women actively conceal their menstrual irregularities through practices of the 'menstrual etiquette' (Laws, 1990) which involves the strategic concealment of menstrual problems. This argument is supported through an analysis of the experiences of 20 Australian women diagnosed with endometriosis. The ramifications of this analysis for chronic pain conditions more generally and for practical strategies designed to address the endometriosis diagnostic delay are considered.

  5. Data hiding for error concealment of H.264/AVC video transmission over mobile networks

    Science.gov (United States)

    Piva, Alessandro; Caldelli, Roberto; Filippini, Francesco

    2005-03-01

    In this paper, a new data hiding-based error concealment algorithm is proposed. The method allows to increase the video quality in H.264/AVC wireless video transmission and Real-Time applications, where the retransmission is unacceptable. Data hiding is used for carrying to the decoder the values of 6 inner pixels of every macro-block (MB) to be used to reconstruct lost MBs into Intra frames through a bilinear interpolation process. The side information concerning a slice is hidden into another slice of the same frame, by properly modifying some quantized AC coefficients of the Integer Transform of the 16 blocks 4x4 composing the MBs of the host slice. At the decoder, the embedded information can be recovered from the bit-stream and used in the bilinear interpolation to reconstruct the damaged slice. This method, although allowing the system to remain fully compliant with the standard, improves the performance with respect to the conventional error concealment methods adopted by H.264/AVC, from the point of view of visual quality and Y-PSNR. In particular, it is possible to improve the result of the interpolation process adopted by H.264/AVC, reducing the distance between interpolating pixels from 16 to 5.

  6. Concealed lung anatomy in Botticelli's masterpieces the primavera and the birth of venus.

    Science.gov (United States)

    Lazzeri, Davide

    2018-01-16

    Sandro Botticelli was one of the most esteemed painters and draughtsmen among Renaissance artists. Under the patronage of the De' Medici family, he was active in Florence during the flourishing of the Renaissance trend towards the reclamation of lost medical and anatomical knowledge of ancient times through the dissection of corpses. Combining the typical attributes of the elegant courtly style with hallmarks derived from the investigation and analysis of classical templates, he left us immortal masterpieces, the excellence of which incomprehensibly waned and was rediscovered only in the 1890s. Few know that it has already been reported that Botticelli concealed the image of a pair of lungs in his masterpiece, The Primavera. The present investigation provides evidence that Botticelli embedded anatomic imagery of the lung in another of his major paintings, namely, The Birth of Venus. Both canvases were most probably influenced and enlightened by the neoplatonic philosophy of the humanist teachings in the De' Medici's circle, and they represent an allegorical celebration of the cycle of life originally generated by the Divine Wind or Breath. This paper supports the theory that because of the anatomical knowledge to which he was exposed, Botticelli aimed to enhance the iconographical meaning of both the masterpieces by concealing images of the lung anatomy within them.

  7. Combining Blink, Pupil, and Response Time Measures in a Concealed Knowledge Test

    Directory of Open Access Journals (Sweden)

    Travis eSeymour

    2013-02-01

    Full Text Available The response time (RT based Concealed Knowledge Test (CKT has been shown to accurately detect participants’ knowledge of mock-crime related information. Tests based on ocular measures such as pupil size and blink rate have sometimes resulted in poor classification, or lacked detailed classification analyses. The present study examines the fitness of multiple pupil and blink related responses in the CKT paradigm. To maximize classification efficiency, participants’ concealed knowledge was assessed using both individual test measures and combinations of test measures. Results show that individual pupil-size, pupil-slope, and pre-response blink-rate measures produce efficient classifications. Combining pupil and blink measures yielded more accuracy classifications than individual ocular measures. Although RT-based tests proved efficient, combining RT with ocular measures had little incremental benefit. It is argued that covertly assessing ocular measures during RT-based tests may guard against effective countermeasure use in applied settings. A compound classification procedure was used to categorize individual participants and yielded high hit rates and low false-alarm rates without the need for adjustments between test paradigms or subject populations. We conclude that with appropriate test paradigms and classification analyses, ocular measures may prove as effective as other indices, though additional research is needed.

  8. Noninvasive detection of concealed explosives: depth profiling through opaque plastics by time-resolved Raman spectroscopy.

    Science.gov (United States)

    Petterson, Ingeborg E Iping; López-López, María; García-Ruiz, Carmen; Gooijer, Cees; Buijs, Joost B; Ariese, Freek

    2011-11-15

    The detection of explosives concealed behind opaque, diffusely scattering materials is a challenge that requires noninvasive analytical techniques for identification without having to manipulate the package. In this context, this study focuses on the application of time-resolved Raman spectroscopy (TRRS) with a picosecond pulsed laser and an intensified charge-coupled device (ICCD) detector for the noninvasive identification of explosive materials through several millimeters of opaque polymers or plastic packaging materials. By means of a short (250 ps) gate which can be delayed several hundred picoseconds after the laser pulse, the ICCD detector allows for the temporal discrimination between photons from the surface of a sample and those from deeper layers. TRRS was applied for the detection of the two main isomers of dinitrotoluene, 2,4-dinitrotoluene, and 2,6-dinitrotoluene as well as for various other components of explosive mixtures, including akardite II, diphenylamine, and ethyl centralite. Spectra were obtained through different diffuse scattering white polymer materials: polytetrafluoroethylene (PTFE), polyoxymethylene (POM), and polyethylene (PE). Common packaging materials of various thicknesses were also selected, including polystyrene (PS) and polyvinyl chloride (PVC). With the demonstration of the ability to detect concealed, explosives-related compounds through an opaque first layer, this study may have important applications in the security and forensic fields.

  9. Emotional arousal modulates the encoding of crime-related details and corresponding physiological responses in the Concealed Information Test.

    Science.gov (United States)

    Peth, Judith; Vossel, Gerhard; Gamer, Matthias

    2012-03-01

    Previous studies demonstrated that concealed crime-related memories can be validly identified using the Concealed Information Test (CIT). However, its field applicability is still debated, and it is specifically unknown how emotional arousal during a crime would influence CIT results. In the current study, emotional arousal during a mock crime and the time delay between mock crime and CIT examination were manipulated. At the immediate and the delayed CIT occasion, central crime details were better remembered than peripheral ones and enhanced emotional arousal further reduced memory for peripheral information. Electrodermal, respiratory, and cardiovascular responses to central crime details were strong and CIT validity was unaffected by delaying the test when arousal was induced during the mock crime. These findings indicate that emotional arousal might facilitate the detection of concealed information some time after a crime occurred. Copyright © 2011 Society for Psychophysiological Research.

  10. Hybrid ANN optimized artificial fish swarm algorithm based classifier for classification of suspicious lesions in breast DCE-MRI

    Science.gov (United States)

    Janaki Sathya, D.; Geetha, K.

    2017-12-01

    Automatic mass or lesion classification systems are developed to aid in distinguishing between malignant and benign lesions present in the breast DCE-MR images, the systems need to improve both the sensitivity and specificity of DCE-MR image interpretation in order to be successful for clinical use. A new classifier (a set of features together with a classification method) based on artificial neural networks trained using artificial fish swarm optimization (AFSO) algorithm is proposed in this paper. The basic idea behind the proposed classifier is to use AFSO algorithm for searching the best combination of synaptic weights for the neural network. An optimal set of features based on the statistical textural features is presented. The investigational outcomes of the proposed suspicious lesion classifier algorithm therefore confirm that the resulting classifier performs better than other such classifiers reported in the literature. Therefore this classifier demonstrates that the improvement in both the sensitivity and specificity are possible through automated image analysis.

  11. Effects of context and state of guilt on the detection of concealed crime information.

    Science.gov (United States)

    Elaad, Eitan

    2009-03-01

    The effects of the state of guilt and the context in which critical information was received on the accuracy of the Concealed Information Test (CIT) were examined in a between-subjects mock crime experiment. 100 participants were randomly assigned to four experimental conditions and one control condition. The experimental conditions were created using a 2 x 2 factorial design (two conditions of the context in which the crime-related details were collected - crime context or neutral context, crossed with two guilt conditions - accomplices or innocents). Results indicated that accomplices were more effectively detected than innocent participants, although both were given the same critical information. Information gathered in the crime context yielded stronger orientation to the critical items than similar information gathered in a neutral context.

  12. Mock crime application of the Complex Trial Protocol (CTP) P300-based concealed information test.

    Science.gov (United States)

    Winograd, Michael R; Rosenfeld, J Peter

    2011-02-01

    The Complex Trial Protocol (CTP), was shown to be an improvement over the previous "three stimulus" P300-based concealed information tests (CITs). Not only was it highly accurate with autobiographical information but was also resistant to the use of countermeasures (CMs). The current study applied the CTP to the detection of incidentally acquired information in a mock crime scenario. In previous "three stimulus" mock crime studies utilizing P300-based CITs, participants memorized a guilty knowledge item(s). Special care was taken in the current study to ensure that participants' knowledge of the guilty item in the mock crime was obtained only during the commission of the act in order to bolster ecological validity. Overall, 92% of all participants in guilty, innocent, and countermeasure conditions were correctly classified. CM use was again indexed by reaction times (RTs). Copyright © 2010 Society for Psychophysiological Research.

  13. The current and future status of the Concealed Information Test for field use

    Directory of Open Access Journals (Sweden)

    Izumi eMatsuda

    2012-11-01

    Full Text Available The Concealed Information Test (CIT is a psychophysiological technique for examining whether a person has knowledge of crime-relevant information. Many laboratory studies have shown that the CIT has good scientific validity. However, the CIT has seldom been used for actual criminal investigations. One successful exception is its use by the Japanese police. In Japan, the CIT has been widely used for criminal investigations, although its probative force in court is not strong. In this paper, we first review the current use of the field CIT in Japan. Then, we discuss two possible approaches to increase its probative force: sophisticated statistical judgment methods and combining new psychophysiological measures with classic autonomic measures. On the basis of these considerations, we propose several suggestions for future practice and research involving the field CIT.

  14. Surface characteristics and lesion depth and activity of suspicious occlusal carious lesions: Findings from The National Dental Practice-Based Research Network.

    Science.gov (United States)

    Makhija, Sonia K; Shugars, Daniel A; Gilbert, Gregg H; Litaker, Mark S; Bader, James D; Schaffer, Rebecca; Gordan, Valeria V; Rindal, D Brad; Pihlstrom, Daniel J; Mungia, Rahma; Meyerowitz, Cyril

    2017-12-01

    A lesion on an occlusal tooth surface with no cavitation and no radiographic radiolucency but in which caries is suspected owing to surface roughness, opacities, or staining can be defined as a suspicious occlusal carious lesion (SOCL). The authors' objective was to quantify the characteristics of SOCLs and their relationship to lesion depth and activity after these lesions were opened surgically. Ninety-three dentists participated in the study. When a consenting patient had an SOCL, information was recorded about the tooth, lesion, treatment provided, and, if the SOCL was opened surgically, its lesion depth. The Rao-Scott cluster-adjusted χ 2 test was used to evaluate associations between lesion depth and color, roughness, patient risk, and luster. The authors analyzed 1,593 SOCLs. Lesion color varied from yellow/light brown (40%) to dark brown/black (47%), with 13% other colors. Most (69%) of SOCLs had a rough surface when examined with an explorer. Over one-third of the SOCLs (39%) were treated surgically. Of the 585 surgically treated SOCLs, 61% had dentinal caries. There were statistically significant associations between lesion depth and color (P = .03), luster (P = .04), and roughness (P = .01). The authors classified 52% of the patients as being at elevated caries risk. The authors found no significant associations between lesion depth and patient risk (P = .07). Although statistically significant, the clinical characteristics studied do not provide accurate guidance for making definitive treatment decisions and result in high rates of false positives. Given that 39% of the opened lesions did not have dentinal caries or were inactive, evidence-based preventive management is an appropriate alternative to surgical intervention. Copyright © 2017 American Dental Association. Published by Elsevier Inc. All rights reserved.

  15. Vitamin D and Musculoskeletal Status in Nova Scotian Women Who Wear Concealing Clothing

    Directory of Open Access Journals (Sweden)

    Jo M. Welch

    2012-05-01

    Full Text Available Bone and muscle weakness due to vitamin D deficiency is common among Muslim women who reside in sunny, equatorial countries. The purpose of this study was to determine if living in a northern maritime location additionally disadvantages women who wear concealing clothes. A cross-sectional matched pair design was used to compare women who habitually wore concealing clothing with women who dressed according to western norms. Each premenopausal hijab-wearing woman (n = 11 was matched by age, height, weight and skin tone with a western-dressed woman. Subjects were tested by hand grip dynamometry to assess muscular strength and by quantitative ultrasound at the calcaneus to assess bone status. Nutritional intake was obtained by 24 h recall. Serum 25-hydroxyvitamin D (s-25(OHD status was determined in seven matched pairs. The hijab group had lower s-25(OHD than women who wore western clothes (40 ± 28 vs. 81 ± 32 nmol/L, p = 0.01. Grip strength in the right hand was lower in the hijab-wearing women (p = 0.05 but this appeared to be due to less participation in intense exercise. Bone status did not differ between groups (p = 0.9. Dietary intake of vitamin D was lower in the hijab-wearers (316 ± 353 vs. 601 ± 341 IU/day, p = 0.001. This pilot study suggests that women living in a northern maritime location appear to be at risk for vitamin D insufficiency and therefore should consider taking vitamin D supplements.

  16. Bilateral Waveform Similarity Overlap-and-Add Based Packet Loss Concealment for Voice over IP

    Directory of Open Access Journals (Sweden)

    J.F. Yeh

    2013-08-01

    Full Text Available This paper invested a bilateral waveform similarity overlap-and-add algorithm for voice packet lost. Since Packet lost will cause the semantic misunderstanding, it has become one of the most essential problems in speech communication. This investment is based on waveform similarity measure using overlap-and-Add algorithm and provides the bilateral information to enhance the speech signal reconstruction. Traditionally, it has been improved that waveform similarity overlap-and-add (WSOLA technique is an effective algorithm to deal with packet loss concealment (PLC for real-time time communication. WSOLA algorithm is widely applied to deal with the length adaptation and packet loss concealment of speech signal. Time scale modification of audio signal is one of the most essential research topics in data communication, especially in voice of IP (VoIP. Herein, the proposed the bilateral WSOLA (BWSOLA that is derived from WSOLA. Instead of only exploitation one direction speech data, the proposed method will reconstruct the lost voice data according to the preceding and cascading data. The related algorithms have been developed to achieve the optimal reconstructing estimation. The experimental results show that the quality of the reconstructed speech signal of the bilateral WSOLA is much better compared to the standard WSOLA and GWSOLA on different packet loss rate and length using the metrics PESQ and MOS. The significant improvement is obtained by bilateral information and proposed method. The proposed bilateral waveform similarity overlap-and-add (BWSOLA outperforms the traditional approaches especially in the long duration data loss.

  17. Subject-based discriminative sparse representation model for detection of concealed information.

    Science.gov (United States)

    Akhavan, Amir; Moradi, Mohammad Hassan; Vand, Safa Rafiei

    2017-05-01

    The use of machine learning approaches in concealed information test (CIT) plays a key role in the progress of this neurophysiological field. In this paper, we presented a new machine learning method for CIT in which each subject is considered independent of the others. The main goal of this study is to adapt the discriminative sparse models to be applicable for subject-based concealed information test. In order to provide sufficient discriminability between guilty and innocent subjects, we introduced a novel discriminative sparse representation model and its appropriate learning methods. For evaluation of the method forty-four subjects participated in a mock crime scenario and their EEG data were recorded. As the model input, in this study the recurrence plot features were extracted from single trial data of different stimuli. Then the extracted feature vectors were reduced using statistical dependency method. The reduced feature vector went through the proposed subject-based sparse model in which the discrimination power of sparse code and reconstruction error were applied simultaneously. Experimental results showed that the proposed approach achieved better performance than other competing discriminative sparse models. The classification accuracy, sensitivity and specificity of the presented sparsity-based method were about 93%, 91% and 95% respectively. Using the EEG data of a single subject in response to different stimuli types and with the aid of the proposed discriminative sparse representation model, one can distinguish guilty subjects from innocent ones. Indeed, this property eliminates the necessity of several subject EEG data in model learning and decision making for a specific subject. Copyright © 2017 Elsevier B.V. All rights reserved.

  18. Vitamin D and Musculoskeletal Status in Nova Scotian Women Who Wear Concealing Clothing

    Science.gov (United States)

    Ojah, Rani C. I.; Welch, Jo M.

    2012-01-01

    Bone and muscle weakness due to vitamin D deficiency is common among Muslim women who reside in sunny, equatorial countries. The purpose of this study was to determine if living in a northern maritime location additionally disadvantages women who wear concealing clothes. A cross-sectional matched pair design was used to compare women who habitually wore concealing clothing with women who dressed according to western norms. Each premenopausal hijab-wearing woman (n = 11) was matched by age, height, weight and skin tone with a western-dressed woman. Subjects were tested by hand grip dynamometry to assess muscular strength and by quantitative ultrasound at the calcaneus to assess bone status. Nutritional intake was obtained by 24 h recall. Serum 25-hydroxyvitamin D (s-25(OH)D) status was determined in seven matched pairs. The hijab group had lower s-25(OH)D than women who wore western clothes (40 ± 28 vs. 81 ± 32 nmol/L, p= 0.01). Grip strength in the right hand was lower in the hijab-wearing women (p = 0.05) but this appeared to be due to less participation in intense exercise. Bone status did not differ between groups (p= 0.9). Dietary intake of vitamin D was lower in the hijab-wearers (316 ± 353 vs. 601 ± 341 IU/day, p= 0.001). This pilot study suggests that women living in a northern maritime location appear to be at risk for vitamin D insufficiency and therefore should consider taking vitamin D supplements. PMID:22690323

  19. The human operational sex ratio: effects of marriage, concealed ovulation, and menopause on mate competition.

    Science.gov (United States)

    Marlowe, Frank W; Berbesque, J Colette

    2012-12-01

    Among mammals, male-male competition for sexual access to females frequently involves fighting. Larger body size gives males an advantage in fighting, which explains why males tend to be larger than females in many species, including anthropoid primates. Mitani et al. derived a formula to measure the operational sex ratio (OSR) to reflect the degree of male-male competition using the number of reproductively available males to females who are cycling and capable of conceiving. The OSR should predict the degree of sexual dimorphism in body mass-at least if male-male competition involves much fighting or threatening. Here, we use hunter-gatherer demographic data and the Mitani et al. formula to calculate the human OSR. We show that humans have a much lower degree of body mass sexual dimorphism than is predicted by our OSR. We suggest this is because human competition rarely involves fighting. In human hunter-gatherer societies, differences in the ages of marriage have an impact on competition in that the age of males at first marriage is younger when there is a lower percentage of married men with two or more wives, and older when there is a higher percentage of married men with two or more wives. We discuss the implications of this for females, along with the effects of two key life history traits that influence the OSR, concealed ovulation and menopause. While menopause decreases the number of reproductively available females to males and thus increases male-male competition, concealed ovulation decreases male-male competition. Finally, we discuss the importance of mostly monogamous mate bonds in human evolution. Copyright © 2012 Elsevier Ltd. All rights reserved.

  20. Brain fingerprinting classification concealed information test detects US Navy military medical information with P300

    Directory of Open Access Journals (Sweden)

    Lawrence A. Farwell

    2014-12-01

    Full Text Available A classification concealed information test (CIT used the brain fingerprinting method of applying P300 event-related potential (ERP in detecting information that is 1 acquired in real life and 2 unique to US Navy experts in military medicine. Military medicine experts and non-experts were asked to push buttons in response to 3 types of text stimuli. Targets contain known information relevant to military medicine, are identified to subjects as relevant, and require pushing one button. Subjects are told to push another button to all other stimuli. Probes contain concealed information relevant to military medicine, and are not identified to subjects. Irrelevants contain equally plausible, but incorrect/irrelevant information. Error rate was 0%. Median and mean statistical confidences for individual determinations were 99.9% with no indeterminates (results lacking sufficiently high statistical confidence to be classified. We compared error rate and statistical confidence for determinations of both information present and information absent produced by classification CIT (Is a probe ERP more similar to a target or to an irrelevant ERP? versus comparison CIT (Does a probe produce a larger ERP than an irrelevant? using P300 plus the late negative component (LNP; together, P300-MERMER. Comparison CIT produced a significantly higher error rate (20% and lower statistical confidences -- mean 67%; information-absent mean was 28.9%, less than chance (50%. We compared analysis using P300 alone with the P300 + LNP. P300 alone produced the same 0% error rate but significantly lower statistical confidences. These findings add to the evidence that the brain fingerprinting methods as described here provide sufficient conditions to produce less than 1% error rate and greater than 95% median statistical confidence in a CIT on information obtained in the course of real life that is characteristic of individuals with specific training, expertise, or organizational

  1. Concealed fertility and extended female sexuality in a non-human primate (Macaca assamensis.

    Directory of Open Access Journals (Sweden)

    Ines Fürtbauer

    Full Text Available In numerous primates living in mixed-sex groups, females display probabilistic cues of fertility to simultaneously concentrate paternity to dominant males while diluting it amongst others as a means to reduce the risk of infanticide and to increase male care for offspring. A few species, however, lack these cues and potentially conceal fertility from males; yet, to date, little is known about mating patterns and their underlying proximate mechanisms in such species. Here, we investigated mating activity and sexual consortships relative to female reproductive state in wild Assamese macaques (Macaca assamensis, a species where females lack prominent anogenital swellings and copulation calls. During two mating seasons (2837 contact hours we recorded sexual and social behaviors, sexual consortships, and collected 1178 fecal samples (n = 15 females which were analyzed for progestogen concentrations to assess female reproductive state and to determine the timing of ovulation and conception. Although mostly conceiving in their first ovarian cycle, females were sexually receptive throughout the entire 4-month mating season, and within-cycle mating frequencies were not increased during fertile phases. Dominant males did not monopolize fertile matings, and consortships by high-ranking males lasted for long periods, which were not exclusively linked to female fertile phases. Furthermore, females copulated promiscuously but not randomly, i.e. for almost every female, matings were concentrated to a certain male, irrespective of male rank. Collectively, we demonstrate that fertility is undisclosed to males. The extreme extended female sexuality facilitated by concealed fertility may allow females to create differentiated mating relationships within a promiscuous mating system. Our study provides important new insight into the plasticity of female sexuality in non-human primates.

  2. Vitamin D and musculoskeletal status in Nova Scotian women who wear concealing clothing.

    Science.gov (United States)

    Ojah, Rani C I; Welch, Jo M

    2012-05-01

    Bone and muscle weakness due to vitamin D deficiency is common among Muslim women who reside in sunny, equatorial countries. The purpose of this study was to determine if living in a northern maritime location additionally disadvantages women who wear concealing clothes. A cross-sectional matched pair design was used to compare women who habitually wore concealing clothing with women who dressed according to western norms. Each premenopausal hijab-wearing woman (n = 11) was matched by age, height, weight and skin tone with a western-dressed woman. Subjects were tested by hand grip dynamometry to assess muscular strength and by quantitative ultrasound at the calcaneus to assess bone status. Nutritional intake was obtained by 24 h recall. Serum 25-hydroxyvitamin D (s-25(OH)D) status was determined in seven matched pairs. The hijab group had lower s-25(OH)D than women who wore western clothes (40 ± 28 vs. 81 ± 32 nmol/L, p= 0.01). Grip strength in the right hand was lower in the hijab-wearing women (p = 0.05) but this appeared to be due to less participation in intense exercise. Bone status did not differ between groups (p= 0.9). Dietary intake of vitamin D was lower in the hijab-wearers (316 ± 353 vs. 601 ± 341 IU/day, p= 0.001). This pilot study suggests that women living in a northern maritime location appear to be at risk for vitamin D insufficiency and therefore should consider taking vitamin D supplements.

  3. Doing everyday occupations both conceals and reveals the phenomenon of being aged.

    Science.gov (United States)

    Wright-St Clair, Valerie A; Kerse, Ngaire; Smythe, Elizabeth

    2011-04-01

    The phenomenon of ageing is so commonplace that it is ordinarily taken-for-granted, with little call to question its meaning. Of importance to occupational therapists is the recent appeal to understand older adults' ordinary ways of everyday living. The aim of this interpretive phenomenological study was to understand the meaning of 'being aged' through the everyday experiences of those who are long-lived. The writings of two philosophers, Hans-Georg Gadamer and Martin Heidegger, guided the study's design and research methods. Being aged in the context of everyday living was the phenomenon of interest. Individual interviews were conducted with 15 community-dwelling New Zealand elders: four Maori aged 71-93 years and 11 non-Maori aged 80-97 years. Stories of going about daily occupations and particular moments in the day were elicited during conversational-style interviews. Hermeneutic methods and phenomenological reflection were used to analyse the data. Two overarching notions were illuminated. The ordinary ways of 'being in the every day', such as having a routine and a familiar purposefulness, conceal being aged. In contrast, 'experiencing the unaccustomed', such as suddenly noticing an unaccustomed weakness or oldness, in the midst of doing deeply familiar occupations is an announcing of being aged. CONCLUSIONS and As such, engaging in everyday, familiar occupations holds the potential to both conceal and reveal the phenomenon of being aged. These results point to the importance of illuminating the lived experience of occupational engagement as a fruitful way of informing occupation-focussed practice. © 2010 The Authors. Australian Occupational Therapy Journal © 2010 Australian Association of Occupational Therapists.

  4. Brain fingerprinting classification concealed information test detects US Navy military medical information with P300

    Science.gov (United States)

    Farwell, Lawrence A.; Richardson, Drew C.; Richardson, Graham M.; Furedy, John J.

    2014-01-01

    A classification concealed information test (CIT) used the “brain fingerprinting” method of applying P300 event-related potential (ERP) in detecting information that is (1) acquired in real life and (2) unique to US Navy experts in military medicine. Military medicine experts and non-experts were asked to push buttons in response to three types of text stimuli. Targets contain known information relevant to military medicine, are identified to subjects as relevant, and require pushing one button. Subjects are told to push another button to all other stimuli. Probes contain concealed information relevant to military medicine, and are not identified to subjects. Irrelevants contain equally plausible, but incorrect/irrelevant information. Error rate was 0%. Median and mean statistical confidences for individual determinations were 99.9% with no indeterminates (results lacking sufficiently high statistical confidence to be classified). We compared error rate and statistical confidence for determinations of both information present and information absent produced by classification CIT (Is a probe ERP more similar to a target or to an irrelevant ERP?) vs. comparison CIT (Does a probe produce a larger ERP than an irrelevant?) using P300 plus the late negative component (LNP; together, P300-MERMER). Comparison CIT produced a significantly higher error rate (20%) and lower statistical confidences: mean 67%; information-absent mean was 28.9%, less than chance (50%). We compared analysis using P300 alone with the P300 + LNP. P300 alone produced the same 0% error rate but significantly lower statistical confidences. These findings add to the evidence that the brain fingerprinting methods as described here provide sufficient conditions to produce less than 1% error rate and greater than 95% median statistical confidence in a CIT on information obtained in the course of real life that is characteristic of individuals with specific training, expertise, or organizational

  5. Relationships among Self-Concealment, Mindfulness and Negative Psychological Outcomes in Asian American and European American College Students

    Science.gov (United States)

    Masuda, Akihiko; Wendell, Johanna W.; Chou, Ying-Yi; Feinstein, Amanda B.

    2010-01-01

    Research on Asian Americans and their psychological adjustment is limited. Consisting of two cross-sectional studies, the present investigation examined the relationships among self-concealment, mindfulness, emotional distress in stressful interpersonal situations, and general psychological ill-health in Asian American college students, and in…

  6. The Concealed Information Test in the Laboratory Versus Japanese Field Practice: Bridging the Scientist-Practitioner Gap

    NARCIS (Netherlands)

    Ogawa, T.; Matsuda, I.; Tsuneoka, M.; Verschuere, B.

    2015-01-01

    Whereas the Concealed Information Test (CIT) is heavily researched in laboratories, Japan is the only country that applies it on a large scale to real criminal investigations. Here we note that important differences exist in CIT design, data-analysis, and test conclusions between these two settings.

  7. Narratives around concealment and agency for stigma-reduction: a study of women affected by leprosy in Cirebon District, Indonesia.

    NARCIS (Netherlands)

    Peters, R.M.H.; Hofker, M.E.; Zweekhorst, M.B.M.; van Brakel, W.H.; Bunders-Aelen, J.G.F.

    2014-01-01

    Purpose: This study analyses the experiences of women affected by leprosy, taking into consideration whether they concealed or disclosed their status, and looks specifically at their ‘agency’. The aim is to provide recommendations for stigma-reduction interventions. Methods: The study population

  8. Self-Concealment, Social Network Sites Usage, Social Appearance Anxiety, Loneliness of High School Students: A Model Testing

    Science.gov (United States)

    Dogan, Ugur; Çolak, Tugba Seda

    2016-01-01

    This study was tested a model for explain to social networks sites (SNS) usage with structural equation modeling (SEM). Using SEM on a sample of 475 high school students (35% male, 65% female) students, model was investigated the relationship between self-concealment, social appearance anxiety, loneliness on SNS such as Twitter and Facebook usage.…

  9. Anxiety/Depression and Hostility/Suspiciousness in Adolescent Boys: Testing Adherence to Honor Code as Mediator of Callousness and Attachment Insecurity

    Science.gov (United States)

    Somech, Lior Y.; Elizur, Yoel

    2012-01-01

    Research of psychological distress (PD) needs to differentiate between anxiety/depression and hostility/suspiciousness, which are associated with different motivational systems. In this study, structural equation modeling was used to test two hypothesized models for the prediction of each facet of PD. Hypotheses were proposed about the effects of…

  10. Rapid identification of bacillus anthracis spores in suspicious powder samples by using matrix-assisted laser desorption ionization-time of flight mass spectrometry (MALDI-TOF MS)

    NARCIS (Netherlands)

    Dybwad, M.; Laaken, A.L. van der; Blatny, J.M.; Paauw, A.

    2013-01-01

    Rapid and reliable identification of Bacillus anthracis spores in suspicious powders is important to mitigate the safety risks and economic burdens associated with such incidents. The aim of this study was to develop and validate a rapid and reliable laboratory- based matrix-assisted laser

  11. 3D Camouflaging Object using RGB-D Sensors

    OpenAIRE

    Siddek, Ahmed M.; Rashwan, Mohsen A.; Eshrah, Islam A.

    2017-01-01

    This paper proposes a new optical camouflage system that uses RGB-D cameras, for acquiring point cloud of background scene, and tracking observers eyes. This system enables a user to conceal an object located behind a display that surrounded by 3D objects. If we considered here the tracked point of observer s eyes is a light source, the system will work on estimating shadow shape of the display device that falls on the objects in background. The system uses the 3d observer s eyes and the loca...

  12. MULTIPLE OBJECTS

    Directory of Open Access Journals (Sweden)

    A. A. Bosov

    2015-04-01

    Full Text Available Purpose. The development of complicated techniques of production and management processes, information systems, computer science, applied objects of systems theory and others requires improvement of mathematical methods, new approaches for researches of application systems. And the variety and diversity of subject systems makes necessary the development of a model that generalizes the classical sets and their development – sets of sets. Multiple objects unlike sets are constructed by multiple structures and represented by the structure and content. The aim of the work is the analysis of multiple structures, generating multiple objects, the further development of operations on these objects in application systems. Methodology. To achieve the objectives of the researches, the structure of multiple objects represents as constructive trio, consisting of media, signatures and axiomatic. Multiple object is determined by the structure and content, as well as represented by hybrid superposition, composed of sets, multi-sets, ordered sets (lists and heterogeneous sets (sequences, corteges. Findings. In this paper we study the properties and characteristics of the components of hybrid multiple objects of complex systems, proposed assessments of their complexity, shown the rules of internal and external operations on objects of implementation. We introduce the relation of arbitrary order over multiple objects, we define the description of functions and display on objects of multiple structures. Originality.In this paper we consider the development of multiple structures, generating multiple objects.Practical value. The transition from the abstract to the subject of multiple structures requires the transformation of the system and multiple objects. Transformation involves three successive stages: specification (binding to the domain, interpretation (multiple sites and particularization (goals. The proposed describe systems approach based on hybrid sets

  13. High throughput image cytometry for detection of suspicious lesions in the oral cavity

    Science.gov (United States)

    MacAulay, Calum; Poh, Catherine F.; Guillaud, Martial; Michele Williams, Pamela; Laronde, Denise M.; Zhang, Lewei; Rosin, Miriam P.

    2012-08-01

    The successful management of oral cancer depends upon early detection, which relies heavily on the clinician's ability to discriminate sometimes subtle alterations of the infrequent premalignant lesions from the more common reactive and inflammatory conditions in the oral mucosa. Even among experienced oral specialists this can be challenging, particularly when using new wide field-of-view direct fluorescence visualization devices clinically introduced for the recognition of at-risk tissue. The objective of this study is to examine if quantitative cytometric analysis of oral brushing samples could facilitate the assessment of the risk of visually ambiguous lesions. About 369 cytological samples were collected and analyzed: (1) 148 samples from pathology-proven sites of SCC, carcinoma in situ or severe dysplasia; (2) 77 samples from sites with inflammation, infection, or trauma, and (3) 144 samples from normal sites. These were randomly separated into training and test sets. The best algorithm correctly recognized 92.5% of the normal samples, 89.4% of the abnormal samples, 86.2% of the confounders in the training set as well as 100% of the normal samples, and 94.4% of the abnormal samples in the test set. These data suggest that quantitative cytology could reduce by more than 85% the number of visually suspect lesions requiring further assessment by biopsy.

  14. Correspondence of cytological and histopathological diagnoses in diagnostic category V of the Bethesda system: “suspicious for malignancy”

    Directory of Open Access Journals (Sweden)

    Agata Stanek-Widera

    2016-05-01

    Full Text Available The progress in imaging methods enables fine needle aspiration (FNA biopsy to be performed on smaller and smaller lesions, including malignant ones (papillary microcarcinomas. The follicular variant predominates in this group, with cytological features often not permitting an unbiased interpretation. The aim of the study was to determine the degree of reliability of the “suspicious for malignancy” (SM diagnosis in material from the Institute of Oncology in Gliwice (IO. 290 primary SM diagnoses were established from 2010 to 2015 in the IO, including the consultations. None of the patients was treated surgically after the first FNA resulting in diagnostic category V (DC V. After the second FNA 80 patients underwent surgery, after the third 58, and after subsequent FNA 10. Together, 148 surgical resections were performed. Among 148 patients treated surgically, 111 were diagnosed with malignant lesions, which constitutes 75%. Predominantly – in 91 cases – the histopathological outcome was papillary carcinoma. The others were: 16 medullary carcinomas, 2 follicular carcinomas, and 2 poorly differentiated carcinoma cases. Moreover, 8 follicular adenomas and 28 nonneoplastic lesions were found. The high positive predictive value (PPV = 75% of SM diagnosis established in the IO testifies to the high reliability of this test. Diagnostic category V in FNA should be an indication for surgical treatment.

  15. A scream from the past: a multidisciplinary approach in a concealment of a corpse found mummified.

    Science.gov (United States)

    Gitto, Lorenzo; Bonaccorso, Luigi; Maiese, Aniello; dell'Aquila, Massimiliano; Arena, Vincenzo; Bolino, Giorgio

    2015-05-01

    When a mummified body is found, it requires the forensic pathologist to determine the manner and cause of death. The mummified body of an older man was found walled in an alcove in a silicon-sealed bedroom, in a semi-supine position with the back on the floor and the legs on the wall. Two plastic bags covered the body. Having removed the plastic bags, the body was fully wrapped in a brown adhesive tape. At the scene, there was no evidence of microfauna. The subject's son stated that after his father's death, he concealed the corpse in order to obtain his annual pension. A postmortem CT scan was performed before the autopsy, which excluded traumatic injuries. The autopsy together with the toxicological and microscopic findings helped us to understand the manner of death. In this case, the mummification process developed under specific environmental conditions and a multidisciplinary approach was required in order to solve it. Copyright © 2015 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.

  16. Children's lie-telling to conceal a parent's transgression: legal implications.

    Science.gov (United States)

    Talwar, Victoria; Lee, Kang; Bala, Nicholas; Lindsay, R C L

    2004-08-01

    Children's lie-telling behavior to conceal the transgression of a parent was examined in 2 experiments. In Experiment 1 (N = 137), parents broke a puppet and told their children (3-11-year-olds) not to tell anyone. Children answered questions about the event. Children's moral understanding of truth- and lie-telling was assessed by a second interviewer and the children then promised to tell the truth (simulating court competence examination procedures). Children were again questioned about what happened to the puppet. Regardless of whether the interview was conducted with their parent absent or present, most children told the truth about their parents' transgression. When the likelihood of the child being blamed for the transgression was reduced, significantly more children lied. There was a significant, yet limited, relation between children's lie-telling behavior and their moral understanding of lie- or truth-telling. Further, after children were questioned about issues concerning truth- and lie-telling and asked to promise to tell the truth, significantly more children told the truth about their parents' transgression. Experiment 2 (N = 64) replicated these findings, with children who were questioned about lies and who then promised to tell the 'truth more likely to tell the truth in a second interview than children who did not participate in this procedure before questioning. Implications for the justice system are discussed.

  17. The "hidden" concealed left-sided accessory pathway: An uncommon cause of SVT in young people.

    Science.gov (United States)

    Pass, Robert H; Liberman, Leonardo; Silver, Eric S; Janson, Christopher M; Blaufox, Andrew D; Nappo, Lynn; Ceresnak, Scott R

    2018-01-12

    Concealed left-sided accessory pathways (CLAP) are a cause of supraventricular tachycardia (SVT) in the young. Most are mapped with right ventricular (RV) apical/outflow pacing. Rarely, alternative means of mapping are required. We review our experience from three pediatric electrophysiology (EP) centers with a rare form of "hidden" CLAP. All patients SVT and one AFIB (4%). APs were adenosine sensitive in 7/20 patients (35%) and VA conduction was decremental in six (26%). CLAP conduction was demonstrable with orthodromic reentrant tachycardia in all patients, with RV extrastimulus testing in seven (30%) and with rapid RV pacing (

  18. Strategies to exclude subjects who conceal and fabricate information when enrolling in clinical trials

    Directory of Open Access Journals (Sweden)

    Eric G. Devine

    2017-03-01

    Full Text Available Clinical trials within the US face an increasing challenge with the recruitment of quality candidates. One readily available group of subjects that have high rates of participation in clinical research are subjects who enroll in multiple trials for the purpose of generating income through study payments. Aside from issues of safety and generalizability, evidence suggests that these subjects employ methods of deception to qualify for the strict entrance criteria of some studies, including concealing information and fabricating information. Including these subjects in research poses a significant risk to the integrity of data quality and study designs. Strategies to limit enrollment of subjects whose motivation is generating income have not been systematically addressed in the literature. The present paper is intended to provide investigators with a range of strategies for developing and implementing a study protocol with protections to minimize the enrollment of subjects whose primary motivation for enrolling is to generate income. This multifaceted approach includes recommendations for advertising strategies, payment strategies, telephone screening strategies, and baseline screening strategies. The approach also includes recommendations for attending to inconsistent study data and subject motivation. Implementing these strategies may be more or less important depending upon the vulnerability of the study design to subject deception. Although these strategies may help researchers exclude subjects with a higher rate of deceptive practices, widespread adoption of subject registries would go a long way to decrease the chances of subjects enrolling in multiple studies or more than once in the same study.

  19. Fourier transform infared spectroscopic imaging for the identification of concealed drug residue particles and fingerprints

    Science.gov (United States)

    Ricci, Camilla; Chan, K. L. Andrew; Kazarian, Sergei G.

    2006-09-01

    Conventional FTIR spectroscopy and microscopy has been widely used in forensic science. New opportunities exist to obtain rapid chemical images and to enhance the sensitivity of detection of trace materials using attenuated total reflection (ATR) Fourier transform infrared (FTIR) spectroscopy coupled with a focal-plane array (FPA) detector. In this work, the sensitivity of ATR-FTIR spectroscopic imaging using three different kinds of ATR crystals (Ge coupled with an infrared microscope, ZnSe and diamond) and resulting in three different optical arrangements for the detection of model drug particles is discussed. Model systems of ibuprofen and paracetamol particles having a size below 32 micrometers have been prepared by sieving. The sensitivity level in the three different approaches has been compared and it has been found that both micro and macro-ATR imaging methods have proven to be a promising techniques for the identification of concealed drug particles. To demonstrate the power and applicability of FTIR chemical imaging to forensic research, various examples are discussed. This includes investigation of the changes of chemical nature of latent fingerprint residue under controlled conditions of humidity and temperature studied by ATR-FTIR imaging. This study demonstrates the potential of spectroscopic imaging for visualizing the chemical changes of fingerprints.

  20. Emotional Arousal at Memory Encoding Enhanced P300 in the Concealed Information Test

    Directory of Open Access Journals (Sweden)

    Akemi Osugi

    2018-01-01

    Full Text Available Previous studies have reported that the concealed information test (CIT is a reliable and powerful method for detecting information. However, the external validity of the CIT studies has not been fully proven. In particular, few studies have examined the effects of emotional arousal at memory encoding on physiological responses in the CIT. The present study investigated the influence on the CIT of the magnitude of emotional arousal at memory encoding of a mock crime, using the P300 component of the event-related brain potential (ERP. In accord with the assumptions of excitation-transfer theory, we presented emotionally arousing pictures before a mock crime. Participants were randomly assigned to either a high emotional arousal group (n = 10 or a low emotional arousal group (n = 11, viewing pictures expected to arouse emotion at a high or low level, respectively. Subsequently, all participants enacted the same mock crime, in which they were instructed to stab a pillow with a sharp-edged tool (e.g., a kitchen knife or ice pick as if harassing a mannequin lying on a bed. After the antecedent emotional experience, the P300-based CIT was conducted. Participants in the high arousal group showed significantly greater P300 amplitudes in response to a probe stimulus compared with the low arousal group. No differences were found between the groups in response to irrelevant stimuli. These results support the notion that emotional arousal influences the P300 in the CIT paradigm.

  1. Photographs of "the Sun City": a registry of exposure and concealment

    Directory of Open Access Journals (Sweden)

    Sylvana Kelly Marques da Silva

    2014-11-01

    Full Text Available Among the different media the photograph stands out as an important visual document that establishes the tension between concealment and revelation, crucial to understanding the social and imaginary aspects. The most important relation between photography and tourism is precisely in both don´t being the picture of society, but rather, they are a representation and fragmented memory, capable of continuous interpretations. Photographs are circumscribed by definite social and cultural issues, as there are from a process of creation and assembly consisting of choices and decisions about what deserves to be photographed. This paper discuss the role of photographs of Natal City concatenated to tourism, searching for what is specific that contributed to the construction of tourist landscape in the Natal city and analyzing the ideological elements that motivated its materialization in the spaces of the city. The photographs of Fatos e Fotos magazine published in 1968 will be analyzed through iconographic and iconological observation suggested by Kossoy (2003, 2006, 2009 and directed by dialectical reading of José de Souza Martins (2009, who claims photography’s mediation in the interests immersed at the social life, resulting by the dynamic expression of the exposure, a result of presences and absences that reveal the denials and contradictions of the real world. Finally, means that the landscapes do not exist in themselves while a fixed space, but were consolidated through the discourses and images linked to the hegemonic logic of the capitalist society.

  2. Effect of Temperature and Moisture on the Development of Concealed Damage in Raw Almonds (Prunus dulcis).

    Science.gov (United States)

    Rogel-Castillo, Cristian; Zuskov, David; Chan, Bronte Lee; Lee, Jihyun; Huang, Guangwei; Mitchell, Alyson E

    2015-09-23

    Concealed damage (CD) is a brown discoloration of nutmeat that appears only after kernels are treated with moderate heat (e.g., roasting). Identifying factors that promote CD in almonds is of significant interest to the nut industry. Herein, the effect of temperature (35 and 45 °C) and moisture (<5, 8, and 11%) on the composition of volatiles in raw almonds (Prunus dulcis var. Nonpareil) was studied using HS-SPME-GC/MS. A CIE LCh colorimetric method was developed to identify raw almonds with CD. A significant increase in CD was demonstrated in almonds exposed to moisture (8% kernel moisture content) at 45 °C as compared to 35 °C. Elevated levels of volatiles related to lipid peroxidation and amino acid degradation were observed in almonds with CD. These results suggest that postharvest moisture exposure resulting in an internal kernel moisture ≥ 8% is a key factor in the development of CD in raw almonds and that CD is accelerated by temperature.

  3. Effect of Drying Moisture Exposed Almonds on the Development of the Quality Defect Concealed Damage.

    Science.gov (United States)

    Rogel-Castillo, Cristian; Luo, Kathleen; Huang, Guangwei; Mitchell, Alyson E

    2017-10-11

    Concealed damage (CD), is a term used by the nut industry to describe a brown discoloration of kernel nutmeat that becomes visible after moderate heat treatments (e.g., roasting). CD can result in consumer rejection and product loss. Postharvest exposure of almonds to moisture (e.g., rain) is a key factor in the development of CD as it promotes hydrolysis of proteins, carbohydrates, and lipids. The effect of drying moisture-exposed almonds between 45 to 95 °C, prior to roasting was evaluated as a method for controlling CD in roasted almonds. Additionally, moisture-exposed almonds dried at 55 and 75 °C were stored under accelerated shelf life conditions (45 °C/80% RH) and evaluated for headspace volatiles. Results indicate that drying temperatures below 65 °C decreases brown discoloration of nutmeat up to 40% while drying temperatures above 75 °C produce significant increases in brown discoloration and volatiles related to lipid oxidation, and nonsignificant increases in Amadori compounds. Results also demonstrate that raw almonds exposed to moisture and dried at 55 °C prior to roasting, reduce the visual sign of CD and maintain headspace volatiles profiles similar to almonds without moisture damage during accelerated storage.

  4. A concealed observational study of infection control and safe injection practices in Jordanian governmental hospitals.

    Science.gov (United States)

    Al-Rawajfah, Omar M; Tubaishat, Ahmad

    2017-10-01

    The recognized international organizations on infection prevention recommend using an observational method as the gold standard procedure for assessing health care professional's compliance with standard infection control practices. However, observational studies are rarely used in Jordanian infection control studies. This study aimed to evaluate injection practices among nurses working in Jordanian governmental hospitals. A cross-sectional concealed observational design is used for this study. A convenience sampling technique was used to recruit a sample of nurses working in governmental hospitals in Jordan. Participants were unaware of the time and observer during the observation episode. A total of 384 nurses from 9 different hospitals participated in the study. A total of 835 injections events were observed, of which 73.9% were performed without handwashing, 64.5% without gloving, and 27.5% were followed by needle recapping. Handwashing rate was the lowest (18.9%) when injections were performed by beginner nurses. Subcutaneous injections were associated with the lowest rate (26.7%) of postinjection handwashing compared with other routes. This study demonstrates the need for focused and effective infection control educational programs in Jordanian hospitals. Future studies should consider exploring the whole infection control practices related to waste disposal and the roles of the infection control nurse in this process in Jordanian hospitals. Copyright © 2017 Association for Professionals in Infection Control and Epidemiology, Inc. Published by Elsevier Inc. All rights reserved.

  5. Understanding Where Americas Public Discussion Takes Place In Todays Society: Case Studies of Concealed Weapons Carry Reform

    Science.gov (United States)

    2016-06-01

    for allowing U.S. citizens the right to own “weapons of mass killing ,” calling all readers to support new measure of gun control and ban certain...arguing that concealed carry permit holders are a danger to public safety and that mass shootings are taking place by citizens who are legally armed.2...developments, on the other, say about the role and reach of the mass media in American society today? B. SIGNIFICANCE OF THE RESEARCH According to

  6. Pragmatic Objectivity

    OpenAIRE

    Michele Marsonet

    2014-01-01

    Nicholas Rescher writes that “objectivity is not something we infer from the data; it is something we must presuppose. It is something that we postulate or presume from the very outset of our dealings with people’s claims about the world’s facts”. Such definition is just the opposite of objectivity conceived of in classical terms, but it cannot be equated with an idealistic viewpoint according to which objectivity is something that our mind simply creates in the process of reflection. It is, ...

  7. [EFFECTIVENESS OF ADVANCED SKIN FLAP AND V-SHAPED VENTRAL INCISION ALONG THE ROOT OF PENILE SHAFT FOR CONCEALED PENIS].

    Science.gov (United States)

    Lin, Junshan; Li, Dumiao; Zhang, Jianxing; Wu, Qiang; Xu, Yali; Lin, Li

    2015-09-01

    To investigate effectiveness of advanced skin flap and V-shaped ventral incision along the root of penile shaft for concealed penis in children. Between July 2007 and January 2015, 121 boys with concealed penis were treated with advanced skin flap and V-shaped ventral incision along the root of penile shaft. The age varied from 18 months to 13 years (mean, 7.2 years). Repair was based on a vertical incision in median raphe, complete degloving of penis and tacking its base to the dermis of the skin. Advanced skin flap and a V-shaped ventral incision along the root of penile shaft were used to cover the penile shaft. The operation time ranged from 60 to 100 minutes (mean, 75 minutes). Disruption of wound occurred in 1 case, and was cured after dressing change; and primary healing of incision was obtained in the others. The follow-up period ranged from 3 months to 7 years (median, 24 months). All patients achieved good to excellent cosmetic results with a low incidence of complications. The results were satisfactory in exposure of penis and prepuce appearance. No obvious scar was observed. The penis had similar appearance to that after prepuce circumcision. A combination of advanced skin flap and V-shaped ventral incision along the root of penile shaft is a simple, safe, and effective procedure for concealed penis with a similar appearance result to the prepuce circumcision.

  8. Trusted Objects

    Energy Technology Data Exchange (ETDEWEB)

    CAMPBELL,PHILIP L.; PIERSON,LYNDON G.; WITZKE,EDWARD L.

    1999-10-27

    In the world of computers a trusted object is a collection of possibly-sensitive data and programs that can be allowed to reside and execute on a computer, even on an adversary's machine. Beyond the scope of one computer we believe that network-based agents in high-consequence and highly reliable applications will depend on this approach, and that the basis for such objects is what we call ''faithful execution.''

  9. The Invisible Work of Closeting: A Qualitative Study About Strategies Used by Lesbian and Gay Persons to Conceal Their Sexual Orientation.

    Science.gov (United States)

    Malterud, Kirsti; Bjorkman, Mari

    2016-10-01

    The last decades have offered substantial improvement regarding human rights for lesbian and gay (LG) persons. Yet LG persons are often in the closet, concealing their sexual orientation. We present a qualitative study based on 182 histories submitted from 161 LG individuals to a Web site. The aim was to explore experiences of closeting among LG persons in Norway. A broad range of strategies was used for closeting, even among individuals who generally considered themselves to be out of the closet. Concealment was enacted by blunt denial, clever avoidance, or subtle vagueness. Other strategies included changing or eliminating the pronoun or name of the partner in ongoing conversations. Context-dependent concealment, differentiating between persons, situations, or arenas, was repeatedly applied for security or convenience. We propose a shift from "being in the closet" to "situated concealment of sexual orientation."

  10. Influence of countermeasures on the validity of the Concealed Information Test.

    Science.gov (United States)

    Peth, Judith; Suchotzki, Kristina; Gamer, Matthias

    2016-09-01

    The Concealed Information Test (CIT) is a psychophysiological technique that allows for detecting crime-related knowledge. Usually, autonomic response measures are used for this purpose, but ocular measures have also been proposed recently. Prior studies reported heterogeneous results for the usage of countermeasures (CM) to corrupt the CIT's validity, depending on the CM technique and the dependent measure. The current study systematically compared the application of physical and mental CM on autonomic and ocular measures during the CIT. Sixty participants committed a mock crime and were assigned to one of three guilty conditions: standard guilty (without CM), physical CM, or mental CM. An additional group of 20 innocents was investigated with the same CIT to calculate validity estimates. Electrodermal responses were more vulnerable for CM usage compared to heart rate and respiration, and physical CM were more effective than mental CM. Independent of CM usage, a combined score of autonomic responses enabled a valid differentiation between guilty and innocent examinees. Fixations and blinks also allowed for detecting crime-related knowledge, but these measures were more affected by CM application than autonomic responses. The current study delivered further evidence that CM differentially impact physiological and ocular responses in the CIT. Whereas individual data channels were strongly affected by CM usage, a combination of different response measures yielded a relatively stable differentiation of guilty and innocent examinees when mental CM were used. These findings are especially relevant for field applications and might inspire future studies to detect or prevent CM usage in CIT examinations. © 2016 Society for Psychophysiological Research.

  11. Subclinical vitamin D deficiency is increased in adolescent girls who wear concealing clothing.

    Science.gov (United States)

    Hatun, Sukru; Islam, Omer; Cizmecioglu, Filiz; Kara, Bulent; Babaoglu, Kadir; Berk, Fatma; Gökalp, Ayse Sevim

    2005-02-01

    Vitamin D deficiency continues to be a worldwide problem, especially in developing countries. The aim of this study was to investigate potential risk factors for vitamin D deficiency. Girls (n = 89) aged 13 to 17 y were enrolled in the study. Study subjects were stratified into 3 groups: Group I included girls living in a suburban area; Group II girls lived in an urban area, and Group III girls lived in an urban area and wore concealing clothes for religious reasons. At the end of winter (in April) serum 25-hydroxyvitamin D [25(OH)D] levels were measured and dietary data were collected using questionnaires. Vitamin D deficiency was defined as a serum 25(OH)D concentration concentration between 25 and 50 nmol/L. The lumbar and femur neck bone mineral densities (BMD) were measured using dual X-ray absorptiometry (DEXA). Overall, 39 girls (43.8%) had vitamin D insufficiency and 19 (21.3%) had vitamin D deficiency. In group III (wearing covered dress) the serum 25(OH)D concentrations (28.13 +/- 12.53 nmol/L) were significantly lower than in the other 2 groups, and within this group, 50% of girls were vitamin D deficient. The lumbar and femur neck BMD of girls with lower 25(OH)D levels did not differ from those with adequate vitamin D levels. We conclude that vitamin D deficiency is an important problem in Turkish adolescent girls, especially in those who follow a religious dress code; therefore, vitamin D supplementation appears to be necessary for adolescent girls.

  12. Integrated Near-Surface Seismic and Geoelectrical Mapping of the Concealed Carlsberg Fault zone, Copenhagen, Denmark

    Science.gov (United States)

    Nielsen, L.; Thybo, H.; Jorgensen, M. I.

    2004-12-01

    The Carlsberg Fault is located in a NNW-SSE striking fault system in the border zone between the Danish Basin and the Baltic Shield. Recent earthquakes indicate that this area is tectonically active. We locate the concealed Carlsberg Fault zone along a 12 km long trace in the Copenhagen city center by seismic refraction, reflection and fan profiling. We supplement our seismic investigations with multi-electrode geoelectrical profiling. The seismic refraction study shows that the Carlsberg Fault zone is a low-velocity zone and marks a change in seismic velocity structure. A normal-incidence reflection seismic section shows a coincident flower structure. We have recorded seismic signals in a fan geometry from shots detonated both inside the low-velocity fault zone and up to about 500 m away from the fault zone. The seismic energy was recorded on three receiver arrays (1.5-2.4 km long arcs) across the expected location of the 400-700 m wide fault zone at distances of up to 7 km from the shots. Shots detonated inside the fault zone result in: 1) weak and delayed first arrivals on the receivers located inside the fault zone compared to earlier and stronger first arrivals outside the fault zone; 2) strong guided P- and S-waves as well as surface waves inside the fault zone. The fault zone is a shadow zone to shots detonated outside the fault zone. Finite-difference wavefield modeling supports the interpretations of the fan recordings. Our fan recording approach facilitates cost-efficient mapping of fault zones in densely urbanized areas where seismic normal-incidence and refraction profiling are not feasible. The geoelectrical measurements show that the fault zone is characterized by low resistivities (lower than 5 ohmm), indicating that the fault zone is fractured and water-filled. This interpretation is supported by hydrological measurements conducted by others, which show that the Carlsberg Fault zone is highly permeable.

  13. Chimpanzee uses manipulative gaze cues to conceal and reveal information to foraging competitor.

    Science.gov (United States)

    Hall, Katie; Oram, Mike W; Campbell, Matthew W; Eppley, Timothy M; Byrne, Richard W; de Waal, Frans B M

    2017-03-01

    Tactical deception has been widely reported in primates on a functional basis, but details of behavioral mechanisms are usually unspecified. We tested a pair of chimpanzees (Pan troglodytes) in the informed forager paradigm, in which the subordinate saw the location of hidden food and the dominant did not. We employed cross-correlations to examine temporal contingencies between chimpanzees' behavior: specifically how the direction of the subordinate's gaze and movement functioned to manipulate the dominant's searching behavior through two tactics, withholding, and misleading information. In Experiment 1, not only did the informed subordinate tend to stop walking toward a single high value food, but she also refrained from gazing toward it, thus, withholding potentially revealing cues from her searching competitor. In a second experiment, in which a moderate value food was hidden in addition to the high value food, whenever the subordinate alternated her gaze between the dominant and the moderate value food, she often paused walking for 5 s; this frequently recruited the dominant to the inferior food, functioning as a "decoy." The subordinate flexibly concealed and revealed gaze toward a goal, which suggests that not only can chimpanzees use visual cues to make predictions about behavior, but also that chimpanzees may understand that other individuals can exploit their gaze direction. These results substantiate descriptive reports of how chimpanzees use gaze to manipulate others, and to our knowledge are the first quantitative data to identify behavioral mechanisms of tactical deception. Cross correlations show a subordinate chimpanzee tactically deceived a dominant by not gazing toward a valuable food (withholding), and recruiting to a "decoy" food (misleading). Chimpanzees understand that others can exploit their gaze direction. © 2016 Wiley Periodicals, Inc.

  14. Repeal of the concealed weapons law and its impact on gun-related injuries and deaths.

    Science.gov (United States)

    Ginwalla, Rashna; Rhee, Peter; Friese, Randall; Green, Donald J; Gries, Lynn; Joseph, Bellal; Kulvatunyou, Narong; Lubin, Dafney; O'Keeffe, Terence; Vercruysse, Gary; Wynne, Julie; Tang, Andrew

    2014-03-01

    Senate Bill 1108 (SB-1108) allows adult citizens to carry concealed weapons without a permit and without completion of a training course. It is unclear whether the law creates a "deterrent factor" to criminals or whether it escalates gun-related violence. We hypothesized that the enactment of SB-1108 resulted in an increase in gun-related injuries and deaths (GRIDs) in southern Arizona. We performed a retrospective cohort study spanning 24 months before (prelaw) and after (postlaw) SB-1108. We collected injury and death data and overall crime and accident trends. Injured patients were dichotomized based on whether their injuries were intentional (iGRIDs) or accidental (aGRIDs). The primary outcome was any GRID. To determine proportional differences in GRIDs between the two periods, we performed χ analyses. For each subgroup, we calculated relative risk (RR). The number of national and state background checks for firearms purchases increased in the postlaw period (national and state p guns had an 11% increased risk of being injured or killed by a firearm (p = 0.036) The proportion of iGRIDs to overall city violent crime remained the same during the two periods (9.74% prelaw vs. 10.36% postlaw; RR, 1.06; 95% confidence interval, 0.96-1.17). However, in the postlaw period, the proportion of gun-related homicides increased by 27% after SB-1108 (RR, 1.27; 95% confidence interval, 1.02-1.58). Both nationally and statewide, firearm purchases increased after the passage of SB-1108. Although the proportion of iGRIDs to overall city violent crime remained the same, the proportion of gun-related homicides increased. Liberalization of gun access is associated with an increase in fatalities from guns. Epidemiologic study, level III.

  15. The Usefulness of the Transabdominal Ultrasonography as a Screening Examination in the Evaluation of the Patient with Suspicious Gastric Disease

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hyun Cheol; Shin, Hyeong Cheol; Kim, Hyung Hwan; Park, Seong Jin; Nam, Deok Ho; Bae, Won Kyung; Kim, Il Young; Jeong, Du Shin; Chung, Il Kwun [Soonchunhyang University, Cheonan Hospital, Cheonan (Korea, Republic of)

    2005-03-15

    To evaluate the usefulness of transabdominal ultrasonography as a screening examination in patients with suspicious gastric disease. We selected 141 patients with epigastric pain and who were found to have antral gastric wall thickening of more than 5 mm in transabdominal ultrasonography, and who underwent gastroscopy immediately following the ultrasonography examination, because we suspected that these patients had gastric disease. We measured the full thickness of the five layers of the gastric wall and evaluated the preservation of this five layered structure. We respectively compared the gastric wall thickness and the preservation of gastric layers in 26 normal, 91 gastritis, 12 gastric ulcer, and 12 gastric cancer patients, who were classified based on the gastroscopy results. The mean thicknesses of the gastric wall in the normal, gastritis, gastric ulcer and gastric cancer patients were 5.13{+-}0.14 mm, 6.71{+-}1.33 mm, 8.08{+-}2.80 mm, and 12.45{+-}3.70 mm, respectively. The gastric walls in the gastritis, gastric ulcer and gastric cancer patients were significantly thicker than that in the normal patients (p < 0.01). The gastric wall in the gastric cancer patients was significantly thicker than those in the gastritis and gastric ulcer patients (p < 0.01). However, the difference in the gastric wall thickness between the gastritis and gastric ulcer patients was not statistically significant (p > 0.01). Except for two patients with gastritis and three patients with gastric ulcer, the stratification of the gastric wall was preserved in all of the normal, gastritis and gastric ulcer patients, whereas it was disrupted in all of the patients with gastric cancer. Transabdominal ultrasonography in the fasting state may be a helpful and convenient modality, which can serve as a screening examination in the evaluation of gastric disease. Therefore, careful attention and effort are needed to evaluate the gastric wall during transabdominal ultrasonography

  16. Fashion Objects

    DEFF Research Database (Denmark)

    Andersen, Bjørn Schiermer

    2009-01-01

    This article attempts to create a framework for understanding modern fashion phenomena on the basis of Durkheim's sociology of religion. It focuses on Durkheim's conception of the relation between the cult and the sacred object, on his notion of 'exteriorisation', and on his theory of the social...... symbol in an attempt to describe the peculiar attraction of the fashion object and its social constitution. However, Durkheim's notions of cult and ritual must undergo profound changes if they are to be used in an analysis of fashion. The article tries to expand the Durkheimian cult, radically enlarging...... it without totally dispersing it; depicting it as held together exclusively by the sheer 'force' of the sacred object. Firstly, the article introduces the themes and problems surrounding Durkheim's conception of the sacred. Next, it briefly sketches an outline of fashion phenomena in Durkheimian categories...

  17. Scattering Suppression from Arbitrary Objects in Spatially-Dispersive Layered Metamaterials

    OpenAIRE

    Shalin, Alexander S.; Ginzburg, Pavel; Orlov, Alexey A.; Iorsh, Ivan; Belov, Pavel A.; Kivshar, Yuri S.; Zayats, Anatoly V.

    2015-01-01

    Concealing objects by making them invisible to an external electromagnetic probe is coined by the term cloaking. Cloaking devices, having numerous potential applications, are still face challenges in realization, especially in the visible spectral range. In particular, inherent losses and extreme parameters of metamaterials required for the cloak implementation are the limiting factors. Here, we numerically demonstrate nearly perfect suppression of scattering from arbitrary shaped objects in ...

  18. Agreement among RTOG Sarcoma Radiation Oncologists in Contouring Suspicious Peritumoral Edema for Pre-operative Radiotherapy of Soft Tissue Sarcoma of the Extremity

    Science.gov (United States)

    Bahig, Houda; Roberge, David; Bosch, Walter; Levin, William; Petersen, Ivy; Haddock, Michael; Freeman, Carolyn; DeLaney, Thomas F.; Abrams, Ross A.; Indelicato, Danny J.; Baldini, Elizabeth H.; Hitchcock, Ying; Kirsch, David G.; Kozak, Kevin R.; Wolfson, Aaron; Wang, Dian

    2013-01-01

    Purpose Peritumoral edema may potentially harbor sarcoma cells. The extent of suspicious edema (SE) included in the treatment volume is subject to clinical judgment, balancing the risk of missing tumor cells with excess toxicity. Our goal was to determine variability in SE delineation by sarcoma radiation oncologists (RO). Material and Method Twelve expert ROs were provided with T1 Gadolinium and T2-weighted MR images of 10 patients with high-grade extremity soft tissue sarcoma. Gross tumor volume, CTV3cm (3cm longitudinal and 1.5cm radial margin) and CTV2cm (2cm longitudinal and 1cm radial margin) were contoured by a single observer. Suspicious peritumoral edema, defined as abnormal signal on T2 images, was independently delineated by all 12 ROs. Contouring agreement was analyzed using the Simultaneous Truth and Performance Level Estimation (STAPLE) algorithm and kappa statistics. Results The mean volumes of GTV, CTV2cm and CTV3cm were respectively 130 cm3 (7–413 cm3), 280cm3 and 360cm3. The mean consensus volume computed using the STAPLE algorithm at 95% confidence interval was 188cm3 (24–565cm3) with a substantial overall agreement corrected for chance (mean kappa =0.71; range: 0.32–0.87). The minimum, maximum and mean volume of suspicious edema (excluding the GTV) were 4cm3, 182cm3 and 58 cm3 (representing a median of 29% of the GTV volume). The median volume of suspicious edema not included in the CTV2cm and in the CTV3cm was 5 cm3 and 0.3cm3 respectively. There were 3 large tumors with >30cm3 of suspicious edema not included in the CTV3cm volume. Conclusion Despite the fact that SE would empirically seem to be a more subjective volume, a substantial or near-perfect inter-observer agreement was observed in SE delineation in most cases with high-grade STS of the extremity. A median of 97% of the consensus SE is within the CTV2cm (99.8% within the CTV3cm). In a minority of cases, however, significant expansion of the CTVs is required to cover SE. PMID

  19. Detection of concealed substances in sealed opaque plastic and coloured glass containers using SORS

    Science.gov (United States)

    Bloomfield, Matthew; Loeffen, Paul W.; Matousek, Pavel

    2010-10-01

    The reliable detection of concealed substances in sealed opaque plastic and coloured glass containers, with low falsealarm rate, is a problem in numerous areas of security. For example, in aviation security, there is no reliable methodology for alarm resolution of substances with high chemical specificity unless the substances are in optically transparent containers. We present a recently developed method called Spatially Offset Raman Spectroscopy (SORS) which enables the discrimination of the Raman spectrum of the content substance from the Raman spectrum of the container material with no prior knowledge of either, thereby allowing unambiguous identification of the container contents. The method is effective with coloured plastic containers that are several millimetres thick and which are not see-through to the eye and also for coloured glass bottles. Such cases do not typically yield to conventional backscatter Raman spectroscopy (or have poor false-alarm rates) since the content signal is often overwhelmed by the signal from the container, which may in addition have a strong interfering fluorescence background. SORS measurement can be performed in a few seconds by shining a laser light onto the container and then measuring the Raman signal at the excitation point but also at one or more offset positions. Each measurement has different relative orthogonal contributions from the container and contents Raman spectra, so that, with no prior knowledge, the pure spectra of both the container and contents can be extracted - either by scaled subtraction or via multivariate statistical methods. The content spectrum can then be compared to a reference library of pure materials to give a threat evaluation with a confidence level not compromised by interfering signals originating from the container wall. In this paper, we describe the methods and their optimization, and characterize their performance in practical screening applications. The study shows that there is

  20. Clinical decision-making in atypical and suspicious categories in fine-needle aspiration cytology of the breast.

    Science.gov (United States)

    Gipponi, Marco; Fregatti, Piero; Garlaschi, Alessandro; Calabrese, Massimo; Baccini, Paola; Gallo, Maurizio; Murelli, Federica; Margarino, Cecilia; Bobbio, Carolina; Friedman, Daniele

    2015-04-01

    Fine-needle aspiration cytology (FNAC) is a simple and reliable technique to assess breast lesions, although a definitive differential diagnosis (benignity vs. cancer) is achieved approximately in 60-70% of cases because an inadequate (C1), atypical (C3) or suspicious (C4) category is otherwise reported. A retrospective analysis of 763 cases with C3 or C4 reports was performed to define their positive predictive value (PPV), as well as the practical implications of clinical and imaging findings as for clinical decision-making. FNACs were collected from January 2003 to September 2012 at the Breast Unit of IRCCS "A.O.U. San Martino-IST" Genoa, with each being received later to definitive histology. The PPV for cancer of C3/C4 categories were computed to measure the accuracy of FNAC; moreover, the PPV was also stratified according to clinical, mammography and sonography data alone or by their combination. The PPV of C3 and C4 was 21.1% (80/380) and 84.1 % (322/383), respectively. Within each C3/C4 category, a significant direct correlation (p<0.001) between the suspicion index of clinical, mammography and sonography data and cancer detection rate was always observed. The PPV of C3/C4 stratified by the combination of clinical and imaging findings showed satisfactory values in the C3 category only when there was an agreement between clinical and imaging findings, whereas the PPV of the C4 category was always remarkably high (ranging from 92.3% to 100%). the diagnostic work-up in C4 reports or in patients with a C3 report but with an high suspicion index at clinical or imaging examination should be preferably implemented by means of a core biopsy to optimize the therapeutic planning; given a C3 report with dubious clinical and/or imaging findings, an excisional biopsy (or in alternative vacuum-assisted breast biopsy with complete removal of the nodule) should be preferably performed in order to reach a definitive histological dia gnosis with no further delay. Copyright

  1. Ultra Wide X-Band Microwave Imaging of Concealed Weapons and Explosives Using 3D-SAR Technique

    Directory of Open Access Journals (Sweden)

    P. Millot

    2015-01-01

    Full Text Available In order to detect and image concealed weapons and explosives, an electromagnetic imaging tool with its related signal processing is presented. The aim is to penetrate clothes and to find personal-born weapons and explosives under clothes. The chosen UWB frequency range covers the whole X-band. The frequency range is justified after transmission measurements of numerous clothes that are dry or slightly wet. The apparatus and the 3D near-field SAR processor are described. A strategy for contour identification is presented with results of some simulants of weapon and explosive. A conclusion is drawn on the possible future of this technique.

  2. Objective thermomechanics

    CERN Document Server

    Fülöp, Tamás

    2015-01-01

    An irreversible thermodynamical theory of solids is presented where the kinematic quantities are defined in an automatically objective way. Namely, auxiliary elements like reference frame, reference time and reference configuration are avoided by formulating the motion of the continuum on spacetime directly, utilizing the Weyl-Matolcsi description of spacetime. This restricts the range of definable kinematic quantities heavily. Solids are distinguished from fluids by possessing not only an instantaneous metric tensor but a relaxed metric, too, that represents the natural geometric structure of the solid. The comparison of the instantaneous metric to the relaxed one is the basis of the definition of the elastic state variable, the elastic deformedness tensor. Thermal expansion is conceived as the temperature dependence of the relaxed metric. As opposed to this reversible type of change, plasticity means an irreversible change in the relaxed metric, and is describable via a plastic change rate tensor. The relat...

  3. Eyes with Suspicious Appearance of the Optic Disc and Normal Intraocular Pressure: Using Clinical and Epidemiological Characteristics to Differentiate Those with and without Glaucoma.

    Directory of Open Access Journals (Sweden)

    Diego T Dias

    Full Text Available Among all glaucoma suspects, eyes with optic nerve head features suspicious or suggestive of early glaucoma are probably those that offer the greatest challenge for clinicians. In contrast with the robust longitudinal data published on ocular hypertension, there is no specific management guideline for these patients. Therefore, evaluating eyes with suspicious optic disc appearance and normal intraocular pressure (IOP, we sought to investigate potential differences in clinical and epidemiological characteristics to differentiate those with normal-tension glaucoma (NTG from those with presumed large physiological optic disc cups (pLPC. In this observational case-control study, we consecutively enrolled individuals with pLPC and NTG. All eyes had vertical cup-to-disc ratio (VCDR≥0.6 and untreated IOP<21 mmHg. Glaucomatous eyes had reproducible visual field defects. Eyes with pLPC required normal visual fields and ≥30 months of follow-up with no evidence of glaucomatous neuropathy. Clinical and epidemiological parameters were compared between groups. Eighty-four individuals with pLPC and 40 NTG patients were included. Regarding our main results, NTG patients were significantly older and with a higher prevalence of Japanese descendants (p<0.01. Not only did pLPC eyes have smaller mean VCDR, but also larger optic discs (p≤0.04. There were no significant differences for gender, central corneal thickness, and spherical equivalent (p≥0.38. Significant odds ratios (OR were found for race (OR = 2.42; for Japanese ancestry, age (OR = 1.05, VCDR (OR = 5.03, and disc size (OR = 0.04; p≤0.04. In conclusion, in patients with suspicious optic disc and normal IOP, those with older age, Japanese ancestry, smaller optic discs, and larger VCDR are more likely to have NTG, and therefore, deserve deeper investigation and closer monitoring.

  4. A Functional Analysis of Deception Detection of a Mock Crime using Infrared Thermal Imaging and the Concealed Information Test

    Directory of Open Access Journals (Sweden)

    Kevin Kiwon Park

    2013-03-01

    Full Text Available The purpose of this study was to utilize thermal imaging and the Concealed Information Test to detect deception in participants who committed a mock crime. A functional analysis using a functional ANOVA and a functional discriminant analysis was conducted to decrease the variation in the physiological data collected through the thermal imaging camera. Participants chose between a non-crime mission (Innocent Condition: IC, or a mock crime (Guilty Condition: GC of stealing a wallet in a computer lab. Temperature in the periorbital region of the face was measured while questioning participants regarding mock crime details. Results revealed that the GC showed significantly higher temperatures when responding to crime relevant items compared to irrelevant items, while the IC did not. The functional ANOVA supported the initial results that facial temperatures of the GC elevated when responding to crime relevant items, demonstrating an interaction between group (guilty/innocent and relevance (relevant/irrelevant. The functional discriminant analysis revealed that answering crime relevant items can be used to discriminate guilty from innocent participants. These results suggest that measuring facial temperatures in the periorbital region while conducting the Concealed Information Test is able to differentiate the GC from the IC.

  5. Concealment, communication and stigma: The perspectives of HIV-positive immigrant Black African men and their partners living in the United Kingdom.

    Science.gov (United States)

    Owuor, John Oa; Locke, Abigail; Heyman, Bob; Clifton, Andrew

    2016-12-01

    This study explored the perspectives of Black men, originally from East Africa, living in the United Kingdom and their partners on what it means to live with diagnosed HIV. This article reports on concealment of HIV-positive status as a strategy adopted by the affected participants to manage the flow of information about their HIV-positive status. Analysis of the data, collected using in-depth interviews involving 23 participants, found widespread selective concealment of HIV-positive status. However, a few respondents had 'come out' publicly about their condition. HIV prevention initiatives should recognise concealment as a vital strategy in managing communication about one's HIV-positive status. © The Author(s) 2015.

  6. The perspective of full-gradient magnetometry system application in searching for magnetic objects

    Science.gov (United States)

    Narkhov, E. D.; Shirokov, A. A.; Sergeev, A. V.; Fedorov, A. L.; Milovidov, E. M.; Denisov, A. Yu.; Saveliev, D. V.; Sapunov, V. A.

    2017-09-01

    Key advantages of using fully graded shooting method are described. The method of detecting position of a pipeline in space by using gradient`s modulus of magnetic field is also presented. The results of expedition to Baidaratskaya Bay, Kara Sea, in which system of 4 Overhauser sensors was used, are reported. The method showed its perspective in searching for objects in concealing environments, particularly in mapping oil- and gas pipelines.

  7. Applicability and discriminative value of a semiautomatic three-dimensional spherical volume for the assessment of the apparent diffusion coefficient in suspicious breast lesions-feasibility study.

    Science.gov (United States)

    Hering, Jan; Laun, Frederik Bernd; Lederer, Wolfgang; Daniel, Heidi; Kuder, Tristan Anselm; Stieber, Anne; Delorme, Stefan; Maier-Hein, Klaus H; Schlemmer, Heinz-Peter; Bickelhaupt, Sebastian

    To evaluate the feasibility and accuracy of a semiautomatic, three-dimensional volume of interest (3D sphere) for measuring the apparent diffusion coefficient (ADC) in suspicious breast lesions compared to conventional single-slice two-dimensional regions of interest (2D ROIs). This institutional-review-board-approved study included 56 participants with Breast Imaging Reporting and Data System 4/5 lesion. All received diffusion-weighted imaging magnetic resonance imaging prior to biopsy (b=0-1500 s/mm(2)). ADC values were measured in the lesions with both methods. Reproducibility and accuracies were compared. Area under the curve was 0.93 [95% confidence interval (CI) 0.86-0.99] for the 3D sphere and 0.91 (95% CI 0.84-0.98) for the 2D ROIs without significantly differing reproducibility (P=.45). A semiautomatic 3D sphere could reliably estimate ADC values in suspicious breast lesions without significant difference compared to conventional 2D ROIs. Copyright © 2016 Elsevier Inc. All rights reserved.

  8. Absorption toward Red BL Lac Objects

    Science.gov (United States)

    Stocke, J. T.; Rector, T. A.

    Based upon the prototypical high-z molecular absorber, PKS 1413+135, we present a summary of properties and search strategies for new high-z absorbers. It is suspicious that two of the four high-z molecular absorbers are BL Lac Objects (PKS 1413+135 & B2 0218+357), suggesting a link between the presence of the foreground absorber and the low equivalent width emission lines of BL Lacs. Also, based upon a new optical absorption line study of radio-selected BL Lac Objects (Stocke & Rector 1997), we find a large overabundance of intervening Mg II absorption line systems in these objects compared to quasars, which also seems to link low equivalent width emission lines to the presence of foreground absorption. Not only does this suggest that the optical characteristics of BL Lacs can be created by microlensing due to stars associated with foreground absorbing gas but also that red BL Lacs are a rich sample to search for new examples of foreground absorbers.

  9. A comparative study of the dimensionality of the self-concealment scale using principal components analysis and Mokken scale analysis.

    Science.gov (United States)

    Wismeijer, Andreas A J; Sijtsma, Klaas; van Assen, Marcel A L M; Vingerhoets, Ad J J M

    2008-07-01

    We discuss and contrast 2 methods for investigating the dimensionality of data from tests and questionnaires: the popular principal components analysis (PCA) and the more recent Mokken scale analysis (MSA; Mokken, 1971). First, we discuss the theoretical similarities and differences between both methods. Then, we use both methods to analyze data collected by means of Larson and Chastain's (1990) Self-Concealment Scale (SCS). We present the different results and highlight the instances in which the methods complement one another so as to obtain a stronger result than would be obtained using only 1 method. Finally, we discuss the implications of the results for the dimensionality of the SCS and provide recommendations for both the further development of the SCS and the future use of PCA and MSA in personality research.

  10. Lead isotopes in iron and manganese oxide coatings and their use as an exploration guide for concealed mineralization

    Science.gov (United States)

    Gulson, B.L.; Church, S.E.; Mizon, K.J.; Meier, A.L.

    1992-01-01

    Lead isotopes from Fe and Mn oxides that coat stream pebbles from around the Mount Emmons porphyry molybdenum deposit in Colorado were studied to assess the feasibility of using Pb isotopes to detect concealed mineral deposits. The Fe/Mn oxide coatings were analyzed to determine their elemental concentrations using ICP-AES. The Pb isotope compositions of solutions from a selected suite of samples were measured, using both thermal ionization and ICP mass spectrometry, to compare results determined by the two analytical methods. Heavy mineral concentrates from the same sites were also analyzed to compare the Pb isotope compositions of the Fe/Mn coatings with those found in panned concentrates. The Fe/Mn and 206Pb/204Pb ratios of the oxide coatings are related to the lithology of the host rocks; Fe/Mn oxide coatings on pebbles of black shale have higher Fe/Mn values than do the coatings on either sandstone or igneous rocks. The shale host rocks have a more radiogenic signature (e.g. higher 206Pb/ 204Pb) than the sandstone or igneous host rocks. The Pb isotope data from sandstone and igneous hosts can detect concealed mineralized rock on both a regional and local scale, even though there are contributions from: (1) metals from the main-stage molybdenite ore deposit; (2) metals from the phyllic alteration zone which has a more radiogenic Pb isotope signature reflecting hydrothermal leaching of Pb from the Mancos Shale; (3) Pb-rich base metal veins with a highly variable Pb isotope signature; and (4) sedimentary country rocks which have a more radiogenic Pb isotope signature. An investigation of within-stream variation shows that the Pb isotope signature of the molybdenite ore zone is retained in the Fe/Mn oxide coatings and is not camouflaged by contributions from Pb-rich base-metal veins that crop out upstream. In another traverse, the Pb isotope data from Fe/Mn oxide coatings reflect a complex mixing of Pb from the molybdenite ore zone and its hornfels margin, Pb

  11. Geochemical Data for Samples Collected in 2007 Near the Concealed Pebble Porphyry Cu-Au-Mo Deposit, Southwest Alaska

    Science.gov (United States)

    Fey, David L.; Granitto, Matthew; Giles, Stuart A.; Smith, Steven M.; Eppinger, Robert G.; Kelley, Karen D.

    2008-01-01

    In the summer of 2007, the U.S. Geological Survey (USGS) began an exploration geochemical research study over the Pebble porphyry copper-gold-molydenum (Cu-Au-Mo) deposit in southwest Alaska. The Pebble deposit is extremely large and is almost entirely concealed by tundra, glacial deposits, and post-Cretaceous volcanic and volcaniclastic rocks. The deposit is presently being explored by Northern Dynasty Minerals, Ltd., and Anglo-American LLC. The USGS undertakes unbiased, broad-scale mineral resource assessments of government lands to provide Congress and citizens with information on national mineral endowment. Research on known deposits is also done to refine and better constrain methods and deposit models for the mineral resource assessments. The Pebble deposit was chosen for this study because it is concealed by surficial cover rocks, it is relatively undisturbed (except for exploration company drill holes), it is a large mineral system, and it is fairly well constrained at depth by the drill hole geology and geochemistry. The goals of the USGS study are (1) to determine whether the concealed deposit can be detected with surface samples, (2) to better understand the processes of metal migration from the deposit to the surface, and (3) to test and develop methods for assessing mineral resources in similar concealed terrains. This report presents analytical results for geochemical samples collected in 2007 from the Pebble deposit and surrounding environs. The analytical data are presented digitally both as an integrated Microsoft 2003 Access? database and as Microsoft 2003 Excel? files. The Pebble deposit is located in southwestern Alaska on state lands about 30 km (18 mi) northwest of the village of Illiamna and 320 km (200 mi) southwest of Anchorage (fig. 1). Elevations in the Pebble area range from 287 m (940 ft) at Frying Pan Lake just south of the deposit to 1146 m (3760 ft) on Kaskanak Mountain about 5 km (5 mi) to the west. The deposit is in an area of

  12. Hidden from health: structural stigma, sexual orientation concealment, and HIV across 38 countries in the European MSM Internet Survey.

    Science.gov (United States)

    Pachankis, John E; Hatzenbuehler, Mark L; Hickson, Ford; Weatherburn, Peter; Berg, Rigmor C; Marcus, Ulrich; Schmidt, Axel J

    2015-06-19

    Substantial country-level variation exists in prejudiced attitudes towards male homosexuality and in the extent to which countries promote the unequal treatment of MSM through discriminatory laws. The impact and underlying mechanisms of country-level stigma on odds of diagnosed HIV, sexual opportunities, and experience of HIV-prevention services, needs and behaviours have rarely been examined, however. Data come from the European MSM Internet Survey (EMIS), which was administered between June and August 2010 across 38 European countries (N = 174 209). Country-level stigma was assessed using a combination of national laws and policies affecting sexual minorities and a measure of attitudes held by the citizens of each country. We also assessed concealment, HIV status, number of past 12-month male sex partners, and eight HIV-preventive services, knowledge, and behavioural outcomes. MSM living in countries with higher levels of stigma had reduced odds of diagnosed HIV and fewer partners but higher odds of sexual risk behaviour, unmet prevention needs, not using testing services, and not discussing their sexuality in testing services. Sexual orientation concealment mediated associations between country-level stigma and these outcomes. Country-level stigma may have historically limited HIV transmission opportunities among MSM, but by restricting MSM's public visibility, it also reduces MSM's ability to access HIV-preventive services, knowledge and precautionary behaviours. These findings suggest that MSM in European countries with high levels of stigma are vulnerable to HIV infection. Although they have less opportunity to identify and contact other MSM, this might change with emerging technologies.

  13. Concealing a shiny facial skin appearance by an Aerogel-based formula. In vitro and in vivo studies.

    Science.gov (United States)

    Cassin, Guillaume; Diridollou, Stephane; Flament, Frederic; Adam, Anne-Sophie; Pierre, Patricia; Colomb, Loic; Morancais, Jean-Luc; Qiu, Huixia

    2017-10-10

    To explore, in vitro and in vivo, the potential interest of an Aerogel-based formula, in concealing a naturally shiny facial skin. In vitro, various formulae and ingredients were applied as a thin film onto contrast plates and studied through measuring the shine induced following pump spraying of a mixture of oleic acid and mineral water as a sebum/sweat mix model. In such a test, an Aerogel ingredient led to very positive results. In vivo, two different formulae with various concentrations of Aerogel were randomly tested on half side of the face vs. bare side of Chinese women, under some provocative environmental conditions, known to enhance facial shine. These conditions comprised a normal activity under a hot and highly humid summer time followed -or not- by a hamam session. Both studies included comparative evaluations using a half-face procedure (treated/untreated or vehicle. In the first case, evaluations were quantitatively carried out whereas the second one was based on a quantitative self-evaluations from standardized full-face photographs RESULTS: In vitro, the tested Aerogel, incorporated at 1% or 2% concentration in a common O/W cosmetic emulsion, shows an immediate light scattering effect, thereby masking shine. Such effect appears of much higher amplitude than that of two other tested particulate ingredients (Talc and Perlite). A noticeable remanence of anti-shine effect was confirmed in vivo in extreme conditions. The latter was self-perceived by all participants in the second study. This results is likely related to the super hydrophobic behavior of the Aerogel. As cosmetic ingredient, this new Aerogel appears as a highly promising ingredient for concealing the facial skin shine, a source of complaint from many consumers living in hot and humid regions. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.

  14. Migrant workers’ occupation and healthcare-seeking preferences for TB-suspicious symptoms and other health problems: a survey among immigrant workers in Songkhla province, southern Thailand

    Directory of Open Access Journals (Sweden)

    Naing Tinzar

    2012-10-01

    Full Text Available Abstract Background Much of the unskilled and semi-skilled workforce in Thailand comprises migrant workers from neighbouring countries. While, in principle, healthcare facilities in the host country are open to those migrants registered with the Ministry of Labour, their actual healthcare-seeking preferences and practices, as well as those of unregistered migrants, are not well documented. This study aimed to describe the patterns of healthcare-seeking behaviours of immigrant workers in Thailand, emphasizing healthcare practices for TB-suspicious symptoms, and to identify the role of occupation and other factors influencing these behaviours. Methods A survey was conducted among 614 immigrant factory workers (FW, rubber tappers (RT and construction workers (CW, in which information was sought on socio-demography, history of illness and related healthcare-seeking behaviour. Mixed effects logistic regression modeling was employed in data analysis. Results Among all three occupations, self-medication was the most common way of dealing with illnesses, including the development of TB-suspicious symptoms, for which inappropriate drugs were used. Only for GI symptoms and obstetric problems did migrant workers commonly seek healthcare at modern healthcare facilities. For GI illness, FW preferred to attend the in-factory clinic and RT a private facility over government facilities owing to the quicker service and greater convenience. For RT, who were generally wealthier, the higher cost of private treatment was not a deterrent. CW preferentially chose a government healthcare facility for their GI problems. For obstetric problems, including delivery, government facilities were utilized by RT and CW, but most FW returned to their home country. After adjusting for confounding, having legal status in the country was associated with overall greater use of government facilities and being female and being married with use of both types of modern healthcare

  15. Attitudes toward Face-to-Face and Online Counseling: Roles of Self-Concealment, Openness to Experience, Loss of Face, Stigma, and Disclosure Expectations among Korean College Students

    Science.gov (United States)

    Bathje, Geoff J.; Kim, Eunha; Rau, Ellen; Bassiouny, Muhammad Adam; Kim, Taehoon

    2014-01-01

    This study examined attitudes toward face-to-face (f2f) and online counseling among 228 Korean college students. In addition, it tested a hypothesized model proposing that general propensities (i.e., self-concealment, openness to experience, and loss of face) would influence counseling-specific expectations (i.e., self-stigma and disclosure…

  16. A comment on Farwell : brain fingerprinting: a comprehensive tutorial review of detection of concealed information with event-related brain potentials

    NARCIS (Netherlands)

    Meijer, E.H.; Ben-Shakhar, G.; Verschuere, B.; Donchin, E.

    2013-01-01

    In a recent issue of Cognitive Neurodynamics Farwell (Cogn Neurodyn 6:115-154, 2012) published a comprehensive tutorial review of the use of Event Related Brain Potentials (ERP) in the detection of concealed information. Farwell’s review covered much of his own work employing his ‘‘brain

  17. Prospective effects of social support on internalized homonegativity and sexual identity concealment among middle-aged and older gay men: a longitudinal cohort study.

    Science.gov (United States)

    Lyons, Anthony; Pepping, Christopher A

    2017-09-01

    Middle-aged and older gay men experience higher rates of depression and anxiety compared to their heterosexual counterparts, with internalized homonegativity and sexual identity concealment known to be major stress-related contributors. This study examined the prospective effect of different types and sources of social support on internalized homonegativity and sexual identity concealment experienced among middle-aged and older gay men. A longitudinal survey involving two waves of data collection separated by 12 months was conducted among a cohort of 186 gay-identified men aged 40 years and older. Two types of social support were found to be important. Greater baseline tangible or practical support independently predicted lower internalized homonegativity at 12-month follow-up, while greater baseline emotional or psychological support independently predicted a lower tendency toward sexual identity concealment at 12-month follow-up. Greater baseline support from community or government agencies, such as health services and support organizations, predicted higher internalized homonegativity at 12-month follow-up. These findings suggest that tangible and emotional support may be beneficial in reducing internalized homonegativity and sexual identity concealment among middle-aged and older gay men. Ensuring that services provide environments that do not compound the stressful impact of stigma also appears to be important.

  18. Mental Health Stigma and Self-Concealment as Predictors of Help-Seeking Attitudes among Latina/o College Students in the United States

    Science.gov (United States)

    Mendoza, Hadrian; Masuda, Akihiko; Swartout, Kevin M.

    2015-01-01

    The study examined whether mental health stigma and self-concealment are uniquely related to various dimensions of attitudes toward seeking professional psychological services (i.e., help-seeking attitudes) in Latina/o college students. Data from 129 Latina/o undergraduates (76% female) were used in the analysis. Results revealed that mental…

  19. Mental Health Stigma, Self-Concealment, and Help-Seeking Attitudes among Asian American and European American College Students with No Help-Seeking Experience

    Science.gov (United States)

    Masuda, Akihiko; Boone, Matthew S.

    2011-01-01

    The present study examined whether mental health stigma (i.e., negative attitudes toward people with a psychological disorder) and self-concealment are unique predictors of help-seeking attitudes in Asian American and European American college students with no history of seeking professional psychological services. The Asian American group had…

  20. Prevention of firearm-related injuries with restrictive licensing and concealed carry laws: An Eastern Association for the Surgery of Trauma systematic review.

    Science.gov (United States)

    Crandall, Marie; Eastman, Alexander; Violano, Pina; Greene, Wendy; Allen, Steven; Block, Ernest; Christmas, Ashley Britton; Dennis, Andrew; Duncan, Thomas; Foster, Shannon; Goldberg, Stephanie; Hirsh, Michael; Joseph, D'Andrea; Lommel, Karen; Pappas, Peter; Shillinglaw, William

    2016-11-01

    In the past decade, more than 300,000 people in the United States have died from firearm injuries. Our goal was to assess the effectiveness of two particular prevention strategies, restrictive licensing of firearms and concealed carry laws, on firearm-related injuries in the US Restrictive Licensing was defined to include denials of ownership for various offenses, such as performing background checks for domestic violence and felony convictions. Concealed carry laws allow licensed individuals to carry concealed weapons. A comprehensive review of the literature was performed. We used Grading of Recommendations Assessment, Development, and Evaluation methodology to assess the breadth and quality of the data specific to our Population, Intervention, Comparator, Outcomes (PICO) questions. A total of 4673 studies were initially identified, then seven more added after two subsequent, additional literature reviews. Of these, 3,623 remained after removing duplicates; 225 case reports, case series, and reviews were excluded, and 3,379 studies were removed because they did not focus on prevention or did not address our comparators of interest. This left a total of 14 studies which merited inclusion for PICO 1 and 13 studies which merited inclusion for PICO 2. PICO 1: We recommend the use of restrictive licensing to reduce firearm-related injuries.PICO 2: We recommend against the use of concealed carry laws to reduce firearm-related injuries.This committee found an association between more restrictive licensing and lower firearm injury rates. All 14 studies were population-based, longitudinal, used modeling to control for covariates, and 11 of the 14 were multi-state. Twelve of the studies reported reductions in firearm injuries, from 7% to 40%. We found no consistent effect of concealed carry laws. Of note, the varied quality of the available data demonstrates a significant information gap, and this committee recommends that we as a society foster a nurturing and encouraging

  1. A comparative analysis of core needle biopsy and fine-needle aspiration cytology in the evaluation of palpable and mammographically detected suspicious breast lesions.

    Science.gov (United States)

    Garg, Shailja; Mohan, Harsh; Bal, Amanjit; Attri, A K; Kochhar, Suman

    2007-11-01

    The present study was undertaken to compare the efficacy of needle core biopsy (NCB) of the breast with fine-needle aspiration cytology (FNAC) in breast lesions (palpable and non-palpable) in the Indian set-up, along with the assessment of tumor grading with both the techniques. Fifty patients with suspicious breast lesions were subjected to simultaneous FNAC and ultrasound-guided NCB following an initial mammographic evaluation. Cases were categorized into benign, benign with atypia, suspicious and malignant groups. In cases of infiltrating duct carcinomas, grading was performed on cytological smears as well as on NCB specimens. Both the techniques were compared, and findings were correlated with radiological and excision findings. Out of 50 cases, 18 were found to be benign and 32 malignant on final pathological diagnosis. Maximum number of patients with benign diagnosis was in the fourth decade (42.11%) and malignant diagnosis in the fourth as well as fifth decade (35.48% each). Sensitivity and specificity of mammography for the diagnosis of malignancy was 84.37% and 83.33%, respectively. Sensitivity and specificity of FNAC for malignant diagnosis was 78.15% and 94.44%, respectively, and of NCB was 96.5% and 100%, respectively. But NCB had a slightly higher specimen inadequacy rate (8%). NCB improved diagnostic categorization over FNAC by 18%. Tumor grading in cases of IDC showed high concordance rate between NCB and subsequent excision biopsy (94.44%) but low concordance rate between NCB and FNAC (59.1%). NCB is superior to FNAC in the diagnosis of breast lesions in terms of sensitivity, specificity, correct histological categorization of the lesions as well as tumor grading. (c) 2007 Wiley-Liss, Inc.

  2. The clinical impact of 18F-FDG PET/CT to detect suspicious recurred thyroid cancer with differentiated type before high dose radioactive iodine therapy

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Bom Sahn; Kang, Won Jun; Lee, Dong Soo; Chang, June Key; Lee, Myung Chul [Seoul National Univ. College of Medicine, Seoul (Korea, Republic of)

    2007-07-01

    The purpose of this study was to evaluate the usefulness of 18F-FDG PET/CT (PET/CT) in suspicious recurred thyroid cancer before high dose of radioactive iodine therapy (RAI therapy). PET/CT was performed after injecting 370-555MBq of 18F-FDG in 23 patients prior to RAI therapy. RAI therapy (212 58 mCi) was performed, and thyroglobulin (Tg) and anti-thyroglobulin antibody (anti-TG ab) during TSH stimulation was measured. The interval between PET/CT and RAI scan was 41 50 day. 15 patients were confirmed as recurred thyroid cancer (pathologic diagnosis: 10), whereas 8 patients were diagnosed as remission status (pathologic diagnosis: 3). PET/CT had 80.0% (12/15) of sensitivity and 75.0% (6/8) of specificity. TG and RAI scan had 80.0% (12/15) and 75% (6/8), 80% (12/15) and 37.5% (3/8) of sensitivity and specificity, respectively. Combination of PET/CT and TG increased the sensitivity (93.3%; 14/15) and specificity (87.5%; 7/8). There was 25 suspicious lesions (19 malignant lesion, 6 benign lesion) in lesion-based study. PET/CT had 84.5% and 83.3% of sensitivity and specificity but RAI scan had 89.5% and 16.7%, respectively. Five false positive sites of RAI scan were diagnosed as fungus ball of lung, calcified mediastinal LN, and post op induced change such as suture granuloma. PET/CT revealed 80% (3/5) of them as benign lesions. Even though PET/CT had similar sensitivity with high dose of RAI scan, it had a better discriminating nature to detect benign lesion. We could diminish the unnecessary high dose of RAI therapy using FDG PET/CT.

  3. Analysis of stereotactic biopsies performed on suspicious calcifications identified within 24 months after completion of breast conserving surgery and radiation therapy for early breast cancer: Can biopsy be obviated?

    Science.gov (United States)

    Candelaria, Rosalind P; Hansakul, Palita; Thompson, Alastair M; Le-Petross, Huong; Valero, Vicente; Bassett, Roland; Huang, Monica L; Santiago, Lumarie; Adrada, Beatriz E

    2017-07-01

    To determine the cancer yield of stereotactic biopsy of suspicious calcifications identified within 24 months after breast conservation therapy (BCT). Retrospective review of stereotactic biopsies performed during 2009-2013 for suspicious calcifications in the ipsilateral breast of patients who completed BCT. 94/2773 (3.4%) had stereotactic biopsies for suspicious calcifications in the ipsilateral breast; 7/94 (7.4%) had DCIS (6) or invasive (1) cancer; 5/7 occurred in the same breast quadrant as the primary. All 7 originally had negative surgical margins (≥2 mm); 6 received whole breast irradiation, and 2 received adjuvant chemotherapy + endocrine therapy. Median time to detection was 11 months (range, 6-20 months). There was a strong association between calcification morphology (particularly pleomorphic) and likelihood of malignancy (p = 0.008). Stereotactic biopsy of calcifications identified within 24 months post-BCT has a 7% cancer yield. Tissue biopsy should be performed rather than imaging followup alone when breast calcifications have suspicious morphology. Copyright © 2017 Elsevier Inc. All rights reserved.

  4. The impact of prior knowledge from participant instructions in a mock crime P300 Concealed Information Test.

    Science.gov (United States)

    Winograd, Michael R; Rosenfeld, J Peter

    2014-12-01

    In P300-Concealed Information Tests used with mock crime scenarios, the amount of detail revealed to a participant prior to the commission of the mock crime can have a serious impact on a study's validity. We predicted that exposure to crime details through instructions would bias detection rates toward enhanced sensitivity. In a 2 × 2 factorial design, participants were either informed (through mock crime instructions) or naïve as to the identity of a to-be-stolen item, and then either committed (guilty) or did not commit (innocent) the crime. Results showed that prior knowledge of the stolen item was sufficient to cause 69% of innocent-informed participants to be incorrectly classified as guilty. Further, we found a trend toward enhanced detection rate for guilty-informed participants over guilty-naïve participants. Results suggest that revealing details to participants through instructions biases detection rates in the P300-CIT toward enhanced sensitivity. Copyright © 2014 Elsevier B.V. All rights reserved.

  5. Use of Near-Infrared Spectroscopy and Chemometrics for the Nondestructive Identification of Concealed Damage in Raw Almonds (Prunus dulcis).

    Science.gov (United States)

    Rogel-Castillo, Cristian; Boulton, Roger; Opastpongkarn, Arunwong; Huang, Guangwei; Mitchell, Alyson E

    2016-07-27

    Concealed damage (CD) is defined as a brown discoloration of the kernel interior (nutmeat) that appears only after moderate to high heat treatment (e.g., blanching, drying, roasting, etc.). Raw almonds with CD have no visible defects before heat treatment. Currently, there are no screening methods available for detecting CD in raw almonds. Herein, the feasibility of using near-infrared (NIR) spectroscopy between 1125 and 2153 nm for the detection of CD in almonds is demonstrated. Almond kernels with CD have less NIR absorbance in the region related with oil, protein, and carbohydrates. With the use of partial least squares discriminant analysis (PLS-DA) and selection of specific wavelengths, three classification models were developed. The calibration models have false-positive and false-negative error rates ranging between 12.4 and 16.1% and between 10.6 and 17.2%, respectively. The percent error rates ranged between 8.2 and 9.2%. Second-derivative preprocessing of the selected wavelength resulted in the most robust predictive model.

  6. Inferior detection of information from collaborative versus individual crimes based on a P300 Concealed Information Test.

    Science.gov (United States)

    Lu, Yang; Rosenfeld, J Peter; Deng, Xiaohong; Zhang, Erhu; Zheng, Huihui; Yan, Gejun; Ouyang, Dan; Hayat, Saba Z

    2017-10-30

    The present study used a P300-based Concealed Information Test (CIT) to detect individual and collaborative crimes and to explore whether or not the P300 index is effective in identifying collaborative crime members. Participants were divided into two groups to either steal a ring alone (individual group) or collaboratively with another companion participant (collaborative group) before taking the Complex Trial Protocol test that is regarded as an accurate version of the P300-based CIT. The ERP results revealed that both groups showed significantly larger P300s to probe (the ring) than to all irrelevant stimuli (other jewelery), but the P300 amplitude difference of probe stimulus versus irrelevant stimuli in the collaborative group was significantly less than that in the individual group. For the individual diagnosis, using P300 index, the detection rate was significantly inferior for collaborative crime than individual crime, probably related to weakness of collaborative encoding. The ROC curve comparisons showed the individual guilty was effectively discriminated from the simulated-innocent (AUC = .84) and from the collaborative guilty (AUC = .83), but the collaborative guilty was not discriminable from the simulated-innocent (AUC = .66). These findings suggest that collaborative encoding of crime-related information impacts the efficiency of the P300 index, and that the P300-based CIT is not applicable when used to identify collaborative crime perpetrators. © 2017 Society for Psychophysiological Research.

  7. The Knowledge Concealed in Users’ Narratives, Valuing Clients’ Experiences as Coherent Knowledge in Their Own Right

    Directory of Open Access Journals (Sweden)

    Ragnfrid Kogstad

    2014-01-01

    Full Text Available Objective. As the history of psychiatry has been written, users have told their stories and often presented pictures incompatible with the professional or official versions. We ask if such a gap still exists and what the ethical as well as epistemological implications may be. Study Design. The design is based on a hermeneutic-phenomenological approach, with a qualitative content analysis of the narratives. Data Sources. The paper draws on user narratives written after the year 2000, describing positive and negative experiences with the mental health services. Extraction Methods. Among 972 users answering a questionnaire, 492 also answered the open questions and wrote one or two stories. We received 715 stories. 610 contained enough information to be included in this narrative analysis. Principal Findings. The stories are coherent, containing traditional narrative plots, but reports about miscommunication, rejection, lack of responsiveness, and humiliation are numerous. Conclusions. The picture drawn from this material has ethical as well as epistemological implications and motivates reflections upon theoretical and practical consequences when users’ experiences do not influence professional knowledge to a larger degree.

  8. Sound objects – Auditory objects – Musical objects

    DEFF Research Database (Denmark)

    Hjortkjær, Jens

    2015-01-01

    ’. In this paper, I review recent neurocognitive research suggesting that the auditory system is sensitive to structural information about real-world objects. Instead of focusing solely on perceptual sound features as determinants of auditory objects, I propose that real-world object properties are inherent......The auditory system transforms patterns of sound energy into perceptual objects but the precise definition of an ‘auditory object’ is much debated. In the context of music listening, Pierre Schaeffer argued that ‘sound objects’ are the fundamental perceptual units in ‘musical objects...

  9. Sound objects – Auditory objects – Musical objects

    DEFF Research Database (Denmark)

    Hjortkjær, Jens

    2016-01-01

    ’. In this paper, I review recent neurocognitive research suggesting that the auditory system is sensitive to structural information about real-world objects. Instead of focusing solely on perceptual sound features as determinants of auditory objects, I propose that real-world object properties are inherent......The auditory system transforms patterns of sound energy into perceptual objects but the precise definition of an ‘auditory object’ is much debated. In the context of music listening, Pierre Schaeffer argued that ‘sound objects’ are the fundamental perceptual units in ‘musical objects...

  10. Agreement Among RTOG Sarcoma Radiation Oncologists in Contouring Suspicious Peritumoral Edema for Preoperative Radiation Therapy of Soft Tissue Sarcoma of the Extremity

    Energy Technology Data Exchange (ETDEWEB)

    Bahig, Houda [Department of Radiation Oncology, Centre Hospitalier de l' Université de Montréal, Montreal, QC (Canada); Roberge, David, E-mail: david.roberge.chum@ssss.gouv.qc.ca [Department of Radiation Oncology, Centre Hospitalier de l' Université de Montréal, Montreal, QC (Canada); Bosch, Walter [Department of Radiation Oncology, Washington University, St Louis, Missouri (United States); Levin, William [Department of Radiation Oncology, University of Pennsylvania, Philadelphia, Pennsylvania (United States); Petersen, Ivy; Haddock, Michael [Department of Radiation Oncology, Mayo Clinic, Rochester, Minnesota (United States); Freeman, Carolyn [Division of Radiation Oncology, McGill University Health Centre, Montreal, QC (Canada); DeLaney, Thomas F. [Department of Radiation Oncology, Massachusetts General Hospital, Boston, Massachusetts (United States); Abrams, Ross A. [Department of Radiation Oncology, Rush University Medical Center, Chicago, Illinois (United States); Indelicato, Danny J. [Department of Radiation Oncology, University of Florida Medical Center, Jacksonville, Florida (United States); Baldini, Elizabeth H. [Department of Radiation Oncology, Brigham and Women' s Hospital and Dana-Farber Cancer Institute, Boston, Massachusetts (United States); Hitchcock, Ying [Department of Radiation Oncology, University of Utah Medical Center, Salt Lake City, Utah (United States); Kirsch, David G. [Department of Radiation Oncology, Duke University Medical Center, Durham, North Carolina (United States); Kozak, Kevin R. [Department of Human Oncology, University of Wisconsin School of Medicine and Public Health, Madison, Wisconsin (United States); Wolfson, Aaron [Department of Radiation Oncology, University of Miami Miller School of Medicine, Miami, Florida (United States); and others

    2013-06-01

    Purpose: Peritumoral edema may harbor sarcoma cells. The extent of suspicious edema (SE) included in the treatment volume is subject to clinical judgment, balancing the risk of missing tumor cells with excess toxicity. Our goal was to determine variability in SE delineation by sarcoma radiation oncologists (RO). Methods and Materials: Twelve expert ROs were provided with T1 gadolinium and T2-weighted MR images of 10 patients with high-grade extremity soft-tissue sarcoma. Gross tumor volume, clinical target volume (CTV)3cm (3 cm longitudinal and 1.5 cm radial margin), and CTV2cm (2 cm longitudinal and 1 cm radial margin) were contoured by a single observer. Suspicious peritumoral edema, defined as abnormal signal on T2 images, was independently delineated by all 12 ROs. Contouring agreement was analyzed using the simultaneous truth and performance level estimation (STAPLE) algorithm and kappa statistics. Results: The mean volumes of GTV, CTV2cm, and CTV3cm were, respectively, 130 cm{sup 3} (7-413 cm{sup 3}), 280 cm{sup 3} and 360 cm{sup 3}. The mean consensus volume computed using the STAPLE algorithm at 95% confidence interval was 188 cm{sup 3} (24-565 cm{sup 3}) with a substantial overall agreement corrected for chance (mean kappa = 0.71; range: 0.32-0.87). The minimum, maximum, and mean volume of SE (excluding the GTV) were 4, 182, and 58 cm{sup 3} (representing a median of 29% of the GTV volume). The median volume of SE not included in the CTV2cm and in the CTV3cm was 5 and 0.3 cm{sup 3}, respectively. There were 3 large tumors with >30 cm{sup 3} of SE not included in the CTV3cm volume. Conclusion: Despite the fact that SE would empirically seem to be a more subjective volume, a substantial or near-perfect interobserver agreement was observed in SE delineation in most cases with high-grade soft-tissue sarcomas of the extremity. A median of 97% of the consensus SE is within the CTV2cm (99.8% within the CTV3cm). In a minority of cases, however, significant

  11. The "good cop, bad cop" effect in the RT-based concealed information test: exploring the effect of emotional expressions displayed by a virtual investigator.

    Directory of Open Access Journals (Sweden)

    Mihai Varga

    Full Text Available Concealing the possession of relevant information represents a complex cognitive process, shaped by contextual demands and individual differences in cognitive and socio-emotional functioning. The Reaction Time-based Concealed Information Test (RT-CIT is used to detect concealed knowledge based on the difference in RTs between denying recognition of critical (probes and newly encountered (irrelevant information. Several research questions were addressed in this scenario implemented after a mock crime. First, we were interested whether the introduction of a social stimulus (facial identity simulating a virtual investigator would facilitate the process of deception detection. Next, we explored whether his emotional displays (friendly, hostile or neutral would have a differential impact on speed of responses to probe versus irrelevant items. We also compared the impact of introducing similar stimuli in a working memory (WM updating context without requirements to conceal information. Finally, we explored the association between deceptive behavior and individual differences in WM updating proficiency or in internalizing problems (state / trait anxiety and depression. Results indicated that the mere presence of a neutral virtual investigator slowed down participants' responses, but not the appended lie-specific time (difference between probes and irrelevants. Emotional expression was shown to differentially affect speed of responses to critical items, with positive displays from the virtual examiner enhancing lie-specific time, compared to negative facial expressions, which had an opposite impact. This valence-specific effect was not visible in the WM updating context. Higher levels of trait / state anxiety were related to faster responses to probes in the negative condition (hostile facial expression of the RT-CIT. These preliminary findings further emphasize the need to take into account motivational and emotional factors when considering the

  12. The "good cop, bad cop" effect in the RT-based concealed information test: exploring the effect of emotional expressions displayed by a virtual investigator.

    Science.gov (United States)

    Varga, Mihai; Visu-Petra, George; Miclea, Mircea; Visu-Petra, Laura

    2015-01-01

    Concealing the possession of relevant information represents a complex cognitive process, shaped by contextual demands and individual differences in cognitive and socio-emotional functioning. The Reaction Time-based Concealed Information Test (RT-CIT) is used to detect concealed knowledge based on the difference in RTs between denying recognition of critical (probes) and newly encountered (irrelevant) information. Several research questions were addressed in this scenario implemented after a mock crime. First, we were interested whether the introduction of a social stimulus (facial identity) simulating a virtual investigator would facilitate the process of deception detection. Next, we explored whether his emotional displays (friendly, hostile or neutral) would have a differential impact on speed of responses to probe versus irrelevant items. We also compared the impact of introducing similar stimuli in a working memory (WM) updating context without requirements to conceal information. Finally, we explored the association between deceptive behavior and individual differences in WM updating proficiency or in internalizing problems (state / trait anxiety and depression). Results indicated that the mere presence of a neutral virtual investigator slowed down participants' responses, but not the appended lie-specific time (difference between probes and irrelevants). Emotional expression was shown to differentially affect speed of responses to critical items, with positive displays from the virtual examiner enhancing lie-specific time, compared to negative facial expressions, which had an opposite impact. This valence-specific effect was not visible in the WM updating context. Higher levels of trait / state anxiety were related to faster responses to probes in the negative condition (hostile facial expression) of the RT-CIT. These preliminary findings further emphasize the need to take into account motivational and emotional factors when considering the transfer of

  13. Enhanced MMW and SMMW/THz imaging system performance prediction and analysis tool for concealed weapon detection and pilotage obstacle avoidance.

    Science.gov (United States)

    Murrill, Steven R; Franck, Charmaine C; Jacobs, Eddie L; Petkie, Douglas T; De Lucia, Frank C

    2017-01-20

    The U.S. Army Research Laboratory has continued to develop and enhance a millimeter-wave (MMW) and submillimeter-wave (SMMW)/terahertz (THz)-band imaging system performance prediction and analysis tool for both the detection and identification of concealed weaponry and for pilotage obstacle avoidance. The details of the MATLAB-based model that accounts for the effects of all critical sensor and display components, for the effects of atmospheric attenuation, concealment material attenuation, active illumination, target and background orientation, target and background thermal emission, and various imaging system architectures have been reported on in 2005, 2007, and 2011. This paper provides a comprehensive review of a newly enhanced MMW and SMMW/THz imaging system analysis and design tool that now includes an improved noise submodel for more accurate and reliable performance predictions, the capability to account for postcapture image contrast enhancement, and the capability to account for concealment material backscatter with active-illumination-based systems. Present plans for additional expansion of the model's predictive capabilities are also outlined.

  14. Quasi-objects, Cult Objects and Fashion Objects

    DEFF Research Database (Denmark)

    Andersen, Bjørn Schiermer

    2011-01-01

    This article attempts to rehabilitate the concept of fetishism and to contribute to the debate on the social role of objects as well as to fashion theory. Extrapolating from Michel Serres’ theory of the quasi-objects, I distinguish two phenomenologies possessing almost opposite characteristics....... These two phenomenologies are, so I argue, essential to quasi-object theory, yet largely ignored by Serres’ sociological interpreters. They correspond with the two different theories of fetishism found in Marx and Durkheim, respectively. In the second half of the article, I introduce the fashion object...... as a unique opportunity for studying the interchange between these two forms of fetishism and their respective phenomenologies. Finally, returning to Serres, I briefly consider the theoretical consequences of introducing the fashion object as a quasi-object....

  15. Comprehensive Laboratory Evaluation of a Highly Specific Lateral Flow Assay for the Presumptive Identification of Bacillus anthracis Spores in Suspicious White Powders and Environmental Samples.

    Science.gov (United States)

    Ramage, Jason G; Prentice, Kristin W; DePalma, Lindsay; Venkateswaran, Kodumudi S; Chivukula, Sruti; Chapman, Carol; Bell, Melissa; Datta, Shomik; Singh, Ajay; Hoffmaster, Alex; Sarwar, Jawad; Parameswaran, Nishanth; Joshi, Mrinmayi; Thirunavkkarasu, Nagarajan; Krishnan, Viswanathan; Morse, Stephen; Avila, Julie R; Sharma, Shashi; Estacio, Peter L; Stanker, Larry; Hodge, David R; Pillai, Segaran P

    2016-01-01

    We conducted a comprehensive, multiphase laboratory evaluation of the Anthrax BioThreat Alert(®) test strip, a lateral flow immunoassay (LFA) for the rapid detection of Bacillus anthracis spores. The study, conducted at 2 sites, evaluated this assay for the detection of spores from the Ames and Sterne strains of B. anthracis, as well as those from an additional 22 strains. Phylogenetic near neighbors, environmental background organisms, white powders, and environmental samples were also tested. The Anthrax LFA demonstrated a limit of detection of about 10(6) spores/mL (ca. 1.5 × 10(5) spores/assay). In this study, overall sensitivity of the LFA was 99.3%, and the specificity was 98.6%. The results indicated that the specificity, sensitivity, limit of detection, dynamic range, and repeatability of the assay support its use in the field for the purpose of qualitatively evaluating suspicious white powders and environmental samples for the presumptive presence of B. anthracis spores.

  16. Comprehensive laboratory evaluation of a highly specific lateral flow assay for the presumptive identification of ricin in suspicious white powders and environmental samples.

    Science.gov (United States)

    Hodge, David R; Prentice, Kristin Willner; Ramage, Jason G; Prezioso, Samantha; Gauthier, Cheryl; Swanson, Tanya; Hastings, Rebecca; Basavanna, Uma; Datta, Shomik; Sharma, Shashi K; Garber, Eric A E; Staab, Andrea; Pettit, Denise; Drumgoole, Rahsaan; Swaney, Erin; Estacio, Peter L; Elder, Ian A; Kovacs, Gerald; Morse, Brenda S; Kellogg, Richard B; Stanker, Larry; Morse, Stephen A; Pillai, Segaran P

    2013-12-01

    Ricin, a heterodimeric toxin that is present in the seeds of the Ricinus communis plant, is the biothreat agent most frequently encountered by law enforcement agencies in the United States. Even in untrained hands, the easily obtainable seeds can yield a highly toxic product that has been used in various types of threats, including "white-powder" letters. Although the vast majority of these threats are hoaxes, an impediment to accurate hazard assessments by first responders is the unreliability of rapid detection assays for ricin, such as lateral flow assays (LFAs). One of the complicating factors associated with LFAs is the incorporation of antibodies of poor specificity that cross-react with near-neighbors or with plant lectins that are capable of nonspecifically cross-linking the capture and detector antibodies. Because of the compelling and critical need to promote the interests of public safety and public health, the Department of Homeland Security conducted a comprehensive laboratory evaluation study of a commercial LFA for the rapid detection of ricin. This study was conducted using comprehensive inclusivity and exclusivity panels of ricin and near-neighbor plant materials, along with panels of lectins and "white-powders," to determine the specificity, sensitivity, limits of detection, dynamic range, and repeatability of the assay for the specific intended use of evaluating suspicious white powders and environmental samples in the field.

  17. Comprehensive laboratory evaluation of a specific lateral flow assay for the presumptive identification of abrin in suspicious white powders and environmental samples.

    Science.gov (United States)

    Ramage, Jason G; Prentice, Kristin Willner; Morse, Stephen A; Carter, Andrew J; Datta, Shomik; Drumgoole, Rahsaan; Gargis, Shaw R; Griffin-Thomas, Latoya; Hastings, Rebecca; Masri, Heather P; Reed, Matthew S; Sharma, Shashi K; Singh, Ajay K; Swaney, Erin; Swanson, Tanya; Gauthier, Cheryl; Toney, Denise; Pohl, Jan; Shakamuri, Priyanka; Stuchlik, Olga; Elder, Ian A; Estacio, Peter L; Garber, Eric A E; Hojvat, Sally; Kellogg, Richard B; Kovacs, Gerald; Stanker, Larry; Weigel, Linda; Hodge, David R; Pillai, Segaran P

    2014-01-01

    Abrin is a heterodimeric toxin present in the seeds of the Abrus precatorius plant. The easily obtainable seeds can yield a highly toxic product that can be used in various types of biocrimes and terrorism-related activities, including "white-powder" letters. Although the vast majority of these threats are hoaxes, the lack of rapid and reliable detection assays for abrin, such as lateral flow assays (LFAs), can be an impediment to accurate and rapid hazard assessment. One of the complicating factors associated with LFAs is the use of antibodies of poor affinity and specificity that cross-react with near neighbors or that bind to plant lectins, which are capable of nonspecifically cross-linking the capture and detector antibodies. Because of the critical need to promote public safety and public health, we conducted a comprehensive laboratory evaluation of a commercial LFA for the rapid detection of abrin. This study was conducted using comprehensive inclusivity and exclusivity panels of abrin and near-neighbor plant materials, along with panels of lectins, related proteins, white powders, and environmental background material, to determine the sensitivity, specificity, limit of detection, dynamic range, and repeatability of the assay for the specific intended use of evaluating suspicious white powders and environmental samples for the presumptive presence of abrin.

  18. Prenatal diagnosis of Prader-Willi syndrome and Angelman syndrome for fetuses with suspicious deletion of chromosomal region 15q11-q13.

    Science.gov (United States)

    Chang, Chia-Wei; Hsu, Hui-Kuo; Kao, Chiu-Ching; Huang, Jyun-Yuan; Kuo, Pao-Lin

    2014-04-01

    To identify Prader-Willi syndrome (PWS) and Angelman syndrome (AS) among fetuses with suspicious deletion of the chromosomal region 15q11-q13. In a retrospective study, data were assessed from fetuses missing chromosomal band 15q12 that underwent molecular diagnosis at the National Chen-Kung University Hospital, Tainan, Taiwan, between January 2001 and December 2012. Amniocytes were subjected to molecular testing, including fluorescence in situ hybridization (FISH) analysis, methylation-specific PCR (M-PCR), and methylation-specific multiplex-ligation-dependent probe amplification (MS-MLPA). During the 12-year study period, 26 041 amniocyte samples were analyzed at the study center and 27 (0.1%) were found to have a missing 15q12 band. A further 16 samples with a missing 15q12 band were received from other cytogenetic laboratories; as a result, 43 amniocyte samples lacking chromosomal band 15q12 underwent further molecular testing. Among these samples, 3 fetuses (7.0%) were found to have PWS (n=1) or AS (n=2). A minority of cases with missing 15q12 had deletion of the PWS/AS critical region. This finding draws attention to the subtle structural rearrangements that occur on 15q11-q13 and provides useful information for prenatal diagnosis of PWS and AS. Copyright © 2013 International Federation of Gynecology and Obstetrics. Published by Elsevier Ireland Ltd. All rights reserved.

  19. Jumping to Conclusions Is Associated with Paranoia but Not General Suspiciousness: A Comparison of Two Versions of the Probabilistic Reasoning Paradigm

    Directory of Open Access Journals (Sweden)

    Steffen Moritz

    2012-01-01

    Full Text Available Theoretical models ascribe jumping to conclusions (JTCs a prominent role in the pathogenesis of paranoia. While many earlier studies corroborated this account, some newer investigations have found no or only small associations of the JTC bias with paranoid symptoms. The present study examined whether these inconsistencies in part reflect methodological differences across studies. The study was built upon the psychometric high-risk paradigm. A total of 1899 subjects from the general population took part in an online survey and were administered the Paranoia Checklist as well as one of two different variants of the probabilistic reasoning task: one variant with a traditional instruction (a and one novel variant that combines probability estimates with decision judgments (b. Factor analysis of the Paranoia Checklist yielded an unspecific suspiciousness factor and a psychotic paranoia factor. The latter was significantly associated with scores indicating hasty decision making. Subjects scoring two standard deviations above the mean of the Paranoia Checklist showed an abnormal data-gathering style relative to subjects with normal scores. Findings suggest that the so-called decision threshold parameter is more sensitive than the conventional JTC index. For future research the specific contents of paranoid beliefs deserve more consideration in the investigation of decision making in schizophrenia as JTC seems to be associated with core psychosis-prone features of paranoia only.

  20. AV nodal reentrant tachycardia or AV reentrant tachycardia using a concealed bypass tract-related adverse events.

    Science.gov (United States)

    Brembilla-Perrot, Béatrice; Bénichou, Maxime; Brembilla, Alice; Bozec, Erwan; Dorlet, Sarah; Sellal, Jean Marc; Olivier, Arnaud; Manenti, Vladimir; Villemin, Thibaut; Beurrier, Daniel; Moulin-Zinsch, Anne; De Chillou, Christian; Girerd, Nicolas

    2015-11-15

    To jointly study paroxysmal supraventricular tachycardia (SVT)-related adverse events (AE) and ablation-related complications, with specific emphasis on the predictors of SVT-related AE as well as their significance by investigating their association with long-term mortality. 1770 patients were included, aged 6 to 97, with either atrioventricular nodal reentrant tachycardia (AVNRT) or orthodromic atrioventricular reciprocal tachycardia (AVRT) mediated by concealed accessory pathway, consecutively referred for SVT work-up in a tertiary care center. SVT-related AE were identified in 339 patients (19%). Major AEs were identified in 23 patients (1%; 15 cardiac arrests or ventricular arrhythmias requiring cardioversion and 8 hemodynamic collapses). Other AE were related to syncope (n=236), acute coronary syndrome (n=57) and heart failure/rhythmic cardiomyopathy (n=21). In multivariable analysis, higher age, heart disease and requirement of isoproterenol to induce SVT were independently associated with a higher risk for SVT-related AE. During follow-up (2.8±3.0years), death occurred more frequently in patients with SVT-related AE, especially in patients with major adverse events (pSVT-related AE remained significantly associated with occurrence of death (HR=6.72, IC=(2.58-17.52), pSVT-related AE in the whole population referred for SVT were more frequent than immediate major ablation complications in patients undergoing SVT ablation (5/1186 vs. 23/1770, p=0.02). SVT-related AE are independent predictors of mortality and are more frequent than immediate major ablation complications in patients undergoing SVT ablation. The present findings support systematically performing SVT ablation in patients with SVT-related adverse events. Copyright © 2015. Published by Elsevier Ireland Ltd.

  1. Examining Effects of Anticipated Stigma, Centrality, Salience, Internalization, and Outness on Psychological Distress for People with Concealable Stigmatized Identities

    Science.gov (United States)

    Quinn, Diane M.; Williams, Michelle K.; Quintana, Francisco; Gaskins, Jennifer L.; Overstreet, Nicole M.; Pishori, Alefiyah; Earnshaw, Valerie A.; Perez, Giselle; Chaudoir, Stephenie R.

    2014-01-01

    Understanding how stigmatized identities contribute to increased rates of depression and anxiety is critical to stigma reduction and mental health treatment. There has been little research testing multiple aspects of stigmatized identities simultaneously. In the current study, we collected data from a diverse, urban, adult community sample of people with a concealed stigmatized identity (CSI). We targeted 5 specific CSIs – mental illness, substance abuse, experience of domestic violence, experience of sexual assault, and experience of childhood abuse – that have been shown to put people at risk for increased psychological distress. We collected measures of the anticipation of being devalued by others if the identity became known (anticipated stigma), the level of defining oneself by the stigmatized identity (centrality), the frequency of thinking about the identity (salience), the extent of agreement with negative stereotypes about the identity (internalized stigma), and extent to which other people currently know about the identity (outness). Results showed that greater anticipated stigma, greater identity salience, and lower levels of outness each uniquely and significantly predicted variance in increased psychological distress (a composite of depression and anxiety). In examining communalities and differences across the five identities, we found that mean levels of the stigma variables differed across the identities, with people with substance abuse and mental illness reporting greater anticipated and internalized stigma. However, the prediction pattern of the variables for psychological distress was similar across the substance abuse, mental illness, domestic violence, and childhood abuse identities (but not sexual assault). Understanding which components of stigmatized identities predict distress can lead to more effective treatment for people experiencing psychological distress. PMID:24817189

  2. Examining effects of anticipated stigma, centrality, salience, internalization, and outness on psychological distress for people with concealable stigmatized identities.

    Directory of Open Access Journals (Sweden)

    Diane M Quinn

    Full Text Available Understanding how stigmatized identities contribute to increased rates of depression and anxiety is critical to stigma reduction and mental health treatment. There has been little research testing multiple aspects of stigmatized identities simultaneously. In the current study, we collected data from a diverse, urban, adult community sample of people with a concealed stigmatized identity (CSI. We targeted 5 specific CSIs--mental illness, substance abuse, experience of domestic violence, experience of sexual assault, and experience of childhood abuse--that have been shown to put people at risk for increased psychological distress. We collected measures of the anticipation of being devalued by others if the identity became known (anticipated stigma, the level of defining oneself by the stigmatized identity (centrality, the frequency of thinking about the identity (salience, the extent of agreement with negative stereotypes about the identity (internalized stigma, and extent to which other people currently know about the identity (outness. Results showed that greater anticipated stigma, greater identity salience, and lower levels of outness each uniquely and significantly predicted variance in increased psychological distress (a composite of depression and anxiety. In examining communalities and differences across the five identities, we found that mean levels of the stigma variables differed across the identities, with people with substance abuse and mental illness reporting greater anticipated and internalized stigma. However, the prediction pattern of the variables for psychological distress was similar across the substance abuse, mental illness, domestic violence, and childhood abuse identities (but not sexual assault. Understanding which components of stigmatized identities predict distress can lead to more effective treatment for people experiencing psychological distress.

  3. Examining effects of anticipated stigma, centrality, salience, internalization, and outness on psychological distress for people with concealable stigmatized identities.

    Science.gov (United States)

    Quinn, Diane M; Williams, Michelle K; Quintana, Francisco; Gaskins, Jennifer L; Overstreet, Nicole M; Pishori, Alefiyah; Earnshaw, Valerie A; Perez, Giselle; Chaudoir, Stephenie R

    2014-01-01

    Understanding how stigmatized identities contribute to increased rates of depression and anxiety is critical to stigma reduction and mental health treatment. There has been little research testing multiple aspects of stigmatized identities simultaneously. In the current study, we collected data from a diverse, urban, adult community sample of people with a concealed stigmatized identity (CSI). We targeted 5 specific CSIs--mental illness, substance abuse, experience of domestic violence, experience of sexual assault, and experience of childhood abuse--that have been shown to put people at risk for increased psychological distress. We collected measures of the anticipation of being devalued by others if the identity became known (anticipated stigma), the level of defining oneself by the stigmatized identity (centrality), the frequency of thinking about the identity (salience), the extent of agreement with negative stereotypes about the identity (internalized stigma), and extent to which other people currently know about the identity (outness). Results showed that greater anticipated stigma, greater identity salience, and lower levels of outness each uniquely and significantly predicted variance in increased psychological distress (a composite of depression and anxiety). In examining communalities and differences across the five identities, we found that mean levels of the stigma variables differed across the identities, with people with substance abuse and mental illness reporting greater anticipated and internalized stigma. However, the prediction pattern of the variables for psychological distress was similar across the substance abuse, mental illness, domestic violence, and childhood abuse identities (but not sexual assault). Understanding which components of stigmatized identities predict distress can lead to more effective treatment for people experiencing psychological distress.

  4. Camouflage, Concealment, and Decoys

    Science.gov (United States)

    2010-11-26

    are designed to exhibit an artificial chlorophyll response at selected NIR wavelengths. Nonstandard materials (sheets, tarps ) are not likely to exhibit...the background. The dark hoses experience solar loading, and the POL liquids within the hoses can provide a thermal cue.  Equipment. Palletized

  5. Reveal or conceal?

    DEFF Research Database (Denmark)

    Giones, Ferran; Bjørnåli, Ekaterina; Billström, Anders

    2017-01-01

    New entrants in technology-intense industries are in a race to build legitimacy in order to compete with established players. Legitimacy has been identified as a driver of venture survival and growth; it helps mitigate third-party uncertainty and so facilitates access to resources, engagement wit...

  6. Disclosing and Concealing

    DEFF Research Database (Denmark)

    Flyverbom, Mikkel

    2016-01-01

    The ubiquity of digital technologies and the datafication of many domains of social liferaise important questions about governance. In the emergent field of internet governancestudies, most work has explored novel governance arrangements, institutional developmentsand the effects of interactions...... of the argument is that there is anintimate relationship between seeing, knowing and governing, and that digitalisation anddatafication processes fundamentally shape how we make things visible or invisible, knowableor unknowable and governable or ungovernable. Having articulated this conceptual argument...

  7. Evaluation of Criteria for Requesting Brain CT Scan before Performing Lumbar Puncture for the Children Suspicious to Meningitis in Rasul Akram Hospital, Tehran

    Directory of Open Access Journals (Sweden)

    A.R. Nateghian

    2005-04-01

    Full Text Available Lumbar puncture (LP is the only way to diagnose meningitis, however some concerning points regarding its complication especially brain herniation are usually noted. Several factors including difficulties of neurologic examination especially in infants, absence of cooperation when performing the LP, incorrect myths and legal issues as well as unavailability of CT equipment , X-ray exposure and charges; makes evaluation of such requests reasonable .One hundred infants and children, 2 months to 12 years old who were suspicious to have meningitis were enrolled in this cross-sectional, descriptive study. Two groups were formed based on requesting a B.CT (Brain CT scan before LP or performing the procedure directly. Demographic and clinical parameters were analyzed among two groups using a questionnaire and CT results were recorded. Chi-square test was used for statistical analysis; P value<0.05 was considered as significant.B.CT was requested for 21 patients (case group in which the results led to postponing the procedure in 14%( 3 of cases. Toxic appearance, poor general condition, bulging fontanel and impaired consciousness (GCS score<8 were significantly related to such a decision making. There was also a trend toward ordering B.CT for those patients with recent cardiopulmonary arrest, focal signs, papilledema, hemiparesis and bradycardia. Two cases of brain herniation were identified in the control group, both had severe irritability and projectile vomiting at presentation.According to other studies, severe impairment of consciousness and presence of focal signs and symptoms are acceptable criteria for such a request, however ordering B.CT solely based on general condition or presence of a bulge fontanel seems to be unreasonable for which we couldn’t identify any supportive study. Larger scale studies considering the pediatric differential diagnosis and characteristics are required to generate proper, scientific and supportive protocols in this

  8. Multi-probe-based resonance-frequency electrical impedance spectroscopy for detection of suspicious breast lesions: improving performance using partial ROC optimization

    Science.gov (United States)

    Lederman, Dror; Zheng, Bin; Wang, Xingwei; Wang, Xiao Hui; Gur, David

    2011-03-01

    We have developed a multi-probe resonance-frequency electrical impedance spectroscope (REIS) system to detect breast abnormalities. Based on assessing asymmetry in REIS signals acquired between left and right breasts, we developed several machine learning classifiers to classify younger women (i.e., under 50YO) into two groups of having high and low risk for developing breast cancer. In this study, we investigated a new method to optimize performance based on the area under a selected partial receiver operating characteristic (ROC) curve when optimizing an artificial neural network (ANN), and tested whether it could improve classification performance. From an ongoing prospective study, we selected a dataset of 174 cases for whom we have both REIS signals and diagnostic status verification. The dataset includes 66 "positive" cases recommended for biopsy due to detection of highly suspicious breast lesions and 108 "negative" cases determined by imaging based examinations. A set of REIS-based feature differences, extracted from the two breasts using a mirror-matched approach, was computed and constituted an initial feature pool. Using a leave-one-case-out cross-validation method, we applied a genetic algorithm (GA) to train the ANN with an optimal subset of features. Two optimization criteria were separately used in GA optimization, namely the area under the entire ROC curve (AUC) and the partial area under the ROC curve, up to a predetermined threshold (i.e., 90% specificity). The results showed that although the ANN optimized using the entire AUC yielded higher overall performance (AUC = 0.83 versus 0.76), the ANN optimized using the partial ROC area criterion achieved substantially higher operational performance (i.e., increasing sensitivity level from 28% to 48% at 95% specificity and/ or from 48% to 58% at 90% specificity).

  9. Quantification of cancer risk of each clinical and ultrasonographic suspicious feature of thyroid nodules: a systematic review and meta-analysis.

    Science.gov (United States)

    Campanella, Paolo; Ianni, Francesca; Rota, Carlo Antonio; Corsello, Salvatore Maria; Pontecorvi, Alfredo

    2014-05-01

    In order to quantify the risk of malignancy of clinical and ultrasonographic features of thyroid nodules (TNs), we did a systematic review and meta-analysis of published studies. We did a literature search in MEDLINE for studies published from 1st January 1989 until 31st December 2012. Studies were considered eligible if they investigated the association between at least one clinical/ultrasonographic feature and the risk of malignancy, did not have exclusion criteria for the detected nodules, had histologically confirmed the diagnoses of malignancy, and had a univariable analysis available. Two reviewers independently extracted data on study characteristics and outcomes. The meta-analysis included 41 studies, for a total of 29678 TN. A higher risk of malignancy expressed in odds ratio (OR) was found for the following: nodule height greater than width (OR: 10.15), absent halo sign (OR: 7.14), microcalcifications (OR: 6.76), irregular margins (OR: 6.12), hypoechogenicity (OR: 5.07), solid nodule structure (OR: 4.69), intranodular vascularization (OR: 3.76), family history of thyroid carcinoma (OR: 2.29), nodule size ≥4 cm (OR: 1.63), single nodule (OR: 1.43), history of head/neck irradiation (OR: 1.29), and male gender (OR: 1.22). Interestingly, meta-regression analysis showed a higher risk of malignancy for hypoechoic nodules in iodine-sufficient than in iodine-deficient geographical areas. The current meta-analysis verified and weighed out each suspicious clinical and ultrasonographic TN feature. The highest risk was found for nodule height greater than width, absent halo sign, and microcalcifications for ultrasonographic features and family history of thyroid carcinoma for clinical features. A meta-analysis-derived grading system of TN malignancy risk, validated on a large prospective cohort, could be a useful tool in TN diagnostic work-up.

  10. PCA3 sensitivity and specificity for prostate cancer detection in patients with abnormal PSA and/or suspicious digital rectal examination. First Latin American experience.

    Science.gov (United States)

    Ramos, Christian G; Valdevenito, Raul; Vergara, Ivonne; Anabalon, Patricio; Sanchez, Catherine; Fulla, Juan

    2013-11-01

    Prostate Cancer Gene 3 (PCA3) is a recently described and highly specific urinary marker for prostate cancer (CaP). Its introduction in clinical practice to supplement low specificity of prostate specific antigen (PSA) can improve CaP diagnosis and follow-up. However, before its introduction, it is necessary to validate the method of PCA3 detection in distinct geographic populations. Our aim was to describe for the first time in Latin America, the application of the PROGENSA PCA3 assay for PCA3 detection in urine in Chilean men and its utility for CaP diagnosis in men with an indication of prostate biopsy. Sixty-four Chilean patients (mean age, 64 years) with indication of prostate biopsy because of elevated PSA and/or suspicious digital rectal examination (DRE) were prospectively recruited. PCA3 scores were assessed from urine samples obtained after DRE, before biopsy, and compared with PSA levels and biopsy outcome. The median PSA value and mean PCA3 score were 5.8 ng/ml and 31.7, respectively. Using a cutoff PCA3 score of 35, the sensitivity and specificity for detecting CaP were 52% and 87%, respectively. The receiver operating characteristic (ROC) curve analysis showed an area under the curve of 0.77 for PCA3 and 0.57 for PSA, for the same group of patients. In patients with previous negative biopsy, PCA3 specificity increased by 2.2%. This is the first report in Latin America on the use of PCA3 in diagnosing CaP. Our results are comparable to those reported in other populations in the literature, demonstrating the reproducibility of the test. PCA3 score was highly specific and we specially recommend its use in patients with persistent elevated PSA and prior negative biopsies. Copyright © 2013 Elsevier Inc. All rights reserved.

  11. The use of clinical guidelines for referral of patients with lesions suspicious for oral cancer may ease early diagnosis and improve education of healthcare professionals.

    Science.gov (United States)

    Seoane, Juan; Corral-Lizana, Cesar; González-Mosquera, Antonio; Cerero, Rocío; Esparza, Germán; Sanz-Cuesta, Teresa; Varela-Centelles, Pablo

    2011-11-01

    Early diagnosis and referral of oral cancer is essential. Successful implementation of clinical guidelines must include current practitioners and students. To evaluate the diagnostic accuracy of students at oral cancer screening and to assess the effectiveness of clinical referral guidelines. Fifth year dental students were randomly allocated to either control (n=19) or experimental groups (n = 18). Both received the customary training in oral diagnosis. The experimental group underwent a 2 hour workshop where the guidelines for the referral of suspicious lesions were discussed. Three months later, a set of 51 clinical cases including benign, malignant, and precancerous conditions/lesions were used to assess the screening ability of each subject. All 37 students entered the study. Sensitivity (control group) ranged from 16.7% to 66.7%; the experimental group scored from 16.7% to 83.3%. Fifty percent of the experimental students reached sensitivity values ≥ 62.5% (p = 0.01). Diagnostic specificity (control group) spanned from 80% to 93.3% (median = 50%); amongst experimental group it ranged from 82.2% to 97.8% (median = 92.8%); (p = 0.003). Concordance -control group- was X = 82.5 (SD = 3.2), and X = 88.2 (SD = 4.3) for the experimental, (p > 0.001). Cohen's kappa test was poor (K cancers urgently (p = 0.002) and left less unreferred cancers (0.04). This group also referred more precancerous lesions/conditions urgently (p = 0.02). The implementation of a clinical referral guideline at undergraduate level has proved valuable, under experimental conditions, to significantly increase diagnostic abilities of the examiners and thus to improve screening for oral cancer.

  12. Performance Study of Objective Speech Quality Measurement for Modern Wireless-VoIP Communications

    Directory of Open Access Journals (Sweden)

    Chan Wai-Yip

    2009-01-01

    Full Text Available Wireless-VoIP communications introduce perceptual degradations that are not present with traditional VoIP communications. This paper investigates the effects of such degradations on the performance of three state-of-the-art standard objective quality measurement algorithms—PESQ, P.563, and an "extended" E-model. The comparative study suggests that measurement performance is significantly affected by acoustic background noise type and level as well as speech codec and packet loss concealment strategy. On our data, PESQ attains superior overall performance and P.563 and E-model attain comparable performance figures.

  13. Per Object statistical analysis

    DEFF Research Database (Denmark)

    2008-01-01

    This RS code is to do Object-by-Object analysis of each Object's sub-objects, e.g. statistical analysis of an object's individual image data pixels. Statistics, such as percentiles (so-called "quartiles") are derived by the process, but the return of that can only be a Scene Variable, not an Object...... an analysis of the values of the object's pixels in MS-Excel. The shell of the proceedure could also be used for purposes other than just the derivation of Object - Sub-object statistics, e.g. rule-based assigment processes....... Variable. This procedure was developed in order to be able to export objects as ESRI shape data with the 90-percentile of the Hue of each object's pixels as an item in the shape attribute table. This procedure uses a sub-level single pixel chessboard segmentation, loops for each of the objects...

  14. Natural Language Object Retrieval

    OpenAIRE

    Hu, Ronghang; Xu, Huazhe; Rohrbach, Marcus; Feng, Jiashi; Saenko, Kate; Darrell, Trevor

    2015-01-01

    In this paper, we address the task of natural language object retrieval, to localize a target object within a given image based on a natural language query of the object. Natural language object retrieval differs from text-based image retrieval task as it involves spatial information about objects within the scene and global scene context. To address this issue, we propose a novel Spatial Context Recurrent ConvNet (SCRC) model as scoring function on candidate boxes for object retrieval, integ...

  15. “Come, what, a siege?” : Metarepresentation in Lady Jane Cavendish and Lady Elizabeth Brackley’s The Concealed Fancies

    OpenAIRE

    Hopkins, Lisa; Macmahon, Barbara

    2013-01-01

    The Concealed Fancies is a play written by Lady Jane Cavendish and Lady Elizabeth Brackley, the two eldest daughters of William Cavendish, marquis (and later duke) of Newcastle, during the English Civil War. We can feel reasonably certain that the sisters wrote it in the hope that it could be performed; however, that would have required the presence of their father, whose return is the climax of the story, from the Continental exile to which he had fled after his comprehensive defeat at the B...

  16. Secrecy in the collection and mediation practices of two World Wars objects: lessons from a shared survey

    Directory of Open Access Journals (Sweden)

    Emilie DA LAGE

    2013-12-01

    Full Text Available This paper focuses on secrecy, observed through the collection and mediation practices of two World Wars objects. The first part of this article examines secrecy through the prism of a survey conducted, on the one hand, by the collector to uncover the secret of the object, and, on the other hand, by us to uncover the secret of its collection. The second part of this contribution focuses on secrecy in the mediation practices of collectors and on the process of revelation and concealment of certain aspects of the exhibits, characterizing those practices. Some reflections on the communication of the results of our personal research are also presented.

  17. Voice Over Internet Protocol Testbed Design for Non-Intrusive, Objective Voice Quality Assessment

    Science.gov (United States)

    2007-09-01

    the common VoIP header fields. RTP Control Protocol (RTCP) is a companion protocol defined within RFC 3550. RTCP manages quality of service... DSP ) to mask the event. The concealment ratio is given by Number of concealed framesConcealment Ratio Total number of speech frames = (4.1...where the concealed frames are calculated in three-second intervals. Any one-second interval containing a mask frame from the DSP increments the

  18. {sup 99m}Tc-MDP and {sup 99m}Tc-MIBI scintimammography in patients with clinically suspicious breast cancer

    Energy Technology Data Exchange (ETDEWEB)

    Pai, Moon Sun; Park, Chan H.; Kim, Su Zy; Yoon, Suk Nam; Park, Hee Boong [College of Medicine, Ajou Univ., Suwon (Korea, Republic of)

    1997-07-01

    {sup 99m}Tc-MDP scintimammography(SM) was performed at the time of the preoperative bone scan in patients with suspicious breast cancer. These patients also had {sup 99m}Tc-MIBI scintimammography before or after the bone scan. The purpose of this report is to compare {sup 99m}Tc-MDP SM and {sup 99m}Tc-MIBI SM with the surgical results. Scintimammography with {sup 99m}Tc-MDP was performed in 20 patients with palpable mass and radiologic suspicion or proven diagnosis of breast cancer preoperatively. Patients ranged in age from 34 to 72. No male patient was included. Both prone lateral and supine anterior views were obtained for 10 min each 10-15min after IV administration of 740 MBq of {sup 99m}Tc-MDP. The {sup 99m}Tc-MIBI scintimammography was also performed before surgery. {sup 99m}Tc-MIBI SM began in 5 min. postinjection of 740MBq of {sup 99m}Tc-MIBI with prone lateral views for 10 min. Scintimammography was evaluated as positive or negative for presence or absence of focal localization of the tracers and the results were compared to histological findings. Breast cancer was histologically diagnosed in all patients ( 16 infiltrating ductal carcinoma, 2 comedocarcinoma, 1 phyllodes tumor, 1 paget disease). The size of tumor mass ranged 1.5-3 cm. Lymph node metastasis was found in 4 patients by the histologic examination. The uptake of {sup 99m}Tc-MDP in breast cancer was noted in all patients except two. One of the two patients was in post excisional biopsy state and the other was also negative in the MIBI scan. There was MDP axillary node uptake in 5 patients. Two of 5 patients with axillary lymph node uptake were false positive but they were all positive with {sup 99m}Tc-MIBI scintimammography. Two masses found in MIBI scan of a patients cannot be separated o the MDP scan. It showed more diffuse uptake than MIBI scan. The concordance between MDP-SM with MIBI-SM(similar pattern of uptake) was 45% and the remaining cases showed not focal but more diffuse uptake

  19. Sharp and blunt force trauma concealment by thermal alteration in homicides: An in-vitro experiment for methodology and protocol development in forensic anthropological analysis of burnt bones.

    Science.gov (United States)

    Macoveciuc, Ioana; Márquez-Grant, Nicholas; Horsfall, Ian; Zioupos, Peter

    2017-06-01

    Burning of human remains is one method used by perpetrators to conceal fatal trauma and expert opinions regarding the degree of skeletal evidence concealment are often disparate. This experiment aimed to reduce this incongruence in forensic anthropological interpretation of burned human remains and implicitly contribute to the development of research methodologies sufficiently robust to withstand forensic scrutiny in the courtroom. We have tested the influence of thermal alteration on pre-existing sharp and blunt trauma on twenty juvenile sheep radii in the laboratory using an automated impact testing system and an electric furnace. The testing conditions simulated a worst-case scenario where remains with pre-existing sharp or blunt trauma were exposed to burning with an intentional vehicular fire scenario in mind. All impact parameters as well as the burning conditions were based on those most commonly encountered in forensic cases and maintained constant throughout the experiment. The results have shown that signatures associated with sharp and blunt force trauma were not masked by heat exposure and highlights the potential for future standardization of fracture analysis in burned bone. Our results further emphasize the recommendation given by other experts on handling, processing and recording burned remains at the crime scene and mortuary. Copyright © 2017 Elsevier B.V. All rights reserved.

  20. Object reading: text recognition for object recognition

    NARCIS (Netherlands)

    Karaoglu, S.; van Gemert, J.C.; Gevers, T.

    2012-01-01

    We propose to use text recognition to aid in visual object class recognition. To this end we first propose a new algorithm for text detection in natural images. The proposed text detection is based on saliency cues and a context fusion step. The algorithm does not need any parameter tuning and can

  1. Seeing Objects as Faces Enhances Object Detection

    Directory of Open Access Journals (Sweden)

    Kohske Takahashi

    2015-09-01

    Full Text Available The face is a special visual stimulus. Both bottom-up processes for low-level facial features and top-down modulation by face expectations contribute to the advantages of face perception. However, it is hard to dissociate the top-down factors from the bottom-up processes, since facial stimuli mandatorily lead to face awareness. In the present study, using the face pareidolia phenomenon, we demonstrated that face awareness, namely seeing an object as a face, enhances object detection performance. In face pareidolia, some people see a visual stimulus, for example, three dots arranged in V shape, as a face, while others do not. This phenomenon allows us to investigate the effect of face awareness leaving the stimulus per se unchanged. Participants were asked to detect a face target or a triangle target. While target per se was identical between the two tasks, the detection sensitivity was higher when the participants recognized the target as a face. This was the case irrespective of the stimulus eccentricity or the vertical orientation of the stimulus. These results demonstrate that seeing an object as a face facilitates object detection via top-down modulation. The advantages of face perception are, therefore, at least partly, due to face awareness.

  2. Choosing for learning objects

    NARCIS (Netherlands)

    Schoonenboom, Judith; Emans, Bruno; Meijer, Joost

    2006-01-01

    Choosing for learning objects discusses eight educational ambitions and the possible roles of learning objects in realising these ambitions. The eight educational ambitions are: (1) Creating independent learning pathways, for example for lifelong learners; (2) Making education more flexible; (3)

  3. Behavioral Objectives for English

    Science.gov (United States)

    Zoellner, Robert

    1972-01-01

    A review-critique of On Writing Behavioral Objectives for English, by John Maxwell and Anthony Lovat, in which behavioral objectives theory is dominated by a stimulus-response rather than a stimulus-response-reinforcement psychology. The reviewer questions whether behavioral objectives can be applied accurately and without distortion of meanings,…

  4. Objects in Motion

    Science.gov (United States)

    Damonte, Kathleen

    2004-01-01

    One thing scientists study is how objects move. A famous scientist named Sir Isaac Newton (1642-1727) spent a lot of time observing objects in motion and came up with three laws that describe how things move. This explanation only deals with the first of his three laws of motion. Newton's First Law of Motion says that moving objects will continue…

  5. Survivability via Control Objectives

    Energy Technology Data Exchange (ETDEWEB)

    CAMPBELL,PHILIP L.

    2000-08-11

    Control objectives open an additional front in the survivability battle. A given set of control objectives is valuable if it represents good practices, it is complete (it covers all the necessary areas), and it is auditable. CobiT and BS 7799 are two examples of control objective sets.

  6. On the Crime Object

    Science.gov (United States)

    Akutaev, Rasul M.; Magomedov, Guseyn B.

    2016-01-01

    The relevance of the research of this problem is caused by the theoretical and practical needs of a specific concept of the crime object as one of the corpus delicti signs essentially the determining and defining its object and objective side, thereby--the nature of socially dangerous act. Besides, being a facultative sign of corpus delicti, the…

  7. Objects, materiality and meaning

    DEFF Research Database (Denmark)

    Lenau, Torben Anker; Lindegaard, Hanne

    2008-01-01

    of the object, and the designers aim is therefore to tune both in order to achieve a desired goal. To do so the designer basically has 2 options: Alteration of the physical shape of the object and the selection of materials. Through the manipulation of shape and materials can symbolic and sensory information......The present research work investigates the relation between physical objects, their materiality, understood as the physical substances they are made from, and the communication from the objects. In product design of physical objects the communicative aspects are just as important as the function...... be written into the object. The materials are therefore carriers of communication, even though this is dependent of the cultural context and the environment which the object will be part of. However the designer has only minor influence on those....

  8. Abstract Objects of Verbs

    DEFF Research Database (Denmark)

    2014-01-01

    Verbs do often take arguments of quite different types. In an orthodox type-theoretic framework this results in an extreme polysemy of many verbs. In this article, it is shown that this unwanted consequence can be avoided when a theory of "abstract objects" is adopted according to which...... these objects represent non-objectual entities in contexts from which they are excluded by type restrictions. Thus these objects are "abstract'' in a functional rather than in an ontological sense: they function as representatives of other entities but they are otherwise quite normal objects. Three examples...... of such a representation are considered: the denotations of that-phrases are objects representing propositions, generic noun phrases denote objects standing for sorts, and infinitivals are viewed as denoting objects representing attributes, i.e., the "ordinary'' meanings of verb phrases....

  9. Early object relations into new objects.

    Science.gov (United States)

    Downey, T W

    2001-01-01

    Two strands of change are suggested by this review, one maturational, the other therapeutic or developmental (Hartmann and Kris, 1945). By "maturational" I mean to suggest energies that infuse the individual from earliest life in a manner that includes object relations, but for the healthy exercise of which object relations per se need not be of central and crucial importance. Within wide limits such energies may be delayed until growth conditions prevail without significant distortion of certain of the organism's ego functions. Therapeutic change is analogous to developmental change in that both involve the crucial presence of another to release energies. In therapeutic change these are energies that have been repressed beyond the reach of developmental dynamics. In everyday development crisis and synthesis alternate in conjunction with new and emerging objects to add to the psychological structures brought to the fore by maturation. In many instances, as we see with John, over time and in a less focussed manner, developmental changes can approximate therapeutic change and visa versa. Freud-Dann in their "experiment" pursued one line, in which the equipmental delay brought on by extremely adverse living circumstances was redressed by providing an interpersonally enriching, loving, developmentally facilitating milieu. The sketches of individual children and John's subsequent story provide a perspective into what becomes the stuff of growth and what remains the stuff of neurosis. The developmental reserves and ego resilience of these children were impressive but probably not extraordinary. Usual growth ensued as soon as they were provided with the rich soil of Bulldogs Bank instead of the desert sand of the Tereszin concentration camp. However, no one can escape such adverse circumstances without having taken in the stuff of neurosis. Affects and percepts that were not assimilatable or even available to consciousness at the time remain buried in the unconscious

  10. Cultivating objects in interaction

    DEFF Research Database (Denmark)

    Hazel, Spencer

    2014-01-01

    the interactional resources which mundane everyday objects provide interactants in the multimodal design of their turns-at-talk. Although the objects which feature in the data – for example notepads, tables, computer monitors – have practical functions within the social ecology of these institutional settings......This paper demonstrates how an initial indexing of objects through gesture and talk provides a residual basis for later indexical development across a stretch of discourse. I show how participants are able to perform an initial mobilization of affordances (Hutchby, 2001) of objects in the immediate...... surround through a combination of vocal, visual and tactile means; once indexed one way, these objects are subsequently recycled in later multimodal turn design. By tracking recurrent participant orientations to particular objects made relevant in the surround, we are able to explore further...

  11. Confinement for Active Objects

    OpenAIRE

    Florian Kammuller

    2014-01-01

    In this paper, we provide a formal framework for the security of distributed active objects. Active objects com-municate asynchronously implementing method calls via futures. We base the formal framework on a security model that uses a semi-lattice to enable multi-lateral security crucial for distributed architectures. We further provide a security type system for the programming model ASPfun of functional active objects. Type safety and a confinement property are presented. ASPfun thus reali...

  12. Objective-C

    CERN Document Server

    DeVoe, Jiva

    2011-01-01

    A soup-to-nuts guide on the Objective-C programming language. Objective-C is the language behind Cocoa and Cocoa Touch, which is the Framework of applications written for the Macintosh, iPod touch, iPhone, and iPad platforms. Part of the Developer Reference series covering the hottest Apple topics, this book covers everything from the basics of the C language to advanced aspects of Apple development. You'll examine Objective-C and high-level subjects of frameworks, threading, networking, and much more.: Covers the basics of the C language and then quickly moves onto Objective-C and more advanc

  13. Abstract Objects of Verbs

    DEFF Research Database (Denmark)

    Robering, Klaus

    2014-01-01

    Verbs do often take arguments of quite different types. In an orthodox type-theoretic framework this results in an extreme polysemy of many verbs. In this article, it is shown that this unwanted consequence can be avoided when a theory of "abstract objects" is adopted according to which...... of such a representation are considered: the denotations of that-phrases are objects representing propositions, generic noun phrases denote objects standing for sorts, and infinitivals are viewed as denoting objects representing attributes, i.e., the "ordinary'' meanings of verb phrases....

  14. Sex difference in choice of concealed or exposed refuge sites by preschool children viewing a model leopard in a playground simulation of antipredator behavior

    Directory of Open Access Journals (Sweden)

    Richard G. Coss

    2016-07-01

    Full Text Available The current study of preschool children characterizes a semi-natural extension of experimental questions on how human ancestors evaded predation when encountering dangerous felids. In a pretend game on a playground, we presented full-size leopard and deer models to children (N = 39 in a repeatedmeasures experimental design. Prior to viewing the model presented 15-m away, each child was instructed by the experimenter to go where she or he would feel safe. The rationale for this study was based on the anthropological construct of “sexual dinichism,” positing that, during the Pliocene, smaller-bodied hominin females engaged in more arboreal behavior than larger-bodied males. Consistent with this construct, our previous simulation research using images of an African rock outcrop showed that, after viewing a lion, girls preferred a tree as refuge rather than a crevice or large boulder whereas boys did not differentiate these refuge sites. In this follow-up study, we predicted that, after viewing the model leopard, the preschool girls would differ from the boys by not choosing enclosed refuge sites analogous to the crevice. Analyses of a contingency table for the leopard model supported this hypothesis by yielding a significant interaction of sex and refuge location (p = .031, d = .76, the source of which was a reliably larger percentage of girls not choosing concealed refuge (p = .005, d = 2.3. The interaction of sex and refuge location for the model deer was not significant (p > .5. Our findings suggest that, in contrast to the deer, the girls selected exposed playground refuge sites rather than concealing ones to maintain visual contact with the leopard as a contingency for future action

  15. What are Objects?

    Indian Academy of Sciences (India)

    Obj ect oriented development of software systems is becom- ing de-facto standard in large software projects. This article explains the motivation behind object orientation and how it promotes the use of software components. Objects as Reusable Subsystems. Can you imagine, designing afresh and fabricating every unit.

  16. Cultivating objects in interaction

    DEFF Research Database (Denmark)

    Hazel, Spencer

    2014-01-01

    is chapter explores patterns of repeated orientations to physical objects in interactants’ visuo-spatial and haptic surround. A number of examples are presented from advice-giving activities in various institutional settings, where participants-in-interaction initially draw on material objects at...

  17. Haptic object individuation

    NARCIS (Netherlands)

    Plaisier, M.A.; Bergmann Tiest, W.M.; Kappers, A.M.L.

    2010-01-01

    Item individuation, i.e., how we decide which parts belong to one object and which to another, is an important aspect of haptic perception and may be important for design of interfaces in which different buttons have to be distinguished. We daily hold several objects in our hand. Somehow, we decide

  18. Conscience and Conscientious Objections

    NARCIS (Netherlands)

    Schinkel, Anders

    2007-01-01

    In Western countries conscientious objection is usually accommodated in various ways, at least in certain areas (military conscription, medicine) and to some extent. It appears to be regarded as fundamentally different from other kinds of objection. But why? This study argues that conscientious

  19. Modelling Digital Media Objects

    DEFF Research Database (Denmark)

    Troelsgaard, Rasmus

    The goal of this thesis is to investigate two relevant issues regarding computational representation and classification of digital multi-media objects. With a special focus on music, a model for representation of objects comprising multiple heterogeneous data types is investigated. Necessary...

  20. On object-orientation

    NARCIS (Netherlands)

    Diertens, B.

    2010-01-01

    Although object-orientation has been around for several decades, its key concept abstraction has not been exploited for proper application of object-orientation in other phases of software development than the implementation phase. We mention some issues that lead to a lot of confusion and obscurity

  1. Simultanagnosia and object individuation.

    Science.gov (United States)

    Mazza, Veronica

    2017-06-06

    Simultanagnosic patients have difficulty in perceiving multiple objects when presented simultaneously. In this review article, I discuss how neuropsychological research on simultanagnosia has been inspirational for two interconnected lines of research related to the core mechanisms by which the visual system processes cluttered scenes. First, I review previous studies on enumeration tasks indicating that, despite their inability to identify multiple objects, simultanagnosic patients can enumerate up to 2-3 elements as efficiently as healthy individuals (the so-called "subitizing" phenomenon). This intriguing observation is one of the first results to support the existence of an "object individuation" mechanism that can spatially tag a limited set of objects simultaneously, and resonates with recent research on the brain dynamics of enumeration in healthy individuals. Second, I further develop the implications of the dissociation between object identification and object enumeration in simultanagnosia specifically for the distinction between object identification and individuation. The latter distinction has been the subject of recent neuroimaging research that has provided fine-grained information on the spatial as well as temporal aspects of object individuation and recognition. The lessons learned from neuropsychological research on exact enumeration in simultanagnosia can be generalized to the normal functioning of the human mind, and have provided insightful clues for cognitive neuroscience.

  2. Near Earth Objects

    DEFF Research Database (Denmark)

    Wolff, Stefan

    2006-01-01

    , Near Earth Objects: Asteroids and comets following paths that bring them near the Earth. NEOs have collided with the Earth since its formation, some causing local devastation, some causing global climate changes, yet the threat from a collision with a near Earth object has only recently been recognised...

  3. Programs as Data Objects

    DEFF Research Database (Denmark)

    This book constitutes the refereed proceedings of the Second Symposium on Programs as Data Objects, PADO 2001, held in Aarhus, Denmark, in May 2001. The 14 revised full papers presented were carefully reviewed and selected from 30 submissions. Various aspects of looking at programs as data objects...... are covered from the point of view of program analysis, program transformation, computational complexity, etc....

  4. Gamifying Video Object Segmentation.

    Science.gov (United States)

    Spampinato, Concetto; Palazzo, Simone; Giordano, Daniela

    2017-10-01

    Video object segmentation can be considered as one of the most challenging computer vision problems. Indeed, so far, no existing solution is able to effectively deal with the peculiarities of real-world videos, especially in cases of articulated motion and object occlusions; limitations that appear more evident when we compare the performance of automated methods with the human one. However, manually segmenting objects in videos is largely impractical as it requires a lot of time and concentration. To address this problem, in this paper we propose an interactive video object segmentation method, which exploits, on one hand, the capability of humans to identify correctly objects in visual scenes, and on the other hand, the collective human brainpower to solve challenging and large-scale tasks. In particular, our method relies on a game with a purpose to collect human inputs on object locations, followed by an accurate segmentation phase achieved by optimizing an energy function encoding spatial and temporal constraints between object regions as well as human-provided location priors. Performance analysis carried out on complex video benchmarks, and exploiting data provided by over 60 users, demonstrated that our method shows a better trade-off between annotation times and segmentation accuracy than interactive video annotation and automated video object segmentation approaches.

  5. Beginning Objective-C

    CERN Document Server

    Dovey, James

    2012-01-01

    Objective-C is today's fastest growing programming language, at least in part due to the popularity of Apple's Mac, iPhone and iPad. Beginning Objective-C is for you if you have some programming experience, but you're new to the Objective-C programming language and you want a modern-and fast-way forwards to your own coding projects. Beginning Objective-C offers you a modern programmer's perspective on Objective-C courtesy of two of the best iOS and Mac developers in the field today, and gets you programming to the best of your ability in this important language.  It gets you rolling fast into

  6. Space Object Query Tool

    Science.gov (United States)

    Phillips, Veronica J.

    2017-01-01

    STI is for a fact sheet on the Space Object Query Tool being created by the MDC. When planning launches, NASA must first factor in the tens of thousands of objects already in orbit around the Earth. The number of human-made objects, including nonfunctional spacecraft, abandoned launch vehicle stages, mission-related debris and fragmentation debris orbiting Earth has grown steadily since Sputnik 1 was launched in 1957. Currently, the U.S. Department of Defenses Joint Space Operations Center, or JSpOC, tracks over 15,000 distinct objects and provides data for more than 40,000 objects via its Space-Track program, found at space-track.org.

  7. Unifying Subjectivity and Objectivity

    Directory of Open Access Journals (Sweden)

    Murugesan Chandrasekaran

    2016-10-01

    Full Text Available The contribution of modern science to the progress of civilization is immeasurable. Even its tendency toward exclusive concentration on the objective world has had salutary effects of great value. Modern science has wiped away much that was merely superstitious or speculative. Its rejection of unfounded opinions and prejudices has helped the thinking mind question conventional beliefs, shed preferences and prejudices, and challenge established authority. But modern systems thinking inherited from natural science is the suppression of the subjective dimension of reality. Many complex systems are an attempt to define and represent all subjective experience in physical terms. The modern man has a bias towards objectivity. The powerful influence of sense impressions on his mind and thinking makes him ignore the subjective experience and consider only objective facts as a valid, legitimate and representation of reality. Observing objective factors that are physical is easier than observing subjective factors that are subtle. The mechanistic view of reality has led to the rejection of the role of the individual in social development as insignificant. The individuals determine the development of society. Their social power has its roots both in subjective factors and objective factors. Economy, politics, society, and culture are inseparable dimensions of a single integrated reality. Subject and object constitute an integrated whole. The mind sees them as separate and independent. Or it views one as completely subordinate to the other. Unbiased approach to the study of all human experiences may prove that subject and object are interdependent dimensions or elements of reality.

  8. On Coordinating Collaborative Objects

    Directory of Open Access Journals (Sweden)

    Abdessamad Imine

    2010-07-01

    Full Text Available A collaborative object represents a data type (such as a text document designed to be shared by a group of dispersed users. The Operational Transformation (OT is a coordination approach used for supporting optimistic replication for these objects. It allows the users to concurrently update the shared data and exchange their updates in any order since the convergence of all replicas, i.e. the fact that all users view the same data, is ensured in all cases. However, designing algorithms for achieving convergence with the OT approach is a critical and challenging issue. In this paper, we propose a formal compositional method for specifying complex collaborative objects. The most important feature of our method is that designing an OT algorithm for the composed collaborative object can be done by reusing the OT algorithms of component collaborative objects. By using our method, we can start from correct small collaborative objects which are relatively easy to handle and incrementally combine them to build more complex collaborative objects.

  9. Functional Object Analysis

    DEFF Research Database (Denmark)

    Raket, Lars Lau

    We propose a direction it the field of statistics which we will call functional object analysis. This subfields considers the analysis of functional objects defined on continuous domains. In this setting we will focus on model-based statistics, with a particularly emphasis on mixed......-effect formulations, where the observed functional signal is assumed to consist of both fixed and random functional effects. This thesis takes the initial steps toward the development of likelihood-based methodology for functional objects. We first consider analysis of functional data defined on high...

  10. [Achievement of therapeutic objectives].

    Science.gov (United States)

    Mantilla, Teresa

    2014-07-01

    Therapeutic objectives for patients with atherogenic dyslipidemia are achieved by improving patient compliance and adherence. Clinical practice guidelines address the importance of treatment compliance for achieving objectives. The combination of a fixed dose of pravastatin and fenofibrate increases the adherence by simplifying the drug regimen and reducing the number of daily doses. The good tolerance, the cost of the combination and the possibility of adjusting the administration to the patient's lifestyle helps achieve the objectives for these patients with high cardiovascular risk. Copyright © 2014 Sociedad Española de Arteriosclerosis y Elsevier España, S.L. All rights reserved.

  11. Piles of objects

    KAUST Repository

    Hsu, Shu-Wei

    2010-01-01

    We present a method for directly modeling piles of objects in multi-body simulations. Piles of objects represent some of the more interesting, but also most time-consuming portion of simulation. We propose a method for reducing computation in many of these situations by explicitly modeling the piles that the objects may form into. By modeling pile behavior rather than the behavior of all individual objects, we can achieve realistic results in less time, and without directly modeling the frictional component that leads to desired pile shapes. Our method is simple to implement and can be easily integrated with existing rigid body simulations. We observe notable speedups in several rigid body examples, and generate a wider variety of piled structures than possible with strict impulse-based simulation. © 2010 ACM.

  12. Safety objectives for 2014

    CERN Multimedia

    HSE Unit

    2014-01-01

    This is the third year in which the CERN Management has presented annual safety objectives for the Organization, the “HSE Objectives”.   The HSE objectives for 2014, which were announced by the Director-General at his traditional New Year’s address to the staff and were presented at the first Enlarged Directorate meeting of the year, have been drawn up and agreed in close collaboration between the DSOs, the HSE Unit and the DG himself. From safety in the workplace to radiation and environmental protection, the document emphasises that “Safety is a priority for CERN” and that safety policy is a key element in how the Organization is run. And, like all policies, it generates objectives that “serve as a general framework for action”. The HSE objectives are broken down into the following fields: occupational health and safety on sites and in the workplace, radiation protection, radiation safety, environmental protection, emerge...

  13. Pinocchio: Geppetto's transitional object

    National Research Council Canada - National Science Library

    Gabriele Zeloni

    2015-01-01

    .... From this perspective, the author puts forward the following hypothesis: Pinocchio is a puppet who comes to life and is therefore, from a child's perception, a transitional object according to Winnicott...

  14. Birth of the Object: Detection of Objectness and Extraction of Object Shape through Object Action Complexes

    DEFF Research Database (Denmark)

    Kraft, Dirk; Pugeault, Nicolas; Baseski, Emre

    2008-01-01

    by the robot. This also leads to the concept of an "object" as a set of features that change predictably over different frames. The system is equipped with a certain degree of generic prior knowledge about the world in terms of a sophisticated visual feature extraction process in an early cognitive vision...... system, knowledge about its own embodiment as well as knowledge about geometric relationships such as rigid body motion. This prior knowledge allows the extraction of representations that are semantically richer compared to many other approaches.......We describe a process in which the segmentation of objects as well as the extraction of the object shape becomes realized through active exploration of a robot vision system. In the exploration process, two behavioral modules that link robot actions to the visual and haptic perception of objects...

  15. Measuring Object Salience

    Directory of Open Access Journals (Sweden)

    A.D.F Clarke

    2014-08-01

    Full Text Available Over the past 15 years work on visual salience has been restricted to models of low-level, bottom-up salience that give an estimate of the salience for every pixel in an image. This study concerns the question of how to measure the salience of objects: given an image and a list of areas of interest (AOIs, can we assign salience scores to the AOIs that reflect their visual prominence? There is increasing evidence that fixations locations are best explained at an object level and an object-level notion of visual salience can easily be incorporated with other object features task relevance and concepts such as scene context. However, extracting scores for AOIs from the saliency maps output by existing models is a non-trivial task. Using simple psychophysical (1/f-noise stimuli, we demonstrate that simple methods for assigning salience score to AOIs (such as taking the maximum, mean, or sum of the relevant pixels in the salience map produce unintuitive results, such as predicting that larger objects are less salient. We also evaluate object salience models over a range of tasks and compare to empirical data. Beyond predicting the number of fixations to different objects in a scene, we also estimate the difficulty of visual search trials; and incorporate visual salience into language production tasks. We present a simple object-based salience model (based on comparing the likelihood of an AOI given the rest of the image to the likelihood of a typical patch of the same area] that gives intuitive results for the 1/f-noise stimuli and performs as well as existing methods on empirical datasets.

  16. Object Based Systems Engineering

    Science.gov (United States)

    2011-10-17

    Based Systems Engineering ( MBSE ) has shifted the emphasis of the Systems Engineering community away from documents towards view-based artifacts. These...Engineering lies primarily in these objects, not the containers that deliver them. FIGURE 1: Evolution of Systems Engineering Practice MBSE ...capture minority viewpoints and discussion threads associated with each object of interest. If the majority view doesn’t lead to success, this data may

  17. Conscientious Objection to Vaccination

    OpenAIRE

    Clarke, Steve; Giubilini, Alberto; Walker, Mary Jean

    2016-01-01

    ABSTRACT Vaccine refusal occurs for a variety of reasons. In this article we examine vaccine refusals that are made on conscientious grounds; that is, for religious, moral, or philosophical reasons. We focus on two questions: first, whether people should be entitled to conscientiously object to vaccination against contagious diseases (either for themselves or for their children); second, if so, to what constraints or requirements should conscientious objection (CO) to vaccination be subject. ...

  18. Protected Objects in Java

    DEFF Research Database (Denmark)

    Løvengreen, Hans Henrik; Schwarzer, Jens Christian

    1998-01-01

    We present an implementation of Ada 95's notion of protected objects in Java. The implementation comprises a class library supporting entry queues and a (pre-) compiler translating slightly decorated Java classes to pure Java classes utilizing the library.......We present an implementation of Ada 95's notion of protected objects in Java. The implementation comprises a class library supporting entry queues and a (pre-) compiler translating slightly decorated Java classes to pure Java classes utilizing the library....

  19. Objects of consciousness

    Directory of Open Access Journals (Sweden)

    Donald David Hoffman

    2014-06-01

    Full Text Available Current models of visual perception typically assume that human vision estimates true properties of physical objects, properties that exist even if unperceived. However, recent studies of perceptual evolution, using evolutionary games and genetic algorithms, reveal that natural selection often drives true perceptions to extinction when they compete with perceptions tuned to fitness rather than truth: Perception guides adaptive behavior; it does not estimate a preexisting physical truth. Moreover, shifting from evolutionary biology to quantum physics, there is reason to disbelieve in preexist-ing physical truths: Certain interpretations of quantum theory deny that dynamical properties of physical objects have defi-nite values when unobserved. In some of these interpretations the observer is fundamental, and wave functions are com-pendia of subjective probabilities, not preexisting elements of physical reality. These two considerations, from evolutionary biology and quantum physics, suggest that current models of object perception require fundamental reformulation. Here we begin such a reformulation, starting with a formal model of consciousness that we call a conscious agent. We develop the dynamics of interacting conscious agents, and study how the perception of objects and space-time can emerge from such dynamics. We show that one particular object, the quantum free particle, has a wave function that is identical in form to the harmonic functions that characterize the asymptotic dynamics of conscious agents; particles are vibrations not of strings but of interacting conscious agents. This allows us to reinterpret physical properties such as position, momentum, and energy as properties of interacting conscious agents, rather than as preexisting physical truths. We sketch how this approach might extend to the perception of relativistic quantum objects, and to classical objects of macroscopic scale.

  20. Objects of consciousness.

    Science.gov (United States)

    Hoffman, Donald D; Prakash, Chetan

    2014-01-01

    Current models of visual perception typically assume that human vision estimates true properties of physical objects, properties that exist even if unperceived. However, recent studies of perceptual evolution, using evolutionary games and genetic algorithms, reveal that natural selection often drives true perceptions to extinction when they compete with perceptions tuned to fitness rather than truth: Perception guides adaptive behavior; it does not estimate a preexisting physical truth. Moreover, shifting from evolutionary biology to quantum physics, there is reason to disbelieve in preexisting physical truths: Certain interpretations of quantum theory deny that dynamical properties of physical objects have definite values when unobserved. In some of these interpretations the observer is fundamental, and wave functions are compendia of subjective probabilities, not preexisting elements of physical reality. These two considerations, from evolutionary biology and quantum physics, suggest that current models of object perception require fundamental reformulation. Here we begin such a reformulation, starting with a formal model of consciousness that we call a "conscious agent." We develop the dynamics of interacting conscious agents, and study how the perception of objects and space-time can emerge from such dynamics. We show that one particular object, the quantum free particle, has a wave function that is identical in form to the harmonic functions that characterize the asymptotic dynamics of conscious agents; particles are vibrations not of strings but of interacting conscious agents. This allows us to reinterpret physical properties such as position, momentum, and energy as properties of interacting conscious agents, rather than as preexisting physical truths. We sketch how this approach might extend to the perception of relativistic quantum objects, and to classical objects of macroscopic scale.

  1. Objects of consciousness

    Science.gov (United States)

    Hoffman, Donald D.; Prakash, Chetan

    2014-01-01

    Current models of visual perception typically assume that human vision estimates true properties of physical objects, properties that exist even if unperceived. However, recent studies of perceptual evolution, using evolutionary games and genetic algorithms, reveal that natural selection often drives true perceptions to extinction when they compete with perceptions tuned to fitness rather than truth: Perception guides adaptive behavior; it does not estimate a preexisting physical truth. Moreover, shifting from evolutionary biology to quantum physics, there is reason to disbelieve in preexisting physical truths: Certain interpretations of quantum theory deny that dynamical properties of physical objects have definite values when unobserved. In some of these interpretations the observer is fundamental, and wave functions are compendia of subjective probabilities, not preexisting elements of physical reality. These two considerations, from evolutionary biology and quantum physics, suggest that current models of object perception require fundamental reformulation. Here we begin such a reformulation, starting with a formal model of consciousness that we call a “conscious agent.” We develop the dynamics of interacting conscious agents, and study how the perception of objects and space-time can emerge from such dynamics. We show that one particular object, the quantum free particle, has a wave function that is identical in form to the harmonic functions that characterize the asymptotic dynamics of conscious agents; particles are vibrations not of strings but of interacting conscious agents. This allows us to reinterpret physical properties such as position, momentum, and energy as properties of interacting conscious agents, rather than as preexisting physical truths. We sketch how this approach might extend to the perception of relativistic quantum objects, and to classical objects of macroscopic scale. PMID:24987382

  2. [Medicine and conscientious objection].

    Science.gov (United States)

    Martínez, K

    2007-01-01

    Conscientious objection to democratically accepted laws in democratic societies is a fact, both among citizens and among professionals. Due respect for laws is a prima facie duty in these societies. But democratic justice must at the same time respect peoples' conscience for it constitutes the ethical identity of individuals. And both law and ethics are necessary - although neither of them is sufficient - for its realization. The problem of conscientious objection among healthcare professionals is analysed from this standpoint and the conclusion is that objection is not an absolute right to exemption from several duties, but that the responsibility of the professional and of the institutions towards the citizenry must always be taken into account. Some solutions are suggested that try to protect both the professionals and the citizens in a bi-directional way.

  3. Pinocchio: Geppetto's transitional object

    Directory of Open Access Journals (Sweden)

    Gabriele Zeloni

    2015-01-01

    Full Text Available The literature has been considered by Freud and others after him, a form of unaware exploration of mind that can leads to discoveries similar to psychoanalysis’s discoveries. From this perspective, the author puts forward the following hypothesis: Pinocchio is a puppet who comes to life and is therefore, from a child's perception, a transitional object according to Winnicott. Consequently Geppetto is nothing more than the involuntary representation of any child interacting with the transitional object. The author explains the results of the analysis of the text in support of the hypothesis and reflects on the impact of The adventure of Pinocchio on the reader.

  4. Learning Objects Web

    DEFF Research Database (Denmark)

    Blåbjerg, Niels Jørgen

    2005-01-01

    Learning Objects Web er et DEFF projekt som Aalborg Universitetsbibliotek har initieret. Projektet tager afsæt i de resultater og erfaringer som er opnået med vores tidligere projekt Streaming Webbased Information Modules (SWIM). Vi har et internationalt netværk af interessenter som giver os...... sparring og feedback i forhold til udviklingskoncept både omkring de teoretiske rammer og i forhold til praktisk anvendelse af vores undervisningskoncept. Med disse rygstød og input har vi forfulgt ønsket om at videreudvikle SWIM i det nye projekt Learning Objects Web. Udgivelsesdato: juni...

  5. The Language of Objects

    DEFF Research Database (Denmark)

    Eskildsen, Kasper Risbjerg

    2012-01-01

    . The arrangement of artifacts not only helped him formulate his theories, but also allowed him to present his arguments in a language of objects. At the same time, Thomsen's definition of archaeology as a museum science placed his branch of archaeology in a closer relationship with other museum sciences...... themselves to histories of texts and therefore abandoned the earliest human history. Instead, he proposed a new history of objects, which included the entire history of humankind. Thomsen's work as director of the Royal Museum of Nordic Antiquities in Copenhagen was especially important for this renewal...

  6. Concealed basalt-matrix diatremes with Cu-Au-Ag-(Mo)-mineralized xenoliths, Santa Cruz Porphyry Cu-(Mo) System, Pinal County, Arizona

    Science.gov (United States)

    Vikre, Peter; Graybeal, Frederick T.; Koutz, Fleetwood R.

    2014-01-01

    The Santa Cruz porphyry Cu-(Mo) system near Casa Grande, Arizona, includes the Sacaton mine deposits and at least five other concealed, mineralized fault blocks with an estimated minimum resource of 1.5 Gt @ 0.6% Cu. The Late Cretaceous-Paleocene system has been dismembered and rotated by Tertiary extension, partially eroded, and covered by Tertiary-Quaternary basin-fill deposits. The mine and mineralized fault blocks, which form an 11 km (~7 miles) by 1.6 km (~1 mile) NE-SW–trending alignment, represent either pieces of one large deposit, several deposits, or pieces of several deposits. The southwestern part of the known system is penetrated by three or more diatremes that consist of heterolithic breccia pipes with basalt and clastic matrices, and subannular tuff ring and maar-fill sedimentary deposits associated with vents. The tephra and maar-fill deposits, which are covered by ~485 to 910 m (~1,600–3,000 ft) of basin fill, lie on a mid-Tertiary erosion surface of Middle Proterozoic granite and Late Cretaceous porphyry, which compose most xenoliths in pipes and are the host rocks of the system. Some igneous xenoliths in the pipes contain bornite-chalcopyrite-covellite assemblages with hypogene grades >1 wt % Cu, 0.01 ounces per ton (oz/t) Au, 0.5 oz/t Ag, and small amounts of Mo (fluid which, based on fluid inclusion populations in mineralized xenoliths, was saline water and CO2. The large vertical extent (~600 m; ~2,000 ft) of basalt matrix in pipes, near-paleosurface matrix vesiculation, and plastically deformed basalt lapilli indicates that diatreme eruptions were predominantly phreatic.Diatreme xenoliths represent crustal stratigraphy and, as in the Santa Cruz system, provide evidence of concealed mineral resources that can guide exploration drilling through cover. Vectors to the source of bornite-dominant xenoliths containing >1% Cu and significant Au and Ag could be determined by refinement of breccia pipe geometries, by reassembly of mineralized fault

  7. Turning subjective into objective

    DEFF Research Database (Denmark)

    Cardoso, Maria João; Cardoso, Jaime; Amaral, Natália

    2007-01-01

    Twelve expert observers from nine different countries convened in a workshop to evaluate the validity of the Breast Cancer Conservative Treatment. Cosmetic results (BCCT.core) software, an objective method for the aesthetic evaluation of breast cancer conservative treatment. Experts were initiall...

  8. Gender Object Identification Test.

    Science.gov (United States)

    Sigmon, Scott B.

    This test was designed primarily for the purpose of assisting social psychologists in researching sex roles and/or sex differences when a nonverbal instrument is desired. The hypothesis was that some objects would be easier for members of one gender to name. The subjects were 30 female and 20 male undergraduate students. Pictures of 65 commercial…

  9. Robust video object cosegmentation.

    Science.gov (United States)

    Wang, Wenguan; Shen, Jianbing; Li, Xuelong; Porikli, Fatih

    2015-10-01

    With ever-increasing volumes of video data, automatic extraction of salient object regions became even more significant for visual analytic solutions. This surge has also opened up opportunities for taking advantage of collective cues encapsulated in multiple videos in a cooperative manner. However, it also brings up major challenges, such as handling of drastic appearance, motion pattern, and pose variations, of foreground objects as well as indiscriminate backgrounds. Here, we present a cosegmentation framework to discover and segment out common object regions across multiple frames and multiple videos in a joint fashion. We incorporate three types of cues, i.e., intraframe saliency, interframe consistency, and across-video similarity into an energy optimization framework that does not make restrictive assumptions on foreground appearance and motion model, and does not require objects to be visible in all frames. We also introduce a spatio-temporal scale-invariant feature transform (SIFT) flow descriptor to integrate across-video correspondence from the conventional SIFT-flow into interframe motion flow from optical flow. This novel spatio-temporal SIFT flow generates reliable estimations of common foregrounds over the entire video data set. Experimental results show that our method outperforms the state-of-the-art on a new extensive data set (ViCoSeg).

  10. The Object of Research

    DEFF Research Database (Denmark)

    Bean, Jonathan; Figueiredo, Bernardo; Pico Larsen, Hanne

    2017-01-01

    explicates the role of objects in supporting this patterning. We explain how an in-situ diary tool (dscout, in our case) can be useful to support this approach. We demonstrate our methodological approach in the context of the Red Rooster Harlem, a cosmopolitan restaurant in New York, owned by the celebrity...

  11. The Road to Objects

    Directory of Open Access Journals (Sweden)

    Graham Harman

    2011-09-01

    Full Text Available Harman presents an outline of how object-oriented ontology (OOO differentiates itself from other branches of speculative realism. Can OOO steer philosophy from an epistemological project that tends to reduce the discipline to "a series of small-time drug busts"?

  12. Testing object Interactions

    NARCIS (Netherlands)

    Grüner, Andreas

    2010-01-01

    In this thesis we provide a unit testing approach for multi-purposes object-oriented programming languages in the style of Java and C#. Our approach includes the definition of a test specification language which results from extending the programming language with new designated specification

  13. Big Java late objects

    CERN Document Server

    Horstmann, Cay S

    2012-01-01

    Big Java: Late Objects is a comprehensive introduction to Java and computer programming, which focuses on the principles of programming, software engineering, and effective learning. It is designed for a two-semester first course in programming for computer science students.

  14. Forecasters' Objectives and Strategies

    DEFF Research Database (Denmark)

    Marinovic, Iván; Ottaviani, Marco; Sørensen, Peter Norman

    2013-01-01

    This chapter develops a unified modeling framework for analyzing the strategic behavior of forecasters. The theoretical model encompasses reputational objectives, competition for the best accuracy, and bias. Also drawing from the extensive lit- erature on analysts, we review the empirical evidenc...

  15. Is there any additional benefit of contrast-enhanced CT as part of routine PET/CT protocols for the differentiation of suspicious incidental gastrointestinal 2-deoxy-{sup 18}F-FDG uptake?

    Energy Technology Data Exchange (ETDEWEB)

    Brendle, Cornelia Bettina; Aschoff, Phillip; Kratt, Thomas; Schraml, Christina; Reimold, Matthias; Claussen, Claus Detlef; Pfannenberg, Christina Anna [University Hospital Tuebingen, Tuebingen (Germany)

    2013-12-15

    Suspicious incidental gastrointestinal FDG uptake during positron-emission tomography/computed tomography (PET/CT) examinations can be caused by different diseases, including malignancies. However, differentiation with PET alone is difficult. The aim of this study was to investigate the potential of PET alone, contrast-enhanced CT (ceCT), and low-dose CT (ldCT) in routine PET/CT protocols for differentiation of incidental gastrointestinal lesions. Sixty patients with incidental gastrointestinal lesions who underwent a routine PET/CT protocol with ldCT and ceCT were retrospectively analysed. The PET lesions were evaluated regarding their FDG uptake patterns and the standard uptake value. The anatomical correlates in both CT protocols were compared in regard to the correct lesion classification with the reference standard endoscopy. Sixty-two lesions were found in 60 patients (17 malignant, 10 premalignant, 5 benign, 13 inflammatory, 17 physiological). The differentiation of the FDG uptake patterns did not enable reliable lesion classification. The positive predictive value for pathology was 0.81 for ceCT in PET/CT and 0.70 for ldCT. Malignancies were detected in 100% of the patients by ceCT vs. 29.4% by ldCT. The false negative rate of ceCT for all pathologies was 31.1%, vs. 68.9% for ldCT. False positive results (17/62) could not be excluded sufficiently by either CT protocol. PET/ceCT protocols provide additional benefit especially in detecting gastrointestinal malignancies as a cause of suspicious incidental gastrointestinal FDG uptake. However, since follow-up endoscopy cannot be forgone due to the considerable false negative rate even with ceCT, the addition of ceCT to a routine PET/ldCT protocol cannot be recommended for this purpose.

  16. Part Objects and Their Location

    DEFF Research Database (Denmark)

    Madsen, Ole Lehrmann; Møller-Pedersen, Birger

    1992-01-01

    The notion of location of part objects is introduced, yielding a reference to the containing object. Combined with locally defined objects and classes (block structure), singularly defined part objects, and references to part objects, it is a powerful language mechanism for defining objects...... with different aspects or roles. The use of part objects for inheritance of code is also explored....

  17. Objectives and Outcomes

    Energy Technology Data Exchange (ETDEWEB)

    Segalman, D.J.

    1998-11-30

    I have recently become involved in the ABET certification process under the new system - ABET 2000. This system relies heavily on concepts of Total Quality Management (TQM). It encourages each institution to define its objectives in terms of its own mission and then create a coherent program based on it. The prescribed steps in setting up the new system at an engineering institution are: o identification of constituencies G definition of mission. It is expected that the department's mission will be consistent with that of the overall institution, but containing some higher resolution language appropriate to that particular discipline of the engineering profession. o statement of objectives consistent with the mission 3G~~\\vED " enumeration of desired, and preferably measurable, outcomes of the process that would ~ `=. verify satisfaction of the objectives. ~~~ 07 !398 o establish performance standards for each outcome. o creation of appropriate feedback loops to assure that the objectives are still consistent with Q$YT1 the mission, that the outcomes remain consistent with the objectives, and that the curriculum and the teaching result in those outcomes. It is my assertion that once the institution verbalizes a mission, enumerated objectives naturally flow from that mission. (We shall try to demonstrate by example.) Further, if the mission uses the word "engineer", one would expect that word also to appear in at least one of the objectives. The objective of producing engineers of any sort must -by decree - involve the presence of the ABET criteria in the outcomes list. In other words, successful satisfaction of the ABET items a-k are a necessary subset of the measure of success in producing engineers. o We shall produce bachelor level engineers whose training in the core topics of chemical (or electrical, or mechanical) engineering is recognized to be among the best in the nation. o We shall provide an opportunity for our students to gain

  18. Object-Oriented Education

    DEFF Research Database (Denmark)

    Pasgaard, Niels Jakob

    Education is traditionally seen as a teleological discipline. Teaching is always done with a purpose in mind. Thus, teaching can be said to be an intentional practice. With a popular Danish expression, one may say that teaching is to want something with someone (Nepper Larsen 2016). In recent years...... tradition, where predefined learning-objectives form the basis for the selection of content and methods of teaching. However, the idea of letting such learning-objectives form the basis for teaching, now also permeates the educational policies of the European Union (European Commision 2011). The spread......, Bogost 2012, Bryant 2014), the article presents a critique of this development. The criticism is based on a questioning of the idea that education should be understood as wanting something with someone. Instead, it is argued that education is the art of introducing Something for someone. The article aims...

  19. Conscientious objection in Italy.

    Science.gov (United States)

    Minerva, Francesca

    2015-02-01

    The law regulating abortion in Italy gives healthcare practitioners the option to make a conscientious objection to activities that are specific and necessary to an abortive intervention. Conscientious objectors among Italian gynaecologists amount to about 70%. This means that only a few doctors are available to perform abortions, and therefore access to abortion is subject to constraints. In 2012 the International Planned Parenthood Federation European Network (IPPF EN) lodged a complaint against Italy to the European Committee of Social Rights, claiming that the inadequate protection of the right to access abortion implies a violation of the right to health. In this paper I will discuss the Italian situation with respect to conscientious objection to abortion and I will suggest possible solutions to the problem. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  20. DOLIB: Distributed Object Library

    Energy Technology Data Exchange (ETDEWEB)

    D' Azevedo, E.F.

    1994-01-01

    This report describes the use and implementation of DOLIB (Distributed Object Library), a library of routines that emulates global or virtual shared memory on Intel multiprocessor systems. Access to a distributed global array is through explicit calls to gather and scatter. Advantages of using DOLIB include: dynamic allocation and freeing of huge (gigabyte) distributed arrays, both C and FORTRAN callable interfaces, and the ability to mix shared-memory and message-passing programming models for ease of use and optimal performance. DOLIB is independent of language and compiler extensions and requires no special operating system support. DOLIB also supports automatic caching of read-only data for high performance. The virtual shared memory support provided in DOLIB is well suited for implementing Lagrangian particle tracking techniques. We have also used DOLIB to create DONIO (Distributed Object Network I/O Library), which obtains over a 10-fold improvement in disk I/O performance on the Intel Paragon.

  1. DOLIB: Distributed Object Library

    Energy Technology Data Exchange (ETDEWEB)

    D`Azevedo, E.F.; Romine, C.H.

    1994-10-01

    This report describes the use and implementation of DOLIB (Distributed Object Library), a library of routines that emulates global or virtual shared memory on Intel multiprocessor systems. Access to a distributed global array is through explicit calls to gather and scatter. Advantages of using DOLIB include: dynamic allocation and freeing of huge (gigabyte) distributed arrays, both C and FORTRAN callable interfaces, and the ability to mix shared-memory and message-passing programming models for ease of use and optimal performance. DOLIB is independent of language and compiler extensions and requires no special operating system support. DOLIB also supports automatic caching of read-only data for high performance. The virtual shared memory support provided in DOLIB is well suited for implementing Lagrangian particle tracking techniques. We have also used DOLIB to create DONIO (Distributed Object Network I/O Library), which obtains over a 10-fold improvement in disk I/O performance on the Intel Paragon.

  2. Object relational mapping frameworks

    OpenAIRE

    Patrný, Vojtěch

    2008-01-01

    This paper is about Java object relational frameworks and related processes. The goal of this work consists of showing design patterns for ORM, introducing Java ORM standards along with the main implementations, finding criteria for comparison of ORM frameworks and showing working ORM example in a case study. This paper has the following structure: The first part of this paper discusses main ORM design patters, approaches to ORM and performance related features of Java ORM frameworks. Next pa...

  3. Dropped object protection analyses

    OpenAIRE

    Nilsen, Ingve

    2014-01-01

    Master's thesis in Offshore structural engineering Impact from dropped object is a typical accident action (NOKSOK N-004, 2013). Hence, the DOP structure is to be analyzed in an accidental limit state (ALS) design practice, which means that a non-linear finite element analysis can be applied. The DOP structure will be based on a typical DOP structure. Several FEM analyses are performed for the DOP structure. Different shapes size and weights and various impact positions are used for si...

  4. Suggestive Objects at Work

    DEFF Research Database (Denmark)

    Ratner, Helene Gad

    2009-01-01

    In Western secular societies, spiritual life is no longer limited to classical religious institutions but can also be found at workplace organizations. While spirituality is conventionally understood as a subjective and internal process, this paper proposes the concept of ‘suggestive objects’, co...... scaffolding. This has deep implications for our understanding of the sacred, including a better appreciation of the way that suggestive objects make the sacred durable, the way they organize it....

  5. [Corpse disposal by concealment in transport containers or packaging materials: Examination by post-mortem computed tomography (PMCT) before forensic autopsy].

    Science.gov (United States)

    Hasegawa, Iwao; Heinemann, Axel; Jahnke, Philipp; Wilke, Nadine; Kammal, Michael; Püschel, Klaus

    2014-01-01

    The presented case reports illustrate the value of post-mortem computed tomography in cases of homicide in which the body was hidden in a container or packaging material and could not be inspected directly from outside. In Case 1, the body was forced into a suitcase, which was then thrown into a flood basin. Post-mortem computed tomography (PMCT) visualized the compressed and extremely flexed body inside the suitcase as well as fractures of the left temporal bone, the left ulna and the left side of the mandible. After recovery of the body, the consequences of long-term immersion in fresh water became visible. At autopsy, a laceration in the left temporal region and a temporal bone fracture were observed. The fractures of the left ulna and the left jaw were associated with moderate hematoma. In Case 2, the body of an 11-year-old girl was retrieved from a plastic bag concealed in a garden shed. The cause of death was ligature strangulation. In the presented cases, PMCT was performed as part of the police investigations for reliable primary documentation of the contents of the containers without further manipulation. Thus the human body, its position inside the container and the presence of bone injuries could be demonstrated before opening the container. In such cases, post-mortem imaging provides reliable and rapid information to the investigating authorities before autopsy already.

  6. War Journalism and 'Objectivity'

    Directory of Open Access Journals (Sweden)

    Annabel McGoldrick

    2006-10-01

    Full Text Available This article opens by considering an apparent paradox. Many professional journalists, working on many media in many countries, consider themselves 'objective'. They do not, at least, set out to skew their coverage of important issues in favour of one side or the other. And yet much of their coverage of conflicts shows a discernible dominant pattern of War Journalism - biased in favour of war. This is not because of a lack of objectivity, the article suggests, but a surfeit. The set of conventions many editors and reporters regard as defining 'objective' journalism arose in response to economic and political conditions which rewarded news that could commend itself as unobjectionable to the maximum number of potential customers. Three of the most important conventions privilege official sources; a dualistic construction of stories and event, over process. Each of these, when applied to the representation of conflicts, leads readers and audiences - or leaves them - to over-value violent, reactive responses and under-value non-violent, developmental responses. Industry conventions sit uneasily alongside equally time-honoured expectations of journalism. These are encoded in rules and regulations governing the content of broadcast news, in many jurisdictions which have a public service concept for radio and television. In some respects, War Journalism can be shown to make it more difficult for broadcast news services to fulfil their public service obligations. Awareness is now growing, of the tension between these two pressures on journalism and its influence on the way pressing public debates are shaped and mediated. More Peace Journalism would help to bring public service news back into line with legitimate public expectations.

  7. Numerical Analysis Objects

    Science.gov (United States)

    Henderson, Michael

    1997-08-01

    The Numerical Analysis Objects project (NAO) is a project in the Mathematics Department of IBM's TJ Watson Research Center. While there are plenty of numerical tools available today, it is not an easy task to combine them into a custom application. NAO is directed at the dual problems of building applications from a set of tools, and creating those tools. There are several "reuse" projects, which focus on the problems of identifying and cataloging tools. NAO is directed at the specific context of scientific computing. Because the type of tools is restricted, problems such as tools with incompatible data structures for input and output, and dissimilar interfaces to tools which solve similar problems can be addressed. The approach we've taken is to define interfaces to those objects used in numerical analysis, such as geometries, functions and operators, and to start collecting (and building) a set of tools which use these interfaces. We have written a class library (a set of abstract classes and implementations) in C++ which demonstrates the approach. Besides the classes, the class library includes "stub" routines which allow the library to be used from C or Fortran, and an interface to a Visual Programming Language. The library has been used to build a simulator for petroleum reservoirs, using a set of tools for discretizing nonlinear differential equations that we have written, and includes "wrapped" versions of packages from the Netlib repository. Documentation can be found on the Web at "http://www.research.ibm.com/nao". I will describe the objects and their interfaces, and give examples ranging from mesh generation to solving differential equations.

  8. Propelling soft objects

    Science.gov (United States)

    Boukellal, Hakim; Plastino, Julie; Noireaux, Vincent; Sykes, Cécile

    2003-03-01

    Cells move by the action of specific proteins or small molecules that assemble and interact, constituting a dynamic network called the cytoskeleton. Actin, one of the major components of eucaryotic cells, exists as filaments (semi-flexible polymers) or as monomers. Local assembly of the actin network leads to cell movement as well as to the propulsion of objects like bacteria or liposomes within cells. In order to understand the force generated for this propulsion, we use biomimetic experimental systems that allow for the control of physical parameters. We show evidence for the role of elasticity in the propulsion mechanism. To cite this article: H. Boukellal et al., C. R. Physique 4 (2003).

  9. Kuiper Belt Objects

    Science.gov (United States)

    Jewitt, David

    The region of the solar system immediately beyond Neptune's orbit is densely populated with small bodies. This region, known as the Kuiper Belt, consists of objects that may predate Neptune, the orbits of which provide a fossil record of processes operative in the young solar system. The Kuiper Belt contains some of the Solar System's most primitive, least thermally processed matter. It is probably the source of the short-period comets and Centaurs, and may also supply collisionally generated interplanetary dust. I discuss the properties of the Kuiper Belt and provide an overview of the outstanding scientific issues.

  10. Managing Permanent Objects

    Science.gov (United States)

    1984-11-01

    pe,ttlca ItI Mamaging Faaaet Objects 1 commen main memory. Note that in the case of shared man memory, the thing that enabled sharing to be...u.ussed. 3.8.1 Non-e.•"t.ndz We have already diwxmd pairs. One additionrl item about pais is that they are often chained togtther by their edr to form a...that the garbage collector can be invoked 7 Unfortunfately Aegis does not supply the m*casary functicnality wo do this, but It would not be difcult so

  11. Conscientious Objection to Vaccination

    Science.gov (United States)

    Clarke, Steve; Giubilini, Alberto

    2016-01-01

    ABSTRACT Vaccine refusal occurs for a variety of reasons. In this article we examine vaccine refusals that are made on conscientious grounds; that is, for religious, moral, or philosophical reasons. We focus on two questions: first, whether people should be entitled to conscientiously object to vaccination against contagious diseases (either for themselves or for their children); second, if so, to what constraints or requirements should conscientious objection (CO) to vaccination be subject. To address these questions, we consider an analogy between CO to vaccination and CO to military service. We argue that conscientious objectors to vaccination should make an appropriate contribution to society in lieu of being vaccinated. The contribution to be made will depend on the severity of the relevant disease(s), its morbidity, and also the likelihood that vaccine refusal will lead to harm. In particular, the contribution required will depend on whether the rate of CO in a given population threatens herd immunity to the disease in question: for severe or highly contagious diseases, if the population rate of CO becomes high enough to threaten herd immunity, the requirements for CO could become so onerous that CO, though in principle permissible, would be de facto impermissible. PMID:28008636

  12. Conscientious Objection to Vaccination.

    Science.gov (United States)

    Clarke, Steve; Giubilini, Alberto; Walker, Mary Jean

    2017-03-01

    Vaccine refusal occurs for a variety of reasons. In this article we examine vaccine refusals that are made on conscientious grounds; that is, for religious, moral, or philosophical reasons. We focus on two questions: first, whether people should be entitled to conscientiously object to vaccination against contagious diseases (either for themselves or for their children); second, if so, to what constraints or requirements should conscientious objection (CO) to vaccination be subject. To address these questions, we consider an analogy between CO to vaccination and CO to military service. We argue that conscientious objectors to vaccination should make an appropriate contribution to society in lieu of being vaccinated. The contribution to be made will depend on the severity of the relevant disease(s), its morbidity, and also the likelihood that vaccine refusal will lead to harm. In particular, the contribution required will depend on whether the rate of CO in a given population threatens herd immunity to the disease in question: for severe or highly contagious diseases, if the population rate of CO becomes high enough to threaten herd immunity, the requirements for CO could become so onerous that CO, though in principle permissible, would be de facto impermissible. © 2016 The Authors Bioethics Published by John Wiley & Sons Ltd.

  13. Cost object in accounting

    Directory of Open Access Journals (Sweden)

    Gertruda Świderska

    2016-07-01

    Full Text Available In Polish literature in the field of accounting there are many synonymous terms such as the object of cost calculation, cost unit, or cost driver. Their definitions are often very similar, and their use in certain cir-cumstances unclear. This article aims to answer the question whether the term costs object meaning „something whose cost is of interest to accounting information users”, can replace previously used terms. The analysis applies to literature in Polish, in which different schools have developed their own terms, which is connected with the tradition of schools of accounting in Poland and the evolution of the con-cepts. The analysis aims to verify the hypothesis that for many synonymous terms used in publications in the field of accounting a universal solution can be proposed, taking into account the technological pro-gress and changing user needs. The research methods used include a systematic review of literature in Polish from the period 1966 to 2016 and an analysis of the terms.

  14. Hardware Objects for Java

    DEFF Research Database (Denmark)

    Schoeberl, Martin; Thalinger, Christian; Korsholm, Stephan

    2008-01-01

    Java, as a safe and platform independent language, avoids access to low-level I/O devices or direct memory access. In standard Java, low-level I/O it not a concern; it is handled by the operating system. However, in the embedded domain resources are scarce and a Java virtual machine (JVM) without...... in three quite different JVMs: in the Java processor JOP, the JIT compiler CACAO, and in the interpreting embedded JVM SimpleRTJ.......Java, as a safe and platform independent language, avoids access to low-level I/O devices or direct memory access. In standard Java, low-level I/O it not a concern; it is handled by the operating system. However, in the embedded domain resources are scarce and a Java virtual machine (JVM) without...... an underlying middleware is an attractive architecture. When running the JVM on bare metal, we need access to I/O devices from Java; therefore we investigate a safe and efficient mechanism to represent I/O devices as first class Java objects, where device registers are represented by object fields. Access...

  15. Technical note: Evaluation of the uncertainties in (choline+creatine)/citrate ratios measured by proton MR spectroscopic imaging in patients suspicious for prostate cancer

    Energy Technology Data Exchange (ETDEWEB)

    Zbyn, S.; Krssak, M.; Memarsadeghi, M.; Gholami, B.; Haitel, A.; Weber, M.; Helbich, T.H.; Trattnig, S.; Moser, E.; Gruber, S.

    2014-07-15

    The presented evaluation of the relative uncertainty (δ'CCC) of the (choline + creatine)/citrate (CC/C) ratios can provide objective information about the quality and diagnostic value of prostate MR spectroscopic imaging data. This information can be combined with the numeric values of CC/C ratios and provides metabolic-quality maps enabling accurate cancer detection and user-independent data evaluation. In addition, the prostate areas suffering most from the low precision of CC/C ratios (e. g., prostate base) were identified.

  16. Bistatic extension for coherent MMW-ISAR-Imaging of objects and humans

    Directory of Open Access Journals (Sweden)

    S. Bertl

    2008-05-01

    Full Text Available We present a bistatic extension of a broadband monostatic FMCW Radar working in the Millimetre-Wave (MMW region and its bistatic imaging properties used for imaging purposes. Due to the different perspective of a bistatic setup compared to a monostatic one, additional information can be obtained.

    A wide bandwidth of approx. 10 GHz is used for the task of high resolution imaging as it could be used for the detection of threats at a person's body in security-sensitive environments. Since MMWs propagate easily through common clothing, it is feasible to image objects like concealed weapons worn under the clothing. MMW-Imaging of humans is one possibility to enhance the capabilities of nowadays security checkpoints, e.g. at airports.

  17. Fundamentals of Object Databases Object-Oriented and Object-Relational Design

    CERN Document Server

    Dietrich, Suzanne

    2010-01-01

    Object-oriented databases were originally developed as an alternative to relational database technology for the representation, storage, and access of non-traditional data forms that were increasingly found in advanced applications of database technology. After much debate regarding object-oriented versus relational database technology, object-oriented extensions were eventually incorporated into relational technology to create object-relational databases. Both object-oriented databases and object-relational databases, collectively known as object databases, provide inherent support for object

  18. ARTEMIS Science Objectives

    Science.gov (United States)

    Sibeck, D. G.; Angelopoulos, V.; Brain, D. A.; Delory, G. T.; Eastwood, J. P.; Farrell, W. M.; Grimm, R. E.; Halekas, J. S.; Hasegawa, H.; Hellinger, P.; hide

    2011-01-01

    NASA's two spacecraft ARTEMIS mission will address both heliospheric and planetary research questions, first while in orbit about the Earth with the Moon and subsequently while in orbit about the Moon. Heliospheric topics include the structure of the Earth's magnetotail; reconnection, particle acceleration, and turbulence in the Earth's magnetosphere, at the bow shock, and in the solar wind; and the formation and structure of the lunar wake. Planetary topics include the lunar exosphere and its relationship to the composition of the lunar surface, the effects of electric fields on dust in the exosphere, internal structure of the Moon, and the lunar crustal magnetic field. This paper describes the expected contributions of ARTEMIS to these baseline scientific objectives.

  19. Breaking Object Correspondence Across Saccadic Eye Movements Deteriorates Object Recognition.

    Science.gov (United States)

    Poth, Christian H; Herwig, Arvid; Schneider, Werner X

    2015-01-01

    Visual perception is based on information processing during periods of eye fixations that are interrupted by fast saccadic eye movements. The ability to sample and relate information on task-relevant objects across fixations implies that correspondence between presaccadic and postsaccadic objects is established. Postsaccadic object information usually updates and overwrites information on the corresponding presaccadic object. The presaccadic object representation is then lost. In contrast, the presaccadic object is conserved when object correspondence is broken. This helps transsaccadic memory but it may impose attentional costs on object recognition. Therefore, we investigated how breaking object correspondence across the saccade affects postsaccadic object recognition. In Experiment 1, object correspondence was broken by a brief postsaccadic blank screen. Observers made a saccade to a peripheral object which was displaced during the saccade. This object reappeared either immediately after the saccade or after the blank screen. Within the postsaccadic object, a letter was briefly presented (terminated by a mask). Observers reported displacement direction and letter identity in different blocks. Breaking object correspondence by blanking improved displacement identification but deteriorated postsaccadic letter recognition. In Experiment 2, object correspondence was broken by changing the object's contrast-polarity. There were no object displacements and observers only reported letter identity. Again, breaking object correspondence deteriorated postsaccadic letter recognition. These findings identify transsaccadic object correspondence as a key determinant of object recognition across the saccade. This is in line with the recent hypothesis that breaking object correspondence results in separate representations of presaccadic and postsaccadic objects which then compete for limited attentional processing resources (Schneider, 2013). Postsaccadic object recognition is

  20. Breaking object correspondence across saccadic eye movements deteriorates object recognition

    Directory of Open Access Journals (Sweden)

    Christian H. Poth

    2015-12-01

    Full Text Available Visual perception is based on information processing during periods of eye fixations that are interrupted by fast saccadic eye movements. The ability to sample and relate information on task-relevant objects across fixations implies that correspondence between presaccadic and postsaccadic objects is established. Postsaccadic object information usually updates and overwrites information on the corresponding presaccadic object. The presaccadic object representation is then lost. In contrast, the presaccadic object is conserved when object correspondence is broken. This helps transsaccadic memory but it may impose attentional costs on object recognition. Therefore, we investigated how breaking object correspondence across the saccade affects postsaccadic object recognition. In Experiment 1, object correspondence was broken by a brief postsaccadic blank screen. Observers made a saccade to a peripheral object which was displaced during the saccade. This object reappeared either immediately after the saccade or after the blank screen. Within the postsaccadic object, a letter was briefly presented (terminated by a mask. Observers reported displacement direction and letter identity in different blocks. Breaking object correspondence by blanking improved displacement identification but deteriorated postsaccadic letter recognition. In Experiment 2, object correspondence was broken by changing the object’s contrast-polarity. There were no object displacements and observers only reported letter identity. Again, breaking object correspondence deteriorated postsaccadic letter recognition. These findings identify transsaccadic object correspondence as a key determinant of object recognition across the saccade. This is in line with the recent hypothesis that breaking object correspondence results in separate representations of presaccadic and postsaccadic objects which then compete for limited attentional processing resources (Schneider, 2013. Postsaccadic

  1. Influence of allocation concealment and intention-to-treat analysis on treatment effects of physical therapy interventions in low back pain randomised controlled trials: a protocol of a meta-epidemiological study.

    Science.gov (United States)

    Almeida, Matheus Oliveira; Saragiotto, Bruno T; Maher, Chris G; Pena Costa, Leonardo Oliveira

    2017-09-27

    Meta-epidemiological studies examining the influence of methodological characteristics, such as allocation concealment and intention-to-treat analysis have been performed in a large number of healthcare areas. However, there are no studies investigating these characteristics in physical therapy interventions for patients with low back pain. The aim of this study is to investigate the influence of allocation concealment and the use of intention-to-treat analysis on estimates of treatment effects of physical therapy interventions in low back pain clinical trials. Searches on PubMed, Embase, Cochrane Database of Systematic Reviews, Physiotherapy Evidence Database (PEDro) and CINAHL databases will be performed. We will search for systematic reviews that include a meta-analysis of randomised controlled trials that compared physical therapy interventions in patients with low back pain with placebo or no intervention, and have pain intensity or disability as the primary outcomes. Information about selection (allocation concealment) and attrition bias (intention-to-treat analysis) will be extracted from the PEDro database for each included trial. Information about bibliographic data, study characteristics, participants' characteristics and study results will be extracted. A random-effects model will be used to provide separate estimates of treatment effects for trials with and without allocation concealment and with and without intention-to-treat analysis (eg, four estimates). A meta-regression will be performed to measure the association between methodological features and treatment effects from each trial. The dependent variable will be the treatment effect (the mean between-group differences) for the primary outcomes (pain or disability), while the independent variables will be the methodological features of interest (allocation concealment and intention-to-treat analysis). Other covariates will include sample size and sequence generation. No ethical approval will be

  2. Data quality objectives

    Energy Technology Data Exchange (ETDEWEB)

    Haeberer, F. [Environmental Protection Agency, Washington, DC (United States)

    1993-12-31

    The U.S. Environmental Protection Agency (EPA) spends about $500 million annually in collecting environmental data for scientific research and regulatory decision making. In addition, the regulated community may spend as much as ten times more each year in responding to EPA compliance requirements. Among the EPA and the regulated community there are several important common concerns: both want to make informed decisions using the right type, quality, and quantity of data. Collecting new data is very resource intensive to all parties. Neither EPA nor the regulated community can afford to collect more or {open_quotes}better{close_quotes} data than are really needed; the Data Quality Objectives (DQO) process is a systematic planning tool for ensuring that the right data will be collected for arriving at a decision within the desired confidence constraints. Using the DQO process to plan environmental data collections can help improve their effectiveness and efficiency, and enhance the defensibility of the decisions for which the data are used.

  3. Beyond the Object

    Directory of Open Access Journals (Sweden)

    2007-01-01

    Full Text Available Object orientation (OO is regained not only in all components of integrate development media but it remarks in the rest of software world from operating system to last application domain - of course, with different intensity and success. A clear prove of OO application in all situations is the development of a wide range of industrial applications. OO technology allows drawing of relation between the geometry, topology and dimensions of data on a class hierarchy; thus, the observation of the amount of data gained by research in many scientific domains is facilitated through class libraries both for graphic primitives and for events examination. In conformity to all waiting, OO asserts in every distributive system, there are very important the applications for making open systems customer-server and dis-tributed applications in Java. Finally OO application in robot's programming and modeling needn't be omitted. However, far to be panacea, OO has also shades which will be researched so on.

  4. [Abortion and conscientious objection].

    Science.gov (United States)

    Czarkowski, Marek

    2015-03-01

    Polish laws specify the parties responsible for lawful medical care in the availability of abortion differently than the Resolution of the Council of Europe. According to Polish regulations they include all Polish doctors while according to the Resolution, the state. Polish rules should not discriminate against anyone in connection with his religion or belief, even more so because the issue of abortion is an example of an unresolved ethical dispute. The number of lawful abortion in Poland does not exceed 1000 per year and can be carried out by only a few specialists contracted by the National Health Fund. Sufficient information and assistance should be provided to all pregnant women by the National Health Fund. The participation of all physicians in the informing process is not necessary, as evidenced by the lack of complaints to provide information on where in vitro fertilization treatment can be found - until recently only available when paid for by the individual and performed in much larger numbers than abortion. Entities performing this paid procedure made sure to provide information on their own. The rejection of the right to the conscientious objection clause by negating the right to refuse information may lead some to give up the profession or cause the termination of certain professionals on the basis of the professed worldview. Meanwhile, doctors are not allowed to be discriminated against on the basis of their conscience or religion. © 2015 MEDPRESS.

  5. Target-object integration, attention distribution, and object orientation interactively modulate object-based selection.

    Science.gov (United States)

    Al-Janabi, Shahd; Greenberg, Adam S

    2016-10-01

    The representational basis of attentional selection can be object-based. Various studies have suggested, however, that object-based selection is less robust than spatial selection across experimental paradigms. We sought to examine the manner by which the following factors might explain this variation: Target-Object Integration (targets 'on' vs. part 'of' an object), Attention Distribution (narrow vs. wide), and Object Orientation (horizontal vs. vertical). In Experiment 1, participants discriminated between two targets presented 'on' an object in one session, or presented as a change 'of' an object in another session. There was no spatial cue-thus, attention was initially focused widely-and the objects were horizontal or vertical. We found evidence of object-based selection only when targets constituted a change 'of' an object. Additionally, object orientation modulated the sign of object-based selection: We observed a same-object advantage for horizontal objects, but a same-object cost for vertical objects. In Experiment 2, an informative cue preceded a single target presented 'on' an object or as a change 'of' an object (thus, attention was initially focused narrowly). Unlike in Experiment 1, we found evidence of object-based selection independent of target-object integration. We again found that the sign of selection was modulated by the objects' orientation. This result may reflect a meridian effect, which emerged due to anisotropies in the cortical representations when attention is oriented endogenously. Experiment 3 revealed that object orientation did not modulate object-based selection when attention was oriented exogenously. Our findings suggest that target-object integration, attention distribution, and object orientation modulate object-based selection, but only in combination.

  6. A Wearable Goggle Navigation System for Dual-Mode Optical and Ultrasound Localization of Suspicious Lesions: Validation Studies Using Tissue-Simulating Phantoms and an Ex Vivo Human Breast Tissue Model.

    Directory of Open Access Journals (Sweden)

    Zeshu Zhang

    Full Text Available Surgical resection remains the primary curative treatment for many early-stage cancers, including breast cancer. The development of intraoperative guidance systems for identifying all sites of disease and improving the likelihood of complete surgical resection is an area of active ongoing research, as this can lead to a decrease in the need of subsequent additional surgical procedures. We develop a wearable goggle navigation system for dual-mode optical and ultrasound imaging of suspicious lesions. The system consists of a light source module, a monochromatic CCD camera, an ultrasound system, a Google Glass, and a host computer. It is tested in tissue-simulating phantoms and an ex vivo human breast tissue model. Our experiments demonstrate that the surgical navigation system provides useful guidance for localization and core needle biopsy of simulated tumor within the tissue-simulating phantom, as well as a core needle biopsy and subsequent excision of Indocyanine Green (ICG-fluorescing sentinel lymph nodes. Our experiments support the contention that this wearable goggle navigation system can be potentially very useful and fully integrated by the surgeon for optimizing many aspects of oncologic surgery. Further engineering optimization and additional in vivo clinical validation work is necessary before such a surgical navigation system can be fully realized in the everyday clinical setting.

  7. Haptic perception of mutiple objects

    NARCIS (Netherlands)

    Plaisier, M.A.

    2010-01-01

    In this thesis a series of investigations into haptic (touch) perception of multiple objects is presented. When we hold a collection of objects in our hand, we can extract different types of information about these objects. We can, for instance, identify which objects we are holding. The first

  8. Aggregating and Disaggregating Flexibility Objects

    DEFF Research Database (Denmark)

    Siksnys, Laurynas; Valsomatzis, Emmanouil; Hose, Katja

    2015-01-01

    of such objects while preserving flexibility. Hence, this paper formally defines the concept of flexibility objects (flex-objects) and provides a novel and efficient solution for aggregating and disaggregating flex-objects. Out of the broad range of possible applications, this paper will focus on smart grid...... the energy domain show that the proposed solutions provide good performance while satisfying the strict requirements....

  9. Challenges of conservation: working objects

    Directory of Open Access Journals (Sweden)

    Professor Elizabeth Pye

    2016-11-01

    Full Text Available This paper discusses the concepts and practice of museum conservation, and the role of conservation in preserving both material and significance of objects. It explores the conservation of science and industry collections and the fact that the significance of many of these objects lies in their operation. It considers alternatives to operating original objects but emphasises the value of experiencing the real thing, and argues that visitors should be given greater physical access to museum objects, including being enabled to handle and work functioning objects. It finishes by calling for research into the effects of operation on the objects themselves, and into what constitutes a satisfying experience of working objects.

  10. [Supernormal and alternating conduction in intermittent bundle branch block and intermittent or concealed ventricular preexcitation. Electrophysiological study, mechanisms and clinical considerations].

    Science.gov (United States)

    Costantini, Marcello

    2016-05-01

    Supernormal and alternating conduction are not rare in clinical arrhythmology, detectable at various levels of the conduction system in different pathophysiological conditions, and often associated, so as to justify the search for a possible link between them. In order to define a possible relationship between supernormal and alternating conduction, the electrophysiological data of two patient groups were analyzed. Group 1 included 9 patients with intermittent bundle branch block in the presence of supernormal conduction through the pathological branch. Group 2 included 16 patients with ventricular preexcitation, intermittent or concealed, in the presence of supernormal conduction through the atrioventricular accessory pathway. In group 1, 8 patients had a phase 3 and 1 patient a phase 3 and phase 4 bundle branch block. In all 9 patients, the area of phase 3 block was interrupted by a window of unexpected conductivity detectable by atrial premature stimulation. In 7/9 cases, by modulating the atrial rate, alternating conduction through the branch was observed, and the cardiac cycle of occurrence of the phenomenon was in the range of supernormal conduction in 6/7 cases. In group 2, 11 patients showed conduction through the accessory pathway only for a narrow range of cardiac cycles, during atrial premature stimulation. One patient had a prolonged accessory pathway refractory period (phase 3 block), but a window of unexpected supernormal conduction within the refractory zone was observed at atrial premature stimulation. Another patient presented a tachycardia and bradycardia-dependent block along the accessory pathway (phase 3 and phase 4 block) and the phase 3 block area was interrupted by a window of supernormal conduction. In the other three cases, supernormal conduction was manifested as unexpected resumption of conductivity through the accessory pathway for atrial cycles more precocious than the actual duration of its effective refractoriness. By modulating the

  11. Internet-Based Assessment of Oncology Health Care Professional Learning Style and Optimization of Materials for Web-Based Learning: Controlled Trial With Concealed Allocation.

    Science.gov (United States)

    Micheel, Christine M; Anderson, Ingrid A; Lee, Patricia; Chen, Sheau-Chiann; Justiss, Katy; Giuse, Nunzia B; Ye, Fei; Kusnoor, Sheila V; Levy, Mia A

    2017-07-25

    Precision medicine has resulted in increasing complexity in the treatment of cancer. Web-based educational materials can help address the needs of oncology health care professionals seeking to understand up-to-date treatment strategies. This study aimed to assess learning styles of oncology health care professionals and to determine whether learning style-tailored educational materials lead to enhanced learning. In all, 21,465 oncology health care professionals were invited by email to participate in the fully automated, parallel group study. Enrollment and follow-up occurred between July 13 and September 7, 2015. Self-enrolled participants took a learning style survey and were assigned to the intervention or control arm using concealed alternating allocation. Participants in the intervention group viewed educational materials consistent with their preferences for learning (reading, listening, and/or watching); participants in the control group viewed educational materials typical of the My Cancer Genome website. Educational materials covered the topic of treatment of metastatic estrogen receptor-positive (ER+) breast cancer using cyclin-dependent kinases 4/6 (CDK4/6) inhibitors. Participant knowledge was assessed immediately before (pretest), immediately after (posttest), and 2 weeks after (follow-up test) review of the educational materials. Study statisticians were blinded to group assignment. A total of 751 participants enrolled in the study. Of these, 367 (48.9%) were allocated to the intervention arm and 384 (51.1%) were allocated to the control arm. Of those allocated to the intervention arm, 256 (69.8%) completed all assessments. Of those allocated to the control arm, 296 (77.1%) completed all assessments. An additional 12 participants were deemed ineligible and one withdrew. Of the 552 participants, 438 (79.3%) self-identified as multimodal learners. The intervention arm showed greater improvement in posttest score compared to the control group (0.4 points

  12. Object-Interviews: Folding, Unfolding, and Refolding Perceptions of Objects

    Directory of Open Access Journals (Sweden)

    Susan Naomi Nordstrom PhD

    2013-02-01

    Full Text Available This article describes the object-interview as a Deleuzian space in which subjects and objects, living and nonliving, entangle together. I developed the object-interview to understand the connections that 11 Midwestern family history genealogists made between objects (e.g., documents, photographs, and other artifacts and their ancestors. The object-interview suggests an alternative way to think and do qualitative interviews informed by poststructural theories. The method draws on French philosopher Deleuze's concepts of the fold, events, and a life, as well as conventional qualitative interview literature. Deleuze's concepts offer a way to rethink objects and subjects as fibrous, connective, and folding entities in qualitative interviews. Such a rethinking offers an alternative to subject-centered conventional qualitative interviews in which subjects are teased apart from objects and subjects primarily produce knowledge. The object-interview, then, is a Deleuzian space in which the supposed distinctions between subjects and objects, as well as other binary divisions, become indistinct, or entangled, as both subjects and objects produce knowledge. That space enabled me to create the concept ensemble of life—a constantly shifting group of objects associated with a person's life. In this article, I describe the theoretical entanglement of the object-interview, the object-interview itself, the data it produced in my dissertation study, and the significance of the method to the field of qualitative research methods.

  13. Healthcare responsibilities and conscientious objection.

    Science.gov (United States)

    Cook, Rebecca J; Olaya, Mónica Arango; Dickens, Bernard M

    2009-03-01

    The Constitutional Court of Colombia has issued a decision of international significance clarifying legal duties of providers, hospitals, and healthcare systems when conscientious objection is made to conducting lawful abortion. The decision establishes objecting providers' duties to refer patients to non-objecting providers, and that hospitals, clinics, and other institutions have no rights of conscientious objection. Their professional and legal duties are to ensure that patients receive timely services. Hospitals and other administrators cannot object, because they do not participate in the procedures they are obliged to arrange. Objecting providers, and hospitals, must maintain knowledge of non-objecting providers to whom their patients must be referred. Accordingly, medical schools must adequately train, and licensing authorities approve, non-objecting providers. Where they are unavailable, midwives and perhaps nurse practitioners may be trained, equipped, and approved for appropriate service delivery. The Court's decision has widespread implications for how healthcare systems must accommodate conscientious objection and patients' legal rights.

  14. Making CORBA objects persistent: The object database adapter approach

    Energy Technology Data Exchange (ETDEWEB)

    Reverbel, F.C.R.

    1997-05-01

    In spite of its remarkable successes in promoting standards for distributed object systems, the Object Management Group (OMG) has not yet settled the issue of object persistence in the Object Request Broker (ORB) environment. The Common Object Request Broker Architecture (CORBA) specification briefly mentions an Object-Oriented Database Adapter that makes objects stored in an object-oriented database accessible through the ORB. This idea is pursued in the Appendix B of the ODMG standard, which identifies a number of issues involved in using an Object Database Management System (ODBMS) in a CORBA environment, and proposes an Object Database Adapter (ODA) to realize the integration of the ORB with the ODBMS. This paper discusses the design and implementation of an ODA that integrates an ORB and an ODBMS with C++ bindings. For the author`s purposes, an ODBMS is a system with programming interfaces. It may be a pure object-oriented DBMS (an OODBMS), or a combination of a relational DBMS and an object-relational mapper.

  15. Single versus multiple objective(s) decision making: an application ...

    African Journals Online (AJOL)

    Single objective approach is most widely used whereas consideration of multiple objectives is the rule rather than an exception in many real life decision-making circumstances. This paper, therefore, investigates whether or not single and multiple criteria/objective approaches necessarily lead to differing conclusions.

  16. Minimum Delay Moving Object Detection

    KAUST Repository

    Lao, Dong

    2017-01-08

    We present a general framework and method for detection of an object in a video based on apparent motion. The object moves relative to background motion at some unknown time in the video, and the goal is to detect and segment the object as soon it moves in an online manner. Due to unreliability of motion between frames, more than two frames are needed to reliably detect the object. Our method is designed to detect the object(s) with minimum delay, i.e., frames after the object moves, constraining the false alarms. Experiments on a new extensive dataset for moving object detection show that our method achieves less delay for all false alarm constraints than existing state-of-the-art.

  17. Objective Tests and Their Construction

    Science.gov (United States)

    Dimes, R. E.

    1973-01-01

    Summarizes classifications of educational objectives, types of test items, and principles underlying the construction of tests. Indicates that a combination of essay and objective tests is preferable in the overall evaluation of a course. (CC)

  18. Two Types of Visual Objects

    Directory of Open Access Journals (Sweden)

    Skrzypulec Błażej

    2015-06-01

    Full Text Available While it is widely accepted that human vision represents objects, it is less clear which of the various philosophical notions of ‘object’ adequately characterizes visual objects. In this paper, I show that within contemporary cognitive psychology visual objects are characterized in two distinct, incompatible ways. On the one hand, models of visual organization describe visual objects in terms of combinations of features, in accordance with the philosophical bundle theories of objects. However, models of visual persistence apply a notion of visual objects that is more similar to that endorsed in philosophical substratum theories. Here I discuss arguments that might show either that only one of the above notions of visual objects is adequate in the context of human vision, or that the category of visual objects is not uniform and contains entities properly characterized by different philosophical conceptions.

  19. Object Knowledge Modulates Colour Appearance

    Directory of Open Access Journals (Sweden)

    Christoph Witzel

    2011-01-01

    Full Text Available We investigated the memory colour effect for colour diagnostic artificial objects. Since knowledge about these objects and their colours has been learned in everyday life, these stimuli allow the investigation of the influence of acquired object knowledge on colour appearance. These investigations are relevant for questions about how object and colour information in high-level vision interact as well as for research about the influence of learning and experience on perception in general. In order to identify suitable artificial objects, we developed a reaction time paradigm that measures (subjective colour diagnosticity. In the main experiment, participants adjusted sixteen such objects to their typical colour as well as to grey. If the achromatic object appears in its typical colour, then participants should adjust it to the opponent colour in order to subjectively perceive it as grey. We found that knowledge about the typical colour influences the colour appearance of artificial objects. This effect was particularly strong along the daylight axis.

  20. Object knowledge modulates colour appearance

    Science.gov (United States)

    Witzel, Christoph; Valkova, Hanna; Hansen, Thorsten; Gegenfurtner, Karl R

    2011-01-01

    We investigated the memory colour effect for colour diagnostic artificial objects. Since knowledge about these objects and their colours has been learned in everyday life, these stimuli allow the investigation of the influence of acquired object knowledge on colour appearance. These investigations are relevant for questions about how object and colour information in high-level vision interact as well as for research about the influence of learning and experience on perception in general. In order to identify suitable artificial objects, we developed a reaction time paradigm that measures (subjective) colour diagnosticity. In the main experiment, participants adjusted sixteen such objects to their typical colour as well as to grey. If the achromatic object appears in its typical colour, then participants should adjust it to the opponent colour in order to subjectively perceive it as grey. We found that knowledge about the typical colour influences the colour appearance of artificial objects. This effect was particularly strong along the daylight axis. PMID:23145224

  1. Minimum Delay Moving Object Detection

    KAUST Repository

    Lao, Dong

    2017-11-09

    We present a general framework and method for detection of an object in a video based on apparent motion. The object moves relative to background motion at some unknown time in the video, and the goal is to detect and segment the object as soon it moves in an online manner. Due to unreliability of motion between frames, more than two frames are needed to reliably detect the object. Our method is designed to detect the object(s) with minimum delay, i.e., frames after the object moves, constraining the false alarms. Experiments on a new extensive dataset for moving object detection show that our method achieves less delay for all false alarm constraints than existing state-of-the-art.

  2. Multidisciplinary Optimization Object Library Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The development of a library of Common MDO Objects is proposed, in which the software objects will automate a variety of recurring problems in the development of MDO...

  3. Object tracking with stereo vision

    Science.gov (United States)

    Huber, Eric

    1994-01-01

    A real-time active stereo vision system incorporating gaze control and task directed vision is described. Emphasis is placed on object tracking and object size and shape determination. Techniques include motion-centroid tracking, depth tracking, and contour tracking.

  4. Object Knowledge Modulates Colour Appearance

    OpenAIRE

    Witzel, Christoph; Valkova, Hanna; Hansen, Thorsten; Gegenfurtner, Karl R.

    2011-01-01

    We investigated the memory colour effect for colour diagnostic artificial objects. Since knowledge about these objects and their colours has been learned in everyday life, these stimuli allow the investigation of the influence of acquired object knowledge on colour appearance. These investigations are relevant for questions about how object and colour information in high-level vision interact as well as for research about the influence of learning and experience on perception in general. In o...

  5. A Model for Concurrent Objects

    DEFF Research Database (Denmark)

    Sørensen, Morten U.

    1996-01-01

    We present a model for concurrent objects where obejcts interact by taking part in common events that are closely matched to form call-response pairs, resulting in resulting in rendez-vous like communications. Objects are built from primitive objects by parallel composition, encapsulation and hid...

  6. Clustering objects from multiple collections

    NARCIS (Netherlands)

    Hollink, V.; van Someren, M.; de Boer, V.

    2009-01-01

    Clustering methods cluster objects on the basis of a similarity measure between the objects. In clustering tasks where the objects come from more than one collection often part of the similarity results from features that are related to the collections rather than features that are relevant for the

  7. Objects as Temporary Autonomous Zones

    Directory of Open Access Journals (Sweden)

    Tim Morton

    2011-09-01

    Full Text Available From Hakim Bey's instructions on creating temporary autonomous zones we see an oscillation "between performance art and politics, circus clowning and revolution." In this essay Tim Morton discusses anarchist politics as, "the creation of fresh objects in a reality without a top or a bottom object, or for that matter a middle object."

  8. Overview of the Microscope Objective

    Science.gov (United States)

    Niu, Ruijuan

    Microscopes are widely used in research and industry. The objective lens is the most significant part of the microscope. Some characteristics and different types of microscope objectives are discussed in this thesis. The markings on the objective indicate some main optical characteristics. However, it is not always possible to know the materials, the radius or the thickness of each surface in an objective lens and it is not easy to simulate an objective without this data. In this thesis, we build a first order model which can simulate a refractive microscope objective when the magnification and numerical aperture are known. The model contains a thin lens made by two standard surfaces and also simulates the principal planes. This model provides more accurate ray heights and it is aplanatic. Some design examples of an objective lens are also discussed in order to get a better understanding of design and optimization considerations.

  9. Propensity to Click on Suspicious Links

    DEFF Research Database (Denmark)

    Sudzina, Frantisek; Pavlicek, Antonin

    2017-01-01

    There already exists a certain, not huge, body of knowledge about impact of personality traits on susceptibility to phishing. But there is a gap when it comes specifically to phishing with links pretending to lead to deal sites. The paper analyzes if gender, age and personality traits influence.......1. Openness to experience was linked positively linked to responsible behavior, narcissism was negatively linked....

  10. Object recognition memory in zebrafish.

    Science.gov (United States)

    May, Zacnicte; Morrill, Adam; Holcombe, Adam; Johnston, Travis; Gallup, Joshua; Fouad, Karim; Schalomon, Melike; Hamilton, Trevor James

    2016-01-01

    The novel object recognition, or novel-object preference (NOP) test is employed to assess recognition memory in a variety of organisms. The subject is exposed to two identical objects, then after a delay, it is placed back in the original environment containing one of the original objects and a novel object. If the subject spends more time exploring one object, this can be interpreted as memory retention. To date, this test has not been fully explored in zebrafish (Danio rerio). Zebrafish possess recognition memory for simple 2- and 3-dimensional geometrical shapes, yet it is unknown if this translates to complex 3-dimensional objects. In this study we evaluated recognition memory in zebrafish using complex objects of different sizes. Contrary to rodents, zebrafish preferentially explored familiar over novel objects. Familiarity preference disappeared after delays of 5 mins. Leopard danios, another strain of D. rerio, also preferred the familiar object after a 1 min delay. Object preference could be re-established in zebra danios by administration of nicotine tartrate salt (50mg/L) prior to stimuli presentation, suggesting a memory-enhancing effect of nicotine. Additionally, exploration biases were present only when the objects were of intermediate size (2 × 5 cm). Our results demonstrate zebra and leopard danios have recognition memory, and that low nicotine doses can improve this memory type in zebra danios. However, exploration biases, from which memory is inferred, depend on object size. These findings suggest zebrafish ecology might influence object preference, as zebrafish neophobia could reflect natural anti-predatory behaviour. Copyright © 2015 Elsevier B.V. All rights reserved.

  11. Graspable objects shape number processing

    Directory of Open Access Journals (Sweden)

    Mariagrazia eRanzini

    2011-12-01

    Full Text Available The field of numerical cognition represents an interesting case for action-based theories of cognition, since number is a special kind of abstract concept. Several studies have shown that within the parietal lobes adjacent neural regions code numerical magnitude and grasping-related information. This anatomical proximity between brain areas involved in number and sensorimotor processes may account for interactions between numerical magnitude and action. In particular, recent studies has demonstrated a causal role of action perception on numerical magnitude processing. If objects are represented in terms of actions (affordances, the causal role of action on number processing should extend to the case of objects affordances. This study investigates the relationship between numbers and objects affordances in two experiments, without (Experiment 1 or with (Experiment 2 a motor action execution (i.e., participants were asked to hold an object in their hands during the task. The task consisted in repeating aloud the odd or even digit within a pair depending on the type of the preceding or following object. Order of presentation (object-number vs. number-object, object type (graspable vs. ungraspable, object size (small vs. large, and Numerical magnitude (small vs. large were manipulated for each experiment. Experiment 1 showed a facilitation – in terms of quicker responses - for graspable over ungraspable objects preceded by numbers, and an effect of numerical magnitude after the presentation of graspable objects. Experiment 2 demonstrated that the action execution enhanced overall the sensitivity to numerical magnitude, however interfering with the effects of objects affordances on number processing. Overall, these findings demonstrate that numbers and graspable objects communicate with each other, supporting the view that abstract concepts may be grounded in motor experience.

  12. Single versus Multiple Objective(s) Decision Making: An Application ...

    African Journals Online (AJOL)

    Rahel

    Keywords: Single versus Multiple Criteria/Objectives; Linear Programming, Goal. Programming; Subsistence Farms .... rule-of-thumb for balancing environmental, employment and other objectives or is non-optimal, .... total fuel or energy need of the household is determined from the dataset on the basis of fuel wood need ...

  13. Relations among Early Object Recognition Skills: Objects and Letters

    Science.gov (United States)

    Augustine, Elaine; Jones, Susan S.; Smith, Linda B.; Longfield, Erica

    2015-01-01

    Human visual object recognition is multifaceted and comprised of several domains of expertise. Developmental relations between young children's letter recognition and their 3-dimensional object recognition abilities are implicated on several grounds but have received little research attention. Here, we ask how preschoolers' success in recognizing…

  14. Channels as Objects in Concurrent Object-Oriented Programming

    Directory of Open Access Journals (Sweden)

    Joana Campos

    2011-10-01

    Full Text Available There is often a sort of a protocol associated to each class, stating when and how certain methods should be called. Given that this protocol is, if at all, described in the documentation accompanying the class, current mainstream object-oriented languages cannot provide for the verification of client code adherence against the sought class behaviour. We have defined a class-based concurrent object-oriented language that formalises such protocols in the form of usage types. Usage types are attached to class definitions, allowing for the specification of (1 the available methods, (2 the tests clients must perform on the result of methods, and (3 the object status - linear or shared - all of which depend on the object's state. Our work extends the recent approach on modular session types by eliminating channel operations, and defining the method call as the single communication primitive in both sequential and concurrent settings. In contrast to previous works, we define a single category for objects, instead of distinct categories for linear and for shared objects, and let linear objects evolve into shared ones. We introduce a standard sync qualifier to prevent thread interference in certain operations on shared objects. We formalise the language syntax, the operational semantics, and a type system that enforces by static typing that methods are called only when available, and by a single client if so specified in the usage type. We illustrate the language via a complete example.

  15. Refining Visually Detected Object poses

    DEFF Research Database (Denmark)

    Holm, Preben; Petersen, Henrik Gordon

    2010-01-01

    to the particular object and in order to handle the demand for flexibility, there is an increasing demand for avoiding such dedicated mechanical alignment systems. Rather, it would be desirable to automatically locate and grasp randomly placed objects from tables, conveyor belts or even bins with a high accuracy......Automated industrial assembly today require that the 3D position and orientation (hereafter ''pose`) of the objects to be assembled are known precisely. Today this precision is mostly established by a dedicated mechanical object alignment system. However, such systems are often dedicated...... that enables direct assembly. Conventional vision systems and laser triangulation systems can locate randomly placed known objects (with 3D CAD models available) with some accuracy, but not necessarily a good enough accuracy. In this paper, we present a novel method for refining the pose accuracy of an object...

  16. Objective interpretation as conforming interpretation

    OpenAIRE

    Lidka Rodak

    2011-01-01

    The practical discourse willingly uses the formula of “objective interpretation”, with no regards to its controversial nature that has been discussed in literature.The main aim of the article is to investigate what “objective interpretation” could mean and how it could be understood in the practical discourse, focusing on the understanding offered by judicature.The thesis of the article is that objective interpretation, as identified with textualists’ position, is not possible to uphold, and ...

  17. Bayesian Tracking of Visual Objects

    Science.gov (United States)

    Zheng, Nanning; Xue, Jianru

    Tracking objects in image sequences involves performing motion analysis at the object level, which is becoming an increasingly important technology in a wide range of computer video applications, including video teleconferencing, security and surveillance, video segmentation, and editing. In this chapter, we focus on sequential Bayesian estimation techniques for visual tracking. We first introduce the sequential Bayesian estimation framework, which acts as the theoretic basis for visual tracking. Then, we present approaches to constructing representation models for specific objects.

  18. Ferromagnetic Objects Magnetovision Detection System

    Directory of Open Access Journals (Sweden)

    Michał Nowicki

    2013-12-01

    Full Text Available This paper presents the application of a weak magnetic fields magnetovision scanning system for detection of dangerous ferromagnetic objects. A measurement system was developed and built to study the magnetic field vector distributions. The measurements of the Earth’s field distortions caused by various ferromagnetic objects were carried out. The ability for passive detection of hidden or buried dangerous objects and the determination of their location was demonstrated.

  19. Object Based Systems Engineering (OBSE)

    Science.gov (United States)

    2011-10-27

    these objects, containers can be reproduced as desired.  MBSE proponents and initiatives clearly have Object Based System Engineering as their...multiple, diverse SE methods. 1970 Paper Documents 1980 OBSE MBSE E-Documents 1990 2000 2010 2020 TECHNOI.DGY DRNEN. WARRGHTER FOCUSED. 8...includes the derivation rationale, i.e. How? or Why?  Capture minority viewpoints and discussion threads for each object of interest. • Lessons

  20. Cognition, action, and object manipulation.

    Science.gov (United States)

    Rosenbaum, David A; Chapman, Kate M; Weigelt, Matthias; Weiss, Daniel J; van der Wel, Robrecht

    2012-09-01

    Although psychology is the science of mental life and behavior, little attention has been paid to the means by which mental life is translated into behavior. One domain in which links between cognition and action have been explored is the manipulation of objects. This article reviews psychological research on this topic, with special emphasis on the tendency to grasp objects differently depending on what one plans to do with the objects. Such differential grasping has been demonstrated in a wide range of object manipulation tasks, including grasping an object in a way that reveals anticipation of the object's future orientation, height, and required placement precision. Differential grasping has also been demonstrated in a wide range of behaviors, including 1-hand grasps, 2-hand grasps, walking, and transferring objects from place to place as well as from person to person. The populations in which the tendency has been shown are also diverse, including nonhuman primates as well as human adults, children, and babies. The tendency is compromised in a variety of clinical populations and in children of a surprisingly advanced age. Verbal working memory is compromised as well if words are memorized while object manipulation tasks are performed; the recency portion of the serial position curve is reduced in this circumstance. In general, the research reviewed here points to rich connections between cognition and action as revealed through the study of object manipulation. Other implications concern affordances, Donders' law, naturalistic observation, and the teaching of psychology. (PsycINFO Database Record (c) 2012 APA, all rights reserved).

  1. Exploring Power with Object Theatre

    DEFF Research Database (Denmark)

    Ryöppy, Merja; Ylirisku, Salu; Knutz, Eva

    2017-01-01

    This paper explores Object Theatre as an approach to address power in design. We understand power as a relational activity that emerges and is upheld through particular ways of relating (Elias, 1991; Stacey, 2007). The spontaneity in participant actions through Object Theatre exercises renders...... processes of relating tangible and negotiable. In this study Object Theatre was applied in exploration of a new walking aid for elderly people. We argue that the shift in perspective that Object Theatre allows designers to achieve can be effectively harnessed to explore issues arising from power relating...

  2. Minimum Delay Moving Object Detection

    KAUST Repository

    Lao, Dong

    2017-05-14

    This thesis presents a general framework and method for detection of an object in a video based on apparent motion. The object moves, at some unknown time, differently than the “background” motion, which can be induced from camera motion. The goal of proposed method is to detect and segment the object as soon it moves in an online manner. Since motion estimation can be unreliable between frames, more than two frames are needed to reliably detect the object. Observing more frames before declaring a detection may lead to a more accurate detection and segmentation, since more motion may be observed leading to a stronger motion cue. However, this leads to greater delay. The proposed method is designed to detect the object(s) with minimum delay, i.e., frames after the object moves, constraining the false alarms, defined as declarations of detection before the object moves or incorrect or inaccurate segmentation at the detection time. Experiments on a new extensive dataset for moving object detection show that our method achieves less delay for all false alarm constraints than existing state-of-the-art.

  3. Identification of computer graphics objects

    Directory of Open Access Journals (Sweden)

    Rossinskyi Yu.M.

    2016-04-01

    Full Text Available The article is devoted to the use of computer graphics methods in problems of creating drawings, charts, drafting, etc. The widespread use of these methods requires the development of efficient algorithms for the identification of objects of drawings. The article analyzes the model-making algorithms for this problem and considered the possibility of reducing the time using graphics editing operations. Editing results in such operations as copying, moving and deleting objects specified images. These operations allow the use of a reliable identification of images of objects methods. For information on the composition of the image of the object along with information about the identity and the color should include information about the spatial location and other characteristics of the object (the thickness and style of contour lines, fill style, and so on. In order to enable the pixel image analysis to structure the information it is necessary to enable the initial code image objects color. The article shows the results of the implementation of the algorithm of encoding object identifiers. To simplify the process of building drawings of any kind, and reduce time-consuming, method of drawing objects identification is proposed based on the use as the ID information of the object color.

  4. 43 CFR 10.7 - Disposition of unclaimed human remains, funerary objects, sacred objects, or objects of cultural...

    Science.gov (United States)

    2010-10-01

    ..., funerary objects, sacred objects, or objects of cultural patrimony. 10.7 Section 10.7 Public Lands... REGULATIONS Human Remains, Funerary Objects, Sacred Objects, or Objects of Cultural Patrimony From Federal or... of cultural patrimony. ...

  5. Unsupervised Primary Object Discovery in Videos Based on Evolutionary Primary Object Modeling With Reliable Object Proposals.

    Science.gov (United States)

    Koh, Yeong Jun; Kim, Chang-Su

    2017-11-01

    A novel primary object discovery (POD) algorithm, which uses reliable object proposals while exploiting the recurrence property of a primary object in a video sequence, is proposed in this paper. First, we generate both color-based and motion-based object proposals in each frame, and extract the feature of each proposal using the random walk with restart simulation. Next, we estimate the foreground confidence for each proposal to remove unreliable proposals. By superposing the features of the remaining reliable proposals, we construct the primary object models. To this end, we develop the evolutionary primary object modeling technique, which exploits the recurrence property of the primary object. Then, using the primary object models, we choose the main proposal in each frame and find the location of the primary object by merging the main proposal with candidate proposals selectively. Finally, we refine the discovered bounding boxes by exploiting temporal correlations of the recurring primary object. Extensive experimental results demonstrate that the proposed POD algorithm significantly outperforms conventional algorithms.

  6. Welding. Performance Objectives. Basic Course.

    Science.gov (United States)

    Vincent, Kenneth

    Several intermediate performance objectives and corresponding criterion measures are listed for each of eight terminal objectives for a basic welding course. The materials were developed for a 36-week (2 hours daily) course developed to teach the fundamentals of welding shop work, to become familiar with the operation of the welding shop…

  7. Welding. Performance Objectives. Intermediate Course.

    Science.gov (United States)

    Vincent, Kenneth

    Several intermediate performance objectives and corresponding criterion measures are listed for each of nine terminal objectives for an intermediate welding course. The materials were developed for a 36-week (3 hours daily) course designed to prepare the student for employment in the field of welding. Electric welding and specialized (TIG & MIG)…

  8. Designing Instruction with Learning Objects.

    Science.gov (United States)

    Hamel, Cheryl J.; Ryan-Jones, David

    2002-01-01

    Discussion of online learning and standards for web-based and computer-based courseware focuses on learning objects, defined here as small, stand-alone units of instruction that can be tagged with descriptors and stored for reuse in various instructional contexts. Presents principles of learning object design and guidelines for assuring that…

  9. Objective interpretation as conforming interpretation

    Directory of Open Access Journals (Sweden)

    Lidka Rodak

    2011-12-01

    Full Text Available The practical discourse willingly uses the formula of “objective interpretation”, with no regards to its controversial nature that has been discussed in literature.The main aim of the article is to investigate what “objective interpretation” could mean and how it could be understood in the practical discourse, focusing on the understanding offered by judicature.The thesis of the article is that objective interpretation, as identified with textualists’ position, is not possible to uphold, and should be rather linked with conforming interpretation. And what this actually implies is that it is not the virtue of certainty and predictability – which are usually associated with objectivity- but coherence that makes the foundation of applicability of objectivity in law.What could be observed from the analyses, is that both the phenomenon of conforming interpretation and objective interpretation play the role of arguments in the interpretive discourse, arguments that provide justification that interpretation is not arbitrary or subjective. With regards to the important part of the ideology of legal application which is the conviction that decisions should be taken on the basis of law in order to exclude arbitrariness, objective interpretation could be read as a question “what kind of authority “supports” certain interpretation”? that is almost never free of judicial creativity and judicial activism.One can say that, objective and conforming interpretation are just another arguments used in legal discourse.

  10. Introducing Object-Oriented Programming

    DEFF Research Database (Denmark)

    Caspersen, Michael Edelgaard

    2008-01-01

    The practice of teaching programming at universities, colleges and high schools went through a major change roughly in the mid 1990s: The teaching of objectorientation in introductory courses slowly became mainstream. Fairly soon, the Object First or Objects Early school of thought was formulated...

  11. Learning Objects: Conditions for Viability

    Science.gov (United States)

    Liber, O.

    2005-01-01

    This article elaborates the factors that have led to the emergence of the concept of learning objects as the predominant model for digital learning materials, examining the problems that they address. It suggests that while there do appear to be real benefits, for a learning object model to be successful there needs to be a thriving learning…

  12. Object Oriented Programming in Director

    Directory of Open Access Journals (Sweden)

    Marian DARDALA

    2006-01-01

    Full Text Available Director is one of the most popular authoring software. As software for developing multimedia applications, Director is an object oriented programming environment. A very important issue to develop multimedia applications is the designing of their own classes. This paper presents the particular aspects concerning the available facilities offered by Lingo to design classes and to generate objects.

  13. Designing active objects in DEGAS

    NARCIS (Netherlands)

    J.F.P. van den Akker; A.P.J.M. Siebes (Arno)

    1997-01-01

    textabstractThis report discusses application design for active databases, in particular for the active object-based database programming language DEGAS. In DEGAS one modularisation principle, the object, is applied to all elements of the application, including rules. We discuss a design process

  14. DEGAS: Capturing dynamics in objects

    NARCIS (Netherlands)

    J.F.P. van den Akker; A.P.J.M. Siebes (Arno)

    1996-01-01

    textabstractIn this paper we introduce Degas (Dynamic Entities Get Autonomous Status), an active temporal data model based on autonomous objects. The active dimension of Degas means that we define the behaviour of objects in terms of production rules. The temporal dimension means that the history of

  15. What Makes an Object Memorable?

    KAUST Repository

    Dubey, Rachit

    2016-02-19

    Recent studies on image memorability have shed light on what distinguishes the memorability of different images and the intrinsic and extrinsic properties that make those images memorable. However, a clear understanding of the memorability of specific objects inside an image remains elusive. In this paper, we provide the first attempt to answer the question: what exactly is remembered about an image? We augment both the images and object segmentations from the PASCAL-S dataset with ground truth memorability scores and shed light on the various factors and properties that make an object memorable (or forgettable) to humans. We analyze various visual factors that may influence object memorability (e.g. color, visual saliency, and object categories). We also study the correlation between object and image memorability and find that image memorability is greatly affected by the memorability of its most memorable object. Lastly, we explore the effectiveness of deep learning and other computational approaches in predicting object memorability in images. Our efforts offer a deeper understanding of memorability in general thereby opening up avenues for a wide variety of applications. © 2015 IEEE.

  16. Classification of Building Object Types

    DEFF Research Database (Denmark)

    Jørgensen, Kaj Asbjørn

    2011-01-01

    be managed by software applications and on the basis of building models. Classification systems with taxonomies of building object types have many application opportunities but can still be beneficial in data exchange between building construction partners. However, this will be performed by new methods...... and in strong connection with databases holding a wide range of object types....

  17. Aesthetic properties of everyday objects.

    Science.gov (United States)

    Stich, Christine; Knäuper, Bärbel; Eisermann, Jens; Leder, Helmut

    2007-06-01

    This research addresses whether one underlying concept of appreciation exists across different classes of objects. Three studies were done. To identify aesthetic properties relevant for the aesthetic judgment of everyday objects and paintings, in Study 1 expert interviews were conducted with 12 interior designers, object-oriented designers and architects, and 12 students of art history. In Study 2, multidimensional unfolding (MDU) was used to examine whether common judgment criteria can be identified for the objects of the different classes. A sample of 217 German subjects participated. 2- or 3-dimensional MDU solutions resulted for each object class. The identified dimensions were labeled using the aesthetic properties derived from the expert interviews (Study 1). These dimensions represent relevant dimensions of aesthetic judgment on which object properties vary. Study 2 suggested that people use different dimensions of aesthetic judgment for different object classes. The identified dimensions were then used to construct three sets of systematically varied everyday objects and one set of systematically varied paintings. Using this stimulus material in Study 3, conjoint analysis indicated these dimensions are differentially important for the overall aesthetic judgment.

  18. Object manipulation facilitates kind-based object individuation of shape-similar objects

    DEFF Research Database (Denmark)

    Kingo, Osman Skjold; Krøjgaard, Peter

    2011-01-01

    Five experiments investigated the importance of shape and object manipulation when 12-month-olds were given the task of individuating objects representing exemplars of kinds in an event-mapping design. In Experiments 1 and 2, results of the study from Xu, Carey, and Quint (2004, Experiment 4) were...... partially replicated, showing that infants were able to individuate two natural-looking exemplars from different categories, but not two exemplars from the same category. In Experiment 3, infants failed to individuate two shape-similar exemplars (from Pauen, 2002a) from different categories. However......, Experiment 4 revealed that allowing infants to manipulate objects shortly before the individuation task enabled them to individuate shape-similar objects from different categories. In Experiment 5, allowing object manipulation did not induce infants to individuate natural-looking objects from the same...

  19. Revealing Nonclassicality of Inaccessible Objects

    Science.gov (United States)

    Krisnanda, Tanjung; Zuppardo, Margherita; Paternostro, Mauro; Paterek, Tomasz

    2017-09-01

    Some physical objects are hardly accessible to direct experimentation. It is then desirable to infer their properties based solely on the interactions they have with systems over which we have control. In this spirit, here we introduce schemes for assessing the nonclassicality of the inaccessible objects as characterized by quantum discord. We consider two probes individually interacting with the inaccessible object but not with each other. The schemes are based on monitoring entanglement dynamics between the probes. Our method is robust and experimentally friendly, as it allows the probes and the object to be open systems and makes no assumptions about the initial state, dimensionality of involved Hilbert spaces, and details of the probe-object Hamiltonian. We apply our scheme to a membrane-in-the-middle optomechanical system, to detect system-environment correlations in open system dynamics as well as nonclassicality of the environment, and we foresee potential benefits for the inference of the nonclassical nature of gravity.

  20. The Surrealist Collection of Objects

    Directory of Open Access Journals (Sweden)

    Pérez, Leticia

    2010-01-01

    Full Text Available In this article I shall discuss the Surrealist collection of objects as a form of art which arises out of mass production forces of the new era. These goods, deeply rooted in the capitalist laws of use-, exchange- and surplus-value, carry in themselves two materialist approaches which end in dialectical materialism. On the one hand, they epitomize the supreme forces of commodity fetishism ingrained in capitalist structures; on the other hand, they arouse unconscious desires which respond to the needs of the society of consumption. Thus, I will explore the act of object-collecting in the most radical Surrealist practices (dream objects, found objects, poème-objets, calligrammes, readymades and Surrealist objects as a way to not only delve into a new art, but also to reflect on societal ongoing transformations and paradoxes.

  1. Scientists' views about communication objectives.

    Science.gov (United States)

    Besley, John C; Dudo, Anthony; Yuan, Shupei

    2017-08-01

    This study looks at how United States-based academic scientists from five professional scientific societies think about eight different communication objectives. The degree to which scientists say they would prioritize these objectives in the context of face-to-face public engagement is statistically predicted using the scientists' attitudes, normative beliefs, and efficacy beliefs, as well as demographics and past communication activity, training, and past thinking about the objectives. The data allow for questions about the degree to which such variables consistently predict views about objectives. The research is placed in the context of assessing factors that communication trainers might seek to reshape if they wanted get scientists to consider choosing specific communication objectives.

  2. Object-Oriented Type Systems

    DEFF Research Database (Denmark)

    Schwartzbach, Michael Ignatieff; Palsberg, Jens

    a type system that generalizes and explains them. The theory is based on an idealized object-oriented language called BOPL (Basic Object Programming Language), containing common features of the above languages. A type system, type inference algorithm, and typings of inheritance and genericity...... are provided for BOPL. Throughout, the results are related to the languages on which BOPL is based. This text offers advanced undergraduates and professional software developers a sound understanding of the key aspects of object-oriented type systems. All algorithms are implemented in a freely available......Object-Oriented Type Systems Jens Palsberg and Michael I. Schwartzbach Aarhus University, Denmark Type systems are required to ensure reliability and efficiency of software. For object-oriented languages, typing is an especially challenging problem because of inheritance, assignment, and late...

  3. Object-Oriented Type Systems

    DEFF Research Database (Denmark)

    Schwartzbach, Michael Ignatieff; Palsberg, Jens

    are provided for BOPL. Throughout, the results are related to the languages on which BOPL is based. This text offers advanced undergraduates and professional software developers a sound understanding of the key aspects of object-oriented type systems. All algorithms are implemented in a freely available......Object-Oriented Type Systems Jens Palsberg and Michael I. Schwartzbach Aarhus University, Denmark Type systems are required to ensure reliability and efficiency of software. For object-oriented languages, typing is an especially challenging problem because of inheritance, assignment, and late...... a type system that generalizes and explains them. The theory is based on an idealized object-oriented language called BOPL (Basic Object Programming Language), containing common features of the above languages. A type system, type inference algorithm, and typings of inheritance and genericity...

  4. Experimental Object-Oriented Modelling

    DEFF Research Database (Denmark)

    Hansen, Klaus Marius

    and discuss techniques for handling and representing uncertainty when modelling in experimental system development. These techniques are centred on patterns and styles for handling uncertainty in object-oriented software architectures. Tools We present the Knight tool designed for collaborative modelling......This thesis examines object-oriented modelling in experimental system development. Object-oriented modelling aims at representing concepts and phenomena of a problem domain in terms of classes and objects. Experimental system development seeks active experimentation in a system development project...... through, e.g., technical prototyping and active user involvement. We introduce and examine “experimental object-oriented modelling” as the intersection of these practices. The contributions of this thesis are expected to be within three perspectives on models and modelling in experimental system...

  5. Complex perspectives on learning objectives

    DEFF Research Database (Denmark)

    Mørcke, Anne Mette; Wichmann-Hansen, Gitte; Guldbrand Nielsen, Dorte

    2006-01-01

    OBJECTIVE To understand core curriculum design and involvement of stakeholders.METHODS Twelve homogeneous focus group interviews with a total of 88 students, house officers, seniordoctors and nurses concerning an undergraduate emergency medicine curriculum. Following content coding of transcripts...... opposite perspectives: objectives as context-free theory-based rules versus objectives as personal practice-based guidelines. The students favoured theory-based objectives, which should be defined by experts conclusively as minimum levels and checklists. The senior doctors preferred practice......-based objectives, which should be decided in a collaborative, local, continuous process, and should be expressed as ideals and expectations. The house officers held both perspectives. Adding to complexity, participants also interpreted competence inconsistently and mixed concepts such as knowledge, observation...

  6. Object-Oriented Type Systems

    DEFF Research Database (Denmark)

    Schwartzbach, Michael Ignatieff; Palsberg, Jens

    a type system that generalizes and explains them. The theory is based on an idealized object-oriented language called BOPL (Basic Object Programming Language), containing common features of the above languages. A type system, type inference algorithm, and typings of inheritance and genericity......Object-Oriented Type Systems Jens Palsberg and Michael I. Schwartzbach Aarhus University, Denmark Type systems are required to ensure reliability and efficiency of software. For object-oriented languages, typing is an especially challenging problem because of inheritance, assignment, and late...... are provided for BOPL. Throughout, the results are related to the languages on which BOPL is based. This text offers advanced undergraduates and professional software developers a sound understanding of the key aspects of object-oriented type systems. All algorithms are implemented in a freely available...

  7. Medical image segmentation using object atlas versus object cloud models

    Science.gov (United States)

    Phellan, Renzo; Falcão, Alexandre X.; Udupa, Jayaram K.

    2015-03-01

    Medical image segmentation is crucial for quantitative organ analysis and surgical planning. Since interactive segmentation is not practical in a production-mode clinical setting, automatic methods based on 3D object appearance models have been proposed. Among them, approaches based on object atlas are the most actively investigated. A key drawback of these approaches is that they require a time-costly image registration process to build and deploy the atlas. Object cloud models (OCM) have been introduced to avoid registration, considerably speeding up the whole process, but they have not been compared to object atlas models (OAM). The present paper fills this gap by presenting a comparative analysis of the two approaches in the task of individually segmenting nine anatomical structures of the human body. Our results indicate that OCM achieve a statistically significant better accuracy for seven anatomical structures, in terms of Dice Similarity Coefficient and Average Symmetric Surface Distance.

  8. Probabilistic object and viewpoint models for active object recognition

    CSIR Research Space (South Africa)

    Govender, N

    2013-09-01

    Full Text Available Feature Transform (SIFT) [10] detector and descriptor to extract relevant object features. SIFT is robust to changes in illumination and affine transformation. Further, the features extracted from the training images are inputted directly into a vocabulary... for the object’s identity but not for pose. Also, the boosting and support vector machines strategy of [14] estimates both object and pose, but uses substantially uncluttered test data. Following [12], we also make use of a vocabulary tree representation [11...

  9. Multiparty Compatibility for Concurrent Objects

    Directory of Open Access Journals (Sweden)

    Roly Perera

    2016-06-01

    Full Text Available Objects and actors are communicating state machines, offering and consuming different services at different points in their lifecycle. Two complementary challenges arise when programming such systems. When objects interact, their state machines must be "compatible", so that services are requested only when they are available. Dually, when objects refine other objects, their state machines must be "compliant", so that services are honoured whenever they are promised. In this paper we show how the idea of multiparty compatibility from the session types literature can be applied to both of these problems. We present an untyped language in which concurrent objects are checked automatically for compatibility and compliance. For simple objects, checking can be exhaustive and has the feel of a type system. More complex objects can be partially validated via test cases, leading to a methodology closer to continuous testing. Our proof-of-concept implementation is limited in some important respects, but demonstrates the potential value of the approach and the relationship to existing software development practices.

  10. An object-color space.

    Science.gov (United States)

    Logvinenko, Alexander D

    2009-10-05

    Putting aside metaphorical meanings of the term, color space is understood as a vector space, where lights having the same color (i.e., subjectively indistinguishable) are represented as a point. The CIE 1931 color space, empirically based on trichromatic color measurements, is a classical example. Its derivatives, such as CIELAB and sRGB, have been successfully used in many applications (e.g., in color management). However, having been designed for presenting the color of self-luminous objects, these spaces are less suitable for presenting color of reflecting objects. Specifically, they can be used to represent color of objects only for a fixed illumination. Here I put forward a color space to represent the color of objects independently of illumination. It is based on an ideal color atlas comprising the reflectance spectra taking two values: k or 1 - k (0 color atlas is complete; that is, every reflecting object is metameric to some element of the atlas. When illumination alters, the classes of metameric reflectance spectra are reshuffled but in each class there is exactly one element of the atlas. Hence, the atlas can uniquely represent the metameric classes irrespective of illumination. Each element of the atlas (thus, object color) is specified by three numbers: (i) lambda = (lambda(1) + lambda(2))/2, which correlates well with hue of object color (as dominant wavelength correlates with hue of light color); (ii) delta =/lambda(1) - lambda/, which correlates with whiteness/blackness; and (iii) alpha =/1 - 2k/, which correlates with chroma of object color (as colorimetric purity correlates with saturation of light color). Using a geographical coordinate system, each element of the atlas (thus, each object color) is geometrically represented as a radius vector so that its length equals alpha, the latitude and longitude being proportional to delta and lambda, respectively.

  11. Conscientious objection in health care

    Directory of Open Access Journals (Sweden)

    Kuře Josef

    2016-12-01

    Full Text Available The paper deals with conscientious objection in health care, addressing the problems of scope, verification and limitation of such refusal, paying attention to ideological agendas hidden behind the right of conscience where the claimed refusal can cause harm or where such a claim is an attempt to impose certain moral values on society or an excuse for not providing health care. The nature of conscientious objection will be investigated and an ethical analysis of conscientious objection will be conducted. Finally some suggestions for health care policy will be proposed.

  12. PHP Objects, Patterns, and Practice

    CERN Document Server

    Zandstra, Matt

    2010-01-01

    This book takes you beyond the PHP basics to the enterprise development practices used by professional programmers. Updated for PHP 5.3 with new sections on closures, namespaces, and continuous integration, this edition will teach you about object features such as abstract classes, reflection, interfaces, and error handling. You'll also discover object tools to help you learn more about your classes, objects, and methods. Then you'll move into design patterns and the principles that make patterns powerful. You'll learn both classic design patterns and enterprise and database patterns with easy

  13. Advancement Planning: An Objectives View.

    Science.gov (United States)

    Druck, Kalman B.

    1986-01-01

    Planning must revolve around objectives related to students, faculty, money, and political support. When it is understood that all of the institution's advancement activity should help produce these four things, planning is easy. (MLW)

  14. On the Aging of Objects

    DEFF Research Database (Denmark)

    Andersen, Bjørn Schiermer

    2016-01-01

    The article seeks to develop a new conceptual framework suitable for analysing the ageing processes of objects in modern culture. The basic intuition is that object experience cannot be analysed separately from collective participation. The article focuses on the question of the ‘timeless’ nature...... of modernist design and seeks to understand why modernist objects age more slowly than other objects. First, inspired by the late Durkheim’s account of symbolism, I turn to the experiential effects of collective embeddedness. Second, I enter the field of architectural practices and architectural theory....... Visiting early modernist ideologue Adolf Loos, I seek to understand the modernist attitude as a direct response to experiences of the acceleration of ageing processes characteristic of modern culture. I then try to show how Loos’s explicit awareness of the collective dimension is ignored by the subsequent...

  15. Delphi FND Application Object Library -

    Data.gov (United States)

    Department of Transportation — Delphi FND Application Object Library contains the following data elements, but are not limited to temporary data tables for the logged in session, information about...

  16. Foreign Objects in the Rectum

    Science.gov (United States)

    ... Rectum Anal Fissure Anal Itching Anorectal Abscess Anorectal Fistula Foreign Objects in the Rectum Hemorrhoids Levator Syndrome Pilonidal Disease Proctitis Rectal Prolapse (See also Overview of the Anus and ...

  17. Object-Oriented Type Systems

    DEFF Research Database (Denmark)

    Schwartzbach, Michael Ignatieff; Palsberg, Jens

    Object-Oriented Type Systems Jens Palsberg and Michael I. Schwartzbach Aarhus University, Denmark Type systems are required to ensure reliability and efficiency of software. For object-oriented languages, typing is an especially challenging problem because of inheritance, assignment, and late...... binding. Existing languages employ different type systems, and it can be difficult to compare, evaluate and improve them, since there is currently no uniform theory for such languages. This book provides such a theory. The authors review the type systems of Simula, Smalltalk, C++ and Eiffel and present...... a type system that generalizes and explains them. The theory is based on an idealized object-oriented language called BOPL (Basic Object Programming Language), containing common features of the above languages. A type system, type inference algorithm, and typings of inheritance and genericity...

  18. Conscientious objection and emergency contraception.

    Science.gov (United States)

    Card, Robert F

    2007-06-01

    This article argues that practitioners have a professional ethical obligation to dispense emergency contraception, even given conscientious objection to this treatment. This recent controversy affects all medical professionals, including physicians as well as pharmacists. This article begins by analyzing the option of referring the patient to another willing provider. Objecting professionals may conscientiously refuse because they consider emergency contraception to be equivalent to abortion or because they believe contraception itself is immoral. This article critically evaluates these reasons and concludes that they do not successfully support conscientious objection in this context. Contrary to the views of other thinkers, it is not possible to easily strike a respectful balance between the interests of objecting providers and patients in this case. As medical professionals, providers have an ethical duty to inform women of this option and provide emergency contraception when this treatment is requested.

  19. Transient heating of moving objects

    Directory of Open Access Journals (Sweden)

    E.I. Baida

    2014-06-01

    Full Text Available A mathematical model of transient and quasistatic heating of moving objects by various heat sources is considered. The mathematical formulation of the problem is described, examples of thermal calculation given.

  20. Laser sources for object illumination

    Energy Technology Data Exchange (ETDEWEB)

    Albrecht, G.F. [Lawrence Livermore National Lab., CA (United States)

    1994-11-15

    The considerations which formulate the specifications for a laser illuminator are explained, using the example of an underwater object. Depending on the parameters which define the scenario, widely varying laser requirements result.

  1. Integrated Multidisciplinary Optimization Objects Project

    Data.gov (United States)

    National Aeronautics and Space Administration — M4 Engineering proposes to implement physics-based, multidisciplinary analysis and optimization objects that will be integrated into a Python, open-source framework...

  2. Conscientious objection in medical practice

    National Research Council Canada - National Science Library

    Beca, Juan Pablo I; Astete, Carmen A

    2015-01-01

    .... This conscientious objection, accepted as a personal right and recognized by several legislations and medical ethics codes, is valid only if it has been reasonably justified and declared in advance...

  3. Incremental Visualizer for Visible Objects

    DEFF Research Database (Denmark)

    Bukauskas, Linas; Bøhlen, Michael Hanspeter

    path. IVVO is the novel solution which allows data to be visualized and loaded on the fly from the database and which regards visibilities of objects. We run a set of experiments to convince that IVVO is feasible in terms of I/O operations and CPU load. We consider the example of data which uses......This paper discusses the integration of database back-end and visualizer front-end into a one tightly coupled system. The main aim which we achieve is to reduce the data pipeline from database to visualization by using incremental data extraction of visible objects in a fly-through scenarios. We...... also argue that passing only relevant data from the database will substantially reduce the overall load of the visualization system. We propose the system Incremental Visualizer for Visible Objects (IVVO) which considers visible objects and enables incremental visualization along the observer movement...

  4. Exotic objects of atomic physics

    Science.gov (United States)

    Eletskii, A. V.

    2017-11-01

    There has been presented a short survey of physical properties, methods of production and exploration as well as directions of practical usage of the objects of atomic physics which are not yet described in detail in modern textbooks and manuals intended for students of technical universities. The family of these objects includes negative and multicharged ions, Rydberg atoms, excimer molecules, clusters. Besides of that, in recent decades this family was supplemented with new nanocarbon structures such as fullerenes, carbon nanotubes and graphene. The textbook “Exotic objects of atomic physics” [1] edited recently contains some information on the above-listed objects of the atomic physics. This textbook can be considered as a supplement to classic courses of atomic physics teaching in technical universities.

  5. Object-Oriented Type Systems

    DEFF Research Database (Denmark)

    Schwartzbach, Michael Ignatieff; Palsberg, Jens

    a type system that generalizes and explains them. The theory is based on an idealized object-oriented language called BOPL (Basic Object Programming Language), containing common features of the above languages. A type system, type inference algorithm, and typings of inheritance and genericity...... binding. Existing languages employ different type systems, and it can be difficult to compare, evaluate and improve them, since there is currently no uniform theory for such languages. This book provides such a theory. The authors review the type systems of Simula, Smalltalk, C++ and Eiffel and present......Object-Oriented Type Systems Jens Palsberg and Michael I. Schwartzbach Aarhus University, Denmark Type systems are required to ensure reliability and efficiency of software. For object-oriented languages, typing is an especially challenging problem because of inheritance, assignment, and late...

  6. SOLO: Self Organizing Live Objects

    Science.gov (United States)

    2008-12-01

    1 SOLO: Self Organizing Live Objects Qi Huang1, 2 (contact, tel. +16073519956), Ken Birman2 1School of Computer Science & Technology...levels of performance, relia- bility, or other QoS objectives. Here, we describe SOLO, a new platform we’re constructing as part of Cornell’s Live ...scenarios that would be expected in wide-area environments. Category: Regular paper for the PDS track (5700 words). Keywords: Self-organization, Live

  7. Well-Being and Objectivity

    Directory of Open Access Journals (Sweden)

    Jakub Bożydar Wiśniewski

    2011-03-01

    Full Text Available In this paper, I investigate the issue of whether there exists an objective element of well-being, completely independent of anyone’s desires, interests and preferences. After rejecting health-based and convention-based approaches to objectivity, I conclude that the element in question consists in respecting autonomy, voluntariness of every purposive agent and the principle of non-aggression.

  8. Objective assessment of technical skill.

    Science.gov (United States)

    MacRae, Helen M

    2011-01-01

    Objective assessment of technical skill is an important component of skills training: trainees require that deficiencies are clearly and objectively identified if a model of deliberate practice with feedback on skill acquisition is to be employed. There are several types of reliable and valid assessments for technical skill currently available. Copyright © 2010 Royal College of Surgeons of Edinburgh (Scottish charity number SC005317) and Royal College of Surgeons in Ireland. Published by Elsevier Ltd. All rights reserved.

  9. How action influences object perception.

    Science.gov (United States)

    Chan, David; Peterson, Mary A; Barense, Morgan D; Pratt, Jay

    2013-01-01

    Although object perception is typically associated with the parvocellular (P) pathway, a form of fast "gist" object perception may be due to activity in the magnocellular (M) pathway (Kveraga et al., 2007). Because the M-pathway is typically associated with action, we hypothesized that manipulations of action would influence speeded object perception. In three experiments, participants indicated whether the objects shown in low and high spatial frequency (HSF) images were larger or smaller than a prototypical shoebox. In Experiment 1, participants used a proximal (hands on monitor) or distal (hands on keyboard) hand posture in separate blocks. In Experiment 2, only the proximal hand posture was used, but the hands were either action oriented with palms in (palms toward the stimuli) or non-action oriented with palms out (palms away from the stimuli). In Experiment 3, we used the palms-in proximal hand posture but manipulated the type of visual stimuli such that they were either action oriented (easily grasped) or non-action oriented (not easily grasped). In all three experiments, the advantage in identifying the low spatial frequency (LSF) images was greater when action was primed (proximal hands, palms-in, graspable). Together, these experiments show that the M-pathway is involved in rapid "gist" object perception, and this type of object perception is influenced by action.

  10. Implications of perspective in teaching objects first and object design

    DEFF Research Database (Denmark)

    Christensen, Henrik Bærbak

    2005-01-01

    There are an increasing number of books published on the important topics of "object-oriented programming" and "object-oriented design" for use in education. However, object-orientation can be viewed from a number of different perspectives---each perspective having its benefits and liabilities....... A perspective has a strong influence on the kind of designs students can and will produce, the kind of domains that are easy or difficult to analyze, and the kind of frame of reference in which design techniques are understood and applied. In this paper we argue that most books make an implicit choice...... of perspective with the unfortunate effect that our students leave our courses with limited design abilities. We present a coarse-grained classification, discuss implications of perspective in a teaching context, and illustrate consequences using a small case study. Our main point is that teachers should...

  11. Object-Tool-Actor Interaction: Object Information Drives Intended Action.

    Science.gov (United States)

    Gonzalez, Dave A; Scharoun, Sara M; Cinelli, M E; Bryden, P J; Lyons, J L; Roy, Eric A

    2018-01-01

    Tool use is typically explored via actor-tool interactions. However, the target-object (that which is being acted on) may influence perceived action possibilities and thereby guide action. Three different tool-target-object pairings were tested (Experiment 1). The hammering action demonstrated the greatest sensitivity and therefore subsequently used to further investigate target-object pairings. The hammer was removed as an option and instructions were provided using pictorial (Experiment 2), written (Experiment 3), and both pictorial and written formats (Experiment 4). The designed tool is chosen when available (Experiment 1) and when removed as a choice (i.e., the hammer), participants perform the same action associated with the designed tool (i.e., hammering) regardless of instruction method (Experiments 2, 3, and 4).

  12. I Object! Moving beyond Learning Objects to Learning Components.

    Science.gov (United States)

    Anderson, Thor A.

    2003-01-01

    Explores why "learning" and "object" have been combined in the field of instructional technology. Examines why current definitions of these terms are lacking when looked at from a standards and interoperability point of view. Suggests a new definition with a rationale to satisfy needs of technologists for precise, practical…

  13. Single versus Multiple Objective(s) Decision Making: An Application ...

    African Journals Online (AJOL)

    Rahel

    Keywords: Single versus Multiple Criteria/Objectives; Linear Programming, Goal. Programming; Subsistence Farms; Northern Ethiopia. JEL classification: C1; C6; C61; D10. 1. (Corresponding author) (email) zenebeg2002@yahoo.com; Department of. Economics, Mekelle University, Adi-Haqui Campus P.O.Box 451 Mekelle ...

  14. Object Pragmatics and Language Development.

    Science.gov (United States)

    Béguin, Marie

    2016-12-01

    The purpose of this contribution is to investigate the advent of language in the light of the appropriation of the cultural uses of the material objects related to material culture and the constitution of their public and shared meanings linked to their uses. First, we suggest that the Object Pragmatics paradigm offers a framework which allows us to take into account the uses of objects in daily life as a site of social conventions, communication and public and shared meanings. Second, we would like to underline the key role of the adult's mediations in the child's ability to evolve towards linguistic development. This contribution will discuss the notion of scenario involving primarily the object, as a possible semiotic tool to support the child's transition to language. We will finally illustrate that it is possible to take into consideration the mastery of conventional uses of the object in the child's ability to engage in a scenario and then to move towards communication and speech development. These issues will be addressed in the context of a research project which focuses on the observation of children interacting with an adult at 16, 20 and 24 months. These longitudinal data were collected by video in a semi-experimental triadic interaction design. The triadic interaction is considered as a relevant unit for the observation and analysis of the role of material culture in speech development, suggesting the existence of new mechanisms to be taken into account in addition to the interactive conditions largely mentioned in literature.

  15. Thermographic detection of buried objects

    Science.gov (United States)

    Castro, Eduardo H.; Abbate, Horacio A.; Mallaina, Eduardo F.; Santos, Juan M.; Mejail, Marta; Borensztejn, Patricia; Jacobo-Berlles, Julio

    2005-03-01

    A great development of technologies for the detection of buried objects took place in the last years. Applications in archeology, finding of pipe lines and others were important, but most attention was paid in humanitarian detection of land mines and unexploded ordnances. Among these technologies, thermography is one of the most useful techniques and has been applied concurrent with other ones (Ground Penetrating Radar, Electromagnetic Induction, etc.) We have made several experiments to obtain thermographic images of buried objects in the middle and far infrared, in laboratory and in field, and in different types of terrain: naked ground, ground covered with grass and sand. We employed, as warming methods, natural sun radiation and blowing of warm air or halogen lamps. We have used metallic and dielectric objects of different sizes and shapes so as to recognize them by their characteristics. The acquired images were improved using noise reduction and image enhancement techniques. In this work we present the thermographic images obtained. All measurements were made at short distance, less than 100 cm, as the objective of our work is to develop a thermographic imaging system for the detection of buried objects to be installed in an autonomous ground robot.

  16. Object Theatre in Design Education

    DEFF Research Database (Denmark)

    Buur, Jacob; Friis, Preben

    2015-01-01

    In a quest to improve our design teaching we experiment with the theatre genre of Object Theatre. We employ techniques from object theatre to challenge current thinking about product agency, movement and meaning, the spatial location, and the social settings of products. At the end of the project...... our graduate design students create a post-dramatic performance that engages an audience in experiencing and exploring the product concepts they create. Our experiences show that it helps us educate young designers in the abilities to take other perspectives than their own (in particular...... that of the ‘object’), and to ‘act before they think’ rather than try to plan everything ahead. It also challenges both the students and ourselves to shift from a distanced ‘aboutness’ to an engaged ‘withness’ of how we think of design. The work with Object Theatre seems important in two respects: It provides new...

  17. Object-Oriented Type Systems

    DEFF Research Database (Denmark)

    Schwartzbach, Michael Ignatieff; Palsberg, Jens

    are provided for BOPL. Throughout, the results are related to the languages on which BOPL is based. This text offers advanced undergraduates and professional software developers a sound understanding of the key aspects of object-oriented type systems. All algorithms are implemented in a freely available......Object-Oriented Type Systems Jens Palsberg and Michael I. Schwartzbach Aarhus University, Denmark Type systems are required to ensure reliability and efficiency of software. For object-oriented languages, typing is an especially challenging problem because of inheritance, assignment, and late...... binding. Existing languages employ different type systems, and it can be difficult to compare, evaluate and improve them, since there is currently no uniform theory for such languages. This book provides such a theory. The authors review the type systems of Simula, Smalltalk, C++ and Eiffel and present...

  18. Shearography for specular object inspection

    Science.gov (United States)

    Xu, Nan; Xie, Xin; Chen, Xu; Yang, Lianxiang

    2014-10-01

    Digital shearography is a laser speckle pattern interferometry based, non-destructive testing (NDT) method, which has a great potential in revealing the defects inside the objects e.g. composite materials. It has been applied successfully in various industry applications. However, due to its essence of laser speckle utilization, the object surface needs to be rough enough, otherwise, the object surface has to be specially treated. Considering the situations that the surface treatment under some cases is not allowed, an improved optical setup has been introduced and described in this paper. A modified shearography setup which can be applied on samples with specular surface is introduced. The theory and experiment results are described and presented.

  19. Exploring object-oriented technologies

    CERN Multimedia

    2000-01-01

    Object oriented technologies are the corner stone of modern software development. A piece of software is today conceived, constructed and tested as a set of objects interacting with each other, rather than as a large sequential program. OO is present throughout the whole software life cycle allowing for maintainable code re-use, clean design and manageable complexity. OO is also the seed upon which other technologies are being built and deployed, such as distributed computing, component models, open interoperability, etc.This series of three seminars will provide a pragmatic overview on the main ideas behind OO software development and will explain the inner workings of the most outstanding technologies being built on OO, such as UML, CORBA, Component Models, Agent Oriented Computing, Business Objects, etc.

  20. Objects of maximum electromagnetic chirality

    CERN Document Server

    Fernandez-Corbaton, Ivan

    2015-01-01

    We introduce a definition of the electromagnetic chirality of an object and show that it has an upper bound. The upper bound is attained if and only if the object is transparent for fields of one handedness (helicity). Additionally, electromagnetic duality symmetry, i.e. helicity preservation upon scattering, turns out to be a necessary condition for reciprocal scatterers to attain the upper bound. We use these results to provide requirements for the design of such extremal scatterers. The requirements can be formulated as constraints on the polarizability tensors for dipolar scatterers or as material constitutive relations. We also outline two applications for objects of maximum electromagnetic chirality: A twofold resonantly enhanced and background free circular dichroism measurement setup, and angle independent helicity filtering glasses.

  1. Object technology: A white paper

    Energy Technology Data Exchange (ETDEWEB)

    Jordan, S.R.; Arrowood, L.F.; Cain, W.D.; Stephens, W.M.; Vickers, B.D.

    1992-05-11

    Object-Oriented Technology (OOT), although not a new paradigm, has recently been prominently featured in the trade press and even general business publications. Indeed, the promises of object technology are alluring: the ability to handle complex design and engineering information through the full manufacturing production life cycle or to manipulate multimedia information, and the ability to improve programmer productivity in creating and maintaining high quality software. Groups at a number of the DOE facilities have been exploring the use of object technology for engineering, business, and other applications. In this white paper, the technology is explored thoroughly and compared with previous means of developing software and storing databases of information. Several specific projects within the DOE Complex are described, and the state of the commercial marketplace is indicated.

  2. Acoustic Characterization of Mesoscale Objects

    Energy Technology Data Exchange (ETDEWEB)

    Chinn, D; Huber, R; Chambers, D; Cole, G; Balogun, O; Spicer, J; Murray, T

    2007-03-13

    This report describes the science and engineering performed to provide state-of-the-art acoustic capabilities for nondestructively characterizing mesoscale (millimeter-sized) objects--allowing micrometer resolution over the objects entire volume. Materials and structures used in mesoscale objects necessitate the use of (1) GHz acoustic frequencies and (2) non-contacting laser generation and detection of acoustic waves. This effort demonstrated that acoustic methods at gigahertz frequencies have the necessary penetration depth and spatial resolution to effectively detect density discontinuities, gaps, and delaminations. A prototype laser-based ultrasonic system was designed and built. The system uses a micro-chip laser for excitation of broadband ultrasonic waves with frequency components reaching 1.0 GHz, and a path-stabilized Michelson interferometer for detection. The proof-of-concept for mesoscale characterization is demonstrated by imaging a micro-fabricated etched pattern in a 70 {micro}m thick silicon wafer.

  3. Object-Oriented Type Systems

    DEFF Research Database (Denmark)

    Schwartzbach, Michael Ignatieff; Palsberg, Jens

    Object-Oriented Type Systems Jens Palsberg and Michael I. Schwartzbach Aarhus University, Denmark Type systems are required to ensure reliability and efficiency of software. For object-oriented languages, typing is an especially challenging problem because of inheritance, assignment, and late...... are provided for BOPL. Throughout, the results are related to the languages on which BOPL is based. This text offers advanced undergraduates and professional software developers a sound understanding of the key aspects of object-oriented type systems. All algorithms are implemented in a freely available...... binding. Existing languages employ different type systems, and it can be difficult to compare, evaluate and improve them, since there is currently no uniform theory for such languages. This book provides such a theory. The authors review the type systems of Simula, Smalltalk, C++ and Eiffel and present...

  4. Testing Object-Oriented Software

    DEFF Research Database (Denmark)

    Caspersen, Michael Edelgaard; Madsen, Ole Lehrmann; Skov, Stefan H.

    -types that are currently being developed into production versions. To assure a high quality in the product it was decided to carry out an activ-ity regarding issues in testing OO software. The purpose of this report is to discuss the issues of testing object-oriented software. It is often claimed that testing of OO......The report is a result of an activity within the project Centre for Object Technology (COT), case 2. In case 2 a number of pilot projects have been carried out to test the feasibility of using object technology within embedded software. Some of the pilot projects have resulted in proto...... software is radically different form testing traditional software developed using imperative/procedural programming. Other authors claim that there is no difference. In this report we will attempt to give an answer to these questions (or at least initiate a discussion)....

  5. Auditory object cognition in dementia

    Science.gov (United States)

    Goll, Johanna C.; Kim, Lois G.; Hailstone, Julia C.; Lehmann, Manja; Buckley, Aisling; Crutch, Sebastian J.; Warren, Jason D.

    2011-01-01

    The cognition of nonverbal sounds in dementia has been relatively little explored. Here we undertook a systematic study of nonverbal sound processing in patient groups with canonical dementia syndromes comprising clinically diagnosed typical amnestic Alzheimer's disease (AD; n = 21), progressive nonfluent aphasia (PNFA; n = 5), logopenic progressive aphasia (LPA; n = 7) and aphasia in association with a progranulin gene mutation (GAA; n = 1), and in healthy age-matched controls (n = 20). Based on a cognitive framework treating complex sounds as ‘auditory objects’, we designed a novel neuropsychological battery to probe auditory object cognition at early perceptual (sub-object), object representational (apperceptive) and semantic levels. All patients had assessments of peripheral hearing and general neuropsychological functions in addition to the experimental auditory battery. While a number of aspects of auditory object analysis were impaired across patient groups and were influenced by general executive (working memory) capacity, certain auditory deficits had some specificity for particular dementia syndromes. Patients with AD had a disproportionate deficit of auditory apperception but preserved timbre processing. Patients with PNFA had salient deficits of timbre and auditory semantic processing, but intact auditory size and apperceptive processing. Patients with LPA had a generalised auditory deficit that was influenced by working memory function. In contrast, the patient with GAA showed substantial preservation of auditory function, but a mild deficit of pitch direction processing and a more severe deficit of auditory apperception. The findings provide evidence for separable stages of auditory object analysis and separable profiles of impaired auditory object cognition in different dementia syndromes. PMID:21689671

  6. Object oriented JavaScript

    CERN Document Server

    Stefanov, Stoyan

    2013-01-01

    You will first be introduced to object-oriented programming, then to the basics of objects in JavaScript. This book takes a do-it-yourself approach when it comes to writing code, because the best way to really learn a programming language is by writing code. You are encouraged to type code into Firebug's console, see how it works and then tweak it and play around with it. There are practice questions at the end of each chapter to help you review what you have learned.For new to intermediate JavaScript developer who wants to prepare themselves for web development problems solved by smart JavaSc

  7. Tree games with regular objectives

    Directory of Open Access Journals (Sweden)

    Marcin Przybyłko

    2014-08-01

    Full Text Available We study tree games developed recently by Matteo Mio as a game interpretation of the probabilistic μ-calculus. With expressive power comes complexity. Mio showed that tree games are able to encode Blackwell games and, consequently, are not determined under deterministic strategies. We show that non-stochastic tree games with objectives recognisable by so-called game automata are determined under deterministic, finite memory strategies. Moreover, we give an elementary algorithmic procedure which, for an arbitrary regular language L and a finite non-stochastic tree game with a winning objective L decides if the game is determined under deterministic strategies.

  8. TACTILE SENSING FOR OBJECT IDENTIFICATION

    DEFF Research Database (Denmark)

    Drimus, Alin; Marian, Nicolae; Bilberg, Arne

    2009-01-01

    The artificial sense of touch is a research area that can be considered still in demand, compared with the human dexterity of grasping a wide variety of shapes and sizes, perform complex tasks, and switch between grasps in response to changing task requirements. For handling unknown objects...... in unstructured environments, tactile sensing can provide more than valuable to complementary vision information about mechanical properties such as recognition and characterization, force, pressure, torque, compliance, friction, and mass as well as object shape, texture, position and pose. In this paper, we...

  9. Elaborazione didattica di Learning Objects.

    Directory of Open Access Journals (Sweden)

    Luigi Guerra

    2006-01-01

    Full Text Available L’idea di un modello didattico problematico per la realizzazione di Learning Objects riprende i temi del problematicismo pedagogico e si impegna a definire un’ipotesi formativa complessa capace di valorizzare la possibile positiva compresenza integrata di strategie didattiche diverse (finanche antitetiche ma componibili in una logica appunto di matrice problematicista. Il punto di partenza del modello proposto è rappresentato dalla opportunità di definire tre tipologie fondamentali di Learning Objects, rispettivamente centrati sull’oggetto, sul processo e sul soggetto dell’apprendimento.

  10. Gravitational lensing by exotic objects

    Science.gov (United States)

    Asada, Hideki

    2017-11-01

    This paper reviews a phenomenological approach to the gravitational lensing by exotic objects such as the Ellis wormhole lens, where the exotic lens objects may follow a non-standard form of the equation of state or may obey a modified gravity theory. A gravitational lens model is proposed in the inverse powers of the distance, such that the Schwarzschild lens and exotic lenses can be described in a unified manner as a one parameter family. As observational implications, the magnification, shear, photo-centroid motion and time delay in this lens model are discussed.

  11. PHP Object-Oriented Solutions

    CERN Document Server

    Powers, David

    2008-01-01

    With the surge of popularity of PHP 5, and with PHP 6 just around the corner, Object-Oriented Programming is now an important consideration for PHP developers. This version-neutral book is a gentle introduction to Object-Oriented Programming (OOP) that won t overburden you with complex theory. It teaches you the essential basics of OOP that you ll need to know before moving onto a more advanced level, and includes a series of pre-packaged scripts that you can incorporate into your existing sites with the minimum of effort. It shows how OOP can be used to create reusable and portable code by wa

  12. Pedagogical Issues in Object Orientation.

    Science.gov (United States)

    Nerur, Sridhar; Ramanujan, Sam; Kesh, Someswar

    2002-01-01

    Discusses the need for people with object-oriented (OO) skills, explains benefits of OO in software development, and addresses some of the difficulties in teaching OO. Topics include the evolution of programming languages; differences between OO and traditional approaches; differences from data modeling; and Unified Modeling Language (UML) and…

  13. Objective consequentialism and avoidable imperfections

    NARCIS (Netherlands)

    van Someren Greve, R.

    2013-01-01

    There are two distinct views on how to formulate an objective consequentialist account of the deontic status of actions, actualism and possibilism. On an actualist account, what matters to the deontic status of actions is only the value of the outcome an action would have, if performed. By contrast,

  14. Objective consensus from decision trees.

    Science.gov (United States)

    Putora, Paul Martin; Panje, Cedric M; Papachristofilou, Alexandros; Dal Pra, Alan; Hundsberger, Thomas; Plasswilm, Ludwig

    2014-12-05

    Consensus-based approaches provide an alternative to evidence-based decision making, especially in situations where high-level evidence is limited. Our aim was to demonstrate a novel source of information, objective consensus based on recommendations in decision tree format from multiple sources. Based on nine sample recommendations in decision tree format a representative analysis was performed. The most common (mode) recommendations for each eventuality (each permutation of parameters) were determined. The same procedure was applied to real clinical recommendations for primary radiotherapy for prostate cancer. Data was collected from 16 radiation oncology centres, converted into decision tree format and analyzed in order to determine the objective consensus. Based on information from multiple sources in decision tree format, treatment recommendations can be assessed for every parameter combination. An objective consensus can be determined by means of mode recommendations without compromise or confrontation among the parties. In the clinical example involving prostate cancer therapy, three parameters were used with two cut-off values each (Gleason score, PSA, T-stage) resulting in a total of 27 possible combinations per decision tree. Despite significant variations among the recommendations, a mode recommendation could be found for specific combinations of parameters. Recommendations represented as decision trees can serve as a basis for objective consensus among multiple parties.

  15. Fast and Objective MRTD measurement

    NARCIS (Netherlands)

    Jong, A.N. de; Bakker, S.J.M.

    1988-01-01

    Manufacturers and Users of the Thermal Imagers have spent very much time upon the definition and measurement of the generally accepted performance curve: MRTD (Minimum Resolvable Temperature Difference). The need for a cheap and fast, objective measurement method has considerably increased since the

  16. ANNOTATION SUPPORTED OCCLUDED OBJECT TRACKING

    Directory of Open Access Journals (Sweden)

    Devinder Kumar

    2012-08-01

    Full Text Available Tracking occluded objects at different depths has become as extremely important component of study for any video sequence having wide applications in object tracking, scene recognition, coding, editing the videos and mosaicking. The paper studies the ability of annotation to track the occluded object based on pyramids with variation in depth further establishing a threshold at which the ability of the system to track the occluded object fails. Image annotation is applied on 3 similar video sequences varying in depth. In the experiment, one bike occludes the other at a depth of 60cm, 80cm and 100cm respectively. Another experiment is performed on tracking humans with similar depth to authenticate the results. The paper also computes the frame by frame error incurred by the system, supported by detailed simulations. This system can be effectively used to analyze the error in motion tracking and further correcting the error leading to flawless tracking. This can be of great interest to computer scientists while designing surveillance systems etc.

  17. Michael Beitz: Objects of Communication

    Science.gov (United States)

    Hoefferle, Mary

    2014-01-01

    For this Instructional Resource, the author interviewed contemporary sculptor Michael Beitz, who uses art to explore the role of designed objects in human communication and emotional experience. This column was written in response to calls for using Enduring Understandings/Big Ideas (National Coalition for Core Arts Standards, 2013; Stewart &…

  18. Recurrent processing during object recognition

    Directory of Open Access Journals (Sweden)

    Randall C. O'Reilly

    2013-04-01

    Full Text Available How does the brain learn to recognize objects visually, and perform this difficult feat robustly in the face of many sources of ambiguity and variability? We present a computational model based on the biology of the relevant visual pathways that learns to reliably recognize 100 different object categories in the face of of naturally-occurring variability in location, rotation, size, and lighting. The model exhibits robustness to highly ambiguous, partially occluded inputs. Both the unified, biologically plausible learning mechanism and the robustness to occlusion derive from the role that recurrent connectivity and recurrent processing mechanisms play in the model. Furthermore, this interaction of recurrent connectivity and learning predicts that high-level visual representations should be shaped by error signals from nearby, associated brain areas over the course of visual learning. Consistent with this prediction, we show how semantic knowledge about object categories changes the nature of their learned visual representations, as well as how this representational shift supports the mapping between perceptual and conceptual knowledge. Altogether, these findings support the potential importance of ongoing recurrent processing throughout the brain's visual system and suggest ways in which object recognition can be understood in terms of interactions within and between processes over time.

  19. Managed Objects for Infrastructure Data

    DEFF Research Database (Denmark)

    Kjems, Erik; Bodum, Lars; Kolar, Jan

    2009-01-01

    Using data objects to describe features in the real world is a new idea and several approaches have already been shown to match scientific paradigms exceedingly well. Depending on the required level of abstraction, it is possible to represent the world more or less close to reality. In the realm ...

  20. Multi-objective energy analysis

    Energy Technology Data Exchange (ETDEWEB)

    Cherniavsky, E.A.

    1979-11-01

    Analytic models have been applied to energy-planning problems in an effort to assess the probable impacts of alternative courses of action on vital social concerns such as the quality of the environment, the state of the economy, or extent of dependence on insecure foreign energy sources. A proposed program may have a variety of effects on social objectives; beneficial results in one area may be purchased at the cost of undesirable consequences in another. A policy must be judged by its impacts on a number of social concerns. The purpose of multi-objective analysis is to identify and quantify the tradeoffs between different social objectives, and to aid policymakers in formulating decisions that achieve the best possible compromise between conflicting goals. This paper reviews approaches and techniques currently employed in multi-objective analysis. Associated problems are explored and discussed in the light of experience with applications to energy-planning models. Conclusions are drawn concerning the most-fruitful directions for future research in this area. 40 references.