Science.gov

Sample records for spatial error concealment

  1. New Hybrid Error Concealment for Digital Compressed Video

    NASA Astrophysics Data System (ADS)

    Hadar, Ofer; Huber, Merav; Huber, Revital; Greenberg, Shlomo

    2005-12-01

    Transmission of a compressed video signal over a lossy communication network exposes the information to losses and errors, which leads to significant visible errors in the reconstructed frames at the decoder side. In this paper we present a new hybrid error concealment algorithm for compressed video sequences, based on temporal and spatial concealment methods. We describe spatial and temporal techniques for the recovery of lost blocks. In particular, we develop postprocessing techniques for the reconstruction of missing or damaged macroblocks. A new decision support tree is developed to efficiently choose the best appropriate error concealment method, according to the spatial and temporal characteristics of the sequence. The proposed algorithm is compared to three error concealment methods: spatial, temporal, and a previous hybrid approach using different noise levels. The results are evaluated using four quality measures. We show that our error concealment scheme outperforms all the other three methods for all the tested video sequences.

  2. Video Error Concealment Using Fidelity Tracking

    NASA Astrophysics Data System (ADS)

    Yoneyama, Akio; Takishima, Yasuhiro; Nakajima, Yasuyuki; Hatori, Yoshinori

    We propose a method to prevent the degradation of decoded MPEG pictures caused by video transmission over error-prone networks. In this paper, we focus on the error concealment that is processed at the decoder without using any backchannels. Though there have been various approaches to this problem, they generally focus on minimizing the degradation measured frame by frame. Although this frame-level approach is effective in evaluating individual frame quality, in the sense of human perception, the most noticeable feature is the spatio-temporal discontinuity of the image feature in the decoded video image. We propose a novel error concealment algorithm comprising the combination of i) A spatio-temporal error recovery function with low processing cost, ii) A MB-based image fidelity tracking scheme, and iii) An adaptive post-filter using the fidelity information. It is demonstrated by experimental results that the proposed algorithm can significantly reduce the subjective degradation of corrupted MPEG video quality with about 30% of additional decoding processing power.

  3. JPEG2000-coded image error concealment exploiting convex sets projections.

    PubMed

    Atzori, Luigi; Ginesu, Giaime; Raccis, Alessio

    2005-04-01

    Transmission errors in JPEG2000 can be grouped into three main classes, depending on the affected area: LL, high frequencies at the lower decomposition levels, and high frequencies at the higher decomposition levels. The first type of errors are the most annoying but can be concealed exploiting the signal spatial correlation like in a number of techniques proposed in the past; the second are less annoying but more difficult to address; the latter are often imperceptible. In this paper, we address the problem of concealing the second class or errors when high bit-planes are damaged by proposing a new approach based on the theory of projections onto convex sets. Accordingly, the error effects are masked by iteratively applying two procedures: low-pass (LP) filtering in the spatial domain and restoration of the uncorrupted wavelet coefficients in the transform domain. It has been observed that a uniform LP filtering brought to some undesired side effects that negatively compensated the advantages. This problem has been overcome by applying an adaptive solution, which exploits an edge map to choose the optimal filter mask size. Simulation results demonstrated the efficiency of the proposed approach. PMID:15825483

  4. Content-based retransmission with error concealment for astronomical images

    NASA Astrophysics Data System (ADS)

    Thienphrapa, Paul; Boussalis, Helen; Liu, Charles; Rad, Khosrow; Dong, Jane

    2005-10-01

    The James Webb Space Telescope (JWST) is expected to produce a vast amount of images that are valuable for astronomical research and education. To support research activities related to JWST mission, NASA has provided funds to establish the Structures Pointing and Control Engineering (SPACE) Laboratory at the California State University, Los Angeles (CSULA). One of the research activities in SPACE lab is to design an effective and efficient transmission system to disseminate JWST images across the Internet. This paper presents a prioritized transmission method to provide the best quality of the transferred image based on the joint-optimization of content-based retransmission and error concealment. First, the astronomical image is compressed using a scalable wavelet-based approach, then packetized into independently decodable packets. To facilitate the joint-optimization of two mutually dependent error control methods, a novel content index is declared to represent the significance of the packet content as well as its importance in error concealment. Based on the defined content index, the optimal retransmission schedule is determined to maximize the quality of the received image under delay constraint with the given error concealment method. Experimental results demonstrate that the proposed approach is very effective to combat the packet loss during transmission to achieve a desirable quality of the received astronomical images.

  5. Video inpainting with short-term windows: application to object removal and error concealment.

    PubMed

    Ebdelli, Mounira; Le Meur, Olivier; Guillemot, Christine

    2015-10-01

    In this paper, we propose a new video inpainting method which applies to both static or free-moving camera videos. The method can be used for object removal, error concealment, and background reconstruction applications. To limit the computational time, a frame is inpainted by considering a small number of neighboring pictures which are grouped into a group of pictures (GoP). More specifically, to inpaint a frame, the method starts by aligning all the frames of the GoP. This is achieved by a region-based homography computation method which allows us to strengthen the spatial consistency of aligned frames. Then, from the stack of aligned frames, an energy function based on both spatial and temporal coherency terms is globally minimized. This energy function is efficient enough to provide high quality results even when the number of pictures in the GoP is rather small, e.g. 20 neighboring frames. This drastically reduces the algorithm complexity and makes the approach well suited for near real-time video editing applications as well as for loss concealment applications. Experiments with several challenging video sequences show that the proposed method provides visually pleasing results for object removal, error concealment, and background reconstruction context. PMID:26011884

  6. The successively temporal error concealment algorithm using error-adaptive block matching principle

    NASA Astrophysics Data System (ADS)

    Lee, Yu-Hsuan; Wu, Tsai-Hsing; Chen, Chao-Chyun

    2014-09-01

    Generally, the temporal error concealment (TEC) adopts the blocks around the corrupted block (CB) as the search pattern to find the best-match block in previous frame. Once the CB is recovered, it is referred to as the recovered block (RB). Although RB can be the search pattern to find the best-match block of another CB, RB is not the same as its original block (OB). The error between the RB and its OB limits the performance of TEC. The successively temporal error concealment (STEC) algorithm is proposed to alleviate this error. The STEC procedure consists of tier-1 and tier-2. The tier-1 divides a corrupted macroblock into four corrupted 8 × 8 blocks and generates a recovering order for them. The corrupted 8 × 8 block with the first place of recovering order is recovered in tier-1, and remaining 8 × 8 CBs are recovered in tier-2 along the recovering order. In tier-2, the error-adaptive block matching principle (EA-BMP) is proposed for the RB as the search pattern to recover remaining corrupted 8 × 8 blocks. The proposed STEC outperforms sophisticated TEC algorithms on average PSNR by 0.3 dB on the packet error rate of 20% at least.

  7. An edge-based temporal error concealment for MPEG-coded video

    NASA Astrophysics Data System (ADS)

    Huang, Yu-Len; Lien, Hsiu-Yi

    2005-07-01

    When transmitted over unreliable channels, the compressed video can suffer severe degradation. Some strategies were employed to make an acceptable quality of the decoded image sequence. Error concealment (EC) technique is one of effective approaches to diminish the quality degradation. A number of EC algorithms have been developed to combat the transmission errors for MPEG-coded video. These methods always work well to reconstruct the smooth or regular damaged macroblocks. However, for damaged macroblocks were irregular or high-detail, the reconstruction may follow noticeable blurring consequence or not match well with the surrounding macroblocks. This paper proposes an edgebased temporal EC model to conceal the errors. In the proposed method, both the spatial and the temporal contextual features in compressed video are measured by using an edge detector, i.e. Sobel operator. The edge information surrounding a damaged macroblock is utilized to estimate the lost motion vectors based on the boundary matching technique. Next, the estimated motion vectors are used to reconstruct the damaged macroblock by exploiting the information in reference frames. In comparison with traditional EC algorithms, the proposed method provides a significant improvement on both objective peak signal-to-noise ratio (PSNR) measurement and subjective visual quality of MPEG-coded video.

  8. Error concealment and early resynchronization techniques for MPEG-2 video streams damaged by transmission over ATM networks

    NASA Astrophysics Data System (ADS)

    Fernandez, Carlos L.; Basso, Andrea; Hubaux, Jean-Pierre

    1996-03-01

    In this paper we present some error concealment techniques for MPEG-2 video coded and multiplexed streams damaged by ATM cell losses. Decoder early resynchronization limits the effects of transmission errors by decoding some information that is normally discarded from the damaged MPEG-2 video bitstreams. A part of this information cannot be completely decoded due to its differential coding among macroblocks (DC levels, motion vectors). Three different techniques are presented for the case of DC level recovery in Intra pictures. Two of them are predictive techniques, one operating in the frequency domain and the other in the spatial domain. The third technique provides an exact reconstruction of DC values using special data coded into the user data area of the MPEG-2 video bitstream. For not resynchronized areas classical temporal and spatial concealment techniques are used. These techniques have been tested on a simulated environment which includes an implementation of MPEG-2 elementary video coding and decoding and MPEG-2 system standards. The ATM transmission part has been simulated by means of specialized simulation software. Results relative to the presented concealment techniques are included.

  9. EZBC video streaming with channel coding and error concealment

    NASA Astrophysics Data System (ADS)

    Bajic, Ivan V.; Woods, John W.

    2003-06-01

    In this text we present a system for streaming video content encoded using the motion-compensated Embedded Zero Block Coder (EZBC). The system incorporates unequal loss protection in the form of multiple description FEC (MD-FEC) coding, which provides adequate protection for the embedded video bitstream when the loss process is not very bursty. The adverse effects of burst losses are reduced using a novel motion-compensated error concealmet method.

  10. Pixel-level Matching Based Multi-hypothesis Error Concealment Modes for Wireless 3D H.264/MVC Communication

    NASA Astrophysics Data System (ADS)

    El-Shafai, Walid

    2015-09-01

    3D multi-view video (MVV) is multiple video streams shot by several cameras around a single scene simultaneously. Therefore it is an urgent task to achieve high 3D MVV compression to meet future bandwidth constraints while maintaining a high reception quality. 3D MVV coded bit-streams that are transmitted over wireless network can suffer from error propagation in the space, time and view domains. Error concealment (EC) algorithms have the advantage of improving the received 3D video quality without any modifications in the transmission rate or in the encoder hardware or software. To improve the quality of reconstructed 3D MVV, we propose an efficient adaptive EC algorithm with multi-hypothesis modes to conceal the erroneous Macro-Blocks (MBs) of intra-coded and inter-coded frames by exploiting the spatial, temporal and inter-view correlations between frames and views. Our proposed algorithm adapts to 3D MVV motion features and to the error locations. The lost MBs are optimally recovered by utilizing motion and disparity matching between frames and views on pixel-by-pixel matching basis. Our simulation results show that the proposed adaptive multi-hypothesis EC algorithm can significantly improve the objective and subjective 3D MVV quality.

  11. Spatial frequency domain error budget

    SciTech Connect

    Hauschildt, H; Krulewich, D

    1998-08-27

    The aim of this paper is to describe a methodology for designing and characterizing machines used to manufacture or inspect parts with spatial-frequency-based specifications. At Lawrence Livermore National Laboratory, one of our responsibilities is to design or select the appropriate machine tools to produce advanced optical and weapons systems. Recently, many of the component tolerances for these systems have been specified in terms of the spatial frequency content of residual errors on the surface. We typically use an error budget as a sensitivity analysis tool to ensure that the parts manufactured by a machine will meet the specified component tolerances. Error budgets provide the formalism whereby we account for all sources of uncertainty in a process, and sum them to arrive at a net prediction of how "precisely" a manufactured component can meet a target specification. Using the error budget, we are able to minimize risk during initial stages by ensuring that the machine will produce components that meet specifications before the machine is actually built or purchased. However, the current error budgeting procedure provides no formal mechanism for designing machines that can produce parts with spatial-frequency-based specifications. The output from the current error budgeting procedure is a single number estimating the net worst case or RMS error on the work piece. This procedure has limited ability to differentiate between low spatial frequency form errors versus high frequency surface finish errors. Therefore the current error budgeting procedure can lead us to reject a machine that is adequate or accept a machine that is inadequate. This paper will describe a new error budgeting methodology to aid in the design and characterization of machines used to manufacture or inspect parts with spatial-frequency-based specifications. The output from this new procedure is the continuous spatial frequency content of errors that result on a machined part. If the machine

  12. Using self-authentication and recovery images for error concealment in wireless environments

    NASA Astrophysics Data System (ADS)

    Lin, Ching-Yung; Sow, Daby; Chang, Shih-Fu

    2001-11-01

    Handling packet loss or delay in the mobile and/or Internet environment is usually a challenging problem for multimedia transmission. Using connection-oriented protocol such as TCP may introduce intolerable time delay in re-transmission. Using datagram-oriented protocols such as UDP may cause partial representation in case of packet loss. In this paper, we propose a new method of using our self-authentication-and-recovery images (SARI) to do the error detection and concealment in the UDP environment. The lost information in a SARI image can be approximately recovered based on the embedded watermark, which includes the content-based authentication information and recovery information. Images or video frames are watermarked in a priori such that no additional mechanism is needed in the networking or the encoding process. Because the recovery is not based on adjacent blocks, the proposed method can recover the corrupted area even though the information loss happen in large areas or high variant areas. Our experiments show the advantages of such technique in both transmission time saving and broad application potentials.

  13. Authenticating concealed private data while maintaining concealment

    DOEpatents

    Thomas, Edward V.; Draelos, Timothy J.

    2007-06-26

    A method of and system for authenticating concealed and statistically varying multi-dimensional data comprising: acquiring an initial measurement of an item, wherein the initial measurement is subject to measurement error; applying a transformation to the initial measurement to generate reference template data; acquiring a subsequent measurement of an item, wherein the subsequent measurement is subject to measurement error; applying the transformation to the subsequent measurement; and calculating a Euclidean distance metric between the transformed measurements; wherein the calculated Euclidean distance metric is identical to a Euclidean distance metric between the measurement prior to transformation.

  14. Unified error model based spatial error compensation for four types of CNC machining center: Part II-unified model based spatial error compensation

    NASA Astrophysics Data System (ADS)

    Fan, Kaiguo; Yang, Jianguo; Yang, Liyan

    2014-12-01

    In this paper, a spatial error compensation method was proposed for CNC machining center based on the unified error model. The spatial error distribution was analyzed in this research. The result shows that the spatial error is relative to each axis of a CNC machine tool. Moreover, the spatial error distribution is non-linear and there is no regularity. In order to improve the modeling accuracy and efficiency, an automatic error modeling application was designed based on the orthogonal polynomials. To realize the spatial error compensation, a multi-thread parallel processing mode based error compensation controller was designed. Using the spatial error compensation method, the machine tools' accuracy is greatly improved compared to that with no compensation.

  15. Deterministic error correction for nonlocal spatial-polarization hyperentanglement

    PubMed Central

    Li, Tao; Wang, Guan-Yu; Deng, Fu-Guo; Long, Gui-Lu

    2016-01-01

    Hyperentanglement is an effective quantum source for quantum communication network due to its high capacity, low loss rate, and its unusual character in teleportation of quantum particle fully. Here we present a deterministic error-correction scheme for nonlocal spatial-polarization hyperentangled photon pairs over collective-noise channels. In our scheme, the spatial-polarization hyperentanglement is first encoded into a spatial-defined time-bin entanglement with identical polarization before it is transmitted over collective-noise channels, which leads to the error rejection of the spatial entanglement during the transmission. The polarization noise affecting the polarization entanglement can be corrected with a proper one-step decoding procedure. The two parties in quantum communication can, in principle, obtain a nonlocal maximally entangled spatial-polarization hyperentanglement in a deterministic way, which makes our protocol more convenient than others in long-distance quantum communication. PMID:26861681

  16. Deterministic error correction for nonlocal spatial-polarization hyperentanglement.

    PubMed

    Li, Tao; Wang, Guan-Yu; Deng, Fu-Guo; Long, Gui-Lu

    2016-01-01

    Hyperentanglement is an effective quantum source for quantum communication network due to its high capacity, low loss rate, and its unusual character in teleportation of quantum particle fully. Here we present a deterministic error-correction scheme for nonlocal spatial-polarization hyperentangled photon pairs over collective-noise channels. In our scheme, the spatial-polarization hyperentanglement is first encoded into a spatial-defined time-bin entanglement with identical polarization before it is transmitted over collective-noise channels, which leads to the error rejection of the spatial entanglement during the transmission. The polarization noise affecting the polarization entanglement can be corrected with a proper one-step decoding procedure. The two parties in quantum communication can, in principle, obtain a nonlocal maximally entangled spatial-polarization hyperentanglement in a deterministic way, which makes our protocol more convenient than others in long-distance quantum communication. PMID:26861681

  17. Deterministic error correction for nonlocal spatial-polarization hyperentanglement

    NASA Astrophysics Data System (ADS)

    Li, Tao; Wang, Guan-Yu; Deng, Fu-Guo; Long, Gui-Lu

    2016-02-01

    Hyperentanglement is an effective quantum source for quantum communication network due to its high capacity, low loss rate, and its unusual character in teleportation of quantum particle fully. Here we present a deterministic error-correction scheme for nonlocal spatial-polarization hyperentangled photon pairs over collective-noise channels. In our scheme, the spatial-polarization hyperentanglement is first encoded into a spatial-defined time-bin entanglement with identical polarization before it is transmitted over collective-noise channels, which leads to the error rejection of the spatial entanglement during the transmission. The polarization noise affecting the polarization entanglement can be corrected with a proper one-step decoding procedure. The two parties in quantum communication can, in principle, obtain a nonlocal maximally entangled spatial-polarization hyperentanglement in a deterministic way, which makes our protocol more convenient than others in long-distance quantum communication.

  18. Measurement error caused by spatial misalignment in environmental epidemiology

    PubMed Central

    Gryparis, Alexandros; Paciorek, Christopher J.; Zeka, Ariana; Schwartz, Joel; Coull, Brent A.

    2009-01-01

    In many environmental epidemiology studies, the locations and/or times of exposure measurements and health assessments do not match. In such settings, health effects analyses often use the predictions from an exposure model as a covariate in a regression model. Such exposure predictions contain some measurement error as the predicted values do not equal the true exposures. We provide a framework for spatial measurement error modeling, showing that smoothing induces a Berkson-type measurement error with nondiagonal error structure. From this viewpoint, we review the existing approaches to estimation in a linear regression health model, including direct use of the spatial predictions and exposure simulation, and explore some modified approaches, including Bayesian models and out-of-sample regression calibration, motivated by measurement error principles. We then extend this work to the generalized linear model framework for health outcomes. Based on analytical considerations and simulation results, we compare the performance of all these approaches under several spatial models for exposure. Our comparisons underscore several important points. First, exposure simulation can perform very poorly under certain realistic scenarios. Second, the relative performance of the different methods depends on the nature of the underlying exposure surface. Third, traditional measurement error concepts can help to explain the relative practical performance of the different methods. We apply the methods to data on the association between levels of particulate matter and birth weight in the greater Boston area. PMID:18927119

  19. Client error concealment of RAID

    NASA Astrophysics Data System (ADS)

    Gu, Jian; Yu, Shengsheng; Zhou, Jingli; Zheng, Junhao

    2001-11-01

    A new technique to recover the information loss in a block-based image coding system is developed in this paper. Disk arrays organize multiple, independent disks into a large, high-performance logical disk. However, with more devices, reliability drops. A single disk failure in RAID level 5 will lead to the increase of the load of each surviving disk by 100% for data reconstruction. Each disk is loaded at less than 50% of its capacity in the fault-free state so that the surviving disks will not saturate when failure occurs. By image partitioning, decoder reconstructs DCT blocks in the sub-image and does not impose any significant load on the disk array. Our approach improves the quality of the compressed image by 2dB to 10dB and above and reduces the code overhead of the compressed image data by 2 percent to 10 percent and above for different images due to recovering main AC coefficients.

  20. Spatial reasoning in the treatment of systematic sensor errors

    SciTech Connect

    Beckerman, M.; Jones, J.P.; Mann, R.C.; Farkas, L.A.; Johnston, S.E.

    1988-01-01

    In processing ultrasonic and visual sensor data acquired by mobile robots systematic errors can occur. The sonar errors include distortions in size and surface orientation due to the beam resolution, and false echoes. The vision errors include, among others, ambiguities in discriminating depth discontinuities from intensity gradients generated by variations in surface brightness. In this paper we present a methodology for the removal of systematic errors using data from the sonar sensor domain to guide the processing of information in the vision domain, and vice versa. During the sonar data processing some errors are removed from 2D navigation maps through pattern analyses and consistent-labelling conditions, using spatial reasoning about the sonar beam and object characteristics. Others are removed using visual information. In the vision data processing vertical edge segments are extracted using a Canny-like algorithm, and are labelled. Object edge features are then constructed from the segments using statistical and spatial analyses. A least-squares method is used during the statistical analysis, and sonar range data are used in the spatial analysis. 7 refs., 10 figs.

  1. Concealment of sexual orientation.

    PubMed

    Sylva, David; Rieger, Gerulf; Linsenmeier, Joan A W; Bailey, J Michael

    2010-02-01

    Sex-atypical behaviors may be used to identify a person as homosexual. To shield themselves from prejudice, homosexual people may attempt to conceal these behaviors. It is not clear how effectively they can do so. In Study 1, we asked homosexual participants to conceal their sex-atypical behaviors while talking about the weather. Raters watched videos of the participants and judged the likelihood that each participant was homosexual. Homosexual participants were able to partially conceal signs of their orientation, but they remained distinguishable from heterosexual participants. In Study 2, we tested the ability to conceal signs of one's sexual orientation in a more demanding situation: a mock job interview. In this scenario, homosexual men were even less effective at concealing their orientation. Higher cognitive demands in this new situation may have interfered with their ability to conceal. PMID:19169803

  2. Spatial uncertainty analysis: Propagation of interpolation errors in spatially distributed models

    USGS Publications Warehouse

    Phillips, D.L.; Marks, D.G.

    1996-01-01

    In simulation modelling, it is desirable to quantify model uncertainties and provide not only point estimates for output variables but confidence intervals as well. Spatially distributed physical and ecological process models are becoming widely used, with runs being made over a grid of points that represent the landscape. This requires input values at each grid point, which often have to be interpolated from irregularly scattered measurement sites, e.g., weather stations. Interpolation introduces spatially varying errors which propagate through the model We extended established uncertainty analysis methods to a spatial domain for quantifying spatial patterns of input variable interpolation errors and how they propagate through a model to affect the uncertainty of the model output. We applied this to a model of potential evapotranspiration (PET) as a demonstration. We modelled PET for three time periods in 1990 as a function of temperature, humidity, and wind on a 10-km grid across the U.S. portion of the Columbia River Basin. Temperature, humidity, and wind speed were interpolated using kriging from 700- 1000 supporting data points. Kriging standard deviations (SD) were used to quantify the spatially varying interpolation uncertainties. For each of 5693 grid points, 100 Monte Carlo simulations were done, using the kriged values of temperature, humidity, and wind, plus random error terms determined by the kriging SDs and the correlations of interpolation errors among the three variables. For the spring season example, kriging SDs averaged 2.6??C for temperature, 8.7% for relative humidity, and 0.38 m s-1 for wind. The resultant PET estimates had coefficients of variation (CVs) ranging from 14% to 27% for the 10-km grid cells. Maps of PET means and CVs showed the spatial patterns of PET with a measure of its uncertainty due to interpolation of the input variables. This methodology should be applicable to a variety of spatially distributed models using interpolated

  3. [Prediction of spatial distribution of forest carbon storage in Heilongjiang Province using spatial error model].

    PubMed

    Liu, Chang; Li, Feng-Ri; Zhen, Zhen

    2014-10-01

    Abstract: Based on the data from Chinese National Forest Inventory (CNFI) and Key Ecological Benefit Forest Monitoring plots (5075 in total) in Heilongjiang Province in 2010 and concurrent meteorological data coming from 59 meteorological stations located in Heilongjiang, Jilin and Inner Mongolia, this paper established a spatial error model (SEM) by GeoDA using carbon storage as dependent variable and several independent variables, including diameter of living trees (DBH), number of trees per hectare (TPH), elevation (Elev), slope (Slope), and product of precipitation and temperature (Rain_Temp). Global Moran's I was computed for describing overall spatial autocorrelations of model results at different spatial scales. Local Moran's I was calculated at the optimal bandwidth (25 km) to present spatial distribution residuals. Intra-block spatial variances were computed to explain spatial heterogeneity of residuals. Finally, a spatial distribution map of carbon storage in Heilongjiang was visualized based on predictions. The results showed that the distribution of forest carbon storage in Heilongjiang had spatial effect and was significantly influenced by stand, topographic and meteorological factors, especially average DBH. SEM could solve the spatial autocorrelation and heterogeneity well. There were significant spatial differences in distribution of forest carbon storage. The carbon storage was mainly distributed in Zhangguangcai Mountain, Xiao Xing'an Mountain and Da Xing'an Mountain where dense, forests existed, rarely distributed in Songnen Plains, while Wanda Mountain had moderate-level carbon storage. PMID:25796882

  4. Augmented GNSS differential corrections minimum mean square error estimation sensitivity to spatial correlation modeling errors.

    PubMed

    Kassabian, Nazelie; Lo Presti, Letizia; Rispoli, Francesco

    2014-01-01

    Railway signaling is a safety system that has evolved over the last couple of centuries towards autonomous functionality. Recently, great effort is being devoted in this field, towards the use and exploitation of Global Navigation Satellite System (GNSS) signals and GNSS augmentation systems in view of lower railway track equipments and maintenance costs, that is a priority to sustain the investments for modernizing the local and regional lines most of which lack automatic train protection systems and are still manually operated. The objective of this paper is to assess the sensitivity of the Linear Minimum Mean Square Error (LMMSE) algorithm to modeling errors in the spatial correlation function that characterizes true pseudorange Differential Corrections (DCs). This study is inspired by the railway application; however, it applies to all transportation systems, including the road sector, that need to be complemented by an augmentation system in order to deliver accurate and reliable positioning with integrity specifications. A vector of noisy pseudorange DC measurements are simulated, assuming a Gauss-Markov model with a decay rate parameter inversely proportional to the correlation distance that exists between two points of a certain environment. The LMMSE algorithm is applied on this vector to estimate the true DC, and the estimation error is compared to the noise added during simulation. The results show that for large enough correlation distance to Reference Stations (RSs) distance separation ratio values, the LMMSE brings considerable advantage in terms of estimation error accuracy and precision. Conversely, the LMMSE algorithm may deteriorate the quality of the DC measurements whenever the ratio falls below a certain threshold. PMID:24922454

  5. Augmented GNSS Differential Corrections Minimum Mean Square Error Estimation Sensitivity to Spatial Correlation Modeling Errors

    PubMed Central

    Kassabian, Nazelie; Presti, Letizia Lo; Rispoli, Francesco

    2014-01-01

    Railway signaling is a safety system that has evolved over the last couple of centuries towards autonomous functionality. Recently, great effort is being devoted in this field, towards the use and exploitation of Global Navigation Satellite System (GNSS) signals and GNSS augmentation systems in view of lower railway track equipments and maintenance costs, that is a priority to sustain the investments for modernizing the local and regional lines most of which lack automatic train protection systems and are still manually operated. The objective of this paper is to assess the sensitivity of the Linear Minimum Mean Square Error (LMMSE) algorithm to modeling errors in the spatial correlation function that characterizes true pseudorange Differential Corrections (DCs). This study is inspired by the railway application; however, it applies to all transportation systems, including the road sector, that need to be complemented by an augmentation system in order to deliver accurate and reliable positioning with integrity specifications. A vector of noisy pseudorange DC measurements are simulated, assuming a Gauss-Markov model with a decay rate parameter inversely proportional to the correlation distance that exists between two points of a certain environment. The LMMSE algorithm is applied on this vector to estimate the true DC, and the estimation error is compared to the noise added during simulation. The results show that for large enough correlation distance to Reference Stations (RSs) distance separation ratio values, the LMMSE brings considerable advantage in terms of estimation error accuracy and precision. Conversely, the LMMSE algorithm may deteriorate the quality of the DC measurements whenever the ratio falls below a certain threshold. PMID:24922454

  6. Concealed wire tracing apparatus

    DOEpatents

    Kronberg, James W.

    1994-01-01

    An apparatus and method that combines a signal generator and a passive signal receiver to detect and record the path of partially or completely concealed electrical wiring without disturbing the concealing surface. The signal generator applies a series of electrical pulses to the selected wiring of interest. The applied pulses create a magnetic field about the wiring that can be detected by a coil contained within the signal receiver. An audible output connected to the receiver and driven by the coil reflects the receivers position with respect to the wiring. The receivers audible signal is strongest when the receiver is directly above the wiring and the long axis of the receivers coil is parallel to the wiring. A marking means is mounted on the receiver to mark the location of the wiring as the receiver is directed over the wiring's concealing surface. Numerous marks made on various locations of the concealing surface will trace the path of the wiring of interest.

  7. Pixelated mask spatial carrier phase shifting interferometry algorithms and associated errors

    SciTech Connect

    Kimbrough, Bradley T

    2006-07-01

    In both temporal and spatial carrier phase shifting interferometry, the primary source of phase calculation error results from an error in the relative phase shift between sample points. In spatial carrier phase shifting interferometry, this phase shifting error is caused directly by the wave front under test and is unavoidable. In order to minimize the phase shifting error, a pix elated spatial carrier phase shifting technique has been developed by 4D technologies. This new technique allows for the grouping of phase shifted pixels together around a single point in two dimensions,minimizing the phase shift change due to the spatial variation in the test wavefront. A formula for the phase calculation error in spatial carrier phase shifting interferometry is derived. The error associated with the use of linear N-point averaging algorithms is presented and compared with those of the pix elated spatial carrier technique.

  8. Evaluation and control of spatial frequency errors in reflective telescopes

    NASA Astrophysics Data System (ADS)

    Zhang, Xuejun; Zeng, Xuefeng; Hu, Haixiang; Zheng, Ligong

    2015-08-01

    In this paper, the influence on the image quality of manufacturing residual errors was studied. By analyzing the statistical distribution characteristics of the residual errors and their effects on PSF and MTF, we divided those errors into low, middle and high frequency domains using the unit "cycles per aperture". Two types of mid-frequency errors, algorithm intrinsic and tool path induced were analyzed. Control methods in current deterministic polishing process, such as MRF or IBF were presented.

  9. Large-scale spatial angle measurement and the pointing error analysis

    NASA Astrophysics Data System (ADS)

    Xiao, Wen-jian; Chen, Zhi-bin; Ma, Dong-xi; Zhang, Yong; Liu, Xian-hong; Qin, Meng-ze

    2016-05-01

    A large-scale spatial angle measurement method is proposed based on inertial reference. Common measurement reference is established in inertial space, and the spatial vector coordinates of each measured axis in inertial space are measured by using autocollimation tracking and inertial measurement technology. According to the spatial coordinates of each test vector axis, the measurement of large-scale spatial angle is easily realized. The pointing error of tracking device based on the two mirrors in the measurement system is studied, and the influence of different installation errors to the pointing error is analyzed. This research can lay a foundation for error allocation, calibration and compensation for the measurement system.

  10. ISAR for concealed objects imaging

    NASA Astrophysics Data System (ADS)

    Zhuravlev, A.; Razevig, V.; Vasiliev, I.; Ivashov, S.; Voronin, V.

    2015-03-01

    A new promising architecture of microwave personnel screening system is analyzed in this paper with numerical simulations. This architecture is based on the concept of inverse aperture synthesis applied to a naturally moving person. The extent of the synthetic aperture is formed by a stationary vertical linear antenna array and by a length of subject's trajectory as he moves in the vicinity of this antenna array. The coherent radar signal processing is achieved by a synchronous 3D video-sensor whose data are used to track the subject. The advantages of the proposed system architecture over currently existing systems are analyzed. Synthesized radar images are obtained by numerical simulations with a human torso model with concealed objects. Various aspects of the system architecture are considered, including: advantages of using sparse antenna arrays to decrease the number of antenna elements, the influence of positioning errors of body surface due to outer clothing. It was shown that detailed radar images of concealed objects can be obtained with a narrow-band signal due to the depth information available from the 3D video sensor. The considered ISAR architecture is considered perspective to be used on infrastructure objects owing to its superior qualities: highest throughput, small footprint, simple design of the radar sub-system, non-required co-operation of the subject.

  11. Concealed wire tracing apparatus

    DOEpatents

    Kronberg, J.W.

    1994-05-31

    An apparatus and method that combines a signal generator and a passive signal receiver to detect and record the path of partially or completely concealed electrical wiring without disturbing the concealing surface is disclosed. The signal generator applies a series of electrical pulses to the selected wiring of interest. The applied pulses create a magnetic field about the wiring that can be detected by a coil contained within the signal receiver. An audible output connected to the receiver and driven by the coil reflects the receivers position with respect to the wiring. The receivers audible signal is strongest when the receiver is directly above the wiring and the long axis of the receivers coil is parallel to the wiring. A marking means is mounted on the receiver to mark the location of the wiring as the receiver is directed over the wiring's concealing surface. Numerous marks made on various locations of the concealing surface will trace the path of the wiring of interest. 4 figs.

  12. Concealing with Structured Light

    PubMed Central

    Sun, Jingbo; Zeng, Jinwei; Wang, Xi; Cartwright, Alexander N.; Litchinitser, Natalia M.

    2014-01-01

    While making objects less visible (or invisible) to a human eye or a radar has captured people's imagination for centuries, current attempts towards realization of this long-awaited functionality range from various stealth technologies to recently proposed cloaking devices. A majority of proposed approaches share a number of common deficiencies such as design complexity, polarization effects, bandwidth, losses and the physical size or shape requirement complicating their implementation especially at optical frequencies. Here we demonstrate an alternative way to conceal macroscopic objects by structuring light itself. In our approach, the incident light is transformed into an optical vortex with a dark core that can be used to conceal macroscopic objects. Once such a beam passed around the object it is transformed back into its initial Gaussian shape with minimum amplitude and phase distortions. Therefore, we propose to use that dark core of the vortex beam to conceal an object that is macroscopic yet small enough to fit the dark (negligibly low intensity) region of the beam. The proposed concealing approach is polarization independent, easy to fabricate, lossless, operates at wavelengths ranging from 560 to 700 nm, and can be used to hide macroscopic objects providing they are smaller than vortex core. PMID:24522638

  13. Concealing with Structured Light

    NASA Astrophysics Data System (ADS)

    Sun, Jingbo; Zeng, Jinwei; Wang, Xi; Cartwright, Alexander N.; Litchinitser, Natalia M.

    2014-02-01

    While making objects less visible (or invisible) to a human eye or a radar has captured people's imagination for centuries, current attempts towards realization of this long-awaited functionality range from various stealth technologies to recently proposed cloaking devices. A majority of proposed approaches share a number of common deficiencies such as design complexity, polarization effects, bandwidth, losses and the physical size or shape requirement complicating their implementation especially at optical frequencies. Here we demonstrate an alternative way to conceal macroscopic objects by structuring light itself. In our approach, the incident light is transformed into an optical vortex with a dark core that can be used to conceal macroscopic objects. Once such a beam passed around the object it is transformed back into its initial Gaussian shape with minimum amplitude and phase distortions. Therefore, we propose to use that dark core of the vortex beam to conceal an object that is macroscopic yet small enough to fit the dark (negligibly low intensity) region of the beam. The proposed concealing approach is polarization independent, easy to fabricate, lossless, operates at wavelengths ranging from 560 to 700 nm, and can be used to hide macroscopic objects providing they are smaller than vortex core.

  14. Characterization of Age Differences in Error Types in a Multitrial Spatial Learning Task

    ERIC Educational Resources Information Center

    Krueger, Lacy E.

    2013-01-01

    Although increased age is associated with greater errors in spatial memory tasks, it is unclear if there are age differences in error types. To investigate this, 334 participants (ages 22-88) completed a task in which they remembered object locations across multiple study-test trials. Far and close error types were categorized based on the spatial…

  15. Canceling the momentum in a phase-shifting algorithm to eliminate spatially uniform errors.

    PubMed

    Hibino, Kenichi; Kim, Yangjin

    2016-08-10

    In phase-shifting interferometry, phase modulation nonlinearity causes both spatially uniform and nonuniform errors in the measured phase. Conventional linear-detuning error-compensating algorithms only eliminate the spatially variable error component. The uniform error is proportional to the inertial momentum of the data-sampling weight of a phase-shifting algorithm. This paper proposes a design approach to cancel the momentum by using characteristic polynomials in the Z-transform space and shows that an arbitrary M-frame algorithm can be modified to a new (M+2)-frame algorithm that acquires new symmetry to eliminate the uniform error. PMID:27534475

  16. Evaluation of MPEG4-SVC for QoE protection in the context of transmission errors

    NASA Astrophysics Data System (ADS)

    Pitrey, Yohann; Barkowsky, Marcus; Le Callet, Patrick; Pépion, Romuald

    2010-08-01

    Scalable Video Coding (SVC) provides a way to encapsulate several video layers with increasing quality and resolution in a single bitstream. Thus it is particularly adapted to address heterogeneous networks and a wide variety of decoding devices. In this paper, we evaluate the interest of SVC in a different context, which is error concealment after transmission on networks subject to packet loss. The encoded scalable video streams contain two layers with different spatial and temporal resolutions designed for mobile video communications with medium size and average to low bitrates. The main idea is to use the base layer to conceal errors in the higher layers if they are corrupted or lost. The base layer is first upscaled either spatially or temporally to reach the same resolution as the layer to conceal. Two error-concealment techniques using the base layer are then proposed for the MPEG-4 SVC standard, involving frame-level concealment and pixel-level concealment. These techniques are compared to the upscaled base layer as well as to a classical single-layer MPEG- 4 AVC/H.264 error-concealment technique. The comparison is carried out through a subjective experiment, in order to evaluate the Quality-of-Experience of the proposed techniques. We study several scenarios involving various bitrates and resolutions for the base layer of the SVC streams. The results show that SVC-based error concealment can provide significantly higher visual quality than single-layer-based techniques. Moreover, we demonstrate that the resolution and bitrate of the base layer have a strong impact on the perceived quality of the concealment.

  17. Effects and correction of magneto-optic spatial light modulator phase errors in an optical correlator

    NASA Technical Reports Server (NTRS)

    Downie, John D.; Hine, Butler P.; Reid, Max B.

    1992-01-01

    The optical phase errors introduced into an optical correlator by the input and filter plane magnetooptic spatial light modulators have been studied. The magnitude of these phase errors is measured and characterized, their effects on the correlation results are evaluated, and a means of correction by a design modification of the binary phase-only optical-filter function is presented. The efficacy of the phase-correction technique is quantified and is found to restore the correlation characteristics to those obtained in the absence of errors, to a high degree. The phase errors of other correlator system elements are also discussed and treated in a similar fashion.

  18. Fourier decomposition of spatial localization errors reveals an idiotropic dominance of an internal model of gravity.

    PubMed

    De Sá Teixeira, Nuno Alexandre

    2014-12-01

    Given its conspicuous nature, gravity has been acknowledged by several research lines as a prime factor in structuring the spatial perception of one's environment. One such line of enquiry has focused on errors in spatial localization aimed at the vanishing location of moving objects - it has been systematically reported that humans mislocalize spatial positions forward, in the direction of motion (representational momentum) and downward in the direction of gravity (representational gravity). Moreover, spatial localization errors were found to evolve dynamically with time in a pattern congruent with an anticipated trajectory (representational trajectory). The present study attempts to ascertain the degree to which vestibular information plays a role in these phenomena. Human observers performed a spatial localization task while tilted to varying degrees and referring to the vanishing locations of targets moving along several directions. A Fourier decomposition of the obtained spatial localization errors revealed that although spatial errors were increased "downward" mainly along the body's longitudinal axis (idiotropic dominance), the degree of misalignment between the latter and physical gravity modulated the time course of the localization responses. This pattern is surmised to reflect increased uncertainty about the internal model when faced with conflicting cues regarding the perceived "downward" direction. PMID:25448714

  19. Instantaneous detection of spatial gradient errors in differential GNSS

    NASA Astrophysics Data System (ADS)

    Jing, Jing

    Global Navigation Satellite Systems (GNSS) have become a critical element of modern engineering and scientific applications. GPS is currently being used in the design of navigation systems for both civil and military aviation applications. Differential GPS carrier phase measurements between antennas provide a very precise measurement that is useful for these applications. In fact, ground infrastructure has already been implemented in the Ground Based Augmentation System (GBAS) to take advantage of these precise measurements for use in civil aviation. Furthermore, these antennas can also be used to detect and isolate certain signal-in-space (SIS) failures and anomalies that are hazardous to aviation applications, for example the ionospheric anomalies and ephemeris failures. This realization, in turn, has led to the development of numerous carrier-phase based monitors. One drawback of the majority of these monitors is that their performance within a given configuration is dependent on how antennas are paired to form double differences. In contrast, the null space monitor approach is developed to provide consistent detection performance regardless of how the antennas are paired which combines measurements from multiple, spatially separated ground antennas through a null space transformation. The instantaneous carrier phase monitor cannot detect all gradients due to the presence of integer ambiguities. These ambiguities cannot be resolved because the gradient magnitude is unknown a priori. Furthermore, it has been shown that the performance of such monitors is highly dependent on the reference antenna topology. The range of detectable gradients for all carrier phase monitors depends on two factors: the number of antennas and their configuration. Antenna configuration is often overlooked as a means to improve performance. and heuristic arguments typically prevail in the associated siting decisions. However. such heuristics do not provide the maximum detectable range of

  20. Quantitative analysis of spatial sampling error in the infant and adult electroencephalogram.

    PubMed

    Grieve, Philip G; Emerson, Ronald G; Isler, Joseph R; Stark, Raymond I

    2004-04-01

    The purpose of this report was to determine the required number of electrodes to record the infant and adult electroencephalogram (EEG) with a specified amount of spatial sampling error. We first developed mathematical theory that governs the spatial sampling of EEG data distributed on a spherical approximation to the scalp. We then used a concentric sphere model of current flow in the head to simulate realistic EEG data. Quantitative spatial sampling error was calculated for the simulated EEG, with additive measurement noise, for 64, 128, and 256 electrodes equally spaced over the surface of the sphere corresponding to the coverage of the human scalp by commercially available "geodesic" electrode arrays. We found the sampling error for the infant to be larger than that for the adult. For example, a sampling error of less than 10% for the adult was obtained with a 64-electrode array but a 256-electrode array was needed for the infant to achieve the same level of error. With the addition of measurement noise, with power 10 times less than that of the EEG, the sampling error increased to 25% for both the infant and adult, for these numbers of electrodes. These results show that accurate measurement of the spatial properties of the infant EEG requires more electrodes than for the adult. PMID:15050554

  1. The effects of weighting function errors on spatial filters for structural control. [sensors for vibration damping

    NASA Technical Reports Server (NTRS)

    Lindner, Douglas K.; Reichard, Karl M.

    1992-01-01

    Distributed-effect sensors, which respond to spatially distributed inputs over a significant gauge length, encompass piezoelectric laminate films, modal-domain optical fiber sensors, and holographic sensors; they can be fabricated with spatially varying sensitivity to a distributed measurand for spatial filtering. Such spatial filters are configurable to extract various structural parameters from distributed measurements that cannot be directly measured by sensors. A modeling is presently conducted for distributed-effect sensors' integration into state-space structural models, noting the effects of fabrication errors on sensor operation.

  2. Spatial heterogeneity of type I error for local cluster detection tests

    PubMed Central

    2014-01-01

    Background Just as power, type I error of cluster detection tests (CDTs) should be spatially assessed. Indeed, CDTs’ type I error and power have both a spatial component as CDTs both detect and locate clusters. In the case of type I error, the spatial distribution of wrongly detected clusters (WDCs) can be particularly affected by edge effect. This simulation study aims to describe the spatial distribution of WDCs and to confirm and quantify the presence of edge effect. Methods A simulation of 40 000 datasets has been performed under the null hypothesis of risk homogeneity. The simulation design used realistic parameters from survey data on birth defects, and in particular, two baseline risks. The simulated datasets were analyzed using the Kulldorff’s spatial scan as a commonly used test whose behavior is otherwise well known. To describe the spatial distribution of type I error, we defined the participation rate for each spatial unit of the region. We used this indicator in a new statistical test proposed to confirm, as well as quantify, the edge effect. Results The predefined type I error of 5% was respected for both baseline risks. Results showed strong edge effect in participation rates, with a descending gradient from center to edge, and WDCs more often centrally situated. Conclusions In routine analysis of real data, clusters on the edge of the region should be carefully considered as they rarely occur when there is no cluster. Further work is needed to combine results from power studies with this work in order to optimize CDTs performance. PMID:24885343

  3. Self-Concealment and Suicidal Behaviors

    ERIC Educational Resources Information Center

    Friedlander, Adam; Nazem, Sarra; Fiske, Amy; Nadorff, Michael R.; Smith, Merideth D.

    2012-01-01

    Understanding self-concealment, the tendency to actively conceal distressing personal information from others, may be important in developing effective ways to help individuals with suicidal ideation. No published study has yet assessed the relation between self-concealment and suicidal behaviors. Additionally, most self-concealment research has…

  4. Spatial Resolution, Grayscale, and Error Diffusion Trade-offs: Impact on Display System Design

    NASA Technical Reports Server (NTRS)

    Gille, Jennifer L. (Principal Investigator)

    1996-01-01

    We examine technology trade-offs related to grayscale resolution, spatial resolution, and error diffusion for tessellated display systems. We present new empirical results from our psychophysical study of these trade-offs and compare them to the predictions of a model of human vision.

  5. Detection of a concealed object

    DOEpatents

    Keller, Paul E.; Hall, Thomas E.; McMakin, Douglas L.

    2008-04-29

    Disclosed are systems, methods, devices, and apparatus to determine if a clothed individual is carrying a suspicious, concealed object. This determination includes establishing data corresponding to an image of the individual through interrogation with electromagnetic radiation in the 200 MHz to 1 THz range. In one form, image data corresponding to intensity of reflected radiation and differential depth of the reflecting surface is received and processed to detect the suspicious, concealed object.

  6. Detection of a concealed object

    DOEpatents

    Keller, Paul E [Richland, WA; Hall, Thomas E [Kennewick, WA; McMakin, Douglas L [Richland, WA

    2010-11-16

    Disclosed are systems, methods, devices, and apparatus to determine if a clothed individual is carrying a suspicious, concealed object. This determination includes establishing data corresponding to an image of the individual through interrogation with electromagnetic radiation in the 200 MHz to 1 THz range. In one form, image data corresponding to intensity of reflected radiation and differential depth of the reflecting surface is received and processed to detect the suspicious, concealed object.

  7. Spatial effects, sampling errors, and task specialization in the honey bee.

    PubMed

    Johnson, B R

    2010-05-01

    Task allocation patterns should depend on the spatial distribution of work within the nest, variation in task demand, and the movement patterns of workers, however, relatively little research has focused on these topics. This study uses a spatially explicit agent based model to determine whether such factors alone can generate biases in task performance at the individual level in the honey bees, Apis mellifera. Specialization (bias in task performance) is shown to result from strong sampling error due to localized task demand, relatively slow moving workers relative to nest size, and strong spatial variation in task demand. To date, specialization has been primarily interpreted with the response threshold concept, which is focused on intrinsic (typically genotypic) differences between workers. Response threshold variation and sampling error due to spatial effects are not mutually exclusive, however, and this study suggests that both contribute to patterns of task bias at the individual level. While spatial effects are strong enough to explain some documented cases of specialization; they are relatively short term and not explanatory for long term cases of specialization. In general, this study suggests that the spatial layout of tasks and fluctuations in their demand must be explicitly controlled for in studies focused on identifying genotypic specialists. PMID:20351761

  8. Refining measurements of lateral channel movement from image time series by quantifying spatial variations in registration error

    NASA Astrophysics Data System (ADS)

    Lea, Devin M.; Legleiter, Carl J.

    2016-04-01

    Remotely sensed data provides information on river morphology useful for examining channel change at yearly-to-decadal time scales. Although previous studies have emphasized the need to distinguish true geomorphic change from errors associated with image registration, standard metrics for assessing and summarizing these errors, such as the root-mean-square error (RMSE) and 90th percentile of the distribution of ground control point (GCP) error, fail to incorporate the spatial structure of this uncertainty. In this study, we introduce a framework for evaluating whether observations of lateral channel migration along a meandering channel are statistically significant, given the spatial distribution of registration error. An iterative leave-one-out cross-validation approach was used to produce local error metrics for an image time series from Savery Creek, Wyoming, USA, and to evaluate various transformation equations, interpolation methods, and GCP placement strategies. Interpolated error surfaces then were used to create error ellipses representing spatially variable buffers of detectable change. Our results show that, for all five sequential image pairs we examined, spatially distributed estimates of registration error enabled detection of a greater number of statistically significant lateral migration vectors than the spatially uniform RMSE or 90th percentile of GCP error. Conversely, spatially distributed error metrics prevented changes from being mistaken as real in areas of greater registration error. Our results also support the findings of previous studies: second-order polynomial functions on average yield the lowest RMSE, and errors are reduced by placing GCPs on the floodplain rather than on hillslopes. This study highlights the importance of characterizing the spatial distribution of image registration errors in the analysis of channel change.

  9. A parametric multiclass Bayes error estimator for the multispectral scanner spatial model performance evaluation

    NASA Technical Reports Server (NTRS)

    Mobasseri, B. G.; Mcgillem, C. D.; Anuta, P. E. (Principal Investigator)

    1978-01-01

    The author has identified the following significant results. The probability of correct classification of various populations in data was defined as the primary performance index. The multispectral data being of multiclass nature as well, required a Bayes error estimation procedure that was dependent on a set of class statistics alone. The classification error was expressed in terms of an N dimensional integral, where N was the dimensionality of the feature space. The multispectral scanner spatial model was represented by a linear shift, invariant multiple, port system where the N spectral bands comprised the input processes. The scanner characteristic function, the relationship governing the transformation of the input spatial, and hence, spectral correlation matrices through the systems, was developed.

  10. Minimizing high spatial frequency residual error in active space telescope mirrors

    NASA Astrophysics Data System (ADS)

    Gray, Thomas L.; Smith, Matthew W.; Cohan, Lucy E.; Miller, David W.

    2009-08-01

    The trend in future space telescopes is towards larger apertures, which provide increased sensitivity and improved angular resolution. Lightweight, segmented, rib-stiffened, actively controlled primary mirrors are an enabling technology, permitting large aperture telescopes to meet the mass and volume restrictions imposed by launch vehicles. Such mirrors, however, are limited in the extent to which their discrete surface-parallel electrostrictive actuators can command global prescription changes. Inevitably some amount of high spatial frequency residual error is added to the wavefront due to the discrete nature of the actuators. A parameterized finite element mirror model is used to simulate this phenomenon and determine designs that mitigate high spatial frequency residual errors in the mirror surface figure. Two predominant residual components are considered: dimpling induced by embedded actuators and print-through induced by facesheet polishing. A gradient descent algorithm is combined with the parameterized mirror model to allow rapid trade space navigation and optimization of the mirror design, yielding advanced design heuristics formulated in terms of minimum machinable rib thickness. These relationships produce mirrors that satisfy manufacturing constraints and minimize uncorrectable high spatial frequency error.

  11. Sinusoidal Siemens star spatial frequency response measurement errors due to misidentified target centers

    SciTech Connect

    Birch, Gabriel Carisle; Griffin, John Clark

    2015-07-23

    Numerous methods are available to measure the spatial frequency response (SFR) of an optical system. A recent change to the ISO 12233 photography resolution standard includes a sinusoidal Siemens star test target. We take the sinusoidal Siemens star proposed by the ISO 12233 standard, measure system SFR, and perform an analysis of errors induced by incorrectly identifying the center of a test target. We show a closed-form solution for the radial profile intensity measurement given an incorrectly determined center and describe how this error reduces the measured SFR of the system. As a result, using the closed-form solution, we propose a two-step process by which test target centers are corrected and the measured SFR is restored to the nominal, correctly centered values.

  12. Sinusoidal Siemens star spatial frequency response measurement errors due to misidentified target centers

    DOE PAGESBeta

    Birch, Gabriel Carisle; Griffin, John Clark

    2015-07-23

    Numerous methods are available to measure the spatial frequency response (SFR) of an optical system. A recent change to the ISO 12233 photography resolution standard includes a sinusoidal Siemens star test target. We take the sinusoidal Siemens star proposed by the ISO 12233 standard, measure system SFR, and perform an analysis of errors induced by incorrectly identifying the center of a test target. We show a closed-form solution for the radial profile intensity measurement given an incorrectly determined center and describe how this error reduces the measured SFR of the system. As a result, using the closed-form solution, we proposemore » a two-step process by which test target centers are corrected and the measured SFR is restored to the nominal, correctly centered values.« less

  13. Quantifying spatial distribution of snow depth errors from LiDAR using Random Forests

    NASA Astrophysics Data System (ADS)

    Tinkham, W.; Smith, A. M.; Marshall, H.; Link, T. E.; Falkowski, M. J.; Winstral, A. H.

    2013-12-01

    There is increasing need to characterize the distribution of snow in complex terrain using remote sensing approaches, especially in isolated mountainous regions that are often water-limited, the principal source of terrestrial freshwater, and sensitive to climatic shifts and variations. We apply intensive topographic surveys, multi-temporal LiDAR, and Random Forest modeling to quantify snow volume and characterize associated errors across seven land cover types in a semi-arid mountainous catchment at a 1 and 4 m spatial resolution. The LiDAR-based estimates of both snow-off surface topology and snow depths were validated against ground-based measurements across the catchment. Comparison of LiDAR-derived snow depths to manual snow depth surveys revealed that LiDAR based estimates were more accurate in areas of low lying vegetation such as shrubs (RMSE = 0.14 m) as compared to areas consisting of tree cover (RMSE = 0.20-0.35 m). The highest errors were found along the edge of conifer forests (RMSE = 0.35 m), however a second conifer transect outside the catchment had much lower errors (RMSE = 0.21 m). This difference is attributed to the wind exposure of the first site that led to highly variable snow depths at short spatial distances. The Random Forest modeled errors deviated from the field measured errors with a RMSE of 0.09-0.34 m across the different cover types. Results show that snow drifts, which are important for maintaining spring and summer stream flows and establishing and sustaining water-limited plant species, contained 30 × 5-6% of the snow volume while only occupying 10% of the catchment area similar to findings by prior physically-based modeling approaches. This study demonstrates the potential utility of combining multi-temporal LiDAR with Random Forest modeling to quantify the distribution of snow depth with a reasonable degree of accuracy. Future work could explore the utility of Terrestrial LiDAR Scanners to produce validation of snow-on surface

  14. Handheld ultrasonic concealed weapon detector

    NASA Astrophysics Data System (ADS)

    Wild, Norbert C.; Doft, Frank; Breuner, Dennis; Felber, Franklin S.

    2001-02-01

    A handheld, battery-operated prototype of a concealed weapon detector has been built and tested. Designed to detect both metallic and non-metallic weapons, the sensor utilizes focused ultrasound (40 kHz frequency) to remotely detect concealed objects from beyond arm's length out to a range of about 12 feet (4 meters). The detector can be used in prison settings, by officers in the field to allow for stand-off frisking of suspects, and to supplement security at courthouse entrances and other monitored portals. The detector emits an audible alarm (with provision for an earphone jack) as well as a visible light-bar indicator when an object is detected. A high intensity aiming light, with momentary switch, allows the user to accurately determine the location of the concealed object. Current efforts are aimed at increasing the probability of detection, reducing the false-alarm rate, and extending the range of detectability out to 20 feet. Plans for accomplishing these tasks will be presented together with data showing the effective range and probability of detection for the present system.

  15. Standoff detection of concealed handguns

    NASA Astrophysics Data System (ADS)

    Rezgui, Nacer; Andrews, David; Bowring, Nicholas; Harmer, Stuart; Southgate, Matthew

    2008-04-01

    An active technique for the standoff detection and identification of concealed conducting items such as handguns and knives is presented. This technique entails illuminating an object with wide range stepped millimetre wave radiation and inducing a local electromagnetic field comprised of a superposition of modes. The coupling to these modes from the illuminating and scattered fields is, in general, frequency dependent and this forms the basis for the detection and identification of conducting items. The object needs to be fully illuminated if a full spectrum of modes and therefore a full frequency response are to be excited and collected. The scattered EM power is measured at "stand off" distance of several metres as the illuminating field is frequency swept and patterns in frequency response characteristic to the target item being sought are looked for. This system relies on contributions from the aspect independent late time responses employed by Baum1 together with aspect independent information derived specifically from gun barrels and polarisation from scattering effects. This technique is suitable for a deployable gun and concealed weapons detection system and does not rely on imaging techniques for determining the presence of a gun. Experimental sets of responses from typical metal or partially conducting objects such as keys, mobile phones and concealed handguns are presented at a range of frequencies.

  16. Method for imaging a concealed object

    DOEpatents

    Davidson, James R [Idaho Falls, ID; Partin, Judy K [Idaho Falls, ID; Sawyers, Robert J [Idaho Falls, ID

    2007-07-03

    A method for imaging a concealed object is described and which includes a step of providing a heat radiating body, and wherein an object to be detected is concealed on the heat radiating body; imaging the heat radiating body to provide a visibly discernible infrared image of the heat radiating body; and determining if the visibly discernible infrared image of the heat radiating body is masked by the presence of the concealed object.

  17. Error and correction for MODIS-AM's spatial response on the NDVI and EVI science products

    NASA Astrophysics Data System (ADS)

    Rojas, Francisco; Schowengerdt, Robert A.; Biggar, Stuart F.

    2002-09-01

    The accuracy of the Moderate Resolution Imaging Spectroradiometer (MODIS) end data products, such as the Vegetation Indices (VIs), are affected by MODIS's Spatial Response (SR). An error analysis is presented for the VI (MOD-13) product using Point Spread Response (PSR) data and improvement using a correction filter is demonstrated. The PSR data is a set of laboratory measurements that include electronic/optical cross-talk (pre-August 1998). The ensquared energy concept is applied to the PSR data to determine upper limits for the Far Field Response (FFR)(unwanted noise) that may be present in the MODIS data. The error is presented using spectral variation, Normalized Difference Vegetation Index (NDVI) and Enhanced Vegetation Index (EVI) which demonstrate that the science products are dependent on the sensor's SR. A correction filter for the MODIS SR shows a qualitative and quantitative improvement using a scene Railroad Valley scene, June 14th 2001 in which Landsat 7 ETM+ is used as the reference.

  18. Unified error model based spatial error compensation for four types of CNC machining center: Part I-Singular function based unified error model

    NASA Astrophysics Data System (ADS)

    Fan, Kaiguo; Yang, Jianguo; Yang, Liyan

    2015-08-01

    To unify the error model for four types of CNC machining center, the comprehensive error model of each type of CNC machining center was established using the homogenous transformation matrix (HTM). The internal rules between the HTMs and the kinematic chains were analyzed in this research. The analysis results show that the HTM elements associated with the motion axes which are at the rear of the reference coordinate system are positive value. On the contrary, the HTM elements associated with the motion axes which are at the front of the reference coordinate system are negative value. To express these internal rules, the singular function was introduced to the HTMs. And a unified error model for four types of CNC machining center was established based on the HTM and the singular function. The unified error model includes 18 error elements which are the main factors affecting the machining accuracy of CNC machine tools. The practical results show that the unified error model is not only suitable for vertical machining center but also suitable for horizontal machining center.

  19. Effect of mid- and high-spatial frequencies on optical performance. [surface error effects on reflecting telescopes

    NASA Technical Reports Server (NTRS)

    Noll, R. J.

    1979-01-01

    In many of today's telescopes the effects of surface errors on image quality and scattered light are very important. The influence of optical fabrication surface errors on the performance of an optical system is discussed. The methods developed by Hopkins (1957) for aberration tolerancing and Barakat (1972) for random wavefront errors are extended to the examination of mid- and high-spatial frequency surface errors. The discussion covers a review of the basic concepts of image quality, an examination of manufacturing errors as a function of image quality performance, a demonstration of mirror scattering effects in relation to surface errors, and some comments on the nature of the correlation functions. Illustrative examples are included.

  20. Spatial and temporal patterns of error in land cover change analyses: Identifying and propagating uncertainty for ecological monitoring and modeling

    NASA Astrophysics Data System (ADS)

    Burnicki, Amy Colette

    Improving our understanding of the uncertainty associated with a map of land-cover change is needed given the importance placed on modeling our changing landscape. My dissertation research addressed the challenges of estimating the accuracy of a map of change by improving our understanding of the spatio-temporal structure of error in multi-date classified imagery, investigating the relative strength and importance of a temporal dependence between classification errors in multi-date imagery, and exploring the interaction of classification errors within a simulated model of land-cover change. First, I quantified the spatial and temporal patterns of error in multi-date classified imagery acquired for Pittsfield Township, Michigan. Specifically, I examined the propagation of error in a post-classification change analysis. The spatial patterns of misclassification for each classified map, the temporal correlation between the errors in each classified map, and secondary variables that may have affected the pattern of error associated with the map of change were analyzed by addressing a series of research hypothesis. The results of all analyses provided a thorough description and understanding of the spatio-temporal error structure for this test township. Second, I developed a model of error propagation in land-cover change that simulated user-defined spatial and temporal patterns of error within a time-series of classified maps to assess the impact of the specified error patterns on the accuracy of the resulting map of change. Two models were developed. The first established the overall modeling framework using land-cover maps composed of two land-cover classes. The second extended the initial model by using three land-cover class maps to investigate model performance under increased landscape complexity. The results of the simulated model demonstrated that the presence of temporal interaction between the errors of individual classified maps affected the resulting

  1. Extracting concealed information from groups.

    PubMed

    Meijer, Ewout H; Smulders, Fren T Y; Merckelbach, Harald L G J

    2010-11-01

    Lie detection procedures are typically aimed at determining guilt or innocence of a single suspect. Serious security threats, however, often involve groups, such as terrorist networks or criminal organizations. In this report, we describe a variant of the skin conductance-based Concealed Information Test (CIT) that allows for the extraction of critical information from such groups. Twelve participants were given information about an upcoming (mock) terrorist attack, with specific instructions not to reveal this information to anyone. Next, each subject was subjected to a CIT, with questions pertaining to the details of the attack. Results showed that for every question, the average skin conductance response to the correct answer option differed significantly (p < 0.05) from those to all other options. These results show that the information about the upcoming attack could be extracted from the group of terror suspects as a whole. PMID:20533975

  2. Control of mid-spatial frequency errors considering the pad groove feature in smoothing polishing process.

    PubMed

    Nie, Xuqing; Li, Shengyi; Hu, Hao; Li, Qi

    2014-10-01

    Mid-spatial frequency error (MSFR) should be strictly controlled in modern optical systems. As an effective approach to suppress MSFR, the smoothing polishing (SP) process is not easy to handle because it can be affected by many factors. This paper mainly focuses on the influence of the pad groove, which has not been researched yet. The SP process is introduced, and the important role of the pad groove is explained in detail. The relationship between the contact pressure distribution and the groove feature including groove section type, groove width, and groove depth is established, and the optimized result is achieved with the finite element method. The different kinds of groove patterns are compared utilizing the numerical superposition method established scrupulously. The optimal groove is applied in the verification experiment conducted on a self-developed SP machine. The root mean square value of the MSFR after the SP process is diminished from 2.38 to 0.68 nm, which reveals that the selected pad can smooth out the MSFR to a great extent with proper SP parameters, while the newly generated MSFR due to the groove can be suppressed to a very low magnitude. PMID:25322215

  3. Effects of Head Rotation on Space- and Word-Based Reading Errors in Spatial Neglect

    ERIC Educational Resources Information Center

    Reinhart, Stefan; Keller, Ingo; Kerkhoff, Georg

    2010-01-01

    Patients with right hemisphere lesions often omit or misread words on the left side of a text or the beginning letters of single words which is termed neglect dyslexia (ND). Two types of reading errors are typically observed in ND: omissions and word-based reading errors. The prior are considered as space-based omission errors on the…

  4. Terahertz interferometric imaging of a concealed object

    NASA Astrophysics Data System (ADS)

    Sinyukov, Alexander M.; Bandyopadhyay, Aparajita; Sengupta, Amartya; Barat, Robert B.; Gary, Dale E.; Michalopoulou, Zoi-Heleni; Zimdars, David; Federici, John F.

    2006-10-01

    Experimental results of two-dimensional homodyne terahertz interferometric imaging are presented. The performance of an N element detector array is imitated by only one detector placed at N positions. Continuous waves at 0.25-0.3 THz are used to detect concealed objects: a metal object and an RDX sample. The terahertz interferometric imaging method can be used in defense and security applications to detect concealed weapons, explosives as well as chemical and biological agents.

  5. Detecting changes in retinal function: Analysis with Non-Stationary Weibull Error Regression and Spatial enhancement (ANSWERS).

    PubMed

    Zhu, Haogang; Russell, Richard A; Saunders, Luke J; Ceccon, Stefano; Garway-Heath, David F; Crabb, David P

    2014-01-01

    Visual fields measured with standard automated perimetry are a benchmark test for determining retinal function in ocular pathologies such as glaucoma. Their monitoring over time is crucial in detecting change in disease course and, therefore, in prompting clinical intervention and defining endpoints in clinical trials of new therapies. However, conventional change detection methods do not take into account non-stationary measurement variability or spatial correlation present in these measures. An inferential statistical model, denoted 'Analysis with Non-Stationary Weibull Error Regression and Spatial enhancement' (ANSWERS), was proposed. In contrast to commonly used ordinary linear regression models, which assume normally distributed errors, ANSWERS incorporates non-stationary variability modelled as a mixture of Weibull distributions. Spatial correlation of measurements was also included into the model using a Bayesian framework. It was evaluated using a large dataset of visual field measurements acquired from electronic health records, and was compared with other widely used methods for detecting deterioration in retinal function. ANSWERS was able to detect deterioration significantly earlier than conventional methods, at matched false positive rates. Statistical sensitivity in detecting deterioration was also significantly better, especially in short time series. Furthermore, the spatial correlation utilised in ANSWERS was shown to improve the ability to detect deterioration, compared to equivalent models without spatial correlation, especially in short follow-up series. ANSWERS is a new efficient method for detecting changes in retinal function. It allows for better detection of change, more efficient endpoints and can potentially shorten the time in clinical trials for new therapies. PMID:24465636

  6. Exact error rate analysis of free-space optical communications with spatial diversity over Gamma-Gamma atmospheric turbulence

    NASA Astrophysics Data System (ADS)

    Ma, Jing; Li, Kangning; Tan, Liying; Yu, Siyuan; Cao, Yubin

    2016-02-01

    The error rate performances and outage probabilities of free-space optical (FSO) communications with spatial diversity are studied for Gamma-Gamma turbulent environments. Equal gain combining (EGC) and selection combining (SC) diversity are considered as practical schemes to mitigate turbulence. The exact bit-error rate (BER) expression and outage probability are derived for direct detection EGC multiple aperture receiver system. BER performances and outage probabilities are analyzed and compared for different number of sub-apertures each having aperture area A with EGC and SC techniques. BER performances and outage probabilities of a single monolithic aperture and multiple aperture receiver system with the same total aperture area are compared under thermal-noise-limited and background-noise-limited conditions. It is shown that multiple aperture receiver system can greatly improve the system communication performances. And these analytical tools are useful in providing highly accurate error rate estimation for FSO communication systems.

  7. Spatial accounting for errors in LiDAR-derived products: Snow volume and snow water equivalent estimation

    NASA Astrophysics Data System (ADS)

    Tinkham, W. T.; Hoffman, C. M.; Falkowski, M. J.; Smith, A. M.; Link, T. E.; Marshall, H.

    2011-12-01

    Light Detection and Ranging (LiDAR) has become one of the most effective and reliable means of characterizing surface topography and vegetation structure. Most LiDAR-derived estimates such as vegetation height, snow depth, and floodplain boundaries rely on the accurate creation of digital terrain models (DTM). As a result of the importance of an accurate DTM in using LiDAR data to estimate snow depth, it is necessary to understand the variables that influence the DTM accuracy in order to assess snow depth error. A series of 4 x 4 m plots that were surveyed at 0.5 m spacing in a semi-arid catchment were used for training the Random Forests algorithm along with a series of 35 variables in order to spatially predict vertical error within a LiDAR derived DTM. The final model was utilized to predict the combined error resulting from snow volume and snow water equivalent estimates derived from a snow-free LiDAR DTM and a snow-on LiDAR acquisition of the same site. The methodology allows for a statistical quantification of the spatially-distributed error patterns that are incorporated into the estimation of snow volume and snow water equivalents from LiDAR.

  8. Spatial and Temporal Characteristics of Error-Related Activity in the Human Brain

    PubMed Central

    Miezin, Francis M.; Nelson, Steven M.; Dubis, Joseph W.; Dosenbach, Nico U.F.; Schlaggar, Bradley L.; Petersen, Steven E.

    2015-01-01

    A number of studies have focused on the role of specific brain regions, such as the dorsal anterior cingulate cortex during trials on which participants make errors, whereas others have implicated a host of more widely distributed regions in the human brain. Previous work has proposed that there are multiple cognitive control networks, raising the question of whether error-related activity can be found in each of these networks. Thus, to examine error-related activity broadly, we conducted a meta-analysis consisting of 12 tasks that included both error and correct trials. These tasks varied by stimulus input (visual, auditory), response output (button press, speech), stimulus category (words, pictures), and task type (e.g., recognition memory, mental rotation). We identified 41 brain regions that showed a differential fMRI BOLD response to error and correct trials across a majority of tasks. These regions displayed three unique response profiles: (1) fast, (2) prolonged, and (3) a delayed response to errors, as well as a more canonical response to correct trials. These regions were found mostly in several control networks, each network predominantly displaying one response profile. The one exception to this “one network, one response profile” observation is the frontoparietal network, which showed prolonged response profiles (all in the right hemisphere), and fast profiles (all but one in the left hemisphere). We suggest that, in the place of a single localized error mechanism, these findings point to a large-scale set of error-related regions across multiple systems that likely subserve different functions. PMID:25568119

  9. Quantification of errors in large-eddy simulations of a spatially evolving mixing layer using polynomial chaos

    SciTech Connect

    Meldi, M.; Sagaut, P.; Salvetti, M. V.

    2012-03-15

    A stochastic approach based on generalized polynomial chaos (gPC) is used to quantify the error in large-eddy simulation (LES) of a spatially evolving mixing layer flow and its sensitivity to different simulation parameters, viz., the grid stretching in the streamwise and lateral directions and the subgrid-scale (SGS) Smagorinsky model constant (C{sub S}). The error is evaluated with respect to the results of a highly resolved LES and for different quantities of interest, namely, the mean streamwise velocity, the momentum thickness, and the shear stress. A typical feature of the considered spatially evolving flow is the progressive transition from a laminar regime, highly dependent on the inlet conditions, to a fully developed turbulent one. Therefore, the computational domain is divided in two different zones (inlet dependent and fully turbulent) and the gPC error analysis is carried out for these two zones separately. An optimization of the parameters is also carried out for both these zones. For all the considered quantities, the results point out that the error is mainly governed by the value of the C{sub S} constant. At the end of the inlet-dependent zone, a strong coupling between the normal stretching ratio and the C{sub S} value is observed. The error sensitivity to the parameter values is significantly larger in the inlet-dependent upstream region; however, low-error values can be obtained in this region for all the considered physical quantities by an ad hoc tuning of the parameters. Conversely, in the turbulent regime the error is globally lower and less sensitive to the parameter variations, but it is more difficult to find a set of parameter values leading to optimal results for all the analyzed physical quantities. A similar analysis is also carried out for the dynamic Smagorinsky model, by varying the grid stretching ratios. Comparing the databases generated with the different subgrid-scale models, it is possible to observe that the error cost

  10. Concealed target detection using augmented reality with SIRE radar

    NASA Astrophysics Data System (ADS)

    Saponaro, Philip; Kambhamettu, Chandra; Ranney, Kenneth; Sullivan, Anders

    2013-05-01

    The Synchronous Impulse Reconstruction (SIRE) forward-looking radar, developed by the U.S. Army Research Laboratory (ARL), can detect concealed targets using ultra-wideband synthetic aperture technology. The SIRE radar has been mounted on a Ford Expedition and combined with other sensors, including a pan/tilt/zoom camera, to test its capabilities of concealed target detection in a realistic environment. Augmented Reality (AR) can be used to combine the SIRE radar image with the live camera stream into one view, which provides the user with information that is quicker to assess and easier to understand than each separated. In this paper we present an AR system which utilizes a global positioning system (GPS) and inertial measurement unit (IMU) to overlay a SIRE radar image onto a live video stream. We describe a method for transforming 3D world points in the UTM coordinate system onto the video stream by calibrating for the intrinsic parameters of the camera. This calibration is performed offline to save computation time and achieve real time performance. Since the intrinsic parameters are affected by the zoom of the camera, we calibrate at eleven different zooms and interpolate. We show the results of a real time transformation of the SAR imagery onto the video stream. Finally, we quantify both the 2D error and 3D residue associated with our transformation and show that the amount of error is reasonable for our application.

  11. Error Estimation in an Optimal Interpolation Scheme for High Spatial and Temporal Resolution SST Analyses

    NASA Technical Reports Server (NTRS)

    Rigney, Matt; Jedlovec, Gary; LaFontaine, Frank; Shafer, Jaclyn

    2010-01-01

    Heat and moisture exchange between ocean surface and atmosphere plays an integral role in short-term, regional NWP. Current SST products lack both spatial and temporal resolution to accurately capture small-scale features that affect heat and moisture flux. NASA satellite is used to produce high spatial and temporal resolution SST analysis using an OI technique.

  12. Bit-error-rate performance of non-line-of-sight UV transmission with spatial diversity reception.

    PubMed

    Xiao, Houfei; Zuo, Yong; Wu, Jian; Li, Yan; Lin, Jintong

    2012-10-01

    In non-line-of-sight (NLOS) UV communication links using intensity modulation with direct detection, atmospheric turbulence-induced intensity fluctuations can significantly impair link performance. To mitigate turbulence-induced fading and, therefore, to improve the bit error rate (BER) performance, spatial diversity reception can be used over NLOS UV links, which involves the deployment of multiple receivers. The maximum-likelihood (ML) spatial diversity scheme is derived for spatially correlated NLOS UV links, and the influence of various fading correlation at different receivers on the BER performance is investigated. For the dual-receiver case, ML diversity detection is compared with equal gain combining and optimal combining schemes under different turbulence intensity conditions. PMID:23027306

  13. Spatial averaging errors in creating hemispherical reflectance (albedo) maps from directional reflectance data

    SciTech Connect

    Kimes, D.S.; Kerber, A.G.; Sellers, P.J. )

    1993-06-01

    The problems in moving from a radiance measurement made for a particular sun-target-sensor geometry to an accurate estimate of the hemispherical reflectance are considerable. A knowledge-based system called VEG was used in this study to infer hemispherical reflectance. Given directional reflectance(s) and the sun angle, VEG selects the most suitable inference technique(s) and estimates the surface hemispherical reflectance with an estimate of the error. Ideally, VEG is applied to homogeneous vegetation. However, what is typically done in GCM (global circulation model) models and related studies is to obtain an average hemispherical reflectance on a square grid cell on the order of 200 km x 200 km. All available directional data for a given cell are averaged (for each view direction), and then a particular technique for inferring hemispherical reflectance is applied to this averaged data. Any given grid cell can contain several surface types that directionally scatter radiation very differently. When averaging over a set of view angles, the resulting mean values may be atypical of the actual surface types that occur on the ground, and the resulting inferred hemispherical reflectance can be in error. These errors were explored by creating a simulated scene and applying VEG to estimate the area-averaged hemispherical reflectance using various sampling procedures. The reduction in the hemispherical reflectance errors provided by using VEG ranged from a factor of 2-4, depending on conditions. This improvement represents a shift from the calculation of a hemispherical reflectance product of relative value (errors of 20% or more), to a product that could be used quantitatively in global modeling applications, where the requirement is for errors to be limited to around 5-10 %.

  14. Spatial resolution of tropical terrestrial CO2 fluxes inferred using space-borne column CO2 sampled in different earth orbits: the role of spatial error correlations

    NASA Astrophysics Data System (ADS)

    Palmer, P. I.; Feng, L.; Bösch, H.

    2011-09-01

    We use realistic numerical experiments to assess the sensitivity of 8-day CO2 flux estimates, inferred from space-borne short-wave infrared measurements of column-averaged CO2 dry air mixing ratio XCO2, to the choice of Earth observing orbit. We focus on three orbits: (1) a low-inclination circular orbit used by the NASA Tropical Rainfall Measuring Mission (TRMM); (2) a sun-synchronous orbit used by the Japanese Greenhouse Gases Observing SATellite (GOSAT) and proposed for the NASA Orbiting Carbon Observatory (OCO-2) instrument; and (3) a precessing orbit used by the International Space Station (ISS). For each orbit, we assume an instrument based on the specification of the OCO-2; for GOSAT we use the relevant instrument specification. Sun-synchronous orbits offer near global coverage within a few days but have implications for the density of clear-sky measurements. The TRMM and ISS orbits intensively sample tropical latitudes, with sun-lit clear-sky measurements evenly distributed between a.m./p.m. For a specified spatial resolution for inferred fluxes, we show there is a critical number of measurements beyond which there is a disproportionately small decrease in flux uncertainty. We also show that including spatial correlations for measurements and model errors (of length 300 km) reduces the effectiveness of high measurement density for flux estimation, as expected, and so should be considered when deciding sampling strategies. We show that cloud-free data from the TRMM orbit generally can improve the spatial resolution of CO2 fluxes achieved by OCO-2 over tropical South America, for example, from 950 km to 630 km, and that combining data from these low-inclination and sun-synchronous orbits have the potential to reduce this spatial length further. Decreasing the length of the error correlations to 50 km, reflecting anticipated future improvements to transport models, results in CO2 flux estimates on spatial scales that approach those observed by regional

  15. Spatial resolution of tropical terrestrial CO2 fluxes inferred using space-borne column CO2 sampled in different earth orbits: the role of spatial error correlations

    NASA Astrophysics Data System (ADS)

    Palmer, P. I.; Feng, L.; Bösch, H.

    2011-05-01

    We use realistic numerical experiments to assess the sensitivity of 8-day CO2 flux estimates, inferred from space-borne short-wave infrared measurements of column-averaged CO2 dry air mixing ratio XCO2, to the choice of Earth observing orbit. We focus on three orbits: (1) a low-inclination circular orbit used by the NASA Tropical Rainfall Measuring Mission (TRMM); (2) a sun-synchronous orbit used by the Japanese Greenhouse Gases Observing SATellite (GOSAT) and proposed for the NASA Orbiting Carbon Observatory (OCO-2) instrument; and (3) a precessing orbit used by the International Space Station (ISS). For each orbit, we assume an instrument based on the specification of the OCO-2; for GOSAT we use the relevant instrument specification. Sun-synchronous orbits offer near global coverage within a few days but have implications for the density of clear-sky measurements. The TRMM and ISS orbits intensively sample tropical latitudes, with sun-lit clear-sky measurements evenly distributed between a.m./p.m. For a specified spatial resolution for inferred fluxes, we find there is a critical number of measurements beyond which there is a disproportionately small decrease in flux uncertainty. We also find that including spatial correlations for measurements and model errors (of length 300 km) reduces the effectiveness of high measurement density for flux estimation and so should be considered when deciding sampling strategies. We show that cloud-free data from the TRMM orbit generally can improve the spatial resolution of CO2 fluxes achieved by OCO-2 over tropical South America, for example, from 950 km to 630 km, and that combining data from these low-inclination and sun-synchronous orbits have the potential to reduce this spatial length further. Decreasing the length of the error correlations to 50 km, reflecting anticipated future improvements to transport models, results in CO2 flux estimates on spatial scales that approach those observed by regional aircraft.

  16. Error resiliency of distributed video coding in wireless video communication

    NASA Astrophysics Data System (ADS)

    Ye, Shuiming; Ouaret, Mourad; Dufaux, Frederic; Ansorge, Michael; Ebrahimi, Touradj

    2008-08-01

    Distributed Video Coding (DVC) is a new paradigm in video coding, based on the Slepian-Wolf and Wyner-Ziv theorems. DVC offers a number of potential advantages: flexible partitioning of the complexity between the encoder and decoder, robustness to channel errors due to intrinsic joint source-channel coding, codec independent scalability, and multi-view coding without communications between the cameras. In this paper, we evaluate the performance of DVC in an error-prone wireless communication environment. We also present a hybrid spatial and temporal error concealment approach for DVC. Finally, we perform a comparison with a state-of-the-art AVC/H.264 video coding scheme in the presence of transmission errors.

  17. Detecting Changes in Retinal Function: Analysis with Non-Stationary Weibull Error Regression and Spatial Enhancement (ANSWERS)

    PubMed Central

    Zhu, Haogang; Russell, Richard A.; Saunders, Luke J.; Ceccon, Stefano; Garway-Heath, David F.; Crabb, David P.

    2014-01-01

    Visual fields measured with standard automated perimetry are a benchmark test for determining retinal function in ocular pathologies such as glaucoma. Their monitoring over time is crucial in detecting change in disease course and, therefore, in prompting clinical intervention and defining endpoints in clinical trials of new therapies. However, conventional change detection methods do not take into account non-stationary measurement variability or spatial correlation present in these measures. An inferential statistical model, denoted ‘Analysis with Non-Stationary Weibull Error Regression and Spatial enhancement’ (ANSWERS), was proposed. In contrast to commonly used ordinary linear regression models, which assume normally distributed errors, ANSWERS incorporates non-stationary variability modelled as a mixture of Weibull distributions. Spatial correlation of measurements was also included into the model using a Bayesian framework. It was evaluated using a large dataset of visual field measurements acquired from electronic health records, and was compared with other widely used methods for detecting deterioration in retinal function. ANSWERS was able to detect deterioration significantly earlier than conventional methods, at matched false positive rates. Statistical sensitivity in detecting deterioration was also significantly better, especially in short time series. Furthermore, the spatial correlation utilised in ANSWERS was shown to improve the ability to detect deterioration, compared to equivalent models without spatial correlation, especially in short follow-up series. ANSWERS is a new efficient method for detecting changes in retinal function. It allows for better detection of change, more efficient endpoints and can potentially shorten the time in clinical trials for new therapies. PMID:24465636

  18. An Examination of the Spatial Distribution of Carbon Dioxide and Systematic Errors

    NASA Technical Reports Server (NTRS)

    Coffey, Brennan; Gunson, Mike; Frankenberg, Christian; Osterman, Greg

    2011-01-01

    The industrial period and modern age is characterized by combustion of coal, oil, and natural gas for primary energy and transportation leading to rising levels of atmospheric of CO2. This increase, which is being carefully measured, has ramifications throughout the biological world. Through remote sensing, it is possible to measure how many molecules of CO2 lie in a defined column of air. However, other gases and particles are present in the atmosphere, such as aerosols and water, which make such measurements more complicated1. Understanding the detailed geometry and path length of the observation is vital to computing the concentration of CO2. Comparing these satellite readings with ground-truth data (TCCON) the systematic errors arising from these sources can be assessed. Once the error is understood, it can be scaled for in the retrieval algorithms to create a set of data, which is closer to the TCCON measurements1. Using this process, the algorithms are being developed to reduce bias, within.1% worldwide of the true value. At this stage, the accuracy is within 1%, but through correcting small errors contained in the algorithms, such as accounting for the scattering of sunlight, the desired accuracy can be achieved.

  19. Instability in spatial error models: an application to the hypothesis of convergence in the European case

    NASA Astrophysics Data System (ADS)

    Mur, Jesús; López, Fernando; Angulo, Ana

    2010-09-01

    This paper focuses on the hypothesis of stability in the mechanisms of spatial dependence that are usually employed in spatial econometric models. We propose a specification strategy for which the first step is to solve a local estimation algorithm, called the Zoom estimation. The aim of this stage is to detect problems of heterogeneity in the parameters and to identify the regimes. Then we resort to a battery of formal Lagrange Multipliers to test the assumption of stability in the processes of spatial dependence. The alternative hypothesis consists of the existence of several regimes in these parameters. A small Monte Carlo serves to confirm the behaviour of this strategy in a context of finite size samples. As an illustration, we solve an application to the case of the hypothesis of convergence for the per capita income in the European regions. Our results reveal the existence of a strong Centre-Periphery dichotomy in which instability extends to all the elements (coefficients of regression as well as parameters of spatial dependence) that intervene in a classical conditional β-convergence model.

  20. Real-time detection of concealed chemical hazards under ambient light conditions using Raman spectroscopy.

    PubMed

    Cletus, Biju; Olds, William; Fredericks, Peter M; Jaatinen, Esa; Izake, Emad L

    2013-07-01

    Current concerns regarding terrorism and international crime highlight the need for new techniques for detecting unknown and hazardous substances. A novel Raman spectroscopy-based technique, spatially offset Raman spectroscopy (SORS), was recently devised for noninvasively probing the contents of diffusely scattering and opaque containers. Here, we demonstrate a modified portable SORS sensor for detecting concealed substances in-field under different background lighting conditions. Samples including explosive precursors, drugs, and an organophosphate insecticide (chemical warfare agent surrogate) were concealed inside diffusely scattering packaging including plastic, paper, and cloth. Measurements were carried out under incandescent and fluorescent light as well as under daylight to assess the suitability of the probe for different real-life conditions. In each case, it was possible to identify the substances against their reference Raman spectra in less than 1 min. The developed sensor has potential for rapid detection of concealed hazardous substances in airports, mail distribution centers, and customs checkpoints. PMID:23692353

  1. Concealed weapons detection using low-frequency magnetic imaging

    NASA Astrophysics Data System (ADS)

    Zollars, Byron G.; Sallee, Bradley; Durrett, Michael G.; Cruce, Clay; Hallidy, William

    1997-02-01

    Military personnel, law-enforcement officers, and civilians face ever-increasing dangers from persons carrying concealed handguns and other weapons. In direct correspondence with this danger is a need for more sophisticated means of detecting concealed weapons. We have developed a novel concealed-weapons detector based on the principle of low- frequency magnetic imaging. The detector is configured as a portal, and constructs an image of electrically conductive objects transported through it with a potential spatial resolution of approximately 1 inch. Measurements on a breadboard version of the weapons detector have, to date, yielded a resolution of 2 inches. In operation, magnetic dipole radiation, emitted by transmitting antennas in the perimeter of the portal, is scattered from conductive objects and is picked up by receive antennas, also positioned around the portal. With sufficient measurements, each with a different geometry, a solution to the inverse scattering problem can be found. The result is an image of conductive objects in the detector. The detector is sensitive to all metals, semiconductors, and conductive composites. The measured conductivity image formed by the detector is combined with the video signal from a visible CCD camera to form a composite image of persons transiting the detector portal and the conductive objects they are carrying. Accompanying image recognition software could be used to determine the threat level of objects based upon shape, conductivity, and placement on the person of the carrier, and provide cueing, logging, or alarm functions to the operator if suspect weapons are identified. The low- power, low-frequency emissions from the detector are at levels considered safe to humans and medical implants..

  2. Detecting concealed objects at a checkpoint

    DOEpatents

    McMakin, Douglas L.; Hall, Thomas E.; Sheen, David M.; Severtsen, Ronald H.

    2008-07-29

    Disclosed are systems, methods, devices, and apparatus to interrogate a clothed individual with electromagnetic radiation to determine if a concealed object is being carried. This determination includes establishing data corresponding to an image of the individual with a pair of opposed, semi-cylindrical array panels each configured to interrogate the individual with electromagnetic radiation in the 200 MHz to 1 THz range.

  3. Concealment of Child Sexual Abuse in Sports

    ERIC Educational Resources Information Center

    Hartill, Mike

    2013-01-01

    When the sexual abuse of children is revealed, it is often found that other nonabusing adults were aware of the abuse but failed to act. During the past twenty years or so, the concealment of child sexual abuse (CSA) within organizations has emerged as a key challenge for child protection work. Recent events at Pennsylvania State University (PSU)…

  4. Manifest and concealed correlations in quantum mechanics

    NASA Astrophysics Data System (ADS)

    de la Torre, A. C.; Iguain, J. L.

    1998-11-01

    The quantum covariance function is used to study correlations in quantum systems. Besides the obvious correlations due to the conservation of some quantity, the appearance of concealed quantum correlations like non-locality or non-separability is studied. The choice of an appropriate basis allows a complete analysis relating correlations with conservation laws and factorizability.

  5. Automated Human Screening for Detecting Concealed Knowledge

    ERIC Educational Resources Information Center

    Twyman, Nathan W.

    2012-01-01

    Screening individuals for concealed knowledge has traditionally been the purview of professional interrogators investigating a crime. But the ability to detect when a person is hiding important information would be of high value to many other fields and functions. This dissertation proposes design principles for and reports on an implementation…

  6. College Students' Reasons for Concealing Suicidal Ideation

    ERIC Educational Resources Information Center

    Burton Denmark, Adryon; Hess, Elaine; Becker, Martin Swanbrow

    2012-01-01

    Self-reported reasons for concealing suicidal ideation were explored using data from a national survey of undergraduate and graduate students: 558 students indicated that they seriously considered attempting suicide during the previous year and did not tell anyone about their suicidal thoughts. Content analysis of students' qualitative responses…

  7. Concealed Questions. In Search of Answers

    ERIC Educational Resources Information Center

    Frana, Ilaria

    2010-01-01

    This dissertation examines the semantic interpretation of various types of DPs in so-called concealed-question (CQ) constructions, as "Bill's phone number" in the sentence "John knows Bill's phone number". The peculiar characteristic of DP-CQs is that they are interpreted as having the meaning of an embedded question. So, for instance, the…

  8. Student Attitudes Toward Concealed Handguns on Campus at 2 Universities

    PubMed Central

    Bouffard, Jeffrey A.; Wells, William; Nobles, Matt R.

    2012-01-01

    We examined student support for a policy that would allow carrying of concealed handguns on university campuses. Large percentages of students at 2 universities expressed very low levels of comfort with the idea of permitting concealed handgun carrying on campus, suggesting that students may not welcome less restrictive policies. Students held slightly different opinions about concealed handguns on and off campus, suggesting that they view the campus environment as unique with respect to concealed handgun carrying. PMID:22720763

  9. An analysis of perceptual errors in reading mammograms using quasi-local spatial frequency spectra.

    PubMed

    Mello-Thoms, C; Dunn, S M; Nodine, C F; Kundel, H L

    2001-09-01

    In this pilot study the authors examined areas on a mammogram that attracted the visual attention of experienced mammographers and mammography fellows, as well as areas that were reported to contain a malignant lesion, and, based on their spatial frequency spectrum, they characterized these areas by the type of decision outcome that they yielded: true-positives (TP), false-positives (FP), true-negatives (TN), and false-negatives (FN). Five 2-view (craniocaudal and medial-lateral oblique) mammogram cases were examined by 8 experienced observers, and the eye position of the observers was tracked. The observers were asked to report the location and nature of any malignant lesions present in the case. The authors analyzed each area in which either the observer made a decision or in which the observer had prolonged (>1,000 ms) visual dwell using wavelet packets, and characterized these areas in terms of the energy contents of each spatial frequency band. It was shown that each decision outcome is characterized by a specific profile in the spatial frequency domain, and that these profiles are significantly different from one another. As a consequence of these differences, the profiles can be used to determine which type of decision a given observer will make when examining the area. Computer-assisted perception correctly predicted up to 64% of the TPs made by the observers, 77% of the FPs, and 70% of the TNs. PMID:11720333

  10. Modelling static 3-D spatial background error covariances - the effect of vertical and horizontal transform order

    NASA Astrophysics Data System (ADS)

    Wlasak, M. A.; Cullen, M. J. P.

    2014-06-01

    A major difference in the formulation of the univariate part of static background error covariance models for use in global operational 4DVAR arises from the order in which the horizontal and vertical transforms are applied. This is because the atmosphere is non-separable with large horizontal scales generally tied to large vertical scales and small horizontal scales tied to small vertical scales. Also horizontal length scales increase dramatically as one enters the stratosphere. A study is presented which evaluates the strengths and weaknesses of each approach with the Met Office Unified Model. It is shown that if the vertical transform is applied as a function of horizontal wavenumber then the horizontal globally-averaged variance and the homogenous, isotropic length scale on each model level for each control variable of the training data is preserved by the covariance model. In addition the wind variance and associated length scales are preserved as the scheme preserves the variances and length scales of horizontal derivatives. If the vertical transform is applied in physical space, it is possible to make it a function of latitude at the cost of not preserving the variances and length scales of the horizontal derivatives. Summer and winter global 4DVAR trials have been run with both background error covariance models. A clear benefit is seen in the fit to observations when the vertical transform is in spectral space and is a function of total horizontal wavenumber.

  11. 25 CFR 11.444 - Carrying concealed weapons.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 25 Indians 1 2012-04-01 2011-04-01 true Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor...

  12. 25 CFR 11.444 - Carrying concealed weapons.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 25 Indians 1 2013-04-01 2013-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor...

  13. 25 CFR 11.444 - Carrying concealed weapons.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 25 Indians 1 2014-04-01 2014-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor...

  14. 25 CFR 11.444 - Carrying concealed weapons.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 25 Indians 1 2011-04-01 2011-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor...

  15. 25 CFR 11.444 - Carrying concealed weapons.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor...

  16. Direct recording of concealed ventricular extrasystoles producing pacer inhibition.

    PubMed

    Bowers, Mark; Berger, Marcie

    2013-10-01

    We report a case of concealed extrasystoles recorded from a pacing lead. The concealed extrasystoles were observed with right ventricular pacing, biventricular unipolar, and biventricular bipolar pacing. The simultaneous surface EKG did not show manifest ventricular extrasystoles with the concealed intracardiac potentials. This case highlights a cause of oversensing that has been theoretically reported in the literature but never directly observed. PMID:23600888

  17. The effect of spatial truncation error on variance of gravity anomalies derived from inversion of satellite orbital and gradiometric data

    NASA Astrophysics Data System (ADS)

    Eshagh, Mehdi; Ghorbannia, Morteza

    2014-07-01

    The spatial truncation error (STE) is a significant systematic error in the integral inversion of satellite gradiometric and orbital data to gravity anomalies at sea level. In order to reduce the effect of STE, a larger area than the desired one is considered in the inversion process, but the anomalies located in its central part are selected as the final results. The STE influences the variance of the results as well because the residual vector, which is contaminated with STE, is used for its estimation. The situation is even more complicated in variance component estimation because of its iterative nature. In this paper, we present a strategy to reduce the effect of STE on the a posteriori variance factor and the variance components for inversion of satellite orbital and gradiometric data to gravity anomalies at sea level. The idea is to define two windowing matrices for reducing this error from the estimated residuals and anomalies. Our simulation studies over Fennoscandia show that the differences between the 0.5°×0.5° gravity anomalies obtained from orbital data and an existing gravity model have standard deviation (STD) and root mean squared error (RMSE) of 10.9 and 12.1 mGal, respectively, and those obtained from gradiometric data have 7.9 and 10.1 in the same units. In the case that they are combined using windowed variance components the STD and RMSE become 6.1 and 8.4 mGal. Also, the mean value of the estimated RMSE after using the windowed variances is in agreement with the RMSE of the differences between the estimated anomalies and those obtained from the gravity model.

  18. Induction detection of concealed bulk banknotes

    NASA Astrophysics Data System (ADS)

    Fuller, Christopher; Chen, Antao

    2012-06-01

    The smuggling of bulk cash across borders is a serious issue that has increased in recent years. In an effort to curb the illegal transport of large numbers of paper bills, a detection scheme has been developed, based on the magnetic characteristics of bank notes. The results show that volumes of paper currency can be detected through common concealing materials such as plastics, cardboard, and fabrics making it a possible potential addition to border security methods. The detection scheme holds the potential of also reducing or eliminating false positives caused by metallic materials found in the vicinity, by observing the stark difference in received signals caused by metal and currency. The detection scheme holds the potential to detect for both the presence and number of concealed bulk notes, while maintaining the ability to reduce false positives caused by metal objects.

  19. Concealed weapons detection using electromagnetic resonances

    NASA Astrophysics Data System (ADS)

    Hunt, Allen R.; Hogg, R. Douglas; Foreman, William

    1998-12-01

    Concealed weapons pose a significant threat to both law enforcement and security agency personnel. The uncontrolled environments associated with peacekeeping and the move toward relaxation of concealed weapons laws here in the U.S. provide a strong motivation for developing weapons detection technologies which are noninvasive and can function noncooperatively. Existing weapons detection systems are primarily oriented to detecting metal and require the cooperation of the person being searched. The new generation of detectors under development that focuses primarily on imaging methods, faces problems associated with privacy issues. There remains a need for a weapons detector which is portable, detects weapons remotely, avoids the issues associated with privacy rights, can tell the difference between car keys and a knife, and is affordable enough that one can be issued to every peacekeeper and law enforcement officer. AKELA is developing a concealed weapons detector that uses wideband radar techniques to excite natural electromagnetic resonances that characterize the size, shape, and material composition of an object. Neural network processing is used to classify the difference between weapons and nuisance objects. We have constructed both time and frequency domain test systems and used them to gather experimental data on a variety of armed and unarmed individuals. These experiments have been performed in an environment similar to the operational environment. Preliminary results from these experiments show that it is possible to detect a weapon being carried by an individual from a distance of 10 to 15 feet, and to detect a weapon being concealed behind the back. The power required is about 100 milliwatts. A breadboard system is being fabricated and will be used by AKELA and our law enforcement partner to gather data in operationally realistic situations. While a laptop computer will control the breadboard system, the wideband radar electronics will fit in a box the

  20. A modified surgical procedure for concealed penis

    PubMed Central

    Cheng, Gong; Liu, Bianjiang; Guan, Zhaolong; Huang, Yuan; Qin, Chao; Song, Ninghong; Wang, Zengjun

    2015-01-01

    Introduction: We described a modified surgical procedure for repairing a concealed penis and compared the efficacy and feasibility of modified repair with traditional repair. Methods: From March 2003 to December 2012, 96 patients with a concealed penis were recruited to undergo penile repair at our centre. Modified repair and traditional repair were performed respectively on 46 and 50 cases. We compared operative time, intraoperative blood loss, cosmetic result of operative scars, postoperative penile retraction, and complications. Results: All operations were completed successfully without serious complications. The mean operative time, intraoperative blood loss, and cosmetic result of the operative scar between the two surgical methods were similar. However, the postoperative penile retraction rate in patients undergoing modified repair decreased significantly than in the traditional repair. Conclusions: Our modified surgical procedure is effective and feasible for a concealed penis. Although extra procedures were needed for the modified repair, the operative time, intraoperative blood loss and cosmetic result of operative scar between the two procedures were similar. Compared with traditional repair, modified repair has better clinical outcomes. PMID:26664507

  1. Internally concealed cocaine: analytical and diagnostic aspects.

    PubMed

    Bogusz, M J; Althoff, H; Erkens, M; Maier, R D; Hofmann, R

    1995-09-01

    Thirty persons arrested at Frankfurt airport for smuggling internally concealed cocaine in 1993/1994 were investigated. An X-ray examination (in all 30 cases), immunochemical examination of urine (in 27 cases) and of saliva (in 20 cases) was performed in parallel. An X-ray examination gave positive results in all examined persons. EMIT cocaine metabolite assay (cut off 300 ng benzoylecgonine (BE)/mL) was positive in eight urine samples. After reducing the cut off to 150 ng BE/mL urine, eleven samples were classified as positive. The results were confirmed by means of chromatographic determinations. These findings showed limited role of immunological examination of urine as a screening test in suspected smuggling of internally concealed drugs. All saliva samples showed negative immunochemical results. The number of concealed containers ranged from 44 to 135 per person. The amount of cocaine hydrochloride found in particular cases ranged from 242 to 1050 g net weight, divided into containers weighing from 5.7 to 13.8 g. Drug packages were obviously machine-made. The packages smuggled by a particular person were uniform. However, a distinct interpersonal variability in drug packages was observed, in regard to the number of protective layers (4-7), size, weight, and cocaine purity. This may be helpful for the identification of production site. The leaching of cocaine from selected containers was investigated in a stirring bath and was independent of the conditions applied. PMID:7595327

  2. Imaging sensor fusion for concealed weapon detection

    NASA Astrophysics Data System (ADS)

    Currie, Nicholas C.; Demma, Fred J.; Ferris, David D., Jr.; McMillan, Robert W.; Wicks, Michael C.; Zyga, Kathleen

    1997-02-01

    Sensors are needed for concealed weapon detection which perform better with regard to weapon classification, identification, probability of detection and false alarm rate than the magnetic sensors commonly used in airports. We have concluded that no single sensor will meet the requirements for a reliable concealed weapon detector and thus that sensor fusion is required to optimize detection probability and false alarm rate by combining sensor outputs in a synergistic fashion. This paper describes microwave, millimeter wave, far infrared, infrared, x-ray, acoustic, and magnetic sensors which have some promise in the field of concealed weapon detection. The strengths and weaknesses of these devices are discussed, and examples of the outputs of most of them are given. Various approaches to fusion of these sensors are also described, from simple cuing of one sensor by another to improvement of image quality by using multiple systems. It is further concluded that none of the sensors described herein will ever replace entirely the airport metal detector, but that many of them meet needs imposed by applications requiring a higher detection probability and lower false alarm rate.

  3. Monte carlo method for the uncertainty evaluation of spatial straightness error based on new generation geometrical product specification

    NASA Astrophysics Data System (ADS)

    Wen, Xiulan; Xu, Youxiong; Li, Hongsheng; Wang, Fenglin; Sheng, Danghong

    2012-09-01

    Straightness error is an important parameter in measuring high-precision shafts. New generation geometrical product specification(GPS) requires the measurement uncertainty characterizing the reliability of the results should be given together when the measurement result is given. Nowadays most researches on straightness focus on error calculation and only several research projects evaluate the measurement uncertainty based on "The Guide to the Expression of Uncertainty in Measurement(GUM)". In order to compute spatial straightness error(SSE) accurately and rapidly and overcome the limitations of GUM, a quasi particle swarm optimization(QPSO) is proposed to solve the minimum zone SSE and Monte Carlo Method(MCM) is developed to estimate the measurement uncertainty. The mathematical model of minimum zone SSE is formulated. In QPSO quasi-random sequences are applied to the generation of the initial position and velocity of particles and their velocities are modified by the constriction factor approach. The flow of measurement uncertainty evaluation based on MCM is proposed, where the heart is repeatedly sampling from the probability density function(PDF) for every input quantity and evaluating the model in each case. The minimum zone SSE of a shaft measured on a Coordinate Measuring Machine(CMM) is calculated by QPSO and the measurement uncertainty is evaluated by MCM on the basis of analyzing the uncertainty contributors. The results show that the uncertainty directly influences the product judgment result. Therefore it is scientific and reasonable to consider the influence of the uncertainty in judging whether the parts are accepted or rejected, especially for those located in the uncertainty zone. The proposed method is especially suitable when the PDF of the measurand cannot adequately be approximated by a Gaussian distribution or a scaled and shifted t-distribution and the measurement model is non-linear.

  4. Failure to paint the left quarter of a watercolor and no error in a line drawing: a case report of an art teacher with unilateral spatial neglect.

    PubMed

    Kondo, Minako; Mori, Toshiko; Makino, Kenichiro; Okazaki, Tetsuya; Hachisuka, Kenji

    2012-06-01

    A 54-year-old art teacher, experienced a right putaminal hemorrhage, and thereafter suffered severe left hemiplegia and unilateral spatial neglect, and was transferred to the rehabilitation department of the University Hospital 1 month after the onset. Although the unilateral spatial neglect was improving, the patient was unable to paint the left quarter of a watercolor, but there was no error in line drawing. The occurrence of errors only in a watercolor suggests that the neural process for painting a watercolor is different from that of line drawing. PMID:21936640

  5. Detecting persons concealed in a vehicle

    DOEpatents

    Tucker, Jr., Raymond W.

    2005-03-29

    An improved method for detecting the presence of humans or animals concealed within in a vehicle uses a combination of the continuous wavelet transform and a ratio-based energy calculation to determine whether the motion detected using seismic sensors placed on the vehicle is due to the presence of a heartbeat within the vehicle or is the result of motion caused by external factors such as the wind. The method performs well in the presence of light to moderate ambient wind levels, producing far fewer false alarm indications. The new method significantly improves the range of ambient environmental conditions under which human presence detection systems can reliably operate.

  6. Detailed calculation of spectral noise caused by measurement errors of Mach-Zehnder interferometer optical path phases in a spatial heterodyne spectrometer with a phase shift scheme.

    PubMed

    Takada, Kazumasa; Seino, Mitsuyoshi; Chiba, Akito; Okamoto, Katsunari

    2013-04-20

    We calculate the root mean square (rms) value of the spectral noise caused by optical path phase measurement errors in a spatial heterodyne spectrometer (SHS) featuring a complex Fourier transformation. In our calculation the deviated phases of each Mach-Zehnder interferometer in the in-phase and quadrature states are treated as statistically independent random variables. We show that the rms value is proportional to the rms error of the phase measurement and that the proportionality coefficient is given analytically. The relationship enables us to estimate the potential performance of the SHS such as the sidelobe suppression ratio for a given measurement error. PMID:23669661

  7. Forward error correction and spatial diversity techniques for high-data-rate MILSATCOM over a slow-fading, nuclear-disturbed channel

    NASA Astrophysics Data System (ADS)

    Paul, Heywood I.; Meader, Charles B.; Lyons, Daniel A.; Ayers, David R.

    Forward error correction (FEC) and spatial diversity techniques are considered for improving the reliability of high-data-rate military satellite communication (MILSATCOM) over a slow-fading, nuclear-disturbed channel. Slow fading, which occurs when the channel decorrelation time is much greater than the transmitted symbol interval, is characterized by deep fades and, without special precautions, long bursts of errors over high-data-rate communication links. Using the widely accepted Defense Nuclear Agency (DNA) nuclear-scintillated channel model, the authors derive performance tradeoffs among required interleaver storage, FEC, spatial diversity, and link signal-to-noise ratio for differential binary phase shift keying (DBPSK) in the slow-fading environment. Spatial diversity is found to yield impressive gains without the large memory storage and transmission relay requirements associated with interleaving.

  8. Induction detection of concealed bulk banknotes

    NASA Astrophysics Data System (ADS)

    Fuller, Christopher; Chen, Antao

    2011-10-01

    Bulk cash smuggling is a serious issue that has grown in volume in recent years. By building on the magnetic characteristics of paper currency, induction sensing is found to be capable of quickly detecting large masses of banknotes. The results show that this method is effective in detecting bulk cash through concealing materials such as plastics, cardboards, fabrics and aluminum foil. The significant difference in the observed phase between the received signals caused by conducting materials and ferrite compounds, found in banknotes, provides a good indication that this process can overcome the interference by metal objects in a real sensing application. This identification strategy has the potential to not only detect the presence of banknotes, but also the number, while still eliminating false positives caused by metal objects.

  9. Millimeter-wave concealed weapon detection

    NASA Astrophysics Data System (ADS)

    Chang, Yu-Wen; Juhola, Markku; Grainger, William; Wang, Beining; Manahan, Brian

    1997-02-01

    Millimeter-wave concealed weapon detection, based on the use of a fast scan short-range FMCW 94 GHz radar, was evaluated in a small business innovative research phase I under the Technology Reinvestment Project (TRP) program. The feasibility of a fast circular scan technique invented by Chang Industry has been firmly established, with handgun images recorded. This fast scan technique is essential both for remote sensing and full-body fixed site scanner applications. Although only raw image data was obtained in Phase I, we propose to apply super-resolution image enhancements and target recognition software algorithms to provide more reliable detection. Endorsement from the Los Angeles County Sheriff's Department, to provide operational input and testing and evaluation, and the hiring of a consultant to plan for future program financing (including venture capital investment) make the project very attractive for commercialization.

  10. Prime number variant of concealed trigeminy.

    PubMed

    Medeiros, C M; Medeiros, N P; de Nonohay, N C; Rodrigues, R

    1985-10-01

    A 53-year-old man with myocardial infarction was found to have frequent premature ventricular beats. The predominant pattern was classical concealed trigeminy; i.e., the number of conducted sinus beats, S, between extrasystoles satisfied the equation S = 3n + 2, where "n" is zero or any positive integer. Two other transient patterns also occurred. The first one was characterized by exceptional values of S, which satisfied the equation S = 3n + 3. In the second transient pattern, all values of S fitted the classical equation, but there were singularly absent values; i.e., the "n" in the equation was exclusively an odd number, giving rise to only prime numbers of interectopic conducted sinus beats. It is proposed in this last form that there are two sites of fixed block proximal to a variable distal block in a re-entry loop responsible for the ventricular extrasystoles. PMID:2415650

  11. Color image fusion for concealed weapon detection

    NASA Astrophysics Data System (ADS)

    Toet, Alexander

    2003-09-01

    Recent advances in passive and active imaging sensor technology offer the potential to detect weapons that are concealed underneath a person's clothing or carried along in bags. Although the concealed weapons can sometimes easily be detected, it can be difficult to perceive their context, due to the non-literal nature of these images. Especially for dynamic crowd surveillance purposes it may be impossible to rapidly asses with certainty which individual in the crowd is the one carrying the observed weapon. Sensor fusion is an enabling technology that may be used to solve this problem. Through fusion the signal of the sensor that depicts the weapon can be displayed in the context provided by a sensor of a different modality. We propose an image fusion scheme in which non-literal imagery can be fused with standard color images such that the result clearly displays the observed weapons in the context of the original color image. The procedure is such that the relevant contrast details from the non-literal image are transferred to the color image without altering the original color distribution of this image. The result is a natural looking color image that fluently combines all details from both input sources. When an observer who performs a dynamic crowd surveillance task, detects a weapon in the scene, he will also be able to quickly determine which person in the crowd is actually carrying the observed weapon (e.g. "the man with the red T-shirt and blue jeans"). The method is illustrated by the fusion of thermal 8-12 μm imagery with standard RGB color images.

  12. Concealed semantic and episodic autobiographical memory electrified

    PubMed Central

    Ganis, Giorgio; Schendan, Haline E.

    2013-01-01

    Electrophysiology-based concealed information tests (CIT) try to determine whether somebody possesses concealed information about a crime-related item (probe) by comparing event-related potentials (ERPs) between this item and comparison items (irrelevants). Although the broader field is sometimes referred to as “memory detection,” little attention has been paid to the precise type of underlying memory involved. This study begins addressing this issue by examining the key distinction between semantic and episodic memory in the autobiographical domain within a CIT paradigm. This study also addresses the issue of whether multiple repetitions of the items over the course of the session habituate the brain responses. Participants were tested in a 3-stimulus CIT with semantic autobiographical probes (their own date of birth) and episodic autobiographical probes (a secret date learned just before the study). Results dissociated these two memory conditions on several ERP components. Semantic probes elicited a smaller frontal N2 than episodic probes, consistent with the idea that the frontal N2 decreases with greater pre-existing knowledge about the item. Likewise, semantic probes elicited a smaller central N400 than episodic probes. Semantic probes also elicited a larger P3b than episodic probes because of their richer meaning. In contrast, episodic probes elicited a larger late positive complex (LPC) than semantic probes, because of the recent episodic memory associated with them. All these ERPs showed a difference between probes and irrelevants in both memory conditions, except for the N400, which showed a difference only in the semantic condition. Finally, although repetition affected the ERPs, it did not reduce the difference between probes and irrelevants. These findings show that the type of memory associated with a probe has both theoretical and practical importance for CIT research. PMID:23355816

  13. Concealing their communication: exploring psychosocial predictors of young drivers' intentions and engagement in concealed texting.

    PubMed

    Gauld, Cassandra S; Lewis, Ioni; White, Katherine M

    2014-01-01

    Making a conscious effort to hide the fact that you are texting while driving (i.e., concealed texting) is a deliberate and risky behaviour involving attention diverted away from the road. As the most frequent users of text messaging services and mobile phones while driving, young people appear at heightened risk of crashing from engaging in this behaviour. This study investigated the phenomenon of concealed texting while driving, and utilised an extended Theory of Planned Behaviour (TPB) including the additional predictors of moral norm, mobile phone involvement, and anticipated regret to predict young drivers' intentions and subsequent behaviour. Participants (n=171) were aged 17-25 years, owned a mobile phone, and had a current driver's licence. Participants completed a questionnaire measuring their intention to conceal texting while driving, and a follow-up questionnaire a week later to report their behavioural engagement. The results of hierarchical multiple regression analyses showed overall support for the predictive utility of the TPB with the standard constructs accounting for 69% of variance in drivers' intentions, and the extended predictors contributing an additional 6% of variance in intentions over and above the standard constructs. Attitude, subjective norm, PBC, moral norm, and mobile phone involvement emerged as significant predictors of intentions; and intention was the only significant predictor of drivers' self-reported behaviour. These constructs can provide insight into key focal points for countermeasures including advertising and other public education strategies aimed at influencing young drivers to reconsider their engagement in this risky behaviour. PMID:24211560

  14. Concealing Concealment: The Mediating Role of Internalized Heterosexism in Psychological Distress Among Lesbian, Gay, and Bisexual Older Adults

    PubMed Central

    Hoy-Ellis, Charles P.

    2016-01-01

    Recent population-based studies indicate that sexual minorities aged 50 and older experience significantly higher rates of psychological distress than their heterosexual age-peers. The minority stress model has been useful in explaining disparately high rates of psychological distress among younger sexual minorities. The purpose of this study is to test a hypothesized structural relationship between two minority stressors—internalized heterosexism and concealment of sexual orientation—and consequent psychological distress among a sample of 2,349 lesbian, gay, and bisexual adults aged 50 to 95 years old. Structural equation modeling indicates that concealment has a nonsignificant direct effect on psychological distress but a significant indirect effect that is mediated through internalized heterosexism; the effect of concealment is itself concealed. This may explain divergent results regarding the role of concealment in psychological distress in other studies, and the implications will be discussed. PMID:26322654

  15. Concealable Stigmatized Identities and Psychological Well-Being

    PubMed Central

    Quinn, Diane M.; Earnshaw, Valerie A.

    2013-01-01

    Many people have concealable stigmatized identities: Identities that can be hidden from others and that are socially devalued and negatively stereotyped. Understanding how these concealable stigmatized identities affect psychological well-being is critical. We present our model of the components of concealable stigmatized identities including valenced content – internalized stigma, experienced discrimination, anticipated stigma, disclosure reactions, and counter-stereotypic/positive information – and magnitude – centrality and salience. Research has shown that negatively valenced content is related to increased psychological distress. However, smaller identity magnitude may buffer this distress. We review the research available and discuss important areas for future work. PMID:23730326

  16. Concealed identification symbols and nondestructive determination of the identification symbols

    DOEpatents

    Nance, Thomas A.; Gibbs, Kenneth M.

    2014-09-16

    The concealing of one or more identification symbols into a target object and the subsequent determination or reading of such symbols through non-destructive testing is described. The symbols can be concealed in a manner so that they are not visible to the human eye and/or cannot be readily revealed to the human eye without damage or destruction of the target object. The identification symbols can be determined after concealment by e.g., the compilation of multiple X-ray images. As such, the present invention can also provide e.g., a deterrent to theft and the recovery of lost or stolen objects.

  17. Covert respiration measures for the detection of concealed information.

    PubMed

    Elaad, Eitan; Ben-Shakhar, Gershon

    2008-03-01

    A mock-theft experiment was designed to assess the efficiency of two covert respiration measures in detection of concealed information. The covert measures were further compared with three standard measures typically used for the detection of concealed knowledge (electrodermal, respiration and finger pulse measures). Results revealed that the covert respiration measures produced good discrimination between "guilty" (participants possessing concealed knowledge) and "innocent" participants. One of the covert measures produced detection efficiency that was similar to that of the standard respiration and finger pulse measures, but less than the electrodermal measure. PMID:18093718

  18. Approach trajectory planning system for maximum concealment

    NASA Technical Reports Server (NTRS)

    Warner, David N., Jr.

    1986-01-01

    A computer-simulation study was undertaken to investigate a maximum concealment guidance technique (pop-up maneuver), which military aircraft may use to capture a glide path from masked, low-altitude flight typical of terrain following/terrain avoidance flight enroute. The guidance system applied to this problem is the Fuel Conservative Guidance System. Previous studies using this system have concentrated on the saving of fuel in basically conventional land and ship-based operations. Because this system is based on energy-management concepts, it also has direct application to the pop-up approach which exploits aircraft performance. Although the algorithm was initially designed to reduce fuel consumption, the commanded deceleration is at its upper limit during the pop-up and, therefore, is a good approximation of a minimum-time solution. Using the model of a powered-lift aircraft, the results of the study demonstrated that guidance commands generated by the system are well within the capability of an automatic flight-control system. Results for several initial approach conditions are presented.

  19. Improving the spatial and temporal resolution with quantification of uncertainty and errors in earth observation data sets using Data Interpolating Empirical Orthogonal Functions methodology

    NASA Astrophysics Data System (ADS)

    El Serafy, Ghada; Gaytan Aguilar, Sandra; Ziemba, Alexander

    2016-04-01

    There is an increasing use of process-based models in the investigation of ecological systems and scenario predictions. The accuracy and quality of these models are improved when run with high spatial and temporal resolution data sets. However, ecological data can often be difficult to collect which manifests itself through irregularities in the spatial and temporal domain of these data sets. Through the use of Data INterpolating Empirical Orthogonal Functions(DINEOF) methodology, earth observation products can be improved to have full spatial coverage within the desired domain as well as increased temporal resolution to daily and weekly time step, those frequently required by process-based models[1]. The DINEOF methodology results in a degree of error being affixed to the refined data product. In order to determine the degree of error introduced through this process, the suspended particulate matter and chlorophyll-a data from MERIS is used with DINEOF to produce high resolution products for the Wadden Sea. These new data sets are then compared with in-situ and other data sources to determine the error. Also, artificial cloud cover scenarios are conducted in order to substantiate the findings from MERIS data experiments. Secondly, the accuracy of DINEOF is explored to evaluate the variance of the methodology. The degree of accuracy is combined with the overall error produced by the methodology and reported in an assessment of the quality of DINEOF when applied to resolution refinement of chlorophyll-a and suspended particulate matter in the Wadden Sea. References [1] Sirjacobs, D.; Alvera-Azcárate, A.; Barth, A.; Lacroix, G.; Park, Y.; Nechad, B.; Ruddick, K.G.; Beckers, J.-M. (2011). Cloud filling of ocean colour and sea surface temperature remote sensing products over the Southern North Sea by the Data Interpolating Empirical Orthogonal Functions methodology. J. Sea Res. 65(1): 114-130. Dx.doi.org/10.1016/j.seares.2010.08.002

  20. Brain fingerprinting classification concealed information test detects US Navy military medical information with P300

    PubMed Central

    Farwell, Lawrence A.; Richardson, Drew C.; Richardson, Graham M.; Furedy, John J.

    2014-01-01

    A classification concealed information test (CIT) used the “brain fingerprinting” method of applying P300 event-related potential (ERP) in detecting information that is (1) acquired in real life and (2) unique to US Navy experts in military medicine. Military medicine experts and non-experts were asked to push buttons in response to three types of text stimuli. Targets contain known information relevant to military medicine, are identified to subjects as relevant, and require pushing one button. Subjects are told to push another button to all other stimuli. Probes contain concealed information relevant to military medicine, and are not identified to subjects. Irrelevants contain equally plausible, but incorrect/irrelevant information. Error rate was 0%. Median and mean statistical confidences for individual determinations were 99.9% with no indeterminates (results lacking sufficiently high statistical confidence to be classified). We compared error rate and statistical confidence for determinations of both information present and information absent produced by classification CIT (Is a probe ERP more similar to a target or to an irrelevant ERP?) vs. comparison CIT (Does a probe produce a larger ERP than an irrelevant?) using P300 plus the late negative component (LNP; together, P300-MERMER). Comparison CIT produced a significantly higher error rate (20%) and lower statistical confidences: mean 67%; information-absent mean was 28.9%, less than chance (50%). We compared analysis using P300 alone with the P300 + LNP. P300 alone produced the same 0% error rate but significantly lower statistical confidences. These findings add to the evidence that the brain fingerprinting methods as described here provide sufficient conditions to produce less than 1% error rate and greater than 95% median statistical confidence in a CIT on information obtained in the course of real life that is characteristic of individuals with specific training, expertise, or organizational

  1. Brain fingerprinting classification concealed information test detects US Navy military medical information with P300.

    PubMed

    Farwell, Lawrence A; Richardson, Drew C; Richardson, Graham M; Furedy, John J

    2014-01-01

    A classification concealed information test (CIT) used the "brain fingerprinting" method of applying P300 event-related potential (ERP) in detecting information that is (1) acquired in real life and (2) unique to US Navy experts in military medicine. Military medicine experts and non-experts were asked to push buttons in response to three types of text stimuli. Targets contain known information relevant to military medicine, are identified to subjects as relevant, and require pushing one button. Subjects are told to push another button to all other stimuli. Probes contain concealed information relevant to military medicine, and are not identified to subjects. Irrelevants contain equally plausible, but incorrect/irrelevant information. Error rate was 0%. Median and mean statistical confidences for individual determinations were 99.9% with no indeterminates (results lacking sufficiently high statistical confidence to be classified). We compared error rate and statistical confidence for determinations of both information present and information absent produced by classification CIT (Is a probe ERP more similar to a target or to an irrelevant ERP?) vs. comparison CIT (Does a probe produce a larger ERP than an irrelevant?) using P300 plus the late negative component (LNP; together, P300-MERMER). Comparison CIT produced a significantly higher error rate (20%) and lower statistical confidences: mean 67%; information-absent mean was 28.9%, less than chance (50%). We compared analysis using P300 alone with the P300 + LNP. P300 alone produced the same 0% error rate but significantly lower statistical confidences. These findings add to the evidence that the brain fingerprinting methods as described here provide sufficient conditions to produce less than 1% error rate and greater than 95% median statistical confidence in a CIT on information obtained in the course of real life that is characteristic of individuals with specific training, expertise, or organizational

  2. Assessing representation errors of IAGOS CO2, CO and CH4 profile observations: the impact of spatial variations in near-field emissions

    NASA Astrophysics Data System (ADS)

    Boschetti, Fabio; Thouret, Valerie; Nedelec, Philippe; Chen, Huilin; Gerbig, Christoph

    2015-04-01

    Airborne platforms have their main strength in the ability of collecting mixing ratio and meteorological data at different heights across a vertical profile, allowing an insight in the internal structure of the atmosphere. However, rental airborne platforms are usually expensive, limiting the number of flights that can be afforded and hence on the amount of data that can be collected. To avoid this disadvantage, the MOZAIC/IAGOS (Measurements of Ozone and water vapor by Airbus In-service airCraft/In-service Aircraft for a Global Observing System) program makes use of commercial airliners, providing data on a regular basis. It is therefore considered an important tool in atmospheric investigations. However, due to the nature of said platforms, MOZAIC/IAGOS's profiles are located near international airports, which are usually significant emission sources, and are in most cases close to major urban settlements, characterized by higher anthropogenic emissions compared to rural areas. When running transport models at finite resolution, these local emissions can heavily affect measurements resulting in biases in model/observation mismatch. Model/observation mismatch can include different aspects in both horizontal and vertical direction, for example spatial and temporal resolution of the modeled fluxes, or poorly represented convective transport or turbulent mixing in the boundary layer. In the framework of the IGAS (IAGOS for GMES Atmospheric Service) project, whose aim is to improve connections between data collected by MOZAIC/IAGOS and Copernicus Atmospheric Service, the present study is focused on the effect of the spatial resolution of emission fluxes, referred to here as representation error. To investigate this, the Lagrangian transport model STILT (Stochastic Time Inverted Lagrangian Transport) was coupled with EDGAR (Emission Database for Global Atmospheric Research) version-4.3 emission inventory at European regional scale. EDGAR's simulated fluxes for CO, CO2

  3. Analysis of Spatial Smoothing Effect of Short-term Fluctuation of Global Solar Radiation based on the Data Including Quantization Error

    NASA Astrophysics Data System (ADS)

    Ue, Yosuke; Hara, Ryoichi; Kita, Hiroyuki; Saito, Yutaka; Takitani, Katsuyuki; Saito, Masami

    A Photovoltaic (PV) system is expected as one of the promising countermeasures for the global warming and the environmental issues. However, generation output from PV system is generally unstable and unpredictable. Therefore, large penetration of PV systems may cause some serious impacts to the power system operation such as a load frequency control, a voltage regulation, etc. Estimation of the influences of PV system installation is becoming important, however, it requires simultaneous multipoint solar radiation measurements. The Japan Meteorological Business Support Center has provided the 1-min meteorological data observed in Japan, however, its solar radiation data includes quantization errors. This paper proposes a regeneration method for the solar radiation data including quantization errors. This paper also analyses the spatial smoothing effect of the global solar radiation fluctuations.

  4. Classification of radiological errors in chest radiographs, using support vector machine on the spatial frequency features of false- negative and false-positive regions

    NASA Astrophysics Data System (ADS)

    Pietrzyk, Mariusz W.; Donovan, Tim; Brennan, Patrick C.; Dix, Alan; Manning, David J.

    2011-03-01

    Aim: To optimize automated classification of radiological errors during lung nodule detection from chest radiographs (CxR) using a support vector machine (SVM) run on the spatial frequency features extracted from the local background of selected regions. Background: The majority of the unreported pulmonary nodules are visually detected but not recognized; shown by the prolonged dwell time values at false-negative regions. Similarly, overestimated nodule locations are capturing substantial amounts of foveal attention. Spatial frequency properties of selected local backgrounds are correlated with human observer responses either in terms of accuracy in indicating abnormality position or in the precision of visual sampling the medical images. Methods: Seven radiologists participated in the eye tracking experiments conducted under conditions of pulmonary nodule detection from a set of 20 postero-anterior CxR. The most dwelled locations have been identified and subjected to spatial frequency (SF) analysis. The image-based features of selected ROI were extracted with un-decimated Wavelet Packet Transform. An analysis of variance was run to select SF features and a SVM schema was implemented to classify False-Negative and False-Positive from all ROI. Results: A relative high overall accuracy was obtained for each individually developed Wavelet-SVM algorithm, with over 90% average correct ratio for errors recognition from all prolonged dwell locations. Conclusion: The preliminary results show that combined eye-tracking and image-based features can be used for automated detection of radiological error with SVM. The work is still in progress and not all analytical procedures have been completed, which might have an effect on the specificity of the algorithm.

  5. A technique for estimating spatial sampling errors in coarse-scale soil moisture estimates derived from point-scale observations

    Technology Transfer Automated Retrieval System (TEKTRAN)

    The validation of satellite surface soil moisture retrievals requires the spatial aggregation of point-scale ground soil moisture measurements up to coarse resolution satellite footprint scales (>10 km). In regions containing a limited number of ground measurements per satellite footprint, a large c...

  6. Attenuation and bit error rate for four co-propagating spatially multiplexed optical communication channels of exactly same wavelength in step index multimode fibers

    NASA Astrophysics Data System (ADS)

    Murshid, Syed H.; Chakravarty, Abhijit

    2011-06-01

    Spatial domain multiplexing (SDM) utilizes co-propagation of exactly the same wavelength in optical fibers to increase the bandwidth by integer multiples. Input signals from multiple independent single mode pigtail laser sources are launched at different input angles into a single multimode carrier fiber. The SDM channels follow helical paths and traverse through the carrier fiber without interfering with each other. The optical energy from the different sources is spatially distributed and takes the form of concentric circular donut shaped rings, where each ring corresponds to an independent laser source. At the output end of the fiber these donut shaped independent channels can be separated either with the help of bulk optics or integrated concentric optical detectors. This presents the experimental setup and results for a four channel SDM system. The attenuation and bit error rate for individual channels of such a system is also presented.

  7. Millimeter-wave imaging for concealed weapon detection

    NASA Astrophysics Data System (ADS)

    McMakin, Douglas L.; Sheen, David M.; Hall, Thomas E.

    2003-07-01

    Full body, real-time, millimeter-wave imaging systems have been developed at the Pacific Northwest National Laboratory for the detection of body-worn, concealed weapons and contraband at security checkpoints. These security systems employ methods derived from microwave holography techniques that utilize phase and amplitude information recorded over a two-dimensional aperture to reconstruct a focused image of the target. Millimeter-wave imaging is well suited for the detection of concealed weapons or other contraband carried on personnel, since millimeter waves are non-ionizing, readily penetrate common clothing material, and are reflected from the human body and any concealed items. In this paper, wide-bandwidth, three-dimensional, holographic microwave imaging techniques and a full-body, planar, millimeter-wave imaging system are described.

  8. Millimeter-wave imaging for concealed weapon detection

    SciTech Connect

    McMakin, Douglas L.; Sheen, David M.; Hall, Thomas E.

    2003-07-16

    Full-body, real-time, millimeter-wave imaging systems have been developed at the Pacific Northwest National Laboratory for the detection of body-worn, concealed weapons and contraband at security checkpoints. These security systems employ methods derived from microwave holography techniques that utilize phase and amplitude information recorded over a two-dimensional aperture to reconstruct a focused image of the target. Millimeter-wave imaging is well suited for the detection of concealed weapons or other contraband carried on personnel, since millimeter waves are non-ionizing, readily penetrate common clothing material, and are reflected from the human body and any concealed items. In this paper, wide-bandwidth, three-dimensional, holographic microwave imaging techniques and a full-body, planar, millimeter-wave imaging system are described.

  9. Pigmented concealing powders for the hair loss patient.

    PubMed

    Cossman, Jack P; Ladizinski, Barry; Lee, Kachiu C

    2013-12-01

    Patients suffering from alopecia may experience low self-esteem, low self-image, and other psychological consequences. While medical and surgical options for treating hair loss exist, these may be prohibitively expensive or have an unpredictable outcome. In lieu of or in addition to therapeutic approaches, cosmetic options have long been an approach to hair loss. However, patients and clinicians alike often regard cosmetic options to be limited to hairstyling and hairpieces, unaware that newer options, namely pigmented concealing powders, may offer a more practical and seemingly natural camouflage. This article introduces the clinician to concealing powders as a viable option for the hair loss patient. PMID:24305431

  10. Systematic errors of an optical encryption system due to the discrete values of a spatial light modulator

    NASA Astrophysics Data System (ADS)

    Monaghan, David S.

    2009-02-01

    An optical implementation of the amplitude encoded double random phase encryption/decryption technique is implemented, and both numerical and experimental results are presented. In particular, we examine the effect of quantization in the decryption process due to the discrete values and quantized levels, which a spatial light modulator (SLM) can physically display. To do this, we characterize a transmissive SLM using Jones matrices and then map a complex image to the physically achievable levels of the SLM using the pseudorandom encoding technique. We present both numerical and experimental results that quantify the performance of the system.

  11. Influence of rainfall estimation error and spatial variability on sewer flow prediction at a small urban scale

    NASA Astrophysics Data System (ADS)

    Schellart, A. N. A.; Shepherd, W. J.; Saul, A. J.

    2012-09-01

    Legislative drivers for water quality and urban flood risk are driving a growing need to accurately determine the performance of urban drainage systems in near real time. Rainfall data are clearly a key input to urban drainage system models. Historically rain gauge data have been used, however radar rainfall data are now widely available and benefits from significantly higher spatial coverage than rain gauges in most UK urban catchments. This paper describes a detailed study based on a small (11 km2) urban catchment in West Yorkshire, England. Radar and rain gauge data have been compared and used as the input to hydrodynamic sewer flow simulations, and the results of these simulations have been compared with measured flows in the sewer system. The results showed that for this size of catchment, there can be significant differences in simulated peak flows and combined sewer overflow spill volumes due to inherent uncertainties between the two rainfall estimates.

  12. Effects of moderate prenatal ethanol exposure and age on social behavior, spatial response perseveration errors and motor behavior.

    PubMed

    Hamilton, Derek A; Barto, Daniel; Rodriguez, Carlos I; Magcalas, Christy M; Fink, Brandi C; Rice, James P; Bird, Clark W; Davies, Suzy; Savage, Daniel D

    2014-08-01

    Persistent deficits in social behavior are among the major negative consequences associated with exposure to ethanol during prenatal development. Prior work from our laboratory has linked deficits in social behavior following moderate prenatal alcohol exposure (PAE) in the rat to functional alterations in the ventrolateral frontal cortex [21]. In addition to social behaviors, the regions comprising the ventrolateral frontal cortex are critical for diverse processes ranging from orofacial motor movements to flexible alteration of behavior in the face of changing consequences. The broader behavioral implications of altered ventrolateral frontal cortex function following moderate PAE have, however, not been examined. In the present study we evaluated the consequences of moderate PAE on social behavior, tongue protrusion, and flexibility in a variant of the Morris water task that required modification of a well-established spatial response. PAE rats displayed deficits in tongue protrusion, reduced flexibility in the spatial domain, increased wrestling, and decreased investigation, indicating that several behaviors associated with ventrolateral frontal cortex function are impaired following moderate PAE. A linear discriminant analysis revealed that measures of wrestling and tongue protrusion provided the best discrimination of PAE rats from saccharin-exposed control rats. We also evaluated all behaviors in young adult (4-5 months) or older (10-11 months) rats to address the persistence of behavioral deficits in adulthood and possible interactions between early ethanol exposure and advancing age. Behavioral deficits in each domain persisted well into adulthood (10-11 months), however, there was no evidence that aging enhances the effects of moderate PAE within the age ranges that were studied. PMID:24769174

  13. Inverse synthetic aperture radar imaging for concealed object detection on a naturally walking person

    NASA Astrophysics Data System (ADS)

    Zhuravlev, Andrey; Ivashov, Sergey; Razevig, Vladimir; Vasiliev, Igor; Bechtel, Timothy

    2014-05-01

    This paper describes the architecture of a microwave radar system intended for imaging concealed objects under clothing as a subject walks through the inspection area. The system uses the principle of inverse aperture which is achieved by a person's movement past a stationary microwave sensor array. In the system, the vertical resolution is achieved by arranging microwave sensors vertically while the horizontal resolution is due to the subject's horizontal motion. The positioning of the objects is achieved by employing a synchronous video sensor that allows coherent radar signal processing. A possible radar signal processing technique based on signal accumulation is described. Numerical experiments are conducted with the described object trajectory model. The influence of positioning errors attributed to the video positioning system is also modeled numerically. An experimental setup is designed and proposed to evaluate the suggested signal processing techniques on real data with an electro-mechanical scanner and single transceiver. It is suggested that the signal acquisition with the system can be accomplished using the stop motion technique, in which a series of changing stationary scenes is sampled and processed. Experimental radar images are demonstrated for stationary objects with concealed items and considered as reference images. Further development of the system is suggested.

  14. Cylindrical millimeter-wave imaging technique for concealed weapon detection

    NASA Astrophysics Data System (ADS)

    Sheen, David M.; McMakin, Douglas L.; Hall, Thomas E.

    1998-03-01

    A novel cylindrical millimeter-wave imaging technique has been developed at the Pacific Northwest National Laboratory for the detection of metallic and non-metallic concealed weapons. This technique uses a vertical array of millimeter- wave antennas which is mechanically swept around a person in a cylindrical fashion. The wideband millimeter-wave data is mathematically reconstructed into a series of high- resolution images of the person being screened. Clothing is relatively transparent to millimeter-wave illumination,whereas the human body and concealed items are reflective at millimeter wavelengths. Differences in shape and reflectivity are revealed in the images and allow a human operator to detect and identify concealed weapons. A full 360 degree scan is necessary to fully inspect a person for concealed items. The millimeter-wave images can be formed into a video animation sequence in which the person appears to rotate in front of a fixed illumination source.This is s convenient method for presenting the 3D image data for analysis. This work has been fully sponsored by the FAA. An engineering prototype based on the cylindrical imaging technique is presently under development. The FAA is currently opposed to presenting the image data directly to the operator due to personal privacy concerns. A computer automated system is desired to address this problem by eliminating operator viewing of the imagery.

  15. Cycles of abuse nurtured by concealment: a clinical report.

    PubMed

    Wijma, Barbro; Thapar-Björkert, Suruchi; Hammarström, Nevija Cah; Swahnberg, Katarina

    2007-09-01

    At present, health care staff do not seem to have sufficient knowledge about their patients' abusive experiences. The aim of the present study is to analyze and discuss what the implications might be for the encounter between patients and health care professionals, when experiences of abuse are concealed. The methodology of this article is varied: a personal narrative, medical records, sociological theoretical literature and empirical evidence. From the narrative we learn that concealment of abuse was devastating for the patient. She was "treated" in vain as a correct diagnosis was not made, while abuse by her father continued. Health care staff also violated her, which she told her therapist, but her protests were not acknowledged. Ten years of treatment thus made her even more sick. This case story focuses on the mechanisms which nurture concealment of a patient's history of abuse, such as structural and symbolic violence. We also suggest ways to break "cycles of abuse". Help the patient to stop concealing also means that she/he leaves a victim role, gets in charge of the situation and takes a first step towards empowerment. In this way, health care settings can become enabling and empowering environments. PMID:17577758

  16. Do Children Understand That People Selectively Conceal or Express Emotion?

    ERIC Educational Resources Information Center

    Hayashi, Hajimu; Shiomi, Yuki

    2015-01-01

    This study examined whether children understand that people selectively conceal or express emotion depending upon the context. We prepared two contexts for a verbal display task for 70 first-graders, 80 third-graders, 64 fifth-graders, and 71 adults. In both contexts, protagonists had negative feelings because of the behavior of the other…

  17. Detection of concealed and buried chemicals by using multifrequency excitations

    SciTech Connect

    Gao Yaohui; Chen, Meng-Ku; Yang, Chia-En; Chang, Yun-Ching; Yao, Jim; Cheng Jiping; Yin, Stuart; Hui Rongqing; Ruffin, Paul; Brantley, Christina; Edwards, Eugene; Luo, Claire

    2010-08-15

    In this paper, we present a new type of concealed and buried chemical detection system by stimulating and enhancing spectroscopic signatures with multifrequency excitations, which includes a low frequency gradient dc electric field, a high frequency microwave field, and higher frequency infrared (IR) radiations. Each excitation frequency plays a unique role. The microwave, which can penetrate into the underground and/or pass through the dielectric covers with low attenuation, could effectively transform its energy into the concealed and buried chemicals and increases its evaporation rate from the sample source. Subsequently, a gradient dc electric field, generated by a Van De Graaff generator, not only serves as a vapor accelerator for efficiently expediting the transportation process of the vapor release from the concealed and buried chemicals but also acts as a vapor concentrator for increasing the chemical concentrations in the detection area, which enables the trace level chemical detection. Finally, the stimulated and enhanced vapors on the surface are detected by the IR spectroscopic fingerprints. Our theoretical and experimental results demonstrate that more than sixfold increase in detection signal can be achieved by using this proposed technology. The proposed technology can also be used for standoff detection of concealed and buried chemicals by adding the remote IR and/or thermal spectroscopic and imaging detection systems.

  18. Adolescent disclosure and concealment: longitudinal and concurrent associations with aggression.

    PubMed

    Leavitt, Chelom E; Nelson, David A; Coyne, Sarah M; Hart, Craig H

    2013-01-01

    This longitudinal study assessed the association between prior (preschool) and concurrent physical and relational aggression as they relate to Russian adolescents' disclosure and concealment patterns with their parents. In the initial preschool study, there were 106 boys and 106 girls (mean age = 60.24 months, SD = 7.81). Both peer nominations and teacher ratings of aggression were obtained for these children. Ten years later, the majority of these children (72.2%; n = 153) completed a longitudinal follow-up battery of assessments. Included in these measures was a self-reported measure of aggression as well as an assessment of the extent to which these adolescents disclosed to and concealed information from their parents. Separate models were estimated by gender of child for the 153 children who participated in both Time 1 and Time 2 data collections. Preschool physical aggression proved an important longitudinal predictor of adolescent disclosure and concealment for girls. Concurrently, self-rated relational aggression was also significantly associated with concealment for both boys and girls. PMID:23720152

  19. Detecting concealed information using functional near-infrared spectroscopy.

    PubMed

    Sai, Liyang; Zhou, Xiaomei; Ding, Xiao Pan; Fu, Genyue; Sang, Biao

    2014-09-01

    The present study focused on the potential application of fNIRS in the detection of concealed information. Participants either committed a mock crime or not and then were presented with a randomized series of probes (crime-related information) and irrelevants (crime-irrelevant information) in a standard concealed information test (CIT). Participants in the guilty group were instructed to conceal crime-related information they obtained from the mock crime, thus making deceptive response to the probes. Meanwhile, their brain activity to probes and irrelevants was recorded by functional near-infrared spectroscopy (fNIRS). At the group level, we found that probe items were associated with longer reaction times and greater activity in bilateral dorsolateral prefrontal cortex and supplementary motor cortex than irrelevant items in the guilty group, but not in the innocent group. These findings provided evidence on neural correlates of recognition during a CIT. Finally, on the basis of the activity in bilateral dorsolateral prefrontal cortex and supplementary motor cortex, the correct classification of guilty versus innocent participants was approximately 75 % and the combination of fNIRS and reaction time measures yielded a better classification rate of 83.3 %. These findings illustrate the feasibility and promise of using fNIRS to detect concealed information. PMID:24514911

  20. Quantum Image Steganography and Steganalysis Based On LSQu-Blocks Image Information Concealing Algorithm

    NASA Astrophysics Data System (ADS)

    A. AL-Salhi, Yahya E.; Lu, Songfeng

    2016-04-01

    Quantum steganography can solve some problems that are considered inefficient in image information concealing. It researches on Quantum image information concealing to have been widely exploited in recent years. Quantum image information concealing can be categorized into quantum image digital blocking, quantum image stereography, anonymity and other branches. Least significant bit (LSB) information concealing plays vital roles in the classical world because many image information concealing algorithms are designed based on it. Firstly, based on the novel enhanced quantum representation (NEQR), image uniform blocks clustering around the concrete the least significant Qu-block (LSQB) information concealing algorithm for quantum image steganography is presented. Secondly, a clustering algorithm is proposed to optimize the concealment of important data. Finally, we used Con-Steg algorithm to conceal the clustered image blocks. Information concealing located on the Fourier domain of an image can achieve the security of image information, thus we further discuss the Fourier domain LSQu-block information concealing algorithm for quantum image based on Quantum Fourier Transforms. In our algorithms, the corresponding unitary Transformations are designed to realize the aim of concealing the secret information to the least significant Qu-block representing color of the quantum cover image. Finally, the procedures of extracting the secret information are illustrated. Quantum image LSQu-block image information concealing algorithm can be applied in many fields according to different needs.

  1. Quantum Image Steganography and Steganalysis Based On LSQu-Blocks Image Information Concealing Algorithm

    NASA Astrophysics Data System (ADS)

    A. AL-Salhi, Yahya E.; Lu, Songfeng

    2016-08-01

    Quantum steganography can solve some problems that are considered inefficient in image information concealing. It researches on Quantum image information concealing to have been widely exploited in recent years. Quantum image information concealing can be categorized into quantum image digital blocking, quantum image stereography, anonymity and other branches. Least significant bit (LSB) information concealing plays vital roles in the classical world because many image information concealing algorithms are designed based on it. Firstly, based on the novel enhanced quantum representation (NEQR), image uniform blocks clustering around the concrete the least significant Qu-block (LSQB) information concealing algorithm for quantum image steganography is presented. Secondly, a clustering algorithm is proposed to optimize the concealment of important data. Finally, we used Con-Steg algorithm to conceal the clustered image blocks. Information concealing located on the Fourier domain of an image can achieve the security of image information, thus we further discuss the Fourier domain LSQu-block information concealing algorithm for quantum image based on Quantum Fourier Transforms. In our algorithms, the corresponding unitary Transformations are designed to realize the aim of concealing the secret information to the least significant Qu-block representing color of the quantum cover image. Finally, the procedures of extracting the secret information are illustrated. Quantum image LSQu-block image information concealing algorithm can be applied in many fields according to different needs.

  2. Campaign for Right to Carry Concealed Guns on Campuses Gains Traction

    ERIC Educational Resources Information Center

    Wiseman, Rachel

    2012-01-01

    Five years after the Virginia Tech massacre prompted a student in Texas to start a Facebook page in favor of the right to carry concealed weapons on college campuses, the resulting group, Students for Concealed Carry, has advanced its cause. In more than a dozen states, legislation has been introduced to allow the carrying of concealed firearms on…

  3. Evaluation of spatial resolution and estimation error of seafloor displacement observation from vessel-based bathymetric survey by use of AUV-based bathymetric data

    NASA Astrophysics Data System (ADS)

    Fujiwara, Toshiya; Masaki, Yuka; Yamamoto, Fujio

    2015-03-01

    A repeated bathymetric survey reveals seafloor displacement between before and after geodynamic events. We evaluated the less-known spatial resolution and estimation error of the seafloor displacement observation from a vessel-based multi-narrow beam bathymetric survey. In this evaluation, bathymetric data from vessel-based and near-seafloor high-resolution autonomous underwater vehicle (AUV)-based surveys in the same area were used. Simulated vessel-based bathymetric "before and after" data of the seafloor displacement were made using AUV-based bathymetric data. The displacement was verified by comparing these simulated data using the analysis conditions that no locational errors of beam sounding points exist, a footprint effect is uniform, depth accuracy is constant in the analysis area, and there are no depth offset between two data. As a result, we found that the smallest vertical seafloor displacement that can be detected occurs when the horizontal extent of the deformation is larger than several times the size of the footprint (area of the narrow sounding beam projected onto the seafloor) of the used vessel's multi-narrow beam echo sounder, and in the situation that the amplitude of the depth difference is greater than the accuracy of the vessel-based depth measurement (standard deviation of measuring error). When local slopes of the bathymetry are gentler than those of the artificial variation appeared in the depth differences between two data, the horizontal seafloor displacement seems to be difficult to resolve accurately. The local slope of the artificial depth variation is derived from the wavelength and the amplitude which are equivalent to ~1-3 times of the footprint size and the accuracy of the depth measurement, respectively.

  4. Error-resilient method for robust video transmissions

    NASA Astrophysics Data System (ADS)

    Choi, Dong-Hwan; Lim, Tae-Gyun; Lee, Sang-Hak; Hwang, Chan-Sik

    2003-06-01

    In this paper we address the problems of video transmission in error prone environments. A novel error-resilient method is proposed that uses a data embedding scheme for header parameters in video coding standards, such as MPEG-2 and H.263. In case of requiring taking the loss of data information into account except for header errors, the video decoder hides visual degradation as well as possible, employing an error concealment method using an affine transform. Header information is very important because syntax elements, tables, and decoding processes all depend on the values of the header information. Therefore, transmission errors in header information can result in serious visual degradation of the output video and also cause an abnormal decoding process. In the proposed method, the header parameters are embedded into the least significant bits (LSB) of the quantized DCT coefficients. Then, when errors occur in the header field of the compressed bitstream, the decoder can accurately recover the corrupted header parameters if the embedded information is extracted correctly. The error concealment technique employed in this paper uses motion estimation considering actual motions, such as rotation, magnification, reduction, and parallel motion, in moving pictures. Experimental results show that the proposed error-resilient method can effectively reconstruct the original video sequence without any additional bits or modifications to the video coding standard and the error concealment method can produce a higher PSNR value and better subjective video quality, estimating the motion of lost data more accurately.

  5. Noise-resistant system of concealed information transfer on a chaotic delayed feedback oscillator with switchable delay time

    NASA Astrophysics Data System (ADS)

    Kul'minskii, D. D.; Ponomarenko, V. I.; Karavaev, A. S.; Prokhorov, M. D.

    2016-05-01

    We propose a system of concealed information transfer based on a delayed feedback oscillator with switchable chaotic regimes. The proposed system is analyzed numerically and experimentally. The dependences of the bit error rate during transmission of a binary information signal on the signal-to-noise ratio, attenuation of the signal in the communication channel, and the duration of the time interval during which a bit is transferred are constructed. The high stability of the system to noise and amplitude distortions of a signal in the communication channel is demonstrated.

  6. Could plate tectonics on Venus be concealed by volcanic deposits

    NASA Technical Reports Server (NTRS)

    Kaula, W. M.; Muradian, L. M.

    1982-01-01

    The present investigation is supplementary to a study reported by Kaula and Phillips (1981). From an analysis of Pioneer Venus altimetry, Kaula and Phillips had inferred that any heat loss from the planet by plate tectonics must be small compared to that from the earth. However, it has been suggested by others that plate tectonic may exist on Venus, but that the expected 'square root of s' dependence of the topographic drop off is not observed because it is concealed by lava flows. The present investigation has the objective to conduct an examination whether this suggestion of concealment by lava flow is correct. On the basis of the performed analysis, it is concluded that the results obtained by Kaula and Phillips appear to be well justified.

  7. ID-Check: Online Concealed Information Test Reveals True Identity.

    PubMed

    Verschuere, Bruno; Kleinberg, Bennett

    2016-01-01

    The Internet has already changed people's lives considerably and is likely to drastically change forensic research. We developed a web-based test to reveal concealed autobiographical information. Initial studies identified a number of conditions that affect diagnostic efficiency. By combining these moderators, this study investigated the full potential of the online ID-check. Participants (n = 101) tried to hide their identity and claimed a false identity in a reaction time-based Concealed Information Test. Half of the participants were presented with personal details (e.g., first name, last name, birthday), whereas the others only saw irrelevant details. Results showed that participants' true identity could be detected with high accuracy (AUC = 0.98; overall accuracy: 86-94%). Online memory detection can reliably and validly detect whether someone is hiding their true identity. This suggests that online memory detection might become a valuable tool for forensic applications. PMID:26390033

  8. Biomedical psychiatry and its concealed metaphors: an anthropological perspective.

    PubMed

    Martínez-Hernáez, Angel

    2013-09-01

    The idea that power relations structure social life is self-evident to most anthropologists. Western medical knowledge or biomedicine, and by extension science or scientific knowledge, however, has until relatively recently been exempt from anthropological scrutiny in political terms. An understanding of biomedicine as a system of knowledge that is not a copy of facts but a representation of them has entailed a break with the traditional separation of folk knowledge and scientific knowledge in anthropology, making it possible to include biomedicine in the repertoire of ethnographic objects. The peculiarity of biomedicine as a cultural system, seen from this perspective, lies in a paradox: its self-characterization as a set of non-ideological discourses and practices is a representation that conceals its ideological and power-saturated nature. Through an analysis of DSM-IV-TR, this article explores some of the representational strategies through which this concealment takes place in biomedical psychiatry: the asocial and universal character of mental illness categories; the neutrality of clinical practice; and the non-moral nature of clinical criteria and judgment. These are concealed metaphors in the true sense, for not only do they speak of something without naming it but they also deny their own existence as metaphors. PMID:24308254

  9. Temporal spying and concealing process in fibre-optic data transmission systems through polarization bypass

    PubMed Central

    Bony, P.Y.; Guasoni, M.; Morin, P.; Sugny, D.; Picozzi, A.; Jauslin, H.R.; Pitois, S.; Fatome, J.

    2014-01-01

    Recent research has been focused on the ability to manipulate a light beam in such a way to hide, namely to cloak, an event over a finite time or localization in space. The main idea is to create a hole or a gap in the spatial or time domain so as to allow for an object or data to be kept hidden for a while and then to be restored. By enlarging the field of applications of this concept to telecommunications, researchers have recently reported the possibility to hide transmitted data in an optical fibre. Here we report the first experimental demonstration of perpetual temporal spying and blinding process of optical data in fibre-optic transmission line based on polarization bypass. We successfully characterize the performance of our system by alternatively copying and then concealing 100% of a 10-Gb s−1 transmitted signal. PMID:25135759

  10. Deep Raman spectroscopy for the non-invasive standoff detection of concealed chemical threat agents.

    PubMed

    Izake, Emad L; Cletus, Biju; Olds, William; Sundarajoo, Shankaran; Fredericks, Peter M; Jaatinen, Esa

    2012-05-30

    Deep Raman spectroscopy has been utilized for the standoff detection of concealed chemical threat agents from a distance of 15 m under real life background illumination conditions. By using combined time and space resolved measurements, various explosive precursors hidden in opaque plastic containers were identified non-invasively. Our results confirm that combined time and space resolved Raman spectroscopy leads to higher selectivity towards the sub-layer over the surface layer as well as enhanced rejection of fluorescence from the container surface when compared to standoff spatially offset Raman spectroscopy. Raman spectra that have minimal interference from the packaging material and good signal-to-noise ratio were acquired within 5 s of measurement time. A new combined time and space resolved Raman spectrometer has been designed with nanosecond laser excitation and gated detection, making it of lower cost and complexity than picosecond-based laboratory systems. PMID:22608458

  11. [Effects of false memories on the Concealed Information Test].

    PubMed

    Zaitsu, Wataru

    2012-10-01

    The effects of false memories on polygraph examinations with the Concealed Information Test (CIT) were investigated by using the Deese-Roediger-McDermott (DRM) paradigm, which allows participants to evoke false memories. Physiological responses to questions consisting of learned, lure, and unlearned items were measured and recorded. The results indicated that responses to lure questions showed critical responses to questions about learned items. These responses included repression of respiration, an increase in electrodermal activity, and a drop in heart rate. These results suggest that critical response patterns are generated in the peripheral nervous system by true and false memories. PMID:23214081

  12. Advanced terahertz imaging system performance model for concealed weapon identification

    NASA Astrophysics Data System (ADS)

    Murrill, Steven R.; Redman, Brian; Espinola, Richard L.; Franck, Charmaine C.; Petkie, Douglas T.; De Lucia, Frank C.; Jacobs, Eddie L.; Griffin, Steven T.; Halford, Carl E.; Reynolds, Joe

    2007-04-01

    The U.S. Army Night Vision and Electronic Sensors Directorate (NVESD) and the U.S. Army Research Laboratory (ARL) have developed a terahertz-band imaging system performance model for detection and identification of concealed weaponry. The details of this MATLAB-based model which accounts for the effects of all critical sensor and display components, and for the effects of atmospheric attenuation, concealment material attenuation, and active illumination, were reported on at the 2005 SPIE Europe Security and Defence Symposium. The focus of this paper is to report on recent advances to the base model which have been designed to more realistically account for the dramatic impact that target and background orientation can have on target observability as related to specular and Lambertian reflections captured by an active-illumination-based imaging system. The advanced terahertz-band imaging system performance model now also accounts for target and background thermal emission, and has been recast into a user-friendly, Windows-executable tool. This advanced THz model has been developed in support of the Defense Advanced Research Project Agency's (DARPA) Terahertz Imaging Focal-Plane Technology (TIFT) program. This paper will describe the advanced THz model and its new radiometric sub-model in detail, and provide modeling and experimental results on target observability as a function of target and background orientation.

  13. Terahertz imaging system performance model for concealed-weapon identification

    NASA Astrophysics Data System (ADS)

    Murrill, Steven R.; Jacobs, Eddie L.; Moyer, Steven K.; Halford, Carl E.; Griffin, Steven T.; De Lucia, Frank C.; Petkie, Douglas T.; Franck, Charmaine C.

    2008-03-01

    The U.S. Army Night Vision and Electronic Sensors Directorate (NVESD) and the U.S. Army Research Laboratory have developed a terahertz (THz) -band imaging system performance model for detection and identification of concealed weaponry. The MATLAB-based model accounts for the effects of all critical sensor and display components and for the effects of atmospheric attenuation, concealment material attenuation, and active illumination. The model is based on recent U.S. Army NVESD sensor performance modeling technology that couples system design parameters to observer-sensor field performance by using the acquire methodology for weapon identification performance predictions. This THz model has been developed in support of the Defense Advanced Research Project Agencies' Terahertz Imaging Focal-Plane Technology (TIFT) program and is currently being used to guide the design and development of a 0.650 THz active-passive imaging system. This paper will describe the THz model in detail, provide and discuss initial modeling results for a prototype THz imaging system, and outline plans to calibrate and validate the model through human perception testing.

  14. Terahertz imaging system performance model for concealed-weapon identification.

    PubMed

    Murrill, Steven R; Jacobs, Eddie L; Moyer, Steven K; Halford, Carl E; Griffin, Steven T; De Lucia, Frank C; Petkie, Douglas T; Franck, Charmaine C

    2008-03-20

    The U.S. Army Night Vision and Electronic Sensors Directorate (NVESD) and the U.S. Army Research Laboratory have developed a terahertz (THz) -band imaging system performance model for detection and identification of concealed weaponry. The MATLAB-based model accounts for the effects of all critical sensor and display components and for the effects of atmospheric attenuation, concealment material attenuation, and active illumination. The model is based on recent U.S. Army NVESD sensor performance modeling technology that couples system design parameters to observer-sensor field performance by using the acquire methodology for weapon identification performance predictions. This THz model has been developed in support of the Defense Advanced Research Project Agencies' Terahertz Imaging Focal-Plane Technology (TIFT) program and is currently being used to guide the design and development of a 0.650 THz active-passive imaging system. This paper will describe the THz model in detail, provide and discuss initial modeling results for a prototype THz imaging system, and outline plans to calibrate and validate the model through human perception testing. PMID:18709076

  15. Separating deceptive and orienting components in a Concealed Information Test.

    PubMed

    Ambach, Wolfgang; Stark, Rudolf; Peper, Martin; Vaitl, Dieter

    2008-11-01

    The Concealed Information Test (CIT) requires the examinee to deceptively deny recognition of known stimuli and to truthfully deny recognition of unknown stimuli. Because deception and orienting are typically coupled, it is unclear how exactly these sub-processes affect the physiological responses measured in the CIT. The present study aimed at separating the effects of deception from those of orienting. In a mock-crime study, using a modified CIT, thirty-six of seventy-two subjects answered truthfully ('truth group'), whereas the other thirty-six concealed their knowledge ('lie group'). Answering was delayed for 4 s after item presentation. Electrodermal activity (EDA), respiration (RLL), and phasic heart rate (HR) were recorded. A decomposition of EDA responses revealed two response components; the response in the first interval was expected to indicate orienting, stimulus evaluation, and answer preparation, whereas the response in the second interval was assumed to reflect answer-related processes. Inconclusively, both EDA components differentiated between 'probe' and 'irrelevant' items in both groups. Phasic HR and RLL differed between item classes only in the 'lie' group, thus reflecting answer-related processes, possibly deception, rather than merely orienting responses. The findings further support the notion that psychophysiological measures elicited by a modified CIT may reflect different mental processes involved in orienting and deception. PMID:18674573

  16. Skin conductance as an indicator of anticipated concealed knowledge.

    PubMed

    Hu, Senqi; Huang, Hsin-Yu; McGovern, Jamie L; Jacobs, David A

    2008-06-01

    The present study investigated the effects of anticipation on skin conductance while participants were answering a set of questions which included one of concealed knowledge. Two experiments were conducted. In Exp. 1, 26 participants completed one experimental session. Each participant was asked to choose one two-digit number from 10 to 99 and was presented 19 other randomly generated two-digit numbers. The list of numbers was then presented to the participant on a computer screen, with a 60-sec. interval occurring every two questions. The participant-selected number was defined as the target question which was randomly placed within the 4th to 17th item of 20 questions stated as follows: "Is your selected number?" The participant was asked to answer "No" to all questions. The skin-conductance response to each question was measured. In Exp. 2, the experimental procedure was the same as that in Exp. 1 except each participant first answered 10 nontarget questions, then answered a target question with the participant's selected number, and then answered another 10 nontarget questions. There were a total of 21 questions. Analysis indicated participants in both experiments generated the highest mean skin conductance while answering the target questions, followed by lower amplitudes to questions prior to and after the target question. The skin-conductance response pattern can be used to identify the psychological process of anticipation of concealed information. PMID:18763466

  17. Target Speaker Detection with Concealed EEG Around the Ear

    PubMed Central

    Mirkovic, Bojana; Bleichner, Martin G.; De Vos, Maarten; Debener, Stefan

    2016-01-01

    Target speaker identification is essential for speech enhancement algorithms in assistive devices aimed toward helping the hearing impaired. Several recent studies have reported that target speaker identification is possible through electroencephalography (EEG) recordings. If the EEG system could be reduced to acceptable size while retaining the signal quality, hearing aids could benefit from the integration with concealed EEG. To compare the performance of a multichannel around-the-ear EEG system with high-density cap EEG recordings an envelope tracking algorithm was applied in a competitive speaker paradigm. The data from 20 normal hearing listeners were concurrently collected from the traditional state-of-the-art laboratory wired EEG system and a wireless mobile EEG system with two bilaterally-placed around-the-ear electrode arrays (cEEGrids). The results show that the cEEGrid ear-EEG technology captured neural signals that allowed the identification of the attended speaker above chance-level, with 69.3% accuracy, while cap-EEG signals resulted in the accuracy of 84.8%. Further analyses investigated the influence of ear-EEG signal quality and revealed that the envelope tracking procedure was unaffected by variability in channel impedances. We conclude that the quality of concealed ear-EEG recordings as acquired with the cEEGrid array has potential to be used in the brain-computer interface steering of hearing aids. PMID:27512364

  18. Active millimeter wave detection of concealed layers of dielectric material

    NASA Astrophysics Data System (ADS)

    Bowring, N. J.; Baker, J. G.; Rezgui, N. D.; Southgate, M.; Alder, J. F.

    2007-04-01

    Extensive work has been published on millimetre wave active and passive detection and imaging of metallic objects concealed under clothing. We propose and demonstrate a technique for revealing the depth as well as the outline of partially transparent objects, which is especially suited to imaging layer materials such as explosives and drugs. The technique uses a focussed and scanned FMCW source, swept through many GHz to reveal this structure. The principle involved is that a parallel sided dielectric slab produces reflections at both its upper and lower surfaces, acting as a Fabry-Perot interferometer. This produces a pattern of alternating reflected peaks and troughs in frequency space. Fourier or Burg transforming this pattern into z-space generates a peak at the thickness of the irradiated sample. It could be argued that though such a technique may work for single uniform slabs of dielectric material, it will give results of little or no significance when the sample both scatters the incident radiation and gives erratic reflectivities due to its non-uniform thickness and permittivity . We show results for a variety of materials such as explosive simulants, powder and drugs, both alone and concealed under clothing or in a rucksack, which display strongly directional reflectivities at millimeter wavelengths, and whose location is well displayed by a varying thickness parameter as the millimetre beam is scanned across the target. With this system we find that samples can easily be detected at standoff distances of at least 4.6m.

  19. Terahertz imaging system performance model for concealed weapon identification

    NASA Astrophysics Data System (ADS)

    Murrill, Steven R.; Jacobs, Eddie L.; Moyer, Steven K.; Halford, Carl E.; Griffin, Steven T.; De Lucia, Frank C.; Petkie, Douglas T.; Franck, Charmaine C.

    2005-11-01

    The U.S. Army Night Vision and Electronic Sensors Directorate and the U.S. Army Research Laboratory have developed a terahertz-band imaging system performance model for detection and identification of concealed weaponry. The MATLAB-based model accounts for the effects of all critical sensor and display components, and for the effects of atmospheric attenuation, concealment material attenuation, and active illumination. The model is based on recent U.S. Army NVESD sensor performance models that couple system design parameters to observer-sensor field performance using the acquire methodology for weapon identification performance predictions. This THz model has been developed in support of the Defense Advanced Research Project Agencies' Terahertz Imaging Focal-Plane-Array Technology (TIFT) program and is presently being used to guide the design and development of a 0.650 THz active/passive imaging system. This paper will describe the THz model in detail, provide and discuss initial modeling results for a prototype THz imaging system, and outline plans to validate and calibrate the model through human perception testing.

  20. Pulsed neutron interrogation for detection of concealed special nuclear materials

    NASA Astrophysics Data System (ADS)

    Ruddy, Frank; Seidel, John; Flammang, Robert; Petrović, Bojan; Dulloo, Abdul; Congedo, Thomas

    2006-05-01

    A new neutron interrogation technique for detection of concealed Special Nuclear Material (SNM) is described. This technique is a combination of timing techniques from pulsed prompt gamma neutron activation analysis with silicon carbide (SiC) semiconductor fast neutron detector technology. SiC detectors are a new class of radiation detectors that are ultra-fast and capable of processing high count rates. SiC detectors can operate during and within nanoseconds of the end of an intense neutron pulse, providing the ability to detect the prompt neutron emissions from fission events produced by the neutrons in concealed SNM on a much faster pulsing time scale than has been achieved by other techniques. Neutron-induced fission neutrons in 235U have been observed in the time intervals between pulses of 14-MeV neutrons from a deuterium-tritium electronic neutron generator. Initial measurements have emphasized the detection of SNM using thermal-neutron induced fission. Neutron pulsing and time-sequenced neutron counts were carried out on a hundreds of microseconds time scale, enabling the observation of prompt fission neutrons induced by the die-away of thermal neutrons following the 14-MeV pulse. A discussion of pulsed prompt-neutron measurements and of SiC detectors as well as initial measurement results will be presented.

  1. 3D laser imaging for concealed object identification

    NASA Astrophysics Data System (ADS)

    Berechet, Ion; Berginc, Gérard; Berechet, Stefan

    2014-09-01

    This paper deals with new optical non-conventional 3D laser imaging. Optical non-conventional imaging explores the advantages of laser imaging to form a three-dimensional image of the scene. 3D laser imaging can be used for threedimensional medical imaging, topography, surveillance, robotic vision because of ability to detect and recognize objects. In this paper, we present a 3D laser imaging for concealed object identification. The objective of this new 3D laser imaging is to provide the user a complete 3D reconstruction of the concealed object from available 2D data limited in number and with low representativeness. The 2D laser data used in this paper come from simulations that are based on the calculation of the laser interactions with the different interfaces of the scene of interest and from experimental results. We show the global 3D reconstruction procedures capable to separate objects from foliage and reconstruct a threedimensional image of the considered object. In this paper, we present examples of reconstruction and completion of three-dimensional images and we analyse the different parameters of the identification process such as resolution, the scenario of camouflage, noise impact and lacunarity degree.

  2. Target Speaker Detection with Concealed EEG Around the Ear.

    PubMed

    Mirkovic, Bojana; Bleichner, Martin G; De Vos, Maarten; Debener, Stefan

    2016-01-01

    Target speaker identification is essential for speech enhancement algorithms in assistive devices aimed toward helping the hearing impaired. Several recent studies have reported that target speaker identification is possible through electroencephalography (EEG) recordings. If the EEG system could be reduced to acceptable size while retaining the signal quality, hearing aids could benefit from the integration with concealed EEG. To compare the performance of a multichannel around-the-ear EEG system with high-density cap EEG recordings an envelope tracking algorithm was applied in a competitive speaker paradigm. The data from 20 normal hearing listeners were concurrently collected from the traditional state-of-the-art laboratory wired EEG system and a wireless mobile EEG system with two bilaterally-placed around-the-ear electrode arrays (cEEGrids). The results show that the cEEGrid ear-EEG technology captured neural signals that allowed the identification of the attended speaker above chance-level, with 69.3% accuracy, while cap-EEG signals resulted in the accuracy of 84.8%. Further analyses investigated the influence of ear-EEG signal quality and revealed that the envelope tracking procedure was unaffected by variability in channel impedances. We conclude that the quality of concealed ear-EEG recordings as acquired with the cEEGrid array has potential to be used in the brain-computer interface steering of hearing aids. PMID:27512364

  3. Passive millimeter-wave imaging for concealed article detection

    NASA Astrophysics Data System (ADS)

    Lovberg, John A.; Galliano, Joseph A., Jr.; Clark, Stuart E.

    1997-02-01

    Passive-millimeter-wave imaging (PMI) provides a powerful sensing tool for law enforcement, allowing an unobtrusive means for detecting concealed weapons, explosives, or contraband on persons or in baggage. Natural thermal emissions at millimeter wavelengths from bodies, guns, explosives, and other articles pass easily through clothing or other concealment materials, where they can be detected and converted into conventional 2-dimensional images. A new implementation of PMI has demonstrated a large-area, near- real-time staring capability for personnel inspection at standoff ranges of greater than 10 meters. In this form, PMI does not require operator cuing based on subjective 'profiles' of suspicious appearance or behaviors, which may otherwise be construed as violations of civil rights. To the contrary, PMI detects and images heat generated by any object with no predisposition as to its nature or function (e.g. race or gender of humans). As a totally passive imaging tool, it generates no radio-frequency or other radiation which might raise public health concerns. Specifics of the new PMI architecture are presented along with a host of imaging data representing the current state- of-the-art.

  4. Concealed Threat Detection at Multiple Frames-per-second

    SciTech Connect

    Chang, J T

    2005-11-08

    In this LDRD project, our research purpose is to investigate the science and technology necessary to enable real-time array imaging as a rapid way to detect hidden threats through obscurants such as smoke, fog, walls, doors, and clothing. The goal of this research is to augment the capabilities of protective forces in concealed threat detection. In the current context, threats include people as well as weapons. In most cases, security personnel must make very fast assessments of a threat based upon limited amount of data. Among other attributes, UWB has been shown and quantified to penetrate and propagate through many materials (wood, some concretes, non-metallic building materials, some soils, etc.) while maintaining high range resolution. We have build collaborations with university partners and government agencies. We have considered the impact of psychometrics on target recognition and identification. Specifically we have formulated images in real-time that will engage the user's vision system in a more active way to enhance image interpretation capabilities. In this project, we are researching the use of real time (field programmable gate arrays) integrated with high resolution (cm scale), ultra wide band (UWB) electromagnetic signals for imaging personnel through smoke and walls. We evaluated the ability of real-time UWB imaging for detecting smaller objects, such as concealed weapons that are carried by the obscured personnel. We also examined the cognitive interpretation process of real time UWB electromagnetic images.

  5. When Concealed Handgun Licensees Break Bad: Criminal Convictions of Concealed Handgun Licensees in Texas, 2001–2009

    PubMed Central

    Nwaiwu, Obioma; McMaughan Moudouni, Darcy K.; Edwards, Rachel; Lin, Szu-hsuan

    2013-01-01

    Objectives. We explored differences in criminal convictions between holders and nonholders of a concealed handgun license (CHL) in Texas. Methods. The Texas Department of Public Safety (DPS) provides annual data on criminal convictions of holders and nonholders of CHLs. We used 2001 to 2009 DPS data to investigate the differences in the distribution of convictions for these 2 groups across 9 types of criminal offenses. We calculated z scores for the differences in the types of crimes for which CHL holders and nonholders were convicted. Results. CHL holders were much less likely than nonlicensees to be convicted of crimes. Most nonholder convictions involved higher-prevalence crimes (burglary, robbery, or simple assault). CHL holders’ convictions were more likely to involve lower-prevalence crimes, such as sexual offenses, gun offenses, or offenses involving a death. Conclusions. Our results imply that expanding the settings in which concealed carry is permitted may increase the risk of specific types of crimes, some quite serious in those settings. These increased risks may be relatively small. Nonetheless, policymakers should consider these risks when contemplating reducing the scope of gun-free zones. PMID:23153139

  6. 27 CFR 447.62 - False statements or concealment of facts.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO... IMPLEMENTS OF WAR Penalties, Seizures and Forfeitures § 447.62 False statements or concealment of facts. Any... fact or fails to state a material fact required to be stated therein or necessary to make...

  7. 27 CFR 447.62 - False statements or concealment of facts.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO... IMPLEMENTS OF WAR Penalties, Seizures and Forfeitures § 447.62 False statements or concealment of facts. Any... fact or fails to state a material fact required to be stated therein or necessary to make...

  8. 27 CFR 447.62 - False statements or concealment of facts.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO... IMPLEMENTS OF WAR Penalties, Seizures and Forfeitures § 447.62 False statements or concealment of facts. Any... fact or fails to state a material fact required to be stated therein or necessary to make...

  9. 27 CFR 447.62 - False statements or concealment of facts.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO... IMPLEMENTS OF WAR Penalties, Seizures and Forfeitures § 447.62 False statements or concealment of facts. Any... fact or fails to state a material fact required to be stated therein or necessary to make...

  10. 27 CFR 447.62 - False statements or concealment of facts.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO... IMPLEMENTS OF WAR Penalties, Seizures and Forfeitures § 447.62 False statements or concealment of facts. Any... fact or fails to state a material fact required to be stated therein or necessary to make...

  11. Error robustness evaluation of H.264/MPEG-4 AVC

    NASA Astrophysics Data System (ADS)

    Halbach, Till; Olsen, Steffen

    2004-01-01

    The robustness of the recently ratified video compression standard H.264/MPEG-4 AVC against channel errors is evaluated with the focus on rate distortion matters. After a brief introduction of the standard and an explanation of its error-resistant features, it is investigated how the error resilience tools of H.264 can be deployed best for packet-wise transmission as in ATM, H.323, and IP-based services. Further, the performances of two error concealment strategies for use in an H.264-conform decoder are compared to each other.

  12. Regulatory focus moderates the social performance of individuals who conceal a stigmatized identity.

    PubMed

    Newheiser, Anna-Kaisa; Barreto, Manuela; Ellemers, Naomi; Derks, Belle; Scheepers, Daan

    2015-12-01

    People often choose to hide a stigmatized identity to avoid bias. However, hiding stigma can disrupt social interactions. We considered whether regulatory focus qualifies the social effects of hiding stigma by examining interactions in which stigmatized participants concealed a devalued identity from non-stigmatized partners. In the Prevention Focus condition, stigmatized participants were instructed to prevent a negative impression by concealing the identity; in the Promotion Focus condition, they were instructed to promote a positive impression by concealing the identity; in the Control condition, they were simply asked to conceal the identity. Both non-stigmatized partners and independent raters rated the interactions more positively in the Promotion Focus condition. Thus, promotion focus is interpersonally beneficial for individuals who conceal a devalued identity. PMID:25780853

  13. Multi-channel millimeter wave image registration and segmentation for concealed object detection

    NASA Astrophysics Data System (ADS)

    Lee, Dong-Su; Yeom, Seokwon; Son, Jung-Young; Kim, Shin-Hwan

    2010-04-01

    We address an image registration and segmentation method to detect concealed objects captured by passive millimeter wave (MMW) imaging. Passive MMW imaging can create interpretable imagery on the objects concealed under clothing. Due to the penetrating property of the MMW imaging, the MMW imaging system is often employed for the security and defense system. In this paper, we utilize a multi-channel PMMW imaging system operating at the 8 mm regime with linear polarization. Image registration and segmentation are performed to detect concealed objects under clothing. The registration is preceded to align different channel images by means of geometric feature extraction and a matching process. The Linde-Buzo-Gray (LBG) vector quantization with multi-channel information is adopted to segment the concealed object from the body area. In the experiment, the automated image registration and segmentation are performed with various concealed objects including a metal axe and a liquid container.

  14. Selection of food patches by sympatric herbivores in response to concealment and distance from a refuge.

    PubMed

    Crowell, Miranda M; Shipley, Lisa A; Camp, Meghan J; Rachlow, Janet L; Forbey, Jennifer S; Johnson, Timothy R

    2016-05-01

    Small herbivores face risks of predation while foraging and are often forced to trade off food quality for safety. Life history, behaviour, and habitat of predator and prey can influence these trade-offs. We compared how two sympatric rabbits (pygmy rabbit, Brachylagus idahoensis; mountain cottontail, Sylvilagus nuttallii) that differ in size, use of burrows, and habitat specialization in the sagebrush-steppe of western North America respond to amount and orientation of concealment cover and proximity to burrow refuges when selecting food patches. We predicted that both rabbit species would prefer food patches that offered greater concealment and food patches that were closer to burrow refuges. However, because pygmy rabbits are small, obligate burrowers that are restricted to sagebrush habitats, we predicted that they would show stronger preferences for greater cover, orientation of concealment, and patches closer to burrow refuges. We offered two food patches to individuals of each species during three experiments that either varied in the amount of concealment cover, orientation of concealment cover, or distance from a burrow refuge. Both species preferred food patches that offered greater concealment, but pygmy rabbits generally preferred terrestrial and mountain cottontails preferred aerial concealment. Only pygmy rabbits preferred food patches closer to their burrow refuge. Different responses to concealment and proximity to burrow refuges by the two species likely reflect differences in perceived predation risks. Because terrestrial predators are able to dig for prey in burrows, animals like pygmy rabbits that rely on burrow refuges might select food patches based more on terrestrial concealment. In contrast, larger habitat generalists that do not rely on burrow refuges, like mountain cottontails, might trade off terrestrial concealment for visibility to detect approaching terrestrial predators. This study suggests that body size and evolutionary adaptations

  15. Incidental radiographic finding of the concealed art of susuk.

    PubMed

    Devang Divakar, Darshan; Mavinapalla, Seema; Al Kheraif, Abdulaziz Abdullah; Ramakrishnaiah, Ravikumar; Abd Rahim, Muhammad Furqon Bin; Khan, Aftab Ahmed

    2016-07-01

    Susuk, or charm needles, are small, metallic needles inserted under the skin, considered to enhance beauty, health and luck. This hidden secret of inserting susuk is a traditional superstitious ritual, widely practiced among women of Southeast Asia. Here, we present an interesting case of incidental radiographic finding of the concealed art of susuk, which was exposed on a panoramic radiograph taken on a routine basis as a part of diagnostic work up at our centre. An orthopantomogram revealed bilateral metallic foreign bodies in the maxillo-facial region. Anamnestic data affirmed the practice of the body art of susuk. The charm needles were present in the orofacial region without the patient experiencing any pathological signs or symptoms. PMID:26271077

  16. Pathways Between Concealable Stigmatized Identities and Substance Misuse

    PubMed Central

    Talley, Amelia E.; Littlefield, Andrew K.

    2015-01-01

    Individuals with concealable stigmatized identities often possess no obviously devalued attributes, yet are at greater risk for problematic substance use compared to their privileged counterparts. We present a conceptual model, which proposes that identity-relevant content and characteristics have important implications for cognitive, affective, and behavioral consequences of stigma-related stress. In doing so, we synthesize stigma-related models from the extant literature and attempt to integrate these concepts with previous work detailing potential contributors to substance use behaviors specifically. Finally, we ask readers to consider the various ways in which the content and characteristics of an individual’s stigmatized identity might combine with situational and additional individual difference factors to influence the likelihood of substance misuse. PMID:26379766

  17. Temperature effects on polygraph detection of concealed information.

    PubMed

    MacNeill, A Luke; Bradley, M T

    2016-02-01

    Thermoregulatory influences on electrodermal and cardiovascular activity may interfere with the detection of concealed information using a polygraph. This possibility was assessed by means of a mock terrorism scenario. Seventy-two participants were assigned to either a guilty or an innocent role. They were given a polygraph test at one of three ambient temperatures: 10°C, 22°C, or 34°C. Among guilty participants, electrodermal and cardiovascular measures were least effective at 10°C. Electrodermal results were optimal at 22°C, whereas cardiovascular results were optimal at 34°C. Among innocent participants, the effectiveness of these same measures was not affected by ambient temperature. Temperature had no significant impact on respiration results within the guilty or the innocent groups. Taken together, these findings have implications for those who use polygraphs in uncontrolled testing environments. PMID:26435532

  18. Digital key for chaos communication performing time delay concealment.

    PubMed

    Nguimdo, Romain Modeste; Colet, Pere; Larger, Laurent; Pesquera, Luís

    2011-07-15

    We introduce a scheme that integrates a digital key in a phase-chaos electro-optical delay system for optical chaos communications. A pseudorandom binary sequence (PRBS) is mixed within the chaotic dynamics in a way that a mutual concealment is performed; e.g., the time delay is hidden by the binary sequence, and the PRBS is also masked by the chaos. In addition to bridging the gap between algorithmic symmetric key cryptography and chaos-based analog encoding, the proposed approach is intended to benefit from the complex algebra mixing between a (pseudorandom) Boolean variable, and another continuous time (chaotic) variable. The scheme also provides a large flexibility allowing for easy reconfigurations to communicate securely at a high bit rate between different systems. PMID:21838363

  19. Digital Key for Chaos Communication Performing Time Delay Concealment

    NASA Astrophysics Data System (ADS)

    Nguimdo, Romain Modeste; Colet, Pere; Larger, Laurent; Pesquera, Luís

    2011-07-01

    We introduce a scheme that integrates a digital key in a phase-chaos electro-optical delay system for optical chaos communications. A pseudorandom binary sequence (PRBS) is mixed within the chaotic dynamics in a way that a mutual concealment is performed; e.g., the time delay is hidden by the binary sequence, and the PRBS is also masked by the chaos. In addition to bridging the gap between algorithmic symmetric key cryptography and chaos-based analog encoding, the proposed approach is intended to benefit from the complex algebra mixing between a (pseudorandom) Boolean variable, and another continuous time (chaotic) variable. The scheme also provides a large flexibility allowing for easy reconfigurations to communicate securely at a high bit rate between different systems.

  20. Microwave-Spectral Signatures Would Reveal Concealed Objects

    NASA Technical Reports Server (NTRS)

    Arndt, G.; Ngo, P.; Carl, J. R.; Byerly, K.; Stolarcyzk, L.

    2004-01-01

    A proposed technique for locating concealed objects (especially small antipersonnel land mines) involves the acquisition and processing of spectral signatures over broad microwave frequency bands. This technique was conceived to overcome the weaknesses of older narrow- band electromagnetic techniques like ground-probing radar and low-frequency electromagnetic induction. Ground-probing radar is susceptible to false detections and/or interference caused by rocks, roots, air pockets, soil inhomogeneities, ice, liquid water, and miscellaneous buried objects other than those sought. Moreover, if the radar frequency happens to be one for which the permittivity of a sought object matches the permittivity of the surrounding soil or there is an unfavorable complex-amplitude addition of the radar reflection at the receiver, then the object is not detected. Low-frequency electromagnetic induction works well for detecting metallic objects, but the amounts of metal in plastic mines are often too small to be detectable. The potential advantage of the proposed technique arises from the fact that wideband spectral signatures generally contain more relevant information than do narrow-band signals. Consequently, spectral signatures could be used to make better decisions regarding whether concealed objects are present and whether they are the ones sought. In some cases, spectral signatures could provide information on the depths, sizes, shapes, and compositions of objects. An apparatus to implement the proposed technique (see Figure 1) could be assembled from equipment already in common use. Typically, such an apparatus would include a radio-frequency (RF) transmitter/receiver, a broad-band microwave antenna, and a fast personal computer loaded with appropriate software. In operation, the counter would be turned on, the antenna would be aimed at the ground or other mass suspected to contain a mine or other sought object, and the operating frequency would be swept over the band of

  1. Refractive Errors

    MedlinePlus

    ... and lens of your eye helps you focus. Refractive errors are vision problems that happen when the ... cornea, or aging of the lens. Four common refractive errors are Myopia, or nearsightedness - clear vision close ...

  2. Hypoxia in the St. Lawrence Estuary: How a Coding Error Led to the Belief that “Physics Controls Spatial Patterns”

    PubMed Central

    2015-01-01

    Two fundamental sign errors were found in a computer code used for studying the oxygen minimum zone (OMZ) and hypoxia in the Estuary and Gulf of St. Lawrence. These errors invalidate the conclusions drawn from the model, and call into question a proposed mechanism for generating OMZ that challenges classical understanding. The study in question is being cited frequently, leading the discipline in the wrong direction. PMID:26397371

  3. Theoretical analysis on the measurement errors of local 2D DIC: Part I temporal and spatial uncertainty quantification of displacement measurements

    DOE PAGESBeta

    Wang, Yueqi; Lava, Pascal; Reu, Phillip; Debruyne, Dimitri; Van Houtte, Paul

    2015-12-23

    This study presents a theoretical uncertainty quantification of displacement measurements by subset-based 2D-digital image correlation. A generalized solution to estimate the random error of displacement measurement is presented. The obtained solution suggests that the random error of displacement measurements is determined by the image noise, the summation of the intensity gradient in a subset, the subpixel part of displacement, and the interpolation scheme. The proposed method is validated with virtual digital image correlation tests.

  4. Decomposition of Concealed and Exposed Porcine Remains in the North Carolina Piedmont.

    PubMed

    Cammack, J A; Cohen, A C; Kreitlow, K L; Roe, R M; Watson, D W

    2016-01-01

    We examined the decomposition and subsequent insect colonization of small pig carrion (Sus scrofa (L.)) placed in concealed and open environments during spring, summer, and fall in Raleigh, North Carolina, as a model for juvenile human remains. Remains were concealed in simulated attics in three manners, ranging from minimal to well-concealed. Concealment had a significant effect on the insect community colonizing the remains across all three seasons; the beetles Necrobia rufipes (DeGeer) (Cleridae) and Dermestes maculatus (DeGeer) (Coleoptera: Dermestidae) were the only species indicative of remains located indoors, whereas numerous fly (Diptera: Calliphoridae, Muscidae, Sepsidae, and Piophilidae) and beetle (Coleoptera: Silphidae, Staphylinidae, and Histeridae) species and an ant species (Hymenoptera: Formicidae, Prenolepis sp.) were indicative of remains located outdoors. Season also significantly affected the insect species, particularly the blow flies (Diptera: Calliphoridae) colonizing remains: Lucilia illustris (Meigen) was indicative of the spring, Cochliomyia macellaria (F.) and Chrysomya megacephala (F.) were indicative of the summer, and Calliphora vicina Robineau-Desvoidy and Calliphora vomitoria (L.) were indicative of the fall. In addition, across all seasons, colonization was delayed by 35–768 h, depending on the degree of concealment. These differences among the insect communities across seasons and concealment treatments, and the effects of concealment on colonization indicate that such information is important and should to be considered when analyzing entomological evidence for criminal investigations. PMID:26590193

  5. A Concealed Barcode Identification System Using Terahertz Time-domain Spectroscopy

    NASA Astrophysics Data System (ADS)

    Guan, Yu; Yamamoto, Manabu; Kitazawa, Toshiyuki; Tripathi, Saroj R.; Takeya, Kei; Kawase, Kodo

    2015-03-01

    We present a concealed terahertz barcode/chipless tag to achieve remote identification through an obstructing material using terahertz radiation. We show scanned terahertz reflection spectral images of barcodes concealed by a thick obstacle. A concealed and double- side printed terahertz barcode structure is proposed, and we demonstrate that our design has better performance in definition than a single-side printed barcode using terahertz time-domain spectroscopy. This technique combines the benefits of a chipless tag to read encoded information covered by an optically opaque material with low cost and a simple fabrication process. Simulations are also described, along with an explanation of the principle of the terahertz barcode identification system.

  6. Tests of a Dynamic Systems Account of the A-not-B Error: The Influence of Prior Experience on the Spatial Memory Abilities of Two-Year-Olds.

    ERIC Educational Resources Information Center

    Spencer, John P.; Smith, Linda B.; Thelen, Esther

    2001-01-01

    Five experiments tested hypothesis that the A-not-B error results from general processes that make goal-directed actions to remembered locations. Findings showed that 2-year-olds' performance on the A trial was accurate. When the object was hidden at Location B, searches after 10-second delay were biased in the direction of Location A. This bias…

  7. Errors on interrupter tasks presented during spatial and verbal working memory performance are linearly linked to large-scale functional network connectivity in high temporal resolution resting state fMRI.

    PubMed

    Magnuson, Matthew Evan; Thompson, Garth John; Schwarb, Hillary; Pan, Wen-Ju; McKinley, Andy; Schumacher, Eric H; Keilholz, Shella Dawn

    2015-12-01

    The brain is organized into networks composed of spatially separated anatomical regions exhibiting coherent functional activity over time. Two of these networks (the default mode network, DMN, and the task positive network, TPN) have been implicated in the performance of a number of cognitive tasks. To directly examine the stable relationship between network connectivity and behavioral performance, high temporal resolution functional magnetic resonance imaging (fMRI) data were collected during the resting state, and behavioral data were collected from 15 subjects on different days, exploring verbal working memory, spatial working memory, and fluid intelligence. Sustained attention performance was also evaluated in a task interleaved between resting state scans. Functional connectivity within and between the DMN and TPN was related to performance on these tasks. Decreased TPN resting state connectivity was found to significantly correlate with fewer errors on an interrupter task presented during a spatial working memory paradigm and decreased DMN/TPN anti-correlation was significantly correlated with fewer errors on an interrupter task presented during a verbal working memory paradigm. A trend for increased DMN resting state connectivity to correlate to measures of fluid intelligence was also observed. These results provide additional evidence of the relationship between resting state networks and behavioral performance, and show that such results can be observed with high temporal resolution fMRI. Because cognitive scores and functional connectivity were collected on nonconsecutive days, these results highlight the stability of functional connectivity/cognitive performance coupling. PMID:25563228

  8. CW THz scanning transmission imaging for concealed object detection

    NASA Astrophysics Data System (ADS)

    Li, Qi; Yao, Rui; Yin, Qiguo; Ding, Shenghui; Wang, Qi

    2009-07-01

    In the paper, the two-dimensional THz imaging methods are described. The SIFIR-50 FPL Far-Infrared Laser is used as the THz source. The output frequency is 2.5THz in the experiment, because the THz laser operates steadily at this frequency. The P4-42 detector works at room temperature and offers relatively high sensitivity. The software of THz imaging system is self-designed, and it plays a crucial role in this imaging system because it controls nearly all the operations of this system, including the two-dimensional scanning, image data collection, image data storage, image display and image processing. Utilizing this setup, THz transmission images of concealed objects are obtained. In the experiment, a bottle cap and a plastic board covered by reflective materials are chosen as the imaging objects; paper and Teflon are placed before the object to test the transmission imaging effect. The experimental results show that this imaging system can generate clear images.

  9. Concealed Utility Route Planning: Guidelines for Indian Residential Buildings

    NASA Astrophysics Data System (ADS)

    Gupta, Sumana

    2015-09-01

    Utility lines, particularly in Indian residential buildings, are networked in a haphazard manner to economize and expedite the process of laying conduits. They remain concealed behind the wall finish exposing problems later. The conventional method adopted while laying the routes does not economize the process rather it damages the newly constructed building. After an investigation of the practiced methods through reconnaissance, a construction vocabulary in form of guidelines is recommended for brick residential construction. Taking advantage of the versatility of a brick and considering it as an indigenous construction material of the Indian plains, a judicious way of brick laying can create horizontal and vertical chase at specified heights to receive the utility conduits. The method will simplify, expedite, and organize the utility routes and provide a seamless connection of major utility lines in a residential building. It will aid in future augmentation, easy maintenance, cost reduction and time involved in construction. Practical training of masons and awareness of relevant contractors at site is required through trained site supervisors. The proposed method merits further investigation for inclusion in academic curriculums of the trade.

  10. Countermeasure mechanisms in a P300-based concealed information test.

    PubMed

    Meixner, John B; Rosenfeld, J Peter

    2010-01-01

    We recently introduced an accurate and countermeasure (CM)-resistant P300-based deception detection test (J.P. Rosenfeld et al., 2008). When subjects use CMs to all irrelevant items in the test, the probe P300 is increased rather than reduced, as in previous P300-based deception protocols, allowing detection of CM users. Evidence herein suggests this is partly due to an omit effect; the probe was the only uncountered item. Three groups were tested: a guilty omit probe group performed an explicit response to each irrelevant item but not to the probe, an innocent omit irrelevant group saw only irrelevant items and omitted a response to one item, and a guilty no omit group had a concealed information item as probe and performed an explicit response to each. We found a greater P300 amplitude to probes in the guilty omit probe condition as compared with the other two conditions, indicating a P300 enhancing effect of omitting a response to a single stimulus. PMID:19761523

  11. Severe forms of concealed penis without hypospadias: Surgical strategies

    PubMed Central

    de Jesus, Lisieux Eyer; Dekermacher, Samuel; Anderson, Kleber M.

    2015-01-01

    Introduction: Concealed penis (CP) may vary in severity and includes megaprepuce (MP) as a variant. Many different surgical strategies have been described in order to maximize penile exposure and to deal with skin deficiency. We describe the strategies that we use to overcome technical problems in severe cases of CP. Materials and Methods: Six consecutive cases of severe CP (including 3 with MP) were treated in a 2-year period between January 2011 and April 2013. These patients were treated using extensive degloving, removal of dysplastic dartos, Alexander's preputial flap, scrotal flaps and skin grafts. Three patients had been previously circumcised. Cases associated with hypospadias, obesity, disorders of sexual differentiation and micropenises were excluded. Results: All six patients attained good results, with good exposure of the penis, ability to void standing with a well-directed flow and reasonable esthetic results. A technical algorithm for the treatment of primary or recurring cases of CP is proposed. Conclusion: Alexander’ s distally based ventral preputial flap is a useful technical resource to treat MP cases. Free skin grafts and/or laterally based scrotal flaps may be used to cover the penis after release in severe cases of CP. PMID:26604447

  12. The neural correlates of identity faking and concealment: an FMRI study.

    PubMed

    Ding, Xiao Pan; Du, Xiaoxia; Lei, Du; Hu, Chao Super; Fu, Genyue; Chen, Guopeng

    2012-01-01

    The neural basis of self and identity has received extensive research. However, most of these existing studies have focused on situations where the internal representation of the self is consistent with the external one. The present study used fMRI methodology to examine the neural correlates of two different types of identity conflict: identity faking and concealment. Participants were presented with a sequence of names and asked to either conceal their own identity or fake another one. The results revealed that the right insular cortex and bilaterally inferior frontal gyrus were more active for identity concealment compared to the control condition, whereas identity faking elicited a significantly larger percentage signal increase than the control condition in the right superior frontal gyrus, left calcarine, and right caudate. These results suggest that different neural systems associated with both identity processing and deception were involved in identity concealment and faking. PMID:23144915

  13. Concealed pregnancy and newborn abandonment: a contemporary 21st century issue. Part 1.

    PubMed

    Tighe, Sylvia Murphy; Lalor, Joan

    2016-06-01

    This two-part series explores the phenomenon of concealed pregnancy and the association with newborn abandonment, with reference to recent cases of public interest. In Part 1 we focus on defining concealed pregnancy as a complex process which involves hiding a pregnancy, that can lead to tragic consequences such as maternal or neonatal morbidity or mortality (Murphy Tighe and Lalor 2016; Chen et al 2007).The psychosocial issues involved will also be presented (Murphy Tighe and Lalor 2016). PMID:27451485

  14. Digital spatial data for observed, predicted, and misclassification errors for observations in the training dataset for nitrate and arsenic concentrations in basin-fill aquifers in the Southwest Principal Aquifers study area

    USGS Publications Warehouse

    McKinney, Tim S.; Anning, David W.

    2012-01-01

    This product "Digital spatial data for observed, predicted, and misclassification errors for observations in the training dataset for nitrate and arsenic concentrations in basin-fill aquifers in the Southwest Principal Aquifers study area" is a 1:250,000-scale point spatial dataset developed as part of a regional Southwest Principal Aquifers (SWPA) study (Anning and others, 2012). The study examined the vulnerability of basin-fill aquifers in the southwestern United States to nitrate contamination and arsenic enrichment. Statistical models were developed by using the random forest classifier algorithm to predict concentrations of nitrate and arsenic across a model grid that represents local- and basin-scale measures of source, aquifer susceptibility, and geochemical conditions.

  15. Impulse radar imaging system for concealed object detection

    NASA Astrophysics Data System (ADS)

    Podd, F. J. W.; David, M.; Iqbal, G.; Hussain, F.; Morris, D.; Osakue, E.; Yeow, Y.; Zahir, S.; Armitage, D. W.; Peyton, A. J.

    2013-10-01

    Electromagnetic systems for imaging concealed objects at checkpoints typically employ radiation at millimetre and terahertz frequencies. These systems have been shown to be effective and provide a sufficiently high resolution image. However there are difficulties and current electromagnetic systems have limitations particularly in accurately differentiating between threat and innocuous objects based on shape, surface emissivity or reflectivity, which are indicative parameters. In addition, water has a high absorption coefficient at millimetre wavelength and terahertz frequencies, which makes it more difficult for these frequencies to image through thick damp clothing. This paper considers the potential of using ultra wideband (UWB) in the low gigahertz range. The application of this frequency band to security screening appears to be a relatively new field. The business case for implementing the UWB system has been made financially viable by the recent availability of low-cost integrated circuits operating at these frequencies. Although designed for the communication sector, these devices can perform the required UWB radar measurements as well. This paper reports the implementation of a 2 to 5 GHz bandwidth linear array scanner. The paper describes the design and fabrication of transmitter and receiver antenna arrays whose individual elements are a type of antipodal Vivaldi antenna. The antenna's frequency and angular response were simulated in CST Microwave Studio and compared with laboratory measurements. The data pre-processing methods of background subtraction and deconvolution are implemented to improve the image quality. The background subtraction method uses a reference dataset to remove antenna crosstalk and room reflections from the dataset. The deconvolution method uses a Wiener filter to "sharpen" the returned echoes which improves the resolution of the reconstructed image. The filter uses an impulse response reference dataset and a signal

  16. Medication Errors

    MedlinePlus

    ... to reduce the risk of medication errors to industry and others at FDA. Additionally, DMEPA prospectively reviews ... List of Abbreviations Regulations and Guidances Guidance for Industry: Safety Considerations for Product Design to Minimize Medication ...

  17. Medication Errors

    MedlinePlus

    Medicines cure infectious diseases, prevent problems from chronic diseases, and ease pain. But medicines can also cause harmful reactions if not used ... You can help prevent errors by Knowing your medicines. Keep a list of the names of your ...

  18. Robust identification of concealed dangerous substances using THz imaging spectroscopy

    NASA Astrophysics Data System (ADS)

    Nystad, Helle E.; Haakestad, Magnus W.; van Rheenen, Arthur D.

    2015-05-01

    False alarm rates must be kept sufficiently low if a method to detect and identify objects or substances is to be implemented in real life applications. This is also true when trying to detect and identify dangerous substances such as explosives and drugs that are concealed in packaging materials. THz technology may be suited to detect these substances, especially when imaging and spectroscopy are combined. To achieve reasonable throughput, the detection and identification process must be automated and this implies reliance on algorithms to perform this task, rather than human beings. The identification part of the algorithm must compare spectral features of the unknown substance with those in a library of features and determining the distance, in some sense, between these features. If the distance is less than some defined threshold a match is declared. In this paper we consider two types of spectral characteristic that are derived from measured time-domain signals measured in the THz regime: the absorbance and its derivative. Also, we consider two schemes to measure the distance between the unknown and library characteristics: Spectral Angle Mapping (SAM) and Principal Component Analysis (PCA). Finally, the effect of windowing of the measured time-domain signal on the performance of the algorithms is studied, by varying the Blackman-Harris (B-H) window width. Algorithm performance is quantified by studying the receiver-operating characteristics (ROC). For the data considered in this study we conclude that the best performance is obtained when the derivative of the absorbance is used in combination with a narrow B-H window and SAM. SAM is a more straight-forward method and requires no large training data sets and tweaking.

  19. Using fMRI to decode true thoughts independent of intention to conceal.

    PubMed

    Yang, Zhi; Huang, Zirui; Gonzalez-Castillo, Javier; Dai, Rui; Northoff, Georg; Bandettini, Peter

    2014-10-01

    Multi-variate pattern analysis (MVPA) applied to BOLD-fMRI has proven successful at decoding complicated fMRI signal patterns associated with a variety of cognitive processes. One cognitive process, not yet investigated, is the mental representation of "Yes/No" thoughts that precede the actual overt response to a binary "Yes/No" question. In this study, we focus on examining: (1) whether spatial patterns of the hemodynamic response carry sufficient information to allow reliable decoding of "Yes/No" thoughts; and (2) whether decoding of "Yes/No" thoughts is independent of the intention to respond honestly or dishonestly. To achieve this goal, we conducted two separate experiments. Experiment 1, collected on a 3T scanner, examined the whole brain to identify regions that carry sufficient information to permit significantly above-chance prediction of "Yes/No" thoughts at the group level. In Experiment 2, collected on a 7T scanner, we focused on the regions identified in Experiment 1 to examine the capability of achieving high decoding accuracy at the single subject level. A set of regions--namely right superior temporal gyrus, left supra-marginal gyrus, and left middle frontal gyrus--exhibited high decoding power. Decoding accuracy for these regions increased with trial averaging. When 18 trials were averaged, the median accuracies were 82.5%, 77.5%, and 79.5%, respectively. When trials were separated according to deceptive intentions (set via experimental cues), and classifiers were trained on honest trials, but tested on trials where subjects were asked to deceive, the median accuracies of these regions still reached 66%, 75%, and 78.5%. These results provide evidence that concealed "Yes/No" thoughts are encoded in the BOLD signal, retaining some level of independence from the subject's intentions to answer honestly or dishonestly. These findings also suggest the theoretical possibility for more efficient brain-computer interfaces where subjects only need to think

  20. How many more guns?: Estimating the effect of allowing licensed concealed handguns on a college campus.

    PubMed

    Bouffard, Jeffrey A; Nobles, Matt R; Wells, William; Cavanaugh, Michael R

    2012-01-01

    Among other arguments, advocates for lifting bans on carrying concealed handguns on campus propose that this would increase the prevalence of legitimately carried handguns, which might then deter crimes or be used to intervene in campus shooting incidents like the one that took place at Virginia Tech in 2007. Opponents suggest that increased prevalence of concealed handguns would lead to increases in other negative consequences, such as accidental shootings. Little empirical research has examined the potential outcomes of such a policy change, nor has existing research examined the prerequisite issue of whether lifting these bans would result in substantial increases in the prevalence of concealed handguns among students. Using a sample of undergraduate classrooms selected from five academic buildings at a public university in Texas, this study examines the potential impact of lifting the concealed handgun ban on the likelihood that a given classroom would contain at least one legally carried handgun. Results reveal that the impact of potential policy changes in this area vary based on the building under consideration and the measure of potential handgun prevalence. Limitations of the study and implications for future research on the issue of concealed handgun carrying on college campuses are discussed. PMID:21810786

  1. Biomimetic Concealing of PLGA Microspheres in a 3D Scaffold to Prevent Macrophage Uptake.

    PubMed

    Minardi, Silvia; Corradetti, Bruna; Taraballi, Francesca; Sandri, Monica; Martinez, Jonathan O; Powell, Sebastian T; Tampieri, Anna; Weiner, Bradley K; Tasciotti, Ennio

    2016-03-01

    Scaffolds functionalized with delivery systems for the release of growth factors is a robust strategy to enhance tissue regeneration. However, after implantation, macrophages infiltrate the scaffold, eventually initiating the degradation and clearance of the delivery systems. Herein, it is hypothesized that fully embedding the poly(d,l-lactide-co-glycolide acid) microspheres (MS) in a highly structured collagen-based scaffold (concealing) can prevent their detection, preserving the integrity of the payload. Confocal laser microscopy reveals that non-embedded MS are easily internalized; when concealed, J774 and bone marrow-derived macrophages (BMDM) cannot detect them. This is further demonstrated by flow cytometry, as a tenfold decrease is found in the number of MS engulfed by the cells, suggesting that collagen can cloak the MS. This correlates with the amount of nitric oxide and tumor necrosis factor-α produced by J774 and BMDM in response to the concealed MS, comparable to that found for non-functionalized collagen scaffolds. Finally, the release kinetics of a reporter protein is preserved in the presence of macrophages, only when MS are concealed. The data provide detailed strategies for fabricating three dimensional (3D) biomimetic scaffolds able to conceal delivery systems and preserve the therapeutic molecules for release. PMID:26797709

  2. Exploring the characteristics of the attentional blink paradigm when used to discover concealed knowledge.

    PubMed

    Niziurski, Julie; Andre, Jeffrey

    2015-12-01

    Ganis and Patnaik (Appl Psychophysiol Biofeedback 34:189-196, 2009) reported that the attentional blink paradigm using faces could be used to detect the presence of concealed knowledge. The attentional blink is defined as the inability to successfully detect the second of two target items presented within a short inter-stimulus interval. The present study tested the use of the attentional blink paradigm in a concealed knowledge test by investigating the effect that familiar faces may have on the attentional blink. Participants completed 200 trials where they were told to look for the same familiar target (Target 2; actor Brad Pitt) that was intermixed with neutral face stimuli and one other familiar face (Target 1; actor George Clooney). Target 1 was to act as the concealed knowledge as participants familiar with Target 1 would be distracted by his unannounced presence and report not seeing Target 2 thereby showing an attentional blink. Despite all participants being familiar with Target 2, an attentional blink still occurred, but with higher than normal Target 2 accuracy rates. Overall, we found support for using the AB paradigm with the concealed knowledge test; however, a possible countermeasure to the attentional blink is familiarity with Target 2 as eight of 21 participants who recognized Target 1 (the concealed knowledge) were also able to detect Target 2 on 100 % of the trials where Target 1's presence should have created an attentional blink. PMID:26162299

  3. A multifaceted active swept millimetre-wave approach to the detection of concealed weapons

    NASA Astrophysics Data System (ADS)

    Andrews, David A.; Bowring, Nicholas; Rezgui, Nacer D.; Southgate, Matthew; Guest, Elizabeth; Harmer, Stuart; Atiah, Ali

    2008-10-01

    The effective detection of concealed handguns and knives in open spaces is a major challenge for police and security services round the world. Here an automated technique for the detection of concealed handguns that relies on active swept illumination of the target to induce both scattered fields and aspect independent responses from the concealed object is presented. The broad frequency sweep permits information about the object's size to be deduced from transformations into the time/distance domain. In our experiments we collect multiple sweeps across the frequency range at very high speed, which produces a time evolved response from the target, from both normal and cross polarized detectors. From this we extract characteristic signatures from the responses that allow those from innocent objects (e.g. mobile phones, keys etc) to be distinguished from handguns. Information about the optical depth separation of the scattering corners and the degree and shape of cross polarization allows a neural network to successfully concealed handguns. Finally this system utilizes a range of signal processing techniques ranging from correlation between cross and normally polarized scattering through to a neural network classifier to deduce whether a concealed weapon is present.

  4. Use of Near-Infrared Spectroscopy and Chemometrics for the Nondestructive Identification of Concealed Damage in Raw Almonds (Prunus dulcis).

    PubMed

    Rogel-Castillo, Cristian; Boulton, Roger; Opastpongkarn, Arunwong; Huang, Guangwei; Mitchell, Alyson E

    2016-07-27

    Concealed damage (CD) is defined as a brown discoloration of the kernel interior (nutmeat) that appears only after moderate to high heat treatment (e.g., blanching, drying, roasting, etc.). Raw almonds with CD have no visible defects before heat treatment. Currently, there are no screening methods available for detecting CD in raw almonds. Herein, the feasibility of using near-infrared (NIR) spectroscopy between 1125 and 2153 nm for the detection of CD in almonds is demonstrated. Almond kernels with CD have less NIR absorbance in the region related with oil, protein, and carbohydrates. With the use of partial least squares discriminant analysis (PLS-DA) and selection of specific wavelengths, three classification models were developed. The calibration models have false-positive and false-negative error rates ranging between 12.4 and 16.1% and between 10.6 and 17.2%, respectively. The percent error rates ranged between 8.2 and 9.2%. Second-derivative preprocessing of the selected wavelength resulted in the most robust predictive model. PMID:27309980

  5. The neural substrates of deliberative decision making: contrasting effects of hippocampus lesions on performance and vicarious trial-and-error behavior in a spatial memory task and a visual discrimination task

    PubMed Central

    Bett, David; Allison, Elizabeth; Murdoch, Lauren H.; Kaefer, Karola; Wood, Emma R.; Dudchenko, Paul A.

    2012-01-01

    Vicarious trial-and-errors (VTEs) are back-and-forth movements of the head exhibited by rodents and other animals when faced with a decision. These behaviors have recently been associated with prospective sweeps of hippocampal place cell firing, and thus may reflect a rodent model of deliberative decision-making. The aim of the current study was to test whether the hippocampus is essential for VTEs in a spatial memory task and in a simple visual discrimination (VD) task. We found that lesions of the hippocampus with ibotenic acid produced a significant impairment in the accuracy of choices in a serial spatial reversal (SR) task. In terms of VTEs, whereas sham-lesioned animals engaged in more VTE behavior prior to identifying the location of the reward as opposed to repeated trials after it had been located, the lesioned animals failed to show this difference. In contrast, damage to the hippocampus had no effect on acquisition of a VD or on the VTEs seen in this task. For both lesion and sham-lesion animals, adding an additional choice to the VD increased the number of VTEs and decreased the accuracy of choices. Together, these results suggest that the hippocampus may be specifically involved in VTE behavior during spatial decision making. PMID:23115549

  6. Influence of low-spatial frequency ripples in machined potassium dihydrogen phosphate crystal surfaces on wavefront errors based on the wavelet method

    NASA Astrophysics Data System (ADS)

    Chen, Wanqun; Sun, Yazhou

    2015-02-01

    In using a fly cutter to machine potassium dihydrogen phosphate (KDP) crystals, rippling in machined surfaces will remain that will have a significant impact on the optical performance. An analysis of these low-spatial frequency ripples is presented and its influence on the root-mean-squared gradient (GRMS) of the wavefront discussed. A frequency analysis of the machined KDP crystal surfaces is performed using wavelet transform and power spectral density methods. Based on a classification of the time frequencies for these macroripples, the multimode vibration of the machine tool is found to be the main reason surface ripples are produced. Improvements in the machine design parameters are proposed to limit such effects on the wavefront performance of the KDP crystal.

  7. Systematic lossy forward error protection for error-resilient digital video broadcasting

    NASA Astrophysics Data System (ADS)

    Rane, Shantanu D.; Aaron, Anne; Girod, Bernd

    2004-01-01

    We present a novel scheme for error-resilient digital video broadcasting,using the Wyner-Ziv coding paradigm. We apply the general framework of systematic lossy source-channel coding to generate a supplementary bitstream that can correct transmission errors in the decoded video waveform up to a certain residual distortion. The systematic portion consists of a conventional MPEG-coded bitstream, which is transmitted over the error-prone channel without forward error correction.The supplementary bitstream is a low rate representation of the transmitted video sequence generated using Wyner-Ziv encoding. We use the conventionally decoded error-concealed MPEG video sequence as side information to decode the Wyner-Ziv bits. The decoder combines the error-prone side information and the Wyner-Ziv description to yield an improved decoded video signal. Our results indicate that, over a large range of channel error probabilities, this scheme yields superior video quality when compared with traditional forward error correction techniques employed in digital video broadcasting.

  8. The role of psychological flexibility in the relationship between self-concealment and disordered eating symptoms.

    PubMed

    Masuda, Akihiko; Boone, Matthew S; Timko, C Alix

    2011-04-01

    The present cross-sectional study investigated whether psychological flexibility mediates the association between self-concealment and disordered eating (DE) symptoms among non-clinical college students. Data of 209 male and female participants (nfemale =165), aged 18-22 years old, were used for analyses. Self-concealment was found to be positively associated with DE symptoms (i.e., general eating disorder symptoms and eating disorder-related cognitions) and negatively associated with psychological flexibility. Psychological flexibility was inversely associated with DE symptoms. Finally, psychological flexibility was found to mediate the association between self-concealment and DE symptoms after accounting for gender, ethnic background, and body mass index (BMI). PMID:21385643

  9. Real-time computational processing and implementation for concealed object detection

    NASA Astrophysics Data System (ADS)

    Lee, Dong-Su; Yeom, Seokwon; Chang, YuShin; Lee, Mun-Kyo; Jung, Sang-Won

    2012-07-01

    Millimeter wave (MMW) readily penetrates fabrics, thus it can be used to detect objects concealed under clothing. A passive MMW imaging system can operate as a stand-off type sensor that scans people both indoors and outdoors. However, because of the diffraction limit and low signal level, the imaging system often suffers from low image quality. Therefore, suitable computational processing would be required for automatic analysis of the images. The authors present statistical and computational algorithms and their implementations for real-time concealed object detection. The histogram of the image is modeled as a Gaussian mixture distribution, and hidden object areas are segmented by a multilevel scheme involving the expectation-maximization algorithm. The complete algorithm has been implemented in both MATLAB and C++. Experimental and simulation results confirm that the implemented system can achieve real-time detection of concealed objects.

  10. Noradrenergic signaling in the medial prefrontal cortex and amygdala differentially regulates vicarious trial-and-error in a spatial decision-making task.

    PubMed

    Amemiya, Seiichiro; Kubota, Natsuko; Umeyama, Nao; Nishijima, Takeshi; Kita, Ichiro

    2016-01-15

    In uncertain choice situations, we deliberately search and evaluate possible options before taking an action. Once we form a preference regarding the current situation, we take an action more automatically and with less deliberation. In rats, the deliberation process can be seen in vicarious trial-and-error behavior (VTE), which is a head-orienting behavior toward options at a choice point. Recent neurophysiological findings suggest that VTE reflects the rat's thinking about future options as deliberation, expectation, and planning when rats feel conflict. VTE occurs depending on the demand: an increase occurs during initial learning, and a decrease occurs with progression in learning. However, the brain circuit underlying the regulation of VTE has not been thoroughly examined. In situations in which VTE often appears, the medial prefrontal cortex (mPFC) and the amygdala (AMY) are crucial for learning and decision making. Our previous study reported that noradrenaline regulates VTE. Here, to investigate whether the mPFC and AMY are involved in regulation of VTE, we examined the effects of local injection of clonidine, an alpha2 adrenergic autoreceptor agonist, into either region in rats during VTE and choice behavior during a T-maze choice task. Injection of clonidine into either region impaired selection of the advantageous choice in the task. Furthermore, clonidine injection into the mPFC suppressed occurrence of VTE in the early phase of the task, whereas injection into the AMY inhibited the decrease in VTE in the later phase and thus maintained a high level of VTE throughout the task. These results suggest that the mPFC and AMY play a role in the increase and decrease in VTE, respectively, and that noradrenergic mechanisms mediate the dynamic regulation of VTE over experiences. PMID:26341318

  11. Combining the P300-complex trial-based concealed information test and the reaction time-based autobiographical implicit association test in concealed memory detection.

    PubMed

    Hu, Xiaoqing; Rosenfeld, J Peter

    2012-08-01

    Despite the P300-concealed information test's validity in detecting concealed memory when it is conducted immediately after the mock crime, whether the P300-CIT's detection efficiency is moderated by time delay remains unknown. Here, we conducted a mock crime study in which guilty participants were tested immediately after the mock crime or 1 month later. An innocent group was also tested. Assuming that the autobiographical Implicit Association Test (aIAT) and the P300-CIT rely on nonoverlapping mechanisms for memory detection, participants were tested using both the P300-CIT and the reaction time (RT)-based aIAT. Results suggested that the sensitivity of both tests remains even after the 1-month delay. The indicators from the RT-aIAT and P300-CIT were uncorrelated, thus combining P300-CIT and aIAT data further increased the efficiency of memory detection. PMID:22681260

  12. The association between concealing emotions at work and medical utilization in Korea

    PubMed Central

    2014-01-01

    Objectives We aimed to investigate the association between concealing emotions at work and medical utilization. Methods Data from the 2007–2009 4th Korea National Health and Nutrition Examination Survey (KNHANES IV) was used, 7,094 participants (3,837 males, 3,257 females) aged between 20 and 54 who were economically active and completed all necessary questionnaire items were included. Odds ratios (ORs) and 95% confidence intervals (95% CI) for differences in hospitalization, outpatient visits, and pharmaceutical drug use between those who concealed their emotions and those who did not were investigated using logistic regression models with and without gender stratification. Results Among those who concealed their emotions (n = 2,763), 47.4% were females, and 50.1% had chronic disease. In addition, 9.7% of the concealing emotions group had been hospitalized within the last year, 24.8% had been outpatients in the last two weeks, and 28.3% had used pharmaceutical drugs in the last two weeks. All ORs represent the odds of belonging to the concealing emotions group over the non-concealing emotions group. After adjustment for individual, occupational, socioeconomic and disease factors, the adjusted ORs (95% CI) in hospitalization are 1.29 (1.08 ~ 1.53) in the total population, 1.25 (0.98 ~ 1.60) in males and 1.30 (1.02 ~ 1.66) in females, in outpatient visits are 1.15 (1.02 ~ 1.29) in the total population, 1.05 (0.88 ~ 1.24) in males and 1.25 (1.06 ~ 1.47) in females and in pharmaceutical drug use are 1.12 (1.01 ~ 1.25) in the total population, 1.08 (0.92 ~ 1.27) in males and 1.14 (0.98 ~ 1.33) in females. Conclusions Those who concealed their emotions at work were more likely to use medical services. Moreover, the health effects of concealing emotions at work might be more detrimental in women than in men. PMID:25852941

  13. The Role of Stigma Concealment in the Retrospective High School Experiences of Gay, Lesbian, and Bisexual Individuals

    ERIC Educational Resources Information Center

    Frost, David M.; Bastone, Linda M.

    2008-01-01

    High school is a time when most gay, lesbian, and bisexual (GLB) youths experience a great deal of distress related to the stigma attached to being gay. Many try to avoid stigmatization by concealing the fact that they are GLB. This brief report presents a descriptive, multidimensional approach to understanding GLB stigma concealment as a…

  14. The effects of asymmetric vs. symmetric probability of targets following probe and irrelevant stimuli in the complex trial protocol for detection of concealed information with P300.

    PubMed

    Rosenfeld, J Peter; Tang, Monica; Meixner, John; Winograd, Michael; Labkovsky, Elena

    2009-08-01

    The complex trial protocol (CTP, [J.P. Rosenfeld, E. Labkovsky, M. Winograd, M.A. Lui, C. Vandenboom & E. Chedid (2008), The complex trial protocol (CTP): a new, countermeasure-resistant, accurate P300-based method for detection of concealed information. Psychophysiology, 45, 906-919.]) is a sensitive, new, countermeasure-resistant, P300-based concealed information protocol in which a first stimulus (Probe or Irrelevant) is followed after about 1.4-1.8 s by a Target or Non-Target second stimulus within one trial. It has been previously run with a potentially confounding asymmetric conditional probability of Targets following Probes vs. Irrelevants. This present study compared asymmetric vs. symmetric conditional probability groups and found no significant differences in detection rates or Probe-minus-Irrelevant P300 differences between groups. Group differences were seen in error rates and reaction times (RT) to second stimuli. These differences were, however, not diagnostic for deception vs. truth-telling, and were attributable to response perseveration. PMID:19374912

  15. Productive and Inclusive? How Documentation Concealed Racialising Practices in a Diversity Project

    ERIC Educational Resources Information Center

    Miller, Melinda G.

    2014-01-01

    This article examines how documentation concealed racialising practices in a diversity project that was seen to be productive and inclusive. Documentation examples are taken from a doctoral study about embedding Indigenous perspectives in early childhood education curricula in two Australian urban childcare centres. In place of reporting examples…

  16. University Presidents' Perceptions and Practice Regarding the Carrying of Concealed Handguns on College Campuses

    ERIC Educational Resources Information Center

    Price, James H.; Thompson, Amy; Khubchandani, Jagdish; Dake, Joseph; Payton, Erica; Teeple, Karen

    2014-01-01

    Objective: To assess the perceptions and practices of a national sample of college and university presidents regarding their support for concealed handguns being carried on college campuses. Participants: The sample for this study consisted of a national random sample of 900 college or university presidents. Methods: In the spring of 2013, a…

  17. Digital image processing in the SECURE concealed-object detection system

    NASA Astrophysics Data System (ADS)

    Smith, Steven W.

    1993-04-01

    A new technology has been developed for detecting explosives and other dangerous objects concealed under persons' clothing. The 'Subambient Exposure, Computer Utilized Reflected Energy' (SECURE) method uses a very low level of back-scattered x-rays in conjunction with digital image processing to produce an image of the person and any concealed objects. Image processing algorithms, used in the system are directed at presenting information to a human operator in the best possible manner for foreign object detection. These algorithms are viewed as being near optimum, and additional development is probably not justified. Algorithm development is needed in the area of automatic threat detection. This has the potential of reducing the invasion of privacy associated with having a security operator view each image. It also has the potential of reducing the serious problem of operator complacency. In one approach, the new algorithm must (1) recognize and isolate objects in the image, (2) discriminate between concealed objects and human anatomy, and (3) discriminate between dangerous and benign concealed objects. The images produced with the SECURE technology are extremely noisy due to the low levels of radiation used. Any algorithm developed must perform well in this noisy environment. Execution of the algorithm must be accomplished in less than a few seconds. Hardware to implement the algorithm must be of a complexity and cost compatible with the commercial SECURE system.

  18. Orienting versus inhibition in the Concealed Information Test: Different cognitive processes drive different physiological measures.

    PubMed

    Selle, Nathalie Klein; Verschuere, Bruno; Kindt, Merel; Meijer, Ewout; Ben-Shakhar, Gershon

    2016-04-01

    The Concealed Information Test (CIT) provides a valid tool for psychophysiological detection of concealed knowledge. However, its precise theoretical underpinnings remain a matter of debate. The differential physiological responses elicited by concealed, relevant items, relative to control items, were traditionally explained as reflecting an orienting response (OR). According to an alternative account, these responses reflect attempts to inhibit arousal. The present study examined whether and to what extent CIT detection efficiency is affected by instructions aimed at manipulating arousal inhibition (AI). One hundred and forty-eight undergraduate students completed a CIT, while electrodermal, cardiac, and respiratory measures were recorded. Half of the participants were requested to imagine that they are suspected of committing a crime and were motivated to avoid detection (presumably eliciting both OR and AI), while the other half were requested to imagine that they are witnesses of a crime and were motivated to be detected (presumably eliciting OR only). All participants were further requested to remain silent throughout the test. In both conditions, concealed items led to a similar increase in skin conductance as compared to the control items. However, the typically observed heart rate deceleration and respiratory suppression were found in suspects, but not in witnesses. These data imply that different mechanisms drive the responding of different psychophysiological measures used in the CIT, with skin conductance reflecting OR, and heart rate and respiration primarily reflecting AI. PMID:26615984

  19. Ego Identity, Social Anxiety, Social Support, and Self-Concealment in Lesbian, Gay, and Bisexual Individuals

    ERIC Educational Resources Information Center

    Potoczniak, Daniel J.; Aldea, Mirela A.; DeBlaere, Cirleen

    2007-01-01

    This study examined a model in which the relationship between social anxiety and two dimensions of ego identity (commitment and exploration) was expected to be mediated by social support and self-concealment for a sample of lesbian, gay, and bisexual individuals (N=347). Statistically significant paths were found from social anxiety to social…

  20. Anxiety and Related Disorders and Concealment in Sexual Minority Young Adults.

    PubMed

    Cohen, Jeffrey M; Blasey, Christine; Barr Taylor, C; Weiss, Brandon J; Newman, Michelle G

    2016-01-01

    Sexual minorities face greater exposure to discrimination and rejection than heterosexuals. Given these threats, sexual minorities may engage in sexual orientation concealment in order to avoid danger. This social stigma and minority stress places sexual minorities at risk for anxiety and related disorders. Given that three fourths of anxiety disorder onset occurs before the age of 24, the current study investigated the symptoms of generalized anxiety disorder, social phobia, panic disorder, posttraumatic stress disorder, and depression in sexual minority young adults relative to their heterosexual peers. Secondarily, the study investigated sexual orientation concealment as a predictor of anxiety and related disorders. A sample of 157 sexual minority and 157 heterosexual young adults matched on age and gender completed self-report measures of the aforementioned disorders, and indicated their level of sexual orientation concealment. Results revealed that sexual minority young adults reported greater symptoms relative to heterosexuals across all outcome measures. There were no interactions between sexual minority status and gender, however, women had higher symptoms across all disorders. Sexual minority young women appeared to be at the most risk for clinical levels of anxiety and related disorders. In addition, concealment of sexual orientation significantly predicted symptoms of social phobia. Implications are offered for the cognitive and behavioral treatment of anxiety and related disorders in this population. PMID:26763500

  1. The Effects of Concealing Academic Achievement Information on Adolescents' Self-Concept

    ERIC Educational Resources Information Center

    Zhang, Baoshan; Wang, Mo; Li, Juan; Yu, Guoliang; Bi, Yan-Ling

    2011-01-01

    Using an experimental design, the effect of concealing academic achievement information on adolescents' self-concept was examined in the current study. Specifically, adolescents with low academic achievement and adolescents with average to high academic achievement (N = 129) were randomly assigned to different interview contexts wherein…

  2. Shape-descriptor-based detection of concealed weapons in millimeter-wave data

    NASA Astrophysics Data System (ADS)

    Slamani, Mohamed-Adel; Ferris, David D., Jr.

    2001-03-01

    Shape parameters based on circularity, Fourier descriptors, and invariant moments are studied for the automatic detection of weapons in millimeter-wave data. The data is collected by a 30-frames-per-second millimeter-wave (MMW) imager manufactured by Trex Enterprises for the detection of weapons concealed underneath a person's clothing. Results are illustrated through processing real MMW data.

  3. Detecting concealed information using feedback related event-related brain potentials.

    PubMed

    Sai, Liyang; Lin, Xiaohong; Hu, Xiaoqing; Fu, Genyue

    2014-10-01

    Employing an event-related potential (ERP)-based concealed information test (CIT), the present study investigated (1) the neurocognitive processes when people received feedbacks regarding their deceptive/truthful responses and (2) whether such feedback-related ERP activities can be used to detect concealed information above and beyond the recognition-related P300. During the CIT, participants were presented with rare, meaningful probes (their own names) embedded within a series of frequent yet meaningless irrelevants (others' names). Participants were instructed to deny their recognition of the probes. Critically, following participants' responses, they were provided with feedbacks regarding whether they succeeded or failed in the CIT. Replicating previous ERP-based CITs, we found a larger P300 elicited by probe compared to irrelevant. Regarding feedback-related ERPs, a temporospatial Principle Component Analyses found two ERP components that were not only sensitive to feedback manipulations but also can discriminate probe from irrelevant: an earlier, central-distributed positivity that was elicited by "success" feedbacks peaked around 219ms; and a later, right central-distributed positivity that was also elicited by "success" feedbacks, peaked around 400ms. Importantly, the feedback ERPs were not correlated with P300 that was elicited by probe/irrelevant, suggesting that these two ERPs reflect independent processes underlying memory concealment. These findings illustrate the feasibility and promise of using feedback-related ERPs to detect concealed memory and thus deception. PMID:25058495

  4. Fear Perceptions in Public Parks: Interactions of Environmental Concealment, the Presence of People Recreating, and Gender

    ERIC Educational Resources Information Center

    Jorgensen, Lisa J.; Ellis, Gary D.; Ruddell, Edward

    2013-01-01

    This research examined the effect of concealment (environmental cues), presence or absence of people recreating (social cues), and gender on individuals' fear of crime in a community park setting. Using a 7-point single-item indicator, 732 participants from two samples (540 park visitors and 192 college students) rated their estimates of fear…

  5. A non-imaging polarized terahertz passive system for detecting and identifying concealed explosives

    NASA Astrophysics Data System (ADS)

    Karam, Mostafa A.; Meyer, Doug

    2011-06-01

    Existing terahertz THz systems for detecting concealed explosives are not capable of identifying explosive type which leads to higher false alarm rates. Moreover, some of those systems are imaging systems that invade personal privacy, and require more processing and computational resources. Other systems have no polarization preference which makes them incapable of capturing the geometric features of an explosive. In this study a non-imaging polarized THz passive system for detecting and identifying concealed explosives overcoming the forgoing shortcomings is developed. The system employs a polarized passive THz sensor in acquiring emitted data from a scene that may have concealed explosives. The acquired data are decomposed into their natural resonance frequencies, and the number of those frequencies is used as criteria in detecting the explosive presence. If the presence of an explosive is confirmed, a set of physically based retrieval algorithms is used in extracting the explosive dielectric constant/refractive index value from natural resonance frequencies and amplitudes of associated signals. Comparing the refractive index value against a database of refractive indexes of known explosives identifies the explosive type. As an application, a system having a dual polarized radiometer operating within the frequency band of 0.62- 0.82 THz is presented and used in detecting and identifying person borne C-4 explosive concealed under a cotton garment. The system showed higher efficiencies in detecting and identifying the explosive.

  6. How Many More Guns?: Estimating the Effect of Allowing Licensed Concealed Handguns on a College Campus

    ERIC Educational Resources Information Center

    Bouffard, Jeffrey A.; Nobles, Matt R.; Wells, William; Cavanaugh, Michael R.

    2012-01-01

    Among other arguments, advocates for lifting bans on carrying concealed handguns on campus propose that this would increase the prevalence of legitimately carried handguns, which might then deter crimes or be used to intervene in campus shooting incidents like the one that took place at Virginia Tech in 2007. Opponents suggest that increased…

  7. The Cost of Question Concealment: Eye-Tracking and MEG Evidence

    ERIC Educational Resources Information Center

    Harris, Jesse; Pylkkanen, Liina; McElree, Brian; Frisson, Steven

    2008-01-01

    Although natural language appears to be largely compositional, the meanings of certain expressions cannot be straightforwardly recovered from the meanings of their parts. This study examined the online processing of one such class of expressions: "concealed questions", in which the meaning of a complex noun phrase ("the proof of the theorem")…

  8. 36-Month-Olds Conceal Visual and Auditory Information from Others

    ERIC Educational Resources Information Center

    Melis, Alicia P.; Call, Josep; Tomasello, Michael

    2010-01-01

    By three years of age, children are skilled at assessing under which circumstances others can see things. However, nothing is known about whether they can use this knowledge to guide their own deceptive behaviour. Here we investigated 3-year-olds' ability to strategically inhibit or conceal forbidden actions that a nearby adult experimenter could…

  9. Smoothing error pitfalls

    NASA Astrophysics Data System (ADS)

    von Clarmann, T.

    2014-09-01

    The difference due to the content of a priori information between a constrained retrieval and the true atmospheric state is usually represented by a diagnostic quantity called smoothing error. In this paper it is shown that, regardless of the usefulness of the smoothing error as a diagnostic tool in its own right, the concept of the smoothing error as a component of the retrieval error budget is questionable because it is not compliant with Gaussian error propagation. The reason for this is that the smoothing error does not represent the expected deviation of the retrieval from the true state but the expected deviation of the retrieval from the atmospheric state sampled on an arbitrary grid, which is itself a smoothed representation of the true state; in other words, to characterize the full loss of information with respect to the true atmosphere, the effect of the representation of the atmospheric state on a finite grid also needs to be considered. The idea of a sufficiently fine sampling of this reference atmospheric state is problematic because atmospheric variability occurs on all scales, implying that there is no limit beyond which the sampling is fine enough. Even the idealization of infinitesimally fine sampling of the reference state does not help, because the smoothing error is applied to quantities which are only defined in a statistical sense, which implies that a finite volume of sufficient spatial extent is needed to meaningfully discuss temperature or concentration. Smoothing differences, however, which play a role when measurements are compared, are still a useful quantity if the covariance matrix involved has been evaluated on the comparison grid rather than resulting from interpolation and if the averaging kernel matrices have been evaluated on a grid fine enough to capture all atmospheric variations that the instruments are sensitive to. This is, under the assumptions stated, because the undefined component of the smoothing error, which is the

  10. Concealed explosive detection on personnel using a wideband holographic millimeter-wave imaging system

    NASA Astrophysics Data System (ADS)

    Sheen, David M.; McMakin, Douglas L.; Collins, H. D.; Hall, Thomas E.; Severtsen, Ronald H.

    1996-06-01

    A novel wideband millimeter-wave imaging system is presently being developed at Pacific Northwest National Laboratory (PNNL) that will allow rapid inspection of personnel for concealed explosives, handguns, or other threats. Millimeter-wavelength electromagnetic waves are effective for this application since they readily penetrate common clothing materials, while being partially reflected from the person under surveillance as well as any concealed items. To form an image rapidly, a linear array of 128 antennas is used to electronically scan over a horizontal aperture of 0.75 meters, while the linear array is mechanically swept over a vertical aperture of 2 meters. At each point over this 2-D aperture, coherent wideband data reflected from the target is gathered using wide-beamwidth antennas. The data is recorded coherently, and reconstructed (focused) using an efficient image reconstruction algorithm developed at PNNL. This algorithm works in the near-field of both the target and the scanned aperture and preserves the diffraction limited resolution of less than one-wavelength. The wide frequency bandwidth is used to provide depth resolution, which allows the image to be fully focused over a wide range of depths, resulting in a full 3-D image. This is not possible in a normal optical (or quasi-optical) imaging system. This system has been extensively tested using concealed metal and plastic weapons, and has recently been tested using real plastic explosives (C-4 and RDX) and simulated liquid explosives concealed on personnel. Millimeter-waves do not penetrate the human body, so it is necessary to view the subject from several angles in order to fully inspect for concealed weapons. Full animations containing 36 - 72 frames recorded from subjects rotated by 5 - 10 degrees, have been found to be extremely useful for rapid, effective inspection of personnel.

  11. Spatial alexia.

    PubMed

    Ardila, A; Rosselli, M

    1994-05-01

    Twenty-one patients with right hemisphere damage were studied (11 men, 10 women; average age = 41.33; range = 19-65). Patients were divided in two groups: pre-Rolandic (six patients) and retro-Rolandic (15 patients) right hemisphere damage. A special reading test was given to each patient. The observed errors included: literal errors (substitutions, additions, and omissions of letters), substitutions of syllables and pseudowords for meaningful words, left hemispatial neglect, confabulation, splitting of words, verbal errors (substitutions, additions, and omission of words), grouping of letters belonging to two different words, misuse of punctuation marks, and errors in following lines. It was proposed that spatial alexia is characterized by: (1) some difficulties in the recognition of the spatial orientation in letters; (2) left hemispatial neglect; (3) tendency to "complete" the sense of words and sentences; (4) inability to follow lines when reading texts, and sequentially explore the spatial distribution of the written material; and (5) grouping and fragmentation of words, most likely as a consequence of the inability to interpret the relative value of spaces between letters correctly. PMID:7960468

  12. Results of software error-data experiments

    NASA Technical Reports Server (NTRS)

    Finelli, George B.

    1988-01-01

    In order to evaluate existing software reliability models and proposed modeling approaches, a search was conducted for data on the software failure process. This search revealed that the data necessary for this evaluation were not available. As a result, a research effort was initiated by NASA to generate data on which to base the development of credible methods for assessing the reliability of software targeted for flight-crucial applications. Two sets of software error-data experiments were conducted by different research groups. The results of the experiments were consistent: errors caused by different faults in a program occurred at widely varying rates; program failure rates exhibited a log-linear trend with respect to the number of faults corrected; some faults were found to interact in either concealing or revealing ways; and contiguous regions of the input space which cause a program to generate errors, called error crystals, were found and characterized for some faults. Collectively, these experiments have produced information on software failure which must be accounted for in software reliability modeling approaches.

  13. Concealed threat detection with the IRAD sub-millimeter wave 3D imaging radar

    NASA Astrophysics Data System (ADS)

    Robertson, Duncan A.; Cassidy, Scott L.; Jones, Ben; Clark, Anthony

    2014-06-01

    Sub-millimeter wave 3D imaging radar is a promising technology for the stand-off detection of threats concealed on people. The IRAD 340 GHz 3D imaging radar uses polarization intensity information to identify signatures associated with concealed threats. We report on an extensive trials program which has been carried out involving dozens of individual subjects wearing a variety of different clothing to evaluate the detection of a wide range of threat and benign items. We have developed an automatic algorithm to run on the radar which yields a level of anomaly indication in real time. Statistical analysis of the large volume of recorded data has enabled performance metrics for the radar system to be evaluated.

  14. Time-delay concealment and complexity enhancement of an external-cavity laser through optical injection.

    PubMed

    Li, Nianqiang; Pan, Wei; Locquet, A; Citrin, D S

    2015-10-01

    The concealment of the time-delay signature (TDS) of chaotic external-cavity lasers is necessary to ensure the security of optical chaos-based cryptosystems. We show that this signature can be removed simply by optically injecting an external-cavity laser with a large linewidth-enhancement factor into a second, noninjection-locked, semiconductor laser. Concealment is ensured both in the amplitude and in the phase of the optical field, satisfying a sought-after property of optical chaos-based communications. Meanwhile, enhancement of the dynamical complexity, characterized by permutation entropy, coincides with strong TDS suppression over a wide range of parameters, the area for which depends sensitively on the linewidth-enhancement factor. PMID:26421545

  15. Terahertz absorbance spectrum fitting method for quantitative detection of concealed contraband

    NASA Astrophysics Data System (ADS)

    Wang, Yingxin; Zhao, Ziran; Chen, Zhiqiang; Kang, Kejun; Feng, Bing; Zhang, Yan

    2007-12-01

    We present a quantitative method for the nondestructive detection of concealed contraband based on terahertz transmission spectroscopy. Without knowing the prior information of barrier materials, the amount of concealed contraband can be extracted by approximating the terahertz absorbance spectrum of the barrier material with a low-order polynomial and then fitting the measured absorbance spectrum of the inspected object with the polynomial and the known standard spectrum of this kind of contraband. We verify the validity of this method using a sample of explosive 1,3,5-trinitro-s-triazine (RDX) covered with several different barrier materials which are commonly encountered in actual inspection, and good agreement between the calculated and actual value of the amount of RDX is obtained for the experiments performed under both nitrogen and air atmospheres. This indicates that the presented method can achieve quantitative detection of hidden contraband, which is important for security inspection applications.

  16. Identifying the location of a concealed object through unintentional eye movements.

    PubMed

    Neuman, Yair; Assaf, Dan; Israeli, Navot

    2015-01-01

    In some investigative and interrogative contexts, the investigator is seeking to identify the location of an object (e.g., implanted bomb) which is known to a given subject (e.g., a terrorist). In this paper, we present a non-intrusive methodology for uncovering the loci of a concealed object by analyzing the subject's eye movements. Using a combination of eye tracking, psychological manipulation and a search algorithm, we have performed two experiments. In the first experiment, we have gained 58% hit rate in identifying the location of the concealed object and in the second experiment 56% hit rate. The pros and cons of the methodology for forensic investigation are discussed. PMID:25904879

  17. Identifying the location of a concealed object through unintentional eye movements

    PubMed Central

    Neuman, Yair; Assaf, Dan; Israeli, Navot

    2015-01-01

    In some investigative and interrogative contexts, the investigator is seeking to identify the location of an object (e.g., implanted bomb) which is known to a given subject (e.g., a terrorist). In this paper, we present a non-intrusive methodology for uncovering the loci of a concealed object by analyzing the subject's eye movements. Using a combination of eye tracking, psychological manipulation and a search algorithm, we have performed two experiments. In the first experiment, we have gained 58% hit rate in identifying the location of the concealed object and in the second experiment 56% hit rate. The pros and cons of the methodology for forensic investigation are discussed. PMID:25904879

  18. Unsupervised image segmentation for passive THz broadband images for concealed weapon detection

    NASA Astrophysics Data System (ADS)

    Ramírez, Mabel D.; Dietlein, Charles R.; Grossman, Erich; Popović, Zoya

    2007-04-01

    This work presents the application of a basic unsupervised classification algorithm for the segmentation of indoor passive Terahertz images. The 30,000 pixel broadband images of a person with concealed weapons under clothing are taken at a range of 0.8-2m over a frequency range of 0.1-1.2THz using single-pixel row-based raster scanning. The spiral-antenna coupled 36x1x0.02μm Nb bridge cryogenic micro-bolometers are developed at NIST-Optoelectronics Division. The antenna is evaporated on a 250μm thick Si substrate with a 4mm diameter hyper-hemispherical Si lens. The NETD of the microbolometer is 125mK at an integration time of 30 ms. The background temperature calibration is performed with a known 25 pixel source above 330 K, and a measured background fluctuation of 200-500mK. Several weapons were concealed under different fabrics: cotton, polyester, windblocker jacket and thermal sweater. Measured temperature contrasts ranged from 0.5-1K for wrinkles in clothing to 5K for a zipper and 8K for the concealed weapon. In order to automate feature detection in the images, some image processing and pattern recognition techniques have been applied and the results are presented here. We show that even simple algorithms, that can potentially be performed in real time, are capable of differentiating between a metal and a dielectric object concealed under clothing. Additionally, we show that pre-processing can reveal low temperature contrast features, such as folds in clothing.

  19. Antidromic Atrioventricular Reciprocating Tachycardia Using a Concealed Retrograde Conducting Left Lateral Accessory Pathway.

    PubMed

    Gonzalez, Jaime E; Zipse, Matthew M; Nguyen, Duy T; Sauer, William H

    2016-03-01

    Atrioventricular reciprocating tachycardia is a common cause of undifferentiated supraventricular tachycardia. In patients with manifest or concealed accessory pathways, it is imperative to assess for the presence of other accessory pathways. Multiple accessory pathways are present in 4% to 10% of patients and are more common in patients with structural heart disease. In rare cases, multiple accessory pathways can act as the anterograde and retrograde limbs of the tachycardia. PMID:26920167

  20. ARPA/NIJ/Rome Laboratory concealed weapon detection program: an overview

    NASA Astrophysics Data System (ADS)

    Currie, Nicholas C.; Demma, Fred J.; Ferris, David D., Jr.; McMillan, Robert W.; Wicks, Michael C.

    1996-06-01

    Recent advances in passive and active imaging and non- imaging sensor technology offer the potential to detect weapons that are concealed beneath a person's clothing. Sensors that are discussed in this paper are characterized as either non-imaging or imaging. Non-imaging sensors include wide band radar and portal devices such as metal detectors. In general the strength of non-imaging sensors rest with the fact that they are generally inexpensive and can rapidly perform bulk separation between regions where persons are likely to be carrying concealed weapons and those regions that are likely to contain persons who are unarmed. The bulk process is typically accomplished at the expense of false alarm rate. Millimeter-wave (MMW), microwave, x-ray, acoustic, magnetic, and infrared (IR) imaging sensor technologies provide with greater certainty the means to isolate persons within a crowd that are carrying concealed weapons and to identify the weapon type. The increased certainty associated with imaging sensors is accomplished at the expense of cost and bulk surveillance of the crowd. CWD technologies have a variety of military and civilian applications. This technology focus area addresses specific military needs under the Defense Advanced Research Projects Agency's (DARPA) operations other than war/law enforcement (OOTW/LE). Additionally, this technology has numerous civilian law enforcement applications that are being investigated under the National Institute of Justice's (NIJ) Concealed Weapons Detection program. This paper discusses the wide variety of sensors that might be employed in support of a typical scenario, the strengths and weaknesses of each of the sensors relative to the given scenario, and how CWD breadboards will be tested to determine the optimal CWD application. It rapidly becomes apparent that no single sensor will completely satisfy the CWD mission necessitating the fusion of two or more of these sensors.

  1. Tracheal tube obstruction in a case of concealed tracheomalacia--a case report.

    PubMed

    Athanassiou, L; Charissi, N

    2005-06-01

    We report on the successful mangement of airway obstruction, immediately after tracheal intubation for elective operation, in a patient with concealed tracheomalacia. We discuss the issues posed in patients with mild or undiagnosed chronic obstructive pulmonary disease (COPD) that are relevant to tracheomalacia. We underline the link between tracheomalacia and COPD and emphasize the high level of awareness needed, in order to avoid or manage promptly adverse events during airway management for anesthesia in these patients. PMID:16438015

  2. Three-Dimensional Millimeter-wave Imaging for Concealed Weapon Detection

    SciTech Connect

    Sheen, David M. ); McMakin, Douglas L. ); Hall, Thomas E. )

    2000-12-01

    Millimeter-wave imaging techniques and systems have been developed at the Pacific Northwest National Laboratory (PNNL) for the detection of concealed weapons and contraband at airports and other secure locations. These techniques were derived from microwave holography techniques which utilize phase and amplitude information recorded over a two-dimensional aperture to reconstruct a focused image of the target. Millimeter-wave imaging is well suited to the detection of concealed weapons or other contraband carried on personnel since millimeter-waves are non-ionizing, readily penetrate common clothing material, and are reflected from the human body and any concealed items. In this paper, a wide-bandwidth, three-dimensional, holographic microwave imaging technique is described. Practical weapon detection systems for airport, or other high-throughput applications, require high-speed scanning on the order of 3 to 10 seconds. To achieve this goal, a prototype imaging system utilizing a 2 7-33 GHz linear sequentially switched array and a high-speed linear scanner has been developed and tested. This system is described in detail along with numerous imaging results.

  3. Image fusion based on millimeter-wave for concealed weapon detection

    NASA Astrophysics Data System (ADS)

    Zhu, Weiwen; Zhao, Yuejin; Deng, Chao; Zhang, Cunlin; Zhang, Yalin; Zhang, Jingshui

    2010-11-01

    This paper describes a novel multi sensors image fusion technology which is presented for concealed weapon detection (CWD). It is known to all, because of the good transparency of the clothes at millimeter wave band, a millimeter wave radiometer can be used to image and distinguish concealed contraband beneath clothes, for example guns, knives, detonator and so on. As a result, we adopt the passive millimeter wave (PMMW) imaging technology for airport security. However, in consideration of the wavelength of millimeter wave and the single channel mechanical scanning, the millimeter wave image has law optical resolution, which can't meet the need of practical application. Therefore, visible image (VI), which has higher resolution, is proposed for the image fusion with the millimeter wave image to enhance the readability. Before the image fusion, a novel image pre-processing which specifics to the fusion of millimeter wave imaging and visible image is adopted. And in the process of image fusion, multi resolution analysis (MRA) based on Wavelet Transform (WT) is adopted. In this way, the experiment result shows that this method has advantages in concealed weapon detection and has practical significance.

  4. Preventing shoulder-surfing attack with the concept of concealing the password objects' information.

    PubMed

    Ho, Peng Foong; Kam, Yvonne Hwei-Syn; Wee, Mee Chin; Chong, Yu Nam; Por, Lip Yee

    2014-01-01

    Traditionally, picture-based password systems employ password objects (pictures/icons/symbols) as input during an authentication session, thus making them vulnerable to "shoulder-surfing" attack because the visual interface by function is easily observed by others. Recent software-based approaches attempt to minimize this threat by requiring users to enter their passwords indirectly by performing certain mental tasks to derive the indirect password, thus concealing the user's actual password. However, weaknesses in the positioning of distracter and password objects introduce usability and security issues. In this paper, a new method, which conceals information about the password objects as much as possible, is proposed. Besides concealing the password objects and the number of password objects, the proposed method allows both password and distracter objects to be used as the challenge set's input. The correctly entered password appears to be random and can only be derived with the knowledge of the full set of password objects. Therefore, it would be difficult for a shoulder-surfing adversary to identify the user's actual password. Simulation results indicate that the correct input object and its location are random for each challenge set, thus preventing frequency of occurrence analysis attack. User study results show that the proposed method is able to prevent shoulder-surfing attack. PMID:24991649

  5. Stepped-frequency CW radar for concealed weapon detection and through-the-wall surveillance

    NASA Astrophysics Data System (ADS)

    Hunt, Allen R.; Hogg, R. Douglas

    2002-08-01

    Both concealed weapons detection and through the wall surveillance are significant problems for both law enforcement and military personnel. While on the surface it would appear that these two problems are unrelated technologically, they do, in fact, share some common ground. A concealed weapon acts as resonant object, exhibiting electromagnetic resonance peaks at frequencies characteristic of the weapon's major dimensions. For handguns the frequency range of interest lies approximately between 450 MHz and 2 GHz. As it turns out, this is also a region over which many common building materials are largely transparent. As part of grant 97-IJ-CX-K013 from the National Institute of Justice, AKELA, Inc. has developed a stepped-frequency, CW radar that covers this frequency range. The radar is digitally synthesized and controlled and has a range resolution of approximately 4'. Digital waveform control gives the radar the ability to avoid interference with other electronic devices, to tailor data collection for signal processing requirements, and to change its sweep time in response to operational requirements. AKELA has developed a brassboard concealed weapons detector that uses this radar. A through the wall imaging system that uses the radar is currently in development under AFRL Contract F30602-00-C-0205.

  6. Concealed neuroanatomy in Michelangelo's Separation of Light From Darkness in the Sistine Chapel.

    PubMed

    Suk, Ian; Tamargo, Rafael J

    2010-05-01

    Michelangelo Buonarroti (1475-1564) was a master anatomist as well as an artistic genius. He dissected cadavers numerous times and developed a profound understanding of human anatomy. From 1508 to 1512, Michelangelo painted the ceiling of the Sistine Chapel in Rome. His Sistine Chapel frescoes are considered one of the monumental achievements of Renaissance art. In the winter of 1511, Michelangelo entered the final stages of the Sistine Chapel project and painted 4 frescoes along the longitudinal apex of the vault, which completed a series of 9 central panels depicting scenes from the Book of Genesis. It is reported that Michelangelo concealed an image of the brain in the first of these last 4 panels, namely, the Creation of Adam. Here we present evidence that he concealed another neuronanatomic structure in the final panel of this series, the Separation of Light From Darkness, specifically a ventral view of the brainstem. The Separation of Light From Darkness is an important panel in the Sistine Chapel iconography because it depicts the beginning of Creation and is located directly above the altar. We propose that Michelangelo, a deeply religious man and an accomplished anatomist, intended to enhance the meaning of this iconographically critical panel and possibly document his anatomic accomplishments by concealing this sophisticated neuroanatomic rendering within the image of God. PMID:20404688

  7. Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects' Information

    PubMed Central

    Ho, Peng Foong; Kam, Yvonne Hwei-Syn; Wee, Mee Chin

    2014-01-01

    Traditionally, picture-based password systems employ password objects (pictures/icons/symbols) as input during an authentication session, thus making them vulnerable to “shoulder-surfing” attack because the visual interface by function is easily observed by others. Recent software-based approaches attempt to minimize this threat by requiring users to enter their passwords indirectly by performing certain mental tasks to derive the indirect password, thus concealing the user's actual password. However, weaknesses in the positioning of distracter and password objects introduce usability and security issues. In this paper, a new method, which conceals information about the password objects as much as possible, is proposed. Besides concealing the password objects and the number of password objects, the proposed method allows both password and distracter objects to be used as the challenge set's input. The correctly entered password appears to be random and can only be derived with the knowledge of the full set of password objects. Therefore, it would be difficult for a shoulder-surfing adversary to identify the user's actual password. Simulation results indicate that the correct input object and its location are random for each challenge set, thus preventing frequency of occurrence analysis attack. User study results show that the proposed method is able to prevent shoulder-surfing attack. PMID:24991649

  8. Active wideband 350GHz imaging system for concealed-weapon detection

    NASA Astrophysics Data System (ADS)

    Sheen, David M.; Hall, Thomas E.; Severtsen, Ronald H.; McMakin, Douglas L.; Hatchell, Brian K.; Valdez, Patrick L. J.

    2009-05-01

    A prototype active wideband 350 GHz imaging system has been developed to address the urgent need for standoff concealed-weapon detection. This system is based on a wideband, heterodyne, frequency-multiplier-based transceiver system coupled to a quasi-optical focusing system and high-speed conical scanner. This system is able to quickly scan personnel for concealed weapons. Additionally, due to the wideband operation, this system provides accurate ranging information, and the images obtained are fully three-dimensional. Waves in the microwave, millimeter-wave, and terahertz (3 GHz to 1 THz) frequency bands are able to penetrate many optical obscurants, and can be used to form the basis of high-resolution imaging systems. Waves in the sub-millimeter-wave band (300 GHz to 1 THz) are particularly interesting for standoff concealed-weapon detection at ranges of 5 - 20+ meters, due to their unique combination of high resolution and clothing penetration. The Pacific Northwest National Laboratory (PNNL) has previously developed portal screening systems that operate at the lower end of the millimeter-wave frequency range around 30 GHz. These systems are well suited for screening within portals; however, increasing the range of these systems would dramatically reduce the resolution due to diffraction at their relatively long wavelength. In this paper, the standoff 350 GHz imaging system is described in detail and numerous imaging results are presented.

  9. Fixations and eye-blinks allow for detecting concealed crime related memories.

    PubMed

    Peth, Judith; Kim, Johann S C; Gamer, Matthias

    2013-04-01

    The Concealed Information Test (CIT) is a method of forensic psychophysiology that allows for revealing concealed crime related knowledge. Such detection is usually based on autonomic responses but there is a huge interest in other measures that can be acquired unobtrusively. Eye movements and blinks might be such measures but their validity is unclear. Using a mock crime procedure with a manipulation of the arousal during the crime as well as the delay between crime and CIT, we tested whether eye tracking measures allow for detecting concealed knowledge. Guilty participants showed fewer but longer fixations on central crime details and this effect was even present after stimulus offset and accompanied by a reduced blink rate. These ocular measures were partly sensitive for induction of emotional arousal and time of testing. Validity estimates were moderate but indicate that a significant differentiation between guilty and innocent subjects is possible. Future research should further investigate validity differences between gaze measures during a CIT and explore the underlying mechanisms. PMID:23511446

  10. On the sensitivity of terahertz gyrotron based systems for remote detection of concealed radioactive materials

    NASA Astrophysics Data System (ADS)

    Nusinovich, G. S.; Sprangle, P.; Semenov, V. E.; Dorozhkina, D. S.; Glyavin, M. Yu

    2012-06-01

    This paper analyzes some features of systems intended to remotely detect concealed radioactive materials by using a focused THz radiation. This concept is based on possibility to focus high-power THz radiation in a small spot where the wave field exceeds the breakdown threshold. However, in the absence of any sources of ionization, the probability to have in this breakdown-prone volume any seed electrons is very low. Thus, high breakdown rate in a series of THz pulses will indicate the presence of concealed radioactive materials in the vicinity of a focused wave beam. The goal of the present paper is to determine by using the statistical theory THz pulse duration required for reliable initiation of the discharge. Then, the detectable mass of the radioactive material is determined as the function of distance and of the THz wave power and pulse duration. Lastly, possible benefits from using pulse compressors, which shorten the pulse duration but increase the wave power and, hence, the breakdown-prone volume, are analyzed. It is shown that the use of pulse compressors can significantly improve the sensitivity of THz gyrotron based systems for remote detection of concealed radioactive materials.

  11. [Diagnostic Errors in Medicine].

    PubMed

    Buser, Claudia; Bankova, Andriyana

    2015-12-01

    The recognition of diagnostic errors in everyday practice can help improve patient safety. The most common diagnostic errors are the cognitive errors, followed by system-related errors and no fault errors. The cognitive errors often result from mental shortcuts, known as heuristics. The rate of cognitive errors can be reduced by a better understanding of heuristics and the use of checklists. The autopsy as a retrospective quality assessment of clinical diagnosis has a crucial role in learning from diagnostic errors. Diagnostic errors occur more often in primary care in comparison to hospital settings. On the other hand, the inpatient errors are more severe than the outpatient errors. PMID:26649954

  12. Disclosure and Concealment of Sexual Orientation and the Mental Health of Non-Gay-Identified, Behaviorally-Bisexual Men

    PubMed Central

    Schrimshaw, Eric W.; Siegel, Karolynn; Downing, Martin J.; Parsons, Jeffrey T.

    2013-01-01

    Objective Although bisexual men report lower levels of mental health relative to gay men, few studies have examined the factors that contribute to bisexual men’s mental health. Bisexual men are less likely to disclose, and more likely to conceal (i.e., a desire to hide), their sexual orientation than gay men. Theory suggests that this may adversely impact their mental health. This report examined the factors associated with disclosure and with concealment of sexual orientation, the association of disclosure and concealment with mental health, and the potential mediators (i.e., internalized homophobia, social support) of this association with mental health. Method An ethnically-diverse sample of 203 non-gay-identified, behaviorally-bisexual men who do not disclose their same-sex behavior to their female partners were recruited in New York City to complete a single set of self-report measures. Results Concealment was associated with higher income, a heterosexual identification, living with a wife or girlfriend, more frequent sex with women, and less frequent sex with men. Greater concealment, but not disclosure to friends and family, was significantly associated with lower levels of mental health. Multiple mediation analyses revealed that both internalized homophobia and general emotional support significantly mediated the association between concealment and mental health. Conclusions The findings demonstrate that concealment and disclosure are independent constructs among bisexual men. Further, they suggest that interventions addressing concerns about concealment, emotional support, and internalized homophobia may be more beneficial for increasing the mental health of bisexual men than those focused on promoting disclosure. PMID:23276123

  13. Space Saving Statistics: An Introduction to Constant Error, Variable Error, and Absolute Error.

    ERIC Educational Resources Information Center

    Guth, David

    1990-01-01

    Article discusses research on orientation and mobility (O&M) for individuals with visual impairments, examining constant, variable, and absolute error (descriptive statistics that quantify fundamentally different characteristics of distributions of spatially directed behavior). It illustrates the statistics with examples, noting their application…

  14. Sun compass error model

    NASA Technical Reports Server (NTRS)

    Blucker, T. J.; Ferry, W. W.

    1971-01-01

    An error model is described for the Apollo 15 sun compass, a contingency navigational device. Field test data are presented along with significant results of the test. The errors reported include a random error resulting from tilt in leveling the sun compass, a random error because of observer sighting inaccuracies, a bias error because of mean tilt in compass leveling, a bias error in the sun compass itself, and a bias error because the device is leveled to the local terrain slope.

  15. Ultra-wide-band 3D microwave imaging scanner for the detection of concealed weapons

    NASA Astrophysics Data System (ADS)

    Rezgui, Nacer-Ddine; Andrews, David A.; Bowring, Nicholas J.

    2015-10-01

    The threat of concealed weapons, explosives and contraband in footwear, bags and suitcases has led to the development of new devices, which can be deployed for security screening. To address known deficiencies of metal detectors and x-rays, an UWB 3D microwave imaging scanning apparatus using FMCW stepped frequency working in the K and Q bands and with a planar scanning geometry based on an x y stage, has been developed to screen suspicious luggage and footwear. To obtain microwave images of the concealed weapons, the targets are placed above the platform and the single transceiver horn antenna attached to the x y stage is moved mechanically to perform a raster scan to create a 2D synthetic aperture array. The S11 reflection signal of the transmitted sweep frequency from the target is acquired by a VNA in synchronism with each position step. To enhance and filter from clutter and noise the raw data and to obtain the 2D and 3D microwave images of the concealed weapons or explosives, data processing techniques are applied to the acquired signals. These techniques include background subtraction, Inverse Fast Fourier Transform (IFFT), thresholding, filtering by gating and windowing and deconvolving with the transfer function of the system using a reference target. To focus the 3D reconstructed microwave image of the target in range and across the x y aperture without using focusing elements, 3D Synthetic Aperture Radar (SAR) techniques are applied to the post-processed data. The K and Q bands, between 15 to 40 GHz, show good transmission through clothing and dielectric materials found in luggage and footwear. A description of the system, algorithms and some results with replica guns and a comparison of microwave images obtained by IFFT, 2D and 3D SAR techniques are presented.

  16. Electromagnetic induction imaging of concealed metallic objects by means of resonating circuits

    NASA Astrophysics Data System (ADS)

    Guilizzoni, R.; Watson, J. C.; Bartlett, P. A.; Renzoni, F.

    2016-05-01

    An electromagnetic induction system, suitable for 2D imaging of metallic samples of different electrical conductivities, has been developed. The system is based on a parallel LCR circuit comprising a ferrite-cored coil (7.8 mm x 9.5 mm, L=680 μH at 1 KHz), a variable resistor and capacitor. The working principle of the system is based on eddy current induction inside a metallic sample when this is introduced into the AC magnetic field created by the coil. The inductance of the LCR circuit is modified due to the presence of the sample, to an extent that depends on its conductivity. Such modification is known to increase when the system is operated at its resonant frequency. Characterizing different metals based on their values of conductivity is therefore possible by utilizing a suitable system operated at resonance. Both imaging and material characterization were demonstrated by means of the proposed electromagnetic induction technique. Furthermore, the choice of using a system with an adjustable resonant frequency made it possible to select resonances that allow magnetic-field penetration through conductive screens. Investigations on the possibility of imaging concealed metals by penetrating such shields have been carried out. A penetration depth of δ~3 mm through aluminium (Al) was achieved. This allowed concealed metallic samples- having conductivities ranging from 0.54 to 59.77 MSm-1 and hidden behind 1.5-mm-thick Al shields- to be imaged. Our results demonstrate that the presence of the concealed metallic objects can be revealed. The technique was thus shown to be a promising detection tool for security applications.

  17. TDCS Guided using fMRI Significantly Accelerates Learning to Identify Concealed Objects

    PubMed Central

    Clark, Vincent P.; Coffman, Brian A.; Mayer, Andy R.; Weisend, Michael P.; Lane, Terran D.R.; Calhoun, Vince D.; Raybourn, Elaine M.; Garcia, Christopher M.; Wassermann, Eric M.

    2011-01-01

    The accurate identification of obscured and concealed objects in complex environments was an important skill required for survival during human evolution, and is required today for many forms of expertise. Here we used transcranial direct current stimulation (tDCS) guided using neuroimaging to increase learning rate in a novel, minimally guided discovery-learning paradigm. Ninety-six subjects identified threat-related objects concealed in naturalistic virtual surroundings used in real-world training. A variety of brain networks were found using fMRI data collected at different stages of learning, with two of these networks focused in right inferior frontal and right parietal cortex. Anodal 2.0 mA tDCS performed for 30 minutes over these regions in a series of single-blind, randomized studies resulted in significant improvements in learning and performance compared with 0.1 mA tDCS. This difference in performance increased to a factor of two after a one-hour delay. A dose-response effect of current strength on learning was also found. Taken together, these brain imaging and stimulation studies suggest that right frontal and parietal cortex are involved in learning to identify concealed objects in naturalistic surroundings. Furthermore, they suggest that the application of anodal tDCS over these regions can greatly increase learning, resulting in one of the largest effects on learning yet reported. The methods developed here may be useful to decrease the time required to attain expertise in a variety of settings. PMID:21094258

  18. Face and Voice as Social Stimuli Enhance Differential Physiological Responding in a Concealed Information Test

    PubMed Central

    Ambach, Wolfgang; Assmann, Birthe; Krieg, Bennet; Vaitl, Dieter

    2012-01-01

    Attentional, intentional, and motivational factors are known to influence the physiological responses in a Concealed Information Test (CIT). Although concealing information is essentially a social action closely related to motivation, CIT studies typically rely on testing participants in an environment lacking of social stimuli: subjects interact with a computer while sitting alone in an experimental room. To address this gap, we examined the influence of social stimuli on the physiological responses in a CIT. Seventy-one participants underwent a mock-crime experiment with a modified CIT. In a between-subjects design, subjects were either questioned acoustically by a pre-recorded male voice presented together with a virtual male experimenter’s uniform face or by a text field on the screen, which displayed the question devoid of face and voice. Electrodermal activity (EDA), respiration line length (RLL), phasic heart rate (pHR), and finger pulse waveform length (FPWL) were registered. The Psychopathic Personality Inventory – Revised (PPI-R) was administered in addition. The differential responses of RLL, pHR, and FPWL to probe vs. irrelevant items were greater in the condition with social stimuli than in the text condition; interestingly, the differential responses of EDA did not differ between conditions. No modulatory influence of the PPI-R sum or subscale scores was found. The results emphasize the relevance of social aspects in the process of concealing information and in its detection. Attentional demands as well as the participants’ motivation to avoid detection might be the important links between social stimuli and physiological responses in the CIT. PMID:23293613

  19. TDCS guided using fMRI significantly accelerates learning to identify concealed objects.

    PubMed

    Clark, Vincent P; Coffman, Brian A; Mayer, Andy R; Weisend, Michael P; Lane, Terran D R; Calhoun, Vince D; Raybourn, Elaine M; Garcia, Christopher M; Wassermann, Eric M

    2012-01-01

    The accurate identification of obscured and concealed objects in complex environments was an important skill required for survival during human evolution, and is required today for many forms of expertise. Here we used transcranial direct current stimulation (tDCS) guided using neuroimaging to increase learning rate in a novel, minimally guided discovery-learning paradigm. Ninety-six subjects identified threat-related objects concealed in naturalistic virtual surroundings used in real-world training. A variety of brain networks were found using functional magnetic resonance imaging (fMRI) data collected at different stages of learning, with two of these networks focused in right inferior frontal and right parietal cortex. Anodal 2.0 mA tDCS performed for 30 min over these regions in a series of single-blind, randomized studies resulted in significant improvements in learning and performance compared with 0.1 mA tDCS. This difference in performance increased to a factor of two after a one-hour delay. A dose-response effect of current strength on learning was also found. Taken together, these brain imaging and stimulation studies suggest that right frontal and parietal cortex are involved in learning to identify concealed objects in naturalistic surroundings. Furthermore, they suggest that the application of anodal tDCS over these regions can greatly increase learning, resulting in one of the largest effects on learning yet reported. The methods developed here may be useful to decrease the time required to attain expertise in a variety of settings. PMID:21094258

  20. Experimental methods of indoor millimeter-wave radiometric imaging for personnel concealed contraband detection

    NASA Astrophysics Data System (ADS)

    Hu, Taiyang; Xiao, Zelong; Li, Hao; Lv, Rongchuan; Lu, Xuan

    2014-11-01

    The increasingly emerging terrorism attacks and violence crimes around the world have posed severe threats to public security, so carrying out relevant research on advanced experimental methods of personnel concealed contraband detection is crucial and meaningful. All of the advantages of imaging covertly, avoidance of interference with other systems, intrinsic property of being safe to persons under screening , and the superior ability of imaging through natural or manmade obscurants, have significantly combined to enable millimeter-wave (MMW) radiometric imaging to offer great potential in personnel concealed contraband detection. Based upon the current research status of MMW radiometric imaging and urgent demands of personnel security screening, this paper mainly focuses on the experimental methods of indoor MMW radiometric imaging. The reverse radiation noise resulting from super-heterodyne receivers seriously affects the image experiments carried out at short range, so both the generation mechanism and reducing methods of this noise are investigated. Then, the benefit of sky illumination no longer exists for the indoor radiometric imaging, and this leads to the decrease in radiometric temperature contrast between target and background. In order to enhance the radiometric temperature contrast for improving indoor imaging performance, the noise illumination technique is adopted in the indoor imaging scenario. In addition, the speed and accuracy of concealed contraband detection from acquired MMW radiometric images are usually restricted to the deficiencies in traditional artificial interpretation by security inspectors, thus an automatic recognition and location algorithm by integrating improved Fuzzy C-means clustering with moment invariants is put forward. A series of original results are also presented to demonstrate the significance and validity of these methods.

  1. Exploiting synthetic aperture radar imagery for retrieving vibration signatures of concealed machinery

    NASA Astrophysics Data System (ADS)

    Pérez, Francisco; Campbell, Justin B.; Jaramillo, Monica; Dunkel, Ralf; Atwood, Thomas; Doerry, Armin; Gerstle, Walter H.; Santhanam, Balu; Hayat, Majeed M.

    2016-05-01

    It has been demonstrated that the instantaneous acceleration associated with vibrating objects that are directly imaged by synthetic aperture radar (SAR) can be estimated through the application of the discrete fractional Fourier transform (DFrFT) using the information contained in the complex SAR image. In general, vibration signatures may include, for example, the number of chirped sinusoids as well as their respective base frequencies and chirp rates. By further processing the DFrFT-processed data for clutter-noise rejection by means of pseudo- subspace methods, has been shown that the SAR-vibrometry method can be reliable as long as the signal-to-noise ratio (SNR) and the signal-to-clutter ratio (SCR) of the slow-time SAR signal at the range-line of interest exceeds 15dB. Meanwhile, the Nyquist theorem dictates that the maximum measurable vibration frequency is limited by half of the pulse-repetition frequency. This paper focuses on the detection and estimation of vibrations generated by machinery concealed within buildings and other structures. This is a challenging task in general because the vibration signatures of the source are typically altered by their housing structure; moreover, the SNR at the surface of the housing structure tends to be reduced. Here, experimental results for three different vibrating targets, including one concealed target, are reported using complex SAR images acquired by the General Atomics Lynx radar at resolutions of 1-ft and 4-in. The concealed vibrating target is actuated by a gear motor with an off-balance weight attached to it, which is enclosed by a wooden housing. The vibrations of the motor are transmitted to a chimney that extends above the housing structure. Using the SAR vibrometry approach, it is shown that it is possible to distinguish among the three vibrating objects based upon their vibration signatures.

  2. Shaeer’s Technique: A Minimally Invasive Procedure for Monsplasty and Revealing the Concealed Penis

    PubMed Central

    2016-01-01

    Background: A concealed penis is a condition where part of the penis is invisible below the surface of the prepubic skin. Dermolipectomy can correct this condition, although it involves a long abdominal crease incision, or infrapubic incision around the base of the penis, and a possibility for genital lymphedema. This study describes Shaeer’s technique, a minimally invasive method for revealing the concealed penis. Methods: A 1- to 2-cm-long incision was cut over the anterior superior iliac spine (ASIS) on either side. A long curved blunt forceps was inserted from one incision, down to the base of the penis and then up to the contralateral ASIS. A 5-mm wide nonabsorbable tape was picked up by the forceps from 1 incision and pulled through to emerge from the other. Pulling on the tape cephalad pulled the mons pubis and revealed the penis. The tape was sutured to the periosteum overlying the ASIS on either side. Patients were followed up for 18 months for penile length, complications, and overall satisfaction. Results: Twenty patients were operated upon. Preoperatively, flaccid visible length was 3 ± 0.9 cm, and erect visible length was 8 ± 4.6 cm. Postoperatively, the flaccid visible length was 7.1 ± 2.1 cm, with a 57.9% improvement in length (P < 0.0001). Erect visible length was 11.8 ± 2.1 cm, with a 32% improvement in length (P < 0.0001). Length gain was maintained for 18 months. Conclusion: Shaeer’s technique is a minimally invasive, short, and simple procedure for monsplasty and revealing the concealed penis. PMID:27622092

  3. Remediating Common Math Errors.

    ERIC Educational Resources Information Center

    Wagner, Rudolph F.

    1981-01-01

    Explanations and remediation suggestions for five types of mathematics errors due either to perceptual or cognitive difficulties are given. Error types include directionality problems, mirror writing, visually misperceived signs, diagnosed directionality problems, and mixed process errors. (CL)

  4. Contour Error Map Algorithm

    NASA Technical Reports Server (NTRS)

    Merceret, Francis; Lane, John; Immer, Christopher; Case, Jonathan; Manobianco, John

    2005-01-01

    The contour error map (CEM) algorithm and the software that implements the algorithm are means of quantifying correlations between sets of time-varying data that are binarized and registered on spatial grids. The present version of the software is intended for use in evaluating numerical weather forecasts against observational sea-breeze data. In cases in which observational data come from off-grid stations, it is necessary to preprocess the observational data to transform them into gridded data. First, the wind direction is gridded and binarized so that D(i,j;n) is the input to CEM based on forecast data and d(i,j;n) is the input to CEM based on gridded observational data. Here, i and j are spatial indices representing 1.25-km intervals along the west-to-east and south-to-north directions, respectively; and n is a time index representing 5-minute intervals. A binary value of D or d = 0 corresponds to an offshore wind, whereas a value of D or d = 1 corresponds to an onshore wind. CEM includes two notable subalgorithms: One identifies and verifies sea-breeze boundaries; the other, which can be invoked optionally, performs an image-erosion function for the purpose of attempting to eliminate river-breeze contributions in the wind fields.

  5. Standoff concealed weapon detection using a 350 GHz radar imaging system

    SciTech Connect

    Sheen, David M.; Hall, Thomas E.; Severtsen, Ronald H.; McMakin, Douglas L.; Hatchell, Brian K.; Valdez, Patrick LJ

    2010-04-01

    The Pacific Northwest National Laboratory is currently developing a 350 GHz, active, wideband, three-dimensional, radar imaging system to evaluate the feasibility of active sub-mm imaging for standoff concealed weapon detection. The prototype radar imaging system is based on a wideband, heterodyne, frequency-multiplier-based transceiver system coupled to a quasi-optical focusing system and high-speed rotating conical scanner. The wideband operation of this system provides accurate ranging information, and the images obtained are fully three-dimensional. Recent improvements to the system include increased imaging speed using improved balancing techniques, wider bandwidth, and image display techniques.

  6. Concealed long QT syndrome and intractable partial epilepsy: a case report.

    PubMed

    Anderson, Jason H; Bos, Johan Martijn; Meyer, Fredric B; Cascino, Gregory D; Ackerman, Michael J

    2012-11-01

    Herein, we describe a patient with concealed type 2 long QT syndrome with concomitant electroencephalogram-documented epilepsy. Although syncope in patients with long QT syndrome is common and often secondary to cerebral hypoxia after a protracted ventricular arrhythmia, this article demonstrates the importance of avoiding "tunnel vision" as patients with long QT syndrome could also have a primary seizure disorder. Identification of the etiology underlying seizurelike activity is paramount in instituting effective therapy. Furthermore, we theorize that abnormal KCHN2-encoded potassium channel repolarization in the brain could result in epilepsy and arrhythmias in long QT syndrome. PMID:23058853

  7. Millimetre wave and terahertz technology for the detection of concealed threats: a review

    NASA Astrophysics Data System (ADS)

    Kemp, Michael C.

    2006-09-01

    There has been intense interest in the use of millimetre wave and terahertz technology for the detection of concealed weapons, explosives and other threats. Electromagnetic waves at these frequencies are safe, penetrate barriers and have short enough wavelengths to allow discrimination between objects. In addition, many solids including explosives have characteristic spectroscopic signatures at terahertz wavelengths which can be used to identify them. This paper reviews the progress which has been made in recent years and identifies the achievements, challenges and prospects for these technologies in checkpoint people screening, stand off detection of improvised explosive devices (IEDs) and suicide bombers as well as more specialized screening tasks.

  8. Ambient air cooling for concealed soft body armor in a hot environment.

    PubMed

    Ryan, Greg A; Bishop, Stacy H; Herron, Robert L; Katica, Charles P; Elbon, Bre'anna L; Bosak, Andrew M; Bishop, Phillip

    2014-01-01

    Concealed soft body armor inhibits convective and evaporative heat loss and increases heat storage, especially in hot environments. One option to potentially mitigate heat storage is to promote airflow under the soft body armor. The purpose of this study was to evaluate the effect of ambient air induction (∼100 liters per minute) on heat strain while wearing concealed soft body armor in a hot environment (wet bulb globe temperature = 30°C). A counter-balanced, repeated measures protocol was performed with nine healthy male volunteers. Participants were fitted with either a traditional or modified Level II concealed soft body armor. Participants performed cycles of 12 min of walking (1.25 liters per minute) and 3 min of arm curls (0.6 liters per minute) for a total of 60 min. Two-way repeated measures ANOVA was used to assess the mean differences in physiological measures (rectal temperature, heart rate, micro-environment [temperature and relative humidity]). Post hoc Bonferroni analysis and paired samples t-tests (alpha = 0.01) were conducted on omnibus significant findings. Perceptual measures (perceived exertion, thermal comfort) were analyzed using Wilcoxon Signed Ranks Tests. Modification led to an improvement in perceived exertion at 45 min (MOD: 10 ± 1; CON: 11 ± 2; p ≤ 0.001) and 60 min (MOD: 10 ± 2; CON: 12 ± 2; p ≤ 0.001) and a reduction in micro-environment temperature in MOD (1.0 ± 0.2°C, p = 0.03) compared to CON. Modification did not attenuate change in rectal temperature or heart rate (p < 0.01) during 60-min work bout. Change in rectal temperature approached significance between MOD and CON at the end of the work bout (MOD: 0.4 ± 0.2°C; CON: 0.7 ± 0.3°C; p = 0.048). The slope of rectal temperature was significantly greater (p = 0.04) under CON compared to MOD. These data suggest that air induction may provide small benefits while wearing concealed soft body armor, though improvements are needed to lessen physiological strain

  9. An algorithm to unveil the inner structure of objects concealed by beam divergence in radiographic image acquisition systems

    NASA Astrophysics Data System (ADS)

    Almeida, G. L.; Silvani, M. I.; Lopes, R. T.

    2014-11-01

    Two main parameters rule the performance of an Image Acquisition System, namely, spatial resolution and contrast. For radiographic systems using cone beam arrangements, the farther the source, the better the resolution, but the contrast would diminish due to the lower statistics. A closer source would yield a higher contrast but it would no longer reproduce the attenuation map of the object, as the incoming beam flux would be reduced by unequal large divergences and attenuation factors. This work proposes a procedure to correct these effects when the object is comprised of a hull - or encased in it - possessing a shape capable to be described in analytical geometry terms. Such a description allows the construction of a matrix containing the attenuation factors undergone by the beam from the source until its final destination at each coordinate on the 2D detector. Each matrix element incorporates the attenuation suffered by the beam after its travel through the hull wall, as well as its reduction due to the square of distance to the source and the angle it hits the detector surface. When the pixel intensities of the original image are corrected by these factors, the image contrast, reduced by the overall attenuation in the exposure phase, are recovered, allowing one to see details otherwise concealed due to the low contrast. In order to verify the soundness of this approach, synthetic images of objects of different shapes, such as plates and tubes, incorporating defects and statistical fluctuation, have been generated, recorded for further comparison and afterwards processed to improve their contrast. The developed algorithm which, generates processes and plots the images has been written in Fortran 90 language. As the resulting final images exhibit the expected improvements, it therefore seemed worthwhile to carry out further tests with actual experimental radiographies.

  10. An algorithm to unveil the inner structure of objects concealed by beam divergence in radiographic image acquisition systems

    SciTech Connect

    Almeida, G. L.; Silvani, M. I.; Lopes, R. T.

    2014-11-11

    Two main parameters rule the performance of an Image Acquisition System, namely, spatial resolution and contrast. For radiographic systems using cone beam arrangements, the farther the source, the better the resolution, but the contrast would diminish due to the lower statistics. A closer source would yield a higher contrast but it would no longer reproduce the attenuation map of the object, as the incoming beam flux would be reduced by unequal large divergences and attenuation factors. This work proposes a procedure to correct these effects when the object is comprised of a hull - or encased in it - possessing a shape capable to be described in analytical geometry terms. Such a description allows the construction of a matrix containing the attenuation factors undergone by the beam from the source until its final destination at each coordinate on the 2D detector. Each matrix element incorporates the attenuation suffered by the beam after its travel through the hull wall, as well as its reduction due to the square of distance to the source and the angle it hits the detector surface. When the pixel intensities of the original image are corrected by these factors, the image contrast, reduced by the overall attenuation in the exposure phase, are recovered, allowing one to see details otherwise concealed due to the low contrast. In order to verify the soundness of this approach, synthetic images of objects of different shapes, such as plates and tubes, incorporating defects and statistical fluctuation, have been generated, recorded for further comparison and afterwards processed to improve their contrast. The developed algorithm which, generates processes and plots the images has been written in Fortran 90 language. As the resulting final images exhibit the expected improvements, it therefore seemed worthwhile to carry out further tests with actual experimental radiographies.

  11. Geometrical configurations of unphased diffraction-limited antennas in passive millimetre-wave imaging systems for concealed weapon detection

    NASA Astrophysics Data System (ADS)

    Serenelli, Roberto

    2004-12-01

    This paper analyzes simple imaging configurations to scan a human body, suitable as passive or active millimetre-wave imaging systems for concealed weapon detection (CWD). The first cylindrical configuration allows a 360 degrees scan: N unphased diffraction-limited antennas each of size L are placed on a circular support surrounding the subject (allowing scanning in the horizontal plane with N non-overlapping independent beams), and this circle is mechanically displaced over the whole body height. An analytical formula gives the maximum obtainable spatial resolution for different dimensions of the circular scanning device and operating frequencies, and the number of receivers achieving this optimal resolution. Constraints to be taken into account are diffraction, the usable total length of the circle, and the full coverage by the N beams over the subject, which is modelled as a cylinder with variable radius, coaxial with the scanning circle. Numerical calculations of system resolution are shown for different operating microwave (MW) and millimetre-wave (MMW) frequencies; in order to study off-axis performances, situations where the subject is not coaxial with the scanning device are also considered. For the case of a parallelepiped to be imaged instead of a cylinder, a linear array configuration is analyzed similarly to the circular one. A theoretical study is carried out to design other curved arrays, filled with unphased diffraction-limited antennas, for the imaging of linear subjects with finer resolution. Finally, the application of such configurations is considered for the design of active imaging systems, and different system architectures are discussed.

  12. Parasitism rate, parasitoid community composition and host specificity on exposed and semi-concealed caterpillars from a tropical rainforest.

    PubMed

    Hrcek, Jan; Miller, Scott E; Whitfield, James B; Shima, Hiroshi; Novotny, Vojtech

    2013-10-01

    The processes maintaining the enormous diversity of herbivore-parasitoid food webs depend on parasitism rate and parasitoid host specificity. The two parameters have to be evaluated in concert to make conclusions about the importance of parasitoids as natural enemies and guide biological control. We document parasitism rate and host specificity in a highly diverse caterpillar-parasitoid food web encompassing 266 species of lepidopteran hosts and 172 species of hymenopteran or dipteran parasitoids from a lowland tropical forest in Papua New Guinea. We found that semi-concealed hosts (leaf rollers and leaf tiers) represented 84% of all caterpillars, suffered a higher parasitism rate than exposed caterpillars (12 vs. 5%) and their parasitoids were also more host specific. Semi-concealed hosts may therefore be generally more amenable to biological control by parasitoids than exposed ones. Parasitoid host specificity was highest in Braconidae, lower in Diptera: Tachinidae, and, unexpectedly, the lowest in Ichneumonidae. This result challenges the long-standing view of low host specificity in caterpillar-attacking Tachinidae and suggests higher suitability of Braconidae and lower suitability of Ichneumonidae for biological control of caterpillars. Semi-concealed hosts and their parasitoids are the largest, yet understudied component of caterpillar-parasitoid food webs. However, they still remain much closer in parasitism patterns to exposed hosts than to what literature reports on fully concealed leaf miners. Specifically, semi-concealed hosts keep an equally low share of idiobionts (2%) as exposed caterpillars. PMID:23463243

  13. Combined illumination cylindrical millimeter-wave imaging technique for concealed weapon detection

    NASA Astrophysics Data System (ADS)

    Sheen, David M.; McMakin, Douglas L.; Hall, Thomas E.

    2000-07-01

    A novel millimeter-wave imaging technique has been developed for personnel surveillance applications, including the detection of concealed weapons, explosives, drugs, and other contraband material. Millimeter-waves are high-frequency radio waves in the frequency band of 30 - 300 GHz, and pose no health threat to humans at moderate power levels. These waves readily penetrate common clothing materials, and are reflected by the human body and by concealed items. The combined illumination cylindrical imaging concept consists of a vertical, high-resolution, millimeter-wave array of antennas which is scanned in a cylindrical manner about the person under surveillance. Using a computer, the data from this scan is mathematically reconstructed into a series of focused 3D images of the person. After reconstruction, the images are combined into a single high-resolution 3D image of the person under surveillance. This combined image is then rendered using 3D computer graphics techniques. The combined cylindrical illumination is critical as it allows the display of information from all angles. This is necessary because millimeter-waves do not penetrate the body. Ultimately, the images displayed to the operate will be icon-based to protect the privacy of the person being screened. Novel aspects of this technique include the cylindrical scanning concept and the image reconstruction algorithm, which was developed specifically for this imaging system. An engineering prototype based on this cylindrical imaging technique has been fabricated and tested. This work has been sponsored by the Federal Aviation Administration.

  14. Combined Illumination Cylindrical Millimeter-Wave Imaging Technique for Concealed Weapon Detection

    SciTech Connect

    Sheen, David M.; McMakin, Douglas L.; Hall, Thomas E.

    2000-04-01

    A novel millimeter-wave imaging technique has been developed for personnel surveillance applications, including the detection of concealed weapons, explosives, drugs, and other contraband material. Millimeter-waves are high-frequency radio waves in the frequency band of 30-300 GHz, and pose no health threat to humans at moderate power levels. These waves readily penetrate common clothing materials, and are reflected by the human body and by concealed items. The combined illumination cylindrical imaging concept consists of a vertical, high-resolution, millimeter-wave array of antennas which is scanned in a cylindrical manner about the person under surveillance. Using a computer, the data from this scan is mathematically reconstructed into a series of focused 3-D images of the person. After reconstruction, the images are combined into a single high-resolution three-dimensional image of the person under surveillance. This combined image is then rendered using 3-D computer graphics techniques. The combined cylindrical illumination is critical as it allows the display of information from all angles. This is necessary because millimeter-waves do not penetrate the body. Ultimately, the images displayed to the operator will be icon-based to protect the privacy of the person being screened. Novel aspects of this technique include the cylindrical scanning concept and the image reconstruction algorithm, which was developed specifically for this imaging system. An engineering prototype based on this cylindrical imaging technique has been fabricated and tested. This work has been sponsored by the Federal Aviation Administration (FAA).

  15. Exposed and concealed antigens as vaccine targets for controlling ticks and tick-borne diseases.

    PubMed

    Nuttall, P A; Trimnell, A R; Kazimirova, M; Labuda, M

    2006-04-01

    Tick vaccines derived from Bm86, a midgut membrane-bound protein of the cattle tick, Boophilus microplus, are currently the only commercially available ectoparasite vaccines. Despite its introduction to the market in 1994, and the recognized need for alternatives to chemical pesticides, progress in developing effective antitick vaccines (and ectoparasite vaccines in general) is slow. The primary rate-limiting step is the identification of suitable antigenic targets for vaccine development. Two sources of candidate vaccine antigens have been identified: 'exposed' antigens that are secreted in tick saliva during attachment and feeding on a host and 'concealed' antigens that are normally hidden from the host. Recently, a third group of antigens has been distinguished that combines the properties of both exposed and concealed antigens. This latter group offers the prospect of a broad-spectrum vaccine effective against both adults and immature stages of a wide variety of tick species. It also shows transmission-blocking and protective activity against a tick-borne pathogen. With the proliferation of molecular techniques and their application to vaccine development, there are high hopes for new and effective antitick vaccines that also control tick-borne diseases. PMID:16542317

  16. Development of a longer range standoff millimetre wave radar concealed threat detector

    NASA Astrophysics Data System (ADS)

    Bowring, Nicholas J.; Southgate, Matthew J.; Andrews, David A.; Rezgui, Nacer D.; Harmer, Stuart W.; O'Reilly, Dean

    2013-05-01

    A millimeter wave (75 - 110 GHz) polarimetric radar system (MiRTLE) has been developed for the detection of threat objects, such as guns, knives, or explosive devices, which have been concealed under clothing upon the human body. The system uses a Gaussian lens antenna to enable operation at stand-off ranges up to 25 meters. By utilizing ultra-wideband Swept Frequency Continuous Wave Radar very high range resolution (~ 10mm) is realized. The system is capable of detecting objects positioned in front of the body and of measuring the range of a target. By interpretation of the scattered waveform, the presence of a wide spectrum of threat items concealed on the human body may be detected. Threat detection is autonomously rendered by application of a neural network to the scattered time domain, polarimetric radar returns and the system may be taught to alarm or reject certain classes of objects; this allows for highly specific or broad spectrum threat detection. The radar system is portable and operator steerable allowing standoff monitoring of moving human targets in real time. Rapid (1ms) sweep times and fast signal acquisition and processing allow decisions to be made at video frame rates (30 fps) and integrated directly to a video feed providing the operator with a field of view and facilitating aiming. Performance parameters for detection of guns and simulated explosive devices are presented for ranges up to 25 meters.

  17. Concealed weapons detection with an improved passive millimeter-wave imager

    NASA Astrophysics Data System (ADS)

    Martin, Christopher A.; Kolinko, Vladimir G.

    2004-08-01

    Trex Enterprises has developed a second-generation passive millimeter-wave imaging system for detection of concealed weapons and explosives at standoff ranges. Passive millimeter-wave sensors form an image from naturally emitted blackbody radiation in the millimeter-wave portion of the electromagnetic spectrum. Radiation at this wavelength passes through most types of clothing, allowing the user to acquire an image of any articles on a suspect"s person that differ significantly from the human body in their reflectivity or radiometric temperature at millimeter-wave wavelengths. Trex Enterprises previously demonstrated a first-generation concealed weapon detection system with the ability to detect handguns and knives under heavy clothing at a range of 27". The second-generation imager, while similar in concept, has an improved field-of-view and a much reduced size and weight. The imager is to be put through a battery of tests by both Trex Enterprises and the National Institute Of Justice to determine its ability to detect both metallic and non-metallic knives and handguns as well as various types of explosive devices. The tests will be conducted indoors and outdoors at various ranges.

  18. Detection of hazardous liquids concealed in glass, plastic, and aluminum containers

    NASA Astrophysics Data System (ADS)

    Ramirez, Michael L.; Ortiz, William; Ruiz, Orlando; Pacheco-Londoño, Leonardo; Hernández-Rivera, Samuel P.

    2007-04-01

    The use of liquid explosives by terrorists has raised the attention to the use of hazardous liquids as threats to people, buildings and transportation systems. Hazardous liquids such as explosive mixtures, flammables or even chemical warfare agents (CWA) can be concealed in common containers and pass security checks undetected. This work presents three non invasive, non destructive detection approaches that can be used to characterize the content of common liquid containers and detect if the liquid is the intended or a concealed hazardous liquid. Fiber optic coupled Raman spectroscopy and Stand off Raman spectroscopy were used to inspect the content of glass and plastic bottles and thermal conductivity was used to asses the liquid inside aluminum cans. Raman spectroscopy experiments were performed at 532 nm, 488 nm and 785 nm excitation wavelengths. The hazardous liquids under consideration included CWA simulant DMMP, hydrogen peroxide, acetone, cyclohexane, ethanol and nitric acid. These techniques have potential use as a detector for hazardous liquids at a check point or to inspect suspicious bottles from a distance.

  19. Noninvasive detection of concealed explosives: depth profiling through opaque plastics by time-resolved Raman spectroscopy.

    PubMed

    Petterson, Ingeborg E Iping; López-López, María; García-Ruiz, Carmen; Gooijer, Cees; Buijs, Joost B; Ariese, Freek

    2011-11-15

    The detection of explosives concealed behind opaque, diffusely scattering materials is a challenge that requires noninvasive analytical techniques for identification without having to manipulate the package. In this context, this study focuses on the application of time-resolved Raman spectroscopy (TRRS) with a picosecond pulsed laser and an intensified charge-coupled device (ICCD) detector for the noninvasive identification of explosive materials through several millimeters of opaque polymers or plastic packaging materials. By means of a short (250 ps) gate which can be delayed several hundred picoseconds after the laser pulse, the ICCD detector allows for the temporal discrimination between photons from the surface of a sample and those from deeper layers. TRRS was applied for the detection of the two main isomers of dinitrotoluene, 2,4-dinitrotoluene, and 2,6-dinitrotoluene as well as for various other components of explosive mixtures, including akardite II, diphenylamine, and ethyl centralite. Spectra were obtained through different diffuse scattering white polymer materials: polytetrafluoroethylene (PTFE), polyoxymethylene (POM), and polyethylene (PE). Common packaging materials of various thicknesses were also selected, including polystyrene (PS) and polyvinyl chloride (PVC). With the demonstration of the ability to detect concealed, explosives-related compounds through an opaque first layer, this study may have important applications in the security and forensic fields. PMID:21967622

  20. Survey of state-of-the-art technology in remote concealed weapon detection

    NASA Astrophysics Data System (ADS)

    Currie, Nicholas C.; Demma, Fred J.; Ferris, David D., Jr.; McMillan, Robert W.; Vannicola, Vincent C.; Wicks, Michael C.

    1995-09-01

    Recent advances in millimeter-wave (MMV), microwave, and infrared (IR) technologies provide the means to detect concealed weapons remotely through clothing and is some cases through walls. Since the developemnt of forward-looking infrared instruments, work has been ongoing in attempting to use these devices for concealed weapon detection based on temperatrue differences between metallic weapons and in the infrared has led to the development of techniques based on lower frequencies. Focal plane arrays operating MMW frequencies are becoming available which eliminate the need for a costly and slow mechanical scanner for generating images. These radiometric sensors also detect temperature differences between weapons and the human body background. Holographic imaging systems operating at both microwave and MMW frequencies have been developed which generate images of near photographic quality through clothing and through thin, nonmetallic walls. Finally, a real- aperture radar is useful for observing people and detecting weapons through walls and in the field under reduced visibility conditions. This paper will review all of these technologies and give examples of images generated by each type of sensor. An assessment of the future of this technology with regard to law enforcement applications will also be given.

  1. Combining Blink, Pupil, and Response Time Measures in a Concealed Knowledge Test

    PubMed Central

    Seymour, Travis L.; Baker, Christopher A.; Gaunt, Joshua T.

    2013-01-01

    The response time (RT) based Concealed Knowledge Test (CKT) has been shown to accurately detect participants’ knowledge of mock-crime-related information. Tests based on ocular measures such as pupil-size and blink-rate have sometimes resulted in poor classification, or lacked detailed classification analyses. The present study examines the fitness of multiple pupil and blink related responses in the CKT paradigm. To maximize classification efficiency, participants’ concealed knowledge was assessed using both individual test measures and combinations of test measures. Results show that individual pupil-size, pupil-slope, and pre-response blink-rate measures produce efficient classifications. Combining pupil and blink measures yielded more accuracy classifications than individual ocular measures. Although RT-based tests proved efficient, combining RT with ocular measures had little incremental benefit. It is argued that covertly assessing ocular measures during RT-based tests may guard against effective countermeasure use in applied settings. A compound classification procedure was used to categorize individual participants and yielded high hit rates and low false-alarm rates without the need for adjustments between test paradigms and subject populations. We conclude that with appropriate test paradigms and classification analyses, ocular measures may prove as effective as other indices, though additional research is needed. PMID:23382718

  2. Specific NIST projects in support of the NIJ Concealed Weapon Detection and Imaging Program

    NASA Astrophysics Data System (ADS)

    Paulter, Nicholas G.

    1998-12-01

    The Electricity Division of the National Institute of Standards and Technology is developing revised performance standards for hand-held (HH) and walk-through (WT) metal weapon detectors, test procedures and systems for these detectors, and a detection/imaging system for finding concealed weapons. The revised standards will replace the existing National Institute of Justice (NIJ) standards for HH and WT devices and will include detection performance specifications as well as system specifications (environmental conditions, mechanical strength and safety, response reproducibility and repeatability, quality assurance, test reporting, etc.). These system requirements were obtained from the Law Enforcement and corrections Technology Advisory Council, an advisory council for the NIJ. Reproducible and repeatable test procedures and appropriate measurement systems will be developed for evaluating HH and WT detection performance. A guide to the technology and application of non- eddy-current-based detection/imaging methods (such as acoustic, passive millimeter-wave and microwave, active millimeter-wave and terahertz-wave, x-ray, etc.) Will be developed. The Electricity Division is also researching the development of a high- frequency/high-speed (300 GH to 1 THz) pulse-illuminated, stand- off, video-rate, concealed weapons/contraband imaging system.

  3. Concealing of facial expressions by a wild Barbary macaque (Macaca sylvanus).

    PubMed

    Thunström, Maria; Kuchenbuch, Paul; Young, Christopher

    2014-07-01

    Behavioural research on non-vocal communication among non-human primates and its possible links to the origin of human language is a long-standing research topic. Because human language is under voluntary control, it is of interest whether this is also true for any communicative signals of other species. It has been argued that the behaviour of hiding a facial expression with one's hand supports the idea that gestures might be under more voluntary control than facial expressions among non-human primates, and it has also been interpreted as a sign of intentionality. So far, the behaviour has only been reported twice, for single gorilla and chimpanzee individuals, both in captivity. Here, we report the first observation of concealing of facial expressions by a monkey, a Barbary macaque (Macaca sylvanus), living in the wild. On eight separate occasions between 2009 and 2011 an adult male was filmed concealing two different facial expressions associated with play and aggression ("play face" and "scream face"), 22 times in total. The videos were analysed in detail, including gaze direction, hand usage, duration, and individuals present. This male was the only individual in his group to manifest this behaviour, which always occurred in the presence of a dominant male. Several possible interpretations of the function of the behaviour are discussed. The observations in this study indicate that the gestural communication and cognitive abilities of monkeys warrant more research attention. PMID:24770588

  4. Partner choice through concealed floral sugar rewards evolved with the specialization of ant-plant mutualisms.

    PubMed

    Chomicki, Guillaume; Staedler, Yannick M; Schönenberger, Jürg; Renner, Susanne S

    2016-09-01

    Obligate mutualisms require filtering mechanisms to prevent their exploitation by opportunists, but ecological contexts and traits facilitating the evolution of such mechanisms are largely unknown. We investigated the evolution of filtering mechanisms in an epiphytic ant-plant symbiotic system in Fiji involving Rubiaceae and dolichoderine ants, using field experiments, metabolomics, X-ray micro-computed tomography (micro-CT) scanning and phylogenetics. We discovered a novel plant reward consisting of sugary sap concealed in post-anthetic flowers only accessible to Philidris nagasau workers that bite through the thick epidermis. In five of the six species of Rubiaceae obligately inhabited by this ant, the nectar glands functioned for 10 d after a flower's sexual function was over. Sugar metabolomics and field experiments showed that ant foraging tracks sucrose levels, which only drop at the onset of fruit development. Ontogenetic analyses of our focal species and their relatives revealed a 25-fold increase in nectary size and delayed fruit development in the ant-rewarding species, and Bayesian analyses of several traits showed the correlated evolution of sugar rewards and symbiosis specialization. Concealed floral nectar forestalls exploitation by opportunists (generalist ants) and stabilizes these obligate mutualisms. Our study pinpoints the importance of partner choice mechanisms in transitions from facultative to obligate mutualisms. PMID:27159681

  5. When Interference Helps: Increasing Executive Load to Facilitate Deception Detection in the Concealed Information Test

    PubMed Central

    Visu-Petra, George; Varga, Mihai; Miclea, Mircea; Visu-Petra, Laura

    2013-01-01

    The possibility to enhance the detection efficiency of the Concealed Information Test (CIT) by increasing executive load was investigated, using an interference design. After learning and executing a mock crime scenario, subjects underwent three deception detection tests: an RT-based CIT, an RT-based CIT plus a concurrent memory task (CITMem), and an RT-based CIT plus a concurrent set-shifting task (CITShift). The concealed information effect, consisting in increased RT and lower response accuracy for probe items compared to irrelevant items, was evidenced across all three conditions. The group analyses indicated a larger difference between RTs to probe and irrelevant items in the dual-task conditions, but this difference was not translated in a significantly increased detection efficiency at an individual level. Signal detection parameters based on the comparison with a simulated innocent group showed accurate discrimination for all conditions. Overall response accuracy on the CITMem was highest and the difference between response accuracy to probes and irrelevants was smallest in this condition. Accuracy on the concurrent tasks (Mem and Shift) was high, and responses on these tasks were significantly influenced by CIT stimulus type (probes vs. irrelevants). The findings are interpreted in relation to the cognitive load/dual-task interference literature, generating important insights for research on the involvement of executive functions in deceptive behavior. PMID:23543918

  6. Development of THz-range Gyrotrons for Detection of Concealed Radioactive Materials

    NASA Astrophysics Data System (ADS)

    Nusinovich, Gregory S.; Pu, Ruifeng; Antonsen, Thomas M.; Sinitsyn, Oleksandr V.; Rodgers, John; Mohamed, Ali; Silverman, Joseph; Al-Sheikhly, Mohamad; Dimant, Yakov S.; Milikh, Gennady M.; Glyavin, Michael Yu.; Luchinin, Alexei G.; Kopelovich, Eugene A.; Granatstein, Victor L.

    2011-03-01

    The Center for Applied Electromagnetics (AppEl) at the University of Maryland had started development of a sub-THz gyrotron for detecting concealed radioactive materials. The concept is based on the use of a high-power gyrotron whose power being focused in a small spot with dimensions on the order of a wavelength exceeds the threshold level required for initiating a freely localized microwave breakdown in air. However, in the absence of radioactive materials, the ambient electron density is so small that there is a very small probability to find a free electron in this small volume to trigger the avalanche breakdown process. Therefore the fact that the breakdown was observed would indicate that there is a hidden radioactive material in the vicinity of a focused wave beam. We present the design data for a 200-300 kW, 670 GHz gyrotron operating with a pulsed solenoid and describe a single-shot pulsed solenoid producing 27-28 T magnetic fields. Also numerous issues in this specific application are discussed, viz. threshold conditions for initiating the breakdown, production of gamma rays by concealed radioactive materials and their role in producing low energy electrons outside a container, wave beam focusing in a small spot by a limited-size antenna, random walk of energetic electrons which may result in appearance of free electrons in a given volume during the RF pulse and comparison of diffusion time with the time required for competing processes, such as ionization and three-body attachment.

  7. Portable concealed weapon detection using millimeter-wave FMCW radar imaging

    NASA Astrophysics Data System (ADS)

    Johnson, Michael A.; Chang, Yu-Wen

    2001-02-01

    Unobtrusive detection of concealed weapons on persons or in abandoned bags would provide law enforcement a powerful tool to focus resources and increase traffic throughput in high- risk situations. We have developed a fast image scanning 94 GHz radar system that is suitable for portable operation and remote viewing of radar data. This system includes a novel fast image-scanning antenna that allows for the acquisition of medium resolution 3D millimeter wave images of stationary targets with frame times on order of one second. The 3D radar data allows for potential isolation of concealed weapons from body and environmental clutter such as nearby furniture or other people. The radar is an active system so image quality is not affected indoors, emitted power is however very low so there are no health concerns for operator or targets. The low power operation is still sufficient to penetrate heavy clothing or material. Small system size allows for easy transport and rapid deployment of the system as well as an easy migration path to future hand held systems.

  8. Decision Makers Use Norms, Not Cost-Benefit Analysis, When Choosing to Conceal or Reveal Unfair Rewards

    PubMed Central

    Heimann, Marco; Girotto, Vittorio; Legrenzi, Paolo; Bonnefon, Jean-François

    2013-01-01

    We introduce the Conceal or Reveal Dilemma, in which individuals receive unfair benefits, and must decide whether to conceal or to reveal this unfair advantage. This dilemma has two important characteristics: it does not lend itself easily to cost-benefit analysis, neither to the application of any strong universal norm. As a consequence, it is ideally suited to the study of interindividual and intercultural variations in moral-economic norms. In this paper we focus on interindividual variations, and we report four studies showing that individuals cannot be swayed by financial incentives to conceal or to reveal, and follow instead fixed, idiosyncratic strategies. We discuss how this result can be extended to individual and cultural variations in the tendency to display or to hide unfair rewards. PMID:24066040

  9. A map overlay error model based on boundary geometry

    USGS Publications Warehouse

    Gaeuman, D.; Symanzik, J.; Schmidt, J.C.

    2005-01-01

    An error model for quantifying the magnitudes and variability of errors generated in the areas of polygons during spatial overlay of vector geographic information system layers is presented. Numerical simulation of polygon boundary displacements was used to propagate coordinate errors to spatial overlays. The model departs from most previous error models in that it incorporates spatial dependence of coordinate errors at the scale of the boundary segment. It can be readily adapted to match the scale of error-boundary interactions responsible for error generation on a given overlay. The area of error generated by overlay depends on the sinuosity of polygon boundaries, as well as the magnitude of the coordinate errors on the input layers. Asymmetry in boundary shape has relatively little effect on error generation. Overlay errors are affected by real differences in boundary positions on the input layers, as well as errors in the boundary positions. Real differences between input layers tend to compensate for much of the error generated by coordinate errors. Thus, the area of change measured on an overlay layer produced by the XOR overlay operation will be more accurate if the area of real change depicted on the overlay is large. The model presented here considers these interactions, making it especially useful for estimating errors studies of landscape change over time. ?? 2005 The Ohio State University.

  10. Robust quantum spatial search

    NASA Astrophysics Data System (ADS)

    Tulsi, Avatar

    2016-07-01

    Quantum spatial search has been widely studied with most of the study focusing on quantum walk algorithms. We show that quantum walk algorithms are extremely sensitive to systematic errors. We present a recursive algorithm which offers significant robustness to certain systematic errors. To search N items, our recursive algorithm can tolerate errors of size O(1{/}√{ln N}) which is exponentially better than quantum walk algorithms for which tolerable error size is only O(ln N{/}√{N}). Also, our algorithm does not need any ancilla qubit. Thus our algorithm is much easier to implement experimentally compared to quantum walk algorithms.

  11. Robust quantum spatial search

    NASA Astrophysics Data System (ADS)

    Tulsi, Avatar

    2016-04-01

    Quantum spatial search has been widely studied with most of the study focusing on quantum walk algorithms. We show that quantum walk algorithms are extremely sensitive to systematic errors. We present a recursive algorithm which offers significant robustness to certain systematic errors. To search N items, our recursive algorithm can tolerate errors of size O(1{/}√{N}) which is exponentially better than quantum walk algorithms for which tolerable error size is only O(ln N{/}√{N}) . Also, our algorithm does not need any ancilla qubit. Thus our algorithm is much easier to implement experimentally compared to quantum walk algorithms.

  12. Brief Report: How Do They Manage Social Interaction? The Influence of Concealing Academic Achievement Information on Self-Monitoring by Adolescents with Low Achievement

    ERIC Educational Resources Information Center

    Zhang, Baoshan; Zhao, Jun-Yan; Yu, Guoliang

    2010-01-01

    During social interactions people self-monitor their behavior at least partially to conceal socially devalued characteristics. This study examined the influences of concealing academic achievement on self-monitoring in an academically-relevant social interaction. An interview paradigm called for school-aged adolescent participants (total N = 86)…

  13. Scattering suppression from arbitrary objects in spatially dispersive layered metamaterials

    NASA Astrophysics Data System (ADS)

    Shalin, Alexander S.; Ginzburg, Pavel; Orlov, Alexey A.; Iorsh, Ivan; Belov, Pavel A.; Kivshar, Yuri S.; Zayats, Anatoly V.

    2015-03-01

    Concealing objects by making them invisible to an external electromagnetic probe is coined by the term "cloaking." Cloaking devices, having numerous potential applications, are still facing challenges in realization, especially in the visible spectral range. In particular, inherent losses and extreme parameters of metamaterials required for the cloak implementation are the limiting factors. Here, we numerically demonstrate nearly perfect suppression of scattering from arbitrary-shaped objects in spatially dispersive metamaterial acting as an alignment-free concealing cover. We consider a realization of a metamaterial as a metal-dielectric multilayer and demonstrate suppression of scattering from an arbitrary object in forward and backward directions with perfectly preserved wave fronts and less than 10% absolute intensity change, despite spatial dispersion effects present in the composite metamaterial. Beyond the usual scattering suppression applications, the proposed configuration may be used for a simple realization of scattering-free detectors and sensors.

  14. Field error lottery

    SciTech Connect

    Elliott, C.J.; McVey, B. ); Quimby, D.C. )

    1990-01-01

    The level of field errors in an FEL is an important determinant of its performance. We have computed 3D performance of a large laser subsystem subjected to field errors of various types. These calculations have been guided by simple models such as SWOOP. The technique of choice is utilization of the FELEX free electron laser code that now possesses extensive engineering capabilities. Modeling includes the ability to establish tolerances of various types: fast and slow scale field bowing, field error level, beam position monitor error level, gap errors, defocusing errors, energy slew, displacement and pointing errors. Many effects of these errors on relative gain and relative power extraction are displayed and are the essential elements of determining an error budget. The random errors also depend on the particular random number seed used in the calculation. The simultaneous display of the performance versus error level of cases with multiple seeds illustrates the variations attributable to stochasticity of this model. All these errors are evaluated numerically for comprehensive engineering of the system. In particular, gap errors are found to place requirements beyond mechanical tolerances of {plus minus}25{mu}m, and amelioration of these may occur by a procedure utilizing direct measurement of the magnetic fields at assembly time. 4 refs., 12 figs.

  15. Image enhancement and denoising by wavelet transform for concealed weapon detection

    NASA Astrophysics Data System (ADS)

    Raghuveer, M. R.

    1997-02-01

    Wavelet transform based techniques were developed and investigated for isolation and enhancement of objects in images. The primary motivation is the development of image processing algorithms as part of an automatic system for the detection of concealed weapons under a person's clothing; a problem of considerable potential utility to the military in certain common types of deployment in the post cold war environment such as small unit operations. The issue has potential for other dual use purposes such as law enforcement applications. Wavelet decompositions of the currently available images in the Rome Laboratory database, namely, noisy, low contrast, infrared images, were studied in space-scale-amplitude space. An isolation technique for separating potential suspicious regions/objects from surrounding clutter has been proposed. Based on the images available, the study indicates that the technique is promising in providing the image enhancement necessary for further pattern detection and classification.

  16. Remote concealed weapon detection in millimeter-wave region: active and passive

    NASA Astrophysics Data System (ADS)

    Stanko, Stephan; Klöppel, Frank; Huck, Johann; Nötel, Denis; Hägelen, Manfred; Briese, Gunnar; Gregor, Alexander; Erukulla, Sreenivas; Fuchs, Hans-Hellmuth; Essen, Helmut; Pagels, Anke

    2006-09-01

    Sensors used for Security purposes have to cover the non-invasive inspection of persons, baggage and letters with the aim to detect weapons, explosives and chemical or biological threat material. Currently, emphasis is placed on system concepts and technologies for this type of applications, employing millimeterwave-, submillimeterwave- and terahertz sensors. This is based on the capability of these frequency bands to look through textiles and the possibility to achieve a geometric resolution which is sufficient to resolve critical items within the necessary range. Using multiple frequencies promises to give more detailed information about the structure of the observed objects. Furthermore, to overcome the limitations of passive millimeter- and submillimeterwave sensors which depend on indirect illumination, systems using miniaturized mmw-radar modules are applied as well. This paper describes two approaches for the detection of concealed weapons, the first using a millimeterwave radiometer on a scanner and the second employing a miniaturized radar module based on a synthetic aperture method.

  17. Intentional retrieval suppression can conceal guilty knowledge in ERP memory detection tests.

    PubMed

    Bergström, Zara M; Anderson, Michael C; Buda, Marie; Simons, Jon S; Richardson-Klavehn, Alan

    2013-09-01

    Brain-activity markers of guilty knowledge have been promoted as accurate and reliable measures for establishing criminal culpability. Tests based on these markers interpret the presence or absence of memory-related neural activity as diagnostic of whether or not incriminating information is stored in a suspect's brain. This conclusion critically relies on the untested assumption that reminders of a crime uncontrollably elicit memory-related brain activity. However, recent research indicates that, in some circumstances, humans can control whether they remember a previous experience by intentionally suppressing retrieval. We examined whether people could use retrieval suppression to conceal neural evidence of incriminating memories as indexed by Event-Related Potentials (ERPs). When people were motivated to suppress crime retrieval, their memory-related ERP effects were significantly decreased, allowing guilty individuals to evade detection. Our findings indicate that brain measures of guilty knowledge may be under criminals' intentional control and place limits on their use in legal settings. PMID:23664804

  18. A concealed small bowel perforation in an adult secondary to bicycle handlebar trauma

    PubMed Central

    Nolan, GJ; Simpson, RR

    2013-01-01

    Traumatic abdominal wall hernia (TAWH) secondary to bicycle handlebar is a rare injury. The majority of the literature describes abdominal wall herniation in children. We present a rare case of TAWH in an adult with a concealed small bowel perforation. Although clinical examination in conjunction with computed tomography can exclude the majority of solid organ injuries, small bowel injuries can often be missed. Our case initially revealed a serosal tear in the small bowel but, on close inspection, a separate 3mm perforation was identified, hidden in the small bowel mesentery. We strongly support a low threshold for operative intervention if there is any suspicion. Moreover, we stress the importance of meticulous examination during laparotomy as this injury could have been easily missed, resulting in potential morbidity or mortality in a patient sustaining such an injury. PMID:23676803

  19. 220GHz wideband 3D imaging radar for concealed object detection technology development and phenomenology studies

    NASA Astrophysics Data System (ADS)

    Robertson, Duncan A.; Macfarlane, David G.; Bryllert, Tomas

    2016-05-01

    We present a 220 GHz 3D imaging `Pathfinder' radar developed within the EU FP7 project CONSORTIS (Concealed Object Stand-Off Real-Time Imaging for Security) which has been built to address two objectives: (i) to de-risk the radar hardware development and (ii) to enable the collection of phenomenology data with ~1 cm3 volumetric resolution. The radar combines a DDS-based chirp generator and self-mixing multiplier technology to achieve a 30 GHz bandwidth chirp with such high linearity that the raw point response is close to ideal and only requires minor nonlinearity compensation. The single transceiver is focused with a 30 cm lens mounted on a gimbal to acquire 3D volumetric images of static test targets and materials.

  20. Intentional retrieval suppression can conceal guilty knowledge in ERP memory detection tests☆

    PubMed Central

    Bergström, Zara M.; Anderson, Michael C.; Buda, Marie; Simons, Jon S.; Richardson-Klavehn, Alan

    2013-01-01

    Brain-activity markers of guilty knowledge have been promoted as accurate and reliable measures for establishing criminal culpability. Tests based on these markers interpret the presence or absence of memory-related neural activity as diagnostic of whether or not incriminating information is stored in a suspect's brain. This conclusion critically relies on the untested assumption that reminders of a crime uncontrollably elicit memory-related brain activity. However, recent research indicates that, in some circumstances, humans can control whether they remember a previous experience by intentionally suppressing retrieval. We examined whether people could use retrieval suppression to conceal neural evidence of incriminating memories as indexed by Event-Related Potentials (ERPs). When people were motivated to suppress crime retrieval, their memory-related ERP effects were significantly decreased, allowing guilty individuals to evade detection. Our findings indicate that brain measures of guilty knowledge may be under criminals’ intentional control and place limits on their use in legal settings. PMID:23664804

  1. A novel Dual Probe Complex Trial Protocol for detection of concealed information.

    PubMed

    Labkovsky, Elena; Rosenfeld, J Peter

    2014-11-01

    In simply guilty (SG), countermeasure-using guilty (CM), and innocent (IN) subjects, a new concealed information test, the P300-based Dual Probe Complex Trial Protocol was tested in a mock crime scenario. It combines an oddball protocol with two stimuli (probe, irrelevant) and another with three stimuli (probe, irrelevant, target) into one trial, doubling detected mock crime information per unit time, compared to previous protocols. Probe-irrelevant amplitude differences were significant in SG and CM, but not IN subjects. On a measure from both two and three stimulus protocol parts of the Dual Probe Complex Trial Protocol trial, accuracy was 94.7% (based on a .9 bootstrap criterion). The criterion-independent area (AUC) under the receiver operating characteristic (from signal detection theory) measuring SG and CM versus IN discriminability averaged .92 (in a range of 0.5-1.0). Countermeasures enhanced irrelevant (not probe) P300s in CM groups. PMID:24981064

  2. Effects of coping and cooperative instructions on guilty and informed innocents' physiological responses to concealed information.

    PubMed

    Zvi, Liza; Nachson, Israel; Elaad, Eitan

    2012-05-01

    Previous research on the Concealed Information Test indicates that knowledge of the critical information of a given event is sufficient for the elicitation of strong physiological reactions, thus facilitating detection by the test. Other factors that affect the test's efficacy are deceptive verbal responses to the test's questions and motivation of guilty examinees to avoid detection. In the present study effects of coping and cooperative instructions - delivered to guilty and innocent participants - on detection were examined. In a mock-theft experiment guilty participants who actually committed a mock-crime, and informed innocent participants who handled the critical items of the crime in an innocent context, were instructed to adopt either a coping or a cooperative attitude toward the polygraph test. Results indicated that both, guilt and coping behavior, were associated with enhanced physiological responses to the critical information, whereas innocence and cooperative behavior attenuated physiological responses. Theoretical and applied implications of the results are discussed. PMID:22330977

  3. Memory instructions, vocalization, mock crimes, and concealed information tests with a polygraph.

    PubMed

    Bradley, M T; Malik, F J; Cullen, M C

    2011-12-01

    Accuracy rates with polygraphs using concealed information tests (CITs) depend on memory for crime details. Some participants read instructions on murdering a dummy victim that specified exact crime details asked on the subsequent CIT. Others read instructions not stating details, but still requiring interaction with the exact same details for the crime. For example, the murder weapon was under four heavy boxes. Instructions stated either "... remove the 4 boxes ..." or "... remove the boxes ..." Thus, each group removed four boxes, but only one group was primed with the number "4" beforehand. In addition, the victim unexpectedly shouted at some participants during the crime. An innocent group was not exposed to either manipulation. Memory, detection scores, and detection rates were lower for guilty participants not primed with details. Sound affected detection scores but not memory, and there was no interaction between the two factors. Information tests are limited by how crime information is received. PMID:22403929

  4. Event-related potentials increase the discrimination performance of the autonomic-based concealed information test.

    PubMed

    Matsuda, Izumi; Nittono, Hiroshi; Ogawa, Tokihiro

    2011-12-01

    The concealed information test (CIT) assesses an examinee's crime-relevant memory on the basis of physiological differences between crime-relevant and irrelevant items. The CIT based on autonomic measures has been used for criminal investigations, while the CIT based on event-related potentials (ERPs) has been suggested as a useful alternative. To combine these two methods, we developed a quantification method of ERPs measured in the autonomic-based CIT where each item was repeated only 5 times. Results showed that the peak amplitude of the ERP difference wave between crime-relevant and irrelevant items could discriminate between guilty and innocent participants effectively even when only 5 trials were used for averaging. This ERP measure could detect some participants who were missed by the autonomic measures. Combining the ERP and autonomic measures significantly improved the discrimination performance of the autonomic-based CIT. PMID:21806637

  5. Psychophysiological and behavioral measures for detecting concealed information: the role of memory for crime details.

    PubMed

    Nahari, Galit; Ben-Shakhar, Gershon

    2011-06-01

    This study examined the role of memory for crime details in detecting concealed information using the electrodermal measure, Symptom Validity Test, and Number Guessing Test. Participants were randomly assigned to three groups: guilty, who committed a mock theft; informed-innocents, who were exposed to crime-relevant items; and uninformed-innocents, who had no crime-relevant information. Participants were tested immediately or 1 week later. Results showed (a) all tests detected the guilty in the immediate condition, and combining the tests improved detection efficiency; (b) tests' efficiency declined in the delayed condition, mainly for peripheral details; (c) no distinction between guilty and informed innocents was possible in the immediate, yet some distinction emerged in the delayed condition. These findings suggest that, while time delay may somewhat reduce the ability to detect the guilty, it also diminishes the danger of accusing informed-innocents. PMID:20958308

  6. Combining skin conductance and forced choice in the detection of concealed information.

    PubMed

    Meijer, Ewout H; Smulders, Fren T Y; Johnston, James E; Merckelbach, Harald L G J

    2007-09-01

    An advantage of the concealed information polygraph test (CIT) is that its false positive rate is determined on statistical grounds, and can be set a priori at arbitrary low levels (i.e., few innocents declared guilty). This criterion, however, inevitably leads to a loss of sensitivity (i.e., more guilty suspects declared innocent). We explored whether the sensitivity of a CIT procedure could be increased by adding an independent measure that is based on an entirely different psychological mechanism. In two experiments, we explored whether the accuracy of a CIT procedure could be increased by adding Symptom Validity Testing (SVT), a relatively simple, forced-choice, self-report procedure that has previously been used to detect malingering in various contexts. Results of a feigned amnesia experiment but not from a mock crime experiment showed that a combination measure of both tests yielded better detection than either test alone. PMID:17584188

  7. Deception awareness improves P300-based deception detection in concealed information tests.

    PubMed

    Rosenfeld, J Peter; Hu, Xiaoqing; Pederson, Kristine

    2012-10-01

    We asked if increased awareness of deception enhanced P300-based detection of concealed information with two groups: 1) Control subjects saw a randomized series of either rare probes (subject home towns), frequent irrelevants (other towns), and rare targets, which are irrelevant stimuli but requiring Button 1 responses. Probes and non-target irrelevants required Button 2 responses. Controls were told to be sure they performed target/non-target discrimination correctly, and were so reminded throughout the run. 2) Deception subjects received an identical stimulus series and response instructions, but were also alerted about their deception (pressing a non-recognition button to probes) before and throughout the run. The deception group had significantly greater differences between probe and irrelevant P300s than controls, as well as significantly greater individual detections (10/10) than did controls (5/10), suggesting that the deception awareness manipulation enhances test sensitivity. PMID:22750420

  8. Relationships among Self-Concealment, Mindfulness and Negative Psychological Outcomes in Asian American and European American College Students

    ERIC Educational Resources Information Center

    Masuda, Akihiko; Wendell, Johanna W.; Chou, Ying-Yi; Feinstein, Amanda B.

    2010-01-01

    Research on Asian Americans and their psychological adjustment is limited. Consisting of two cross-sectional studies, the present investigation examined the relationships among self-concealment, mindfulness, emotional distress in stressful interpersonal situations, and general psychological ill-health in Asian American college students, and in…

  9. [Cardioversion for paroxysmal supraventricular tachycardia during lung surgery in a patient with concealed Wolff-Parkinson-White syndrome].

    PubMed

    Sato, Yoshiharu; Nagata, Hirofumi; Inoda, Ayako; Miura, Hiroko; Watanabe, Yoko; Suzuki, Kenji

    2014-10-01

    We report a case of paroxysmal supraventricular tachycardia (PSVT) that occurred during video-assisted thoracoscopic (VATS) lobectomy in a patient with concealed Wolff-Parkinson-White (WPW) syndrome. A 59-year-old man with lung cancer was scheduled for VATS lobectomy under general anesthesia. After inserting a thoracic epidural catheter, general anesthesia was induced with intravenous administration of propofol. Anesthesia was maintained with inhalation of desfurane in an air/oxygen mixture and intravenous infusion of remifentanil. Recurrent PSVT occurred three times, and the last episode of PSVT continued for 50 minutes regardless of administration of antiarrhythmic drugs. Synchronized electric shock via adhesive electrode pads on the patient's chest successfully converted PSVT back to normal sinus rhythm. The remaining course and postoperative period were uneventful. An electrophysiological study performed after hospital discharge detected concealed WPW syndrome, which had contributed to the development of atrioventricular reciprocating tachycardia. Concealed WPW syndrome is a rare, but critical complication that could possibly cause lethal atrial tachyarrhythmias during the perioperative period. In the present case, cardioversion using adhesive electrode pads briefly terminated PSVT in a patient with concealed WPW syndrome. PMID:25693338

  10. Self-Concealment, Social Network Sites Usage, Social Appearance Anxiety, Loneliness of High School Students: A Model Testing

    ERIC Educational Resources Information Center

    Dogan, Ugur; Çolak, Tugba Seda

    2016-01-01

    This study was tested a model for explain to social networks sites (SNS) usage with structural equation modeling (SEM). Using SEM on a sample of 475 high school students (35% male, 65% female) students, model was investigated the relationship between self-concealment, social appearance anxiety, loneliness on SNS such as Twitter and Facebook usage.…

  11. Manipulating item proportion and deception reveals crucial dissociation between behavioral, autonomic, and neural indices of concealed information.

    PubMed

    Suchotzki, Kristina; Verschuere, Bruno; Peth, Judith; Crombez, Geert; Gamer, Matthias

    2015-02-01

    Developed as an alternative to traditional deception detection methods, the concealed information test (CIT) assesses recognition of critical (e.g., crime-relevant) "probes." Most often, recognition has been measured as enhanced skin conductance responses (SCRs) to probes compared to irrelevant foils (CIT effect). More recently, also differentially enlarged reaction times (RTs) and increased neural activity in the bilateral inferior frontal gyrus, the right middle frontal gyrus, and the right temporo-parietal junction have been observed. The aims of the current functional magnetic resonance imaging (fMRI) study were to (1) investigate the boundary conditions of the CIT effects in all three measures and thereby (2) gain more insight into the relative contribution of two mechanisms underlying enhanced responding to concealed information (i.e., orienting versus response inhibition). Therefore, we manipulated the proportion of probe versus irrelevant items, and whether suspects were instructed to actively deny recognition of probe knowledge (i.e., deceive) during the test. Results revealed that whereas overt deception was not necessary for the SCR CIT effect, it was crucial for the RT and the fMRI-based CIT effects. The proportion manipulation enhanced the CIT effect in all three measures. The results indicate that different mental processes might underlie the response pattern in the CIT. While skin conductance responding to concealed information may best be explained by orienting theory, it seems that response inhibition drives RT and blood oxygen level dependent responding to concealed information. PMID:25277495

  12. Tissue Engineering: Biomimetic Concealing of PLGA Microspheres in a 3D Scaffold to Prevent Macrophage Uptake (Small 11/2016).

    PubMed

    Minardi, Silvia; Corradetti, Bruna; Taraballi, Francesca; Sandri, Monica; Martinez, Jonathan O; Powell, Sebastian T; Tampieri, Anna; Weiner, Bradley K; Tasciotti, Ennio

    2016-03-01

    Avoiding the clearance of drug delivery systems from 3D scaffolds is crucial to preserve the bioactivity of their therapeutic payload. This is accomplished on page 1479, by E. Tasciotti and co-workers, through a "concealing" strategy: cloaking PLGA microspheres with the type I collagen matrix of a biomimetic scaffold, which enables the control of the production of inflammatory mediators. PMID:26970527

  13. Disclosure and Concealment of Sexual Orientation and the Mental Health of Non-Gay-Identified, Behaviorally Bisexual Men

    ERIC Educational Resources Information Center

    Schrimshaw, Eric W.; Siegel, Karolynn; Downing, Martin J., Jr.; Parsons, Jeffrey T.

    2013-01-01

    Objective: Although bisexual men report lower levels of mental health relative to gay men, few studies have examined the factors that contribute to bisexual men's mental health. Bisexual men are less likely to disclose, and more likely to conceal (i.e., a desire to hide), their sexual orientation than gay men. Theory suggests that this may…

  14. P300 amplitudes in the concealed information test are less affected by depth of processing than electrodermal responses

    PubMed Central

    Gamer, Matthias; Berti, Stefan

    2012-01-01

    The Concealed Information Test (CIT) has been used in the laboratory as well as in field applications to detect concealed crime related memories. The presentation of crime relevant details to guilty suspects has been shown to elicit enhanced N200 and P300 amplitudes of the event-related brain potentials (ERPs) as well as greater skin conductance responses (SCRs) as compared to neutral test items. These electrophysiological and electrodermal responses were found to incrementally contribute to the validity of the test, thereby suggesting that these response systems are sensitive to different psychological processes. In the current study, we tested whether depth of processing differentially affects N200, P300, and SCR amplitudes in the CIT. Twenty participants carried out a mock crime and became familiar with central and peripheral crime details. A CIT that was conducted 1 week later revealed that SCR amplitudes were larger for central details although central and peripheral items were remembered equally well in a subsequent explicit memory test. By contrast, P300 amplitudes elicited by crime related details were larger but did not differ significantly between question types. N200 amplitudes did not allow for detecting concealed knowledge in this study. These results indicate that depth of processing might be one factor that differentially affects central and autonomic nervous system responses to concealed information. Such differentiation might be highly relevant for field applications of the CIT. PMID:23162454

  15. Concealed Fertility and Extended Female Sexuality in a Non-Human Primate (Macaca assamensis)

    PubMed Central

    Fürtbauer, Ines; Heistermann, Michael; Schülke, Oliver; Ostner, Julia

    2011-01-01

    In numerous primates living in mixed-sex groups, females display probabilistic cues of fertility to simultaneously concentrate paternity to dominant males while diluting it amongst others as a means to reduce the risk of infanticide and to increase male care for offspring. A few species, however, lack these cues and potentially conceal fertility from males; yet, to date, little is known about mating patterns and their underlying proximate mechanisms in such species. Here, we investigated mating activity and sexual consortships relative to female reproductive state in wild Assamese macaques (Macaca assamensis), a species where females lack prominent anogenital swellings and copulation calls. During two mating seasons (2837 contact hours) we recorded sexual and social behaviors, sexual consortships, and collected 1178 fecal samples (n = 15 females) which were analyzed for progestogen concentrations to assess female reproductive state and to determine the timing of ovulation and conception. Although mostly conceiving in their first ovarian cycle, females were sexually receptive throughout the entire 4-month mating season, and within-cycle mating frequencies were not increased during fertile phases. Dominant males did not monopolize fertile matings, and consortships by high-ranking males lasted for long periods, which were not exclusively linked to female fertile phases. Furthermore, females copulated promiscuously but not randomly, i.e. for almost every female, matings were concentrated to a certain male, irrespective of male rank. Collectively, we demonstrate that fertility is undisclosed to males. The extreme extended female sexuality facilitated by concealed fertility may allow females to create differentiated mating relationships within a promiscuous mating system. Our study provides important new insight into the plasticity of female sexuality in non-human primates. PMID:21853074

  16. Millimeter-wave concealed weapons detection and through-the-wall imaging systems

    NASA Astrophysics Data System (ADS)

    Huguenin, G. Richard

    1997-02-01

    Millimetrix' millimeter wave passive imaging technology offers the opportunity for rapid and remote detection of metallic and non-metallic weapons, plastic explosives, drugs, and other contraband concealed under multiple layers of clothing without the necessity of a direct physical search. The purely passive imaging technique relies solely on the existing natural emissions from the scene objects, does not expose the person to any man-made radiation, and is therefore completely harmless to the person being observed and to all others in the area. Screening can be done remotely and with as much discretion as the situation requires. The passive imaging approach to the detection of concealed weapons and contraband hidden under people's clothing works well at millimeter wavelengths because of a fortunate convergence of a number of key factors: (1) adequate resolution in a reasonable sensor size; (2) high transparency of virtually all clothing; and (3) the extraordinarily high emissivity of human flesh compared to the vast majority of other materials. Longer (microwave) wavelengths are impractical because of sensor size and resolution issues, and shorter (infrared) wavelengths are impractical because of the poor transparency of most clothing. The ability of millimeter wave emissions to penetrate many common building materials permits the remote observation, using active millimeter wave sensors, of people and other objects within a room from outside of that room. The resulting through-the-wall 'live' video images of people and furnishings will indicate their location, posture, and activity within a room which should be valuable knowledge to Special Operations, SWAT, and other military and law enforcement personnel prior to their entering that room. Millimeter wave radar imaging systems based on passive MillivisionR camera technology are being developed by Millimetrix (and other members of the MIRTAC TRP consortium) for through-the-wall imaging system (TWIS) applications.

  17. Enhanced terahertz imaging system performance analysis and design tool for concealed weapon identification

    NASA Astrophysics Data System (ADS)

    Murrill, Steven R.; Franck, Charmaine C.; Espinola, Richard L.; Petkie, Douglas T.; De Lucia, Frank C.; Jacobs, Eddie L.

    2011-11-01

    The U.S. Army Research Laboratory (ARL) and the U.S. Army Night Vision and Electronic Sensors Directorate (NVESD) have developed a terahertz-band imaging system performance model/tool for detection and identification of concealed weaponry. The details of the MATLAB-based model which accounts for the effects of all critical sensor and display components, and for the effects of atmospheric attenuation, concealment material attenuation, and active illumination, were reported on at the 2005 SPIE Europe Security & Defence Symposium (Brugge). An advanced version of the base model that accounts for both the dramatic impact that target and background orientation can have on target observability as related to specular and Lambertian reflections captured by an active-illumination-based imaging system, and for the impact of target and background thermal emission, was reported on at the 2007 SPIE Defense and Security Symposium (Orlando). This paper will provide a comprehensive review of an enhanced, user-friendly, Windows-executable, terahertz-band imaging system performance analysis and design tool that now includes additional features such as a MODTRAN-based atmospheric attenuation calculator and advanced system architecture configuration inputs that allow for straightforward performance analysis of active or passive systems based on scanning (single- or line-array detector element(s)) or staring (focal-plane-array detector elements) imaging architectures. This newly enhanced THz imaging system design tool is an extension of the advanced THz imaging system performance model that was developed under the Defense Advanced Research Project Agency's (DARPA) Terahertz Imaging Focal-Plane Technology (TIFT) program. This paper will also provide example system component (active-illumination source and detector) trade-study analyses using the new features of this user-friendly THz imaging system performance analysis and design tool.

  18. Vitamin D and Musculoskeletal Status in Nova Scotian Women Who Wear Concealing Clothing

    PubMed Central

    Ojah, Rani C. I.; Welch, Jo M.

    2012-01-01

    Bone and muscle weakness due to vitamin D deficiency is common among Muslim women who reside in sunny, equatorial countries. The purpose of this study was to determine if living in a northern maritime location additionally disadvantages women who wear concealing clothes. A cross-sectional matched pair design was used to compare women who habitually wore concealing clothing with women who dressed according to western norms. Each premenopausal hijab-wearing woman (n = 11) was matched by age, height, weight and skin tone with a western-dressed woman. Subjects were tested by hand grip dynamometry to assess muscular strength and by quantitative ultrasound at the calcaneus to assess bone status. Nutritional intake was obtained by 24 h recall. Serum 25-hydroxyvitamin D (s-25(OH)D) status was determined in seven matched pairs. The hijab group had lower s-25(OH)D than women who wore western clothes (40 ± 28 vs. 81 ± 32 nmol/L, p= 0.01). Grip strength in the right hand was lower in the hijab-wearing women (p = 0.05) but this appeared to be due to less participation in intense exercise. Bone status did not differ between groups (p= 0.9). Dietary intake of vitamin D was lower in the hijab-wearers (316 ± 353 vs. 601 ± 341 IU/day, p= 0.001). This pilot study suggests that women living in a northern maritime location appear to be at risk for vitamin D insufficiency and therefore should consider taking vitamin D supplements. PMID:22690323

  19. Vitamin D and musculoskeletal status in Nova Scotian women who wear concealing clothing.

    PubMed

    Ojah, Rani C I; Welch, Jo M

    2012-05-01

    Bone and muscle weakness due to vitamin D deficiency is common among Muslim women who reside in sunny, equatorial countries. The purpose of this study was to determine if living in a northern maritime location additionally disadvantages women who wear concealing clothes. A cross-sectional matched pair design was used to compare women who habitually wore concealing clothing with women who dressed according to western norms. Each premenopausal hijab-wearing woman (n = 11) was matched by age, height, weight and skin tone with a western-dressed woman. Subjects were tested by hand grip dynamometry to assess muscular strength and by quantitative ultrasound at the calcaneus to assess bone status. Nutritional intake was obtained by 24 h recall. Serum 25-hydroxyvitamin D (s-25(OH)D) status was determined in seven matched pairs. The hijab group had lower s-25(OH)D than women who wore western clothes (40 ± 28 vs. 81 ± 32 nmol/L, p= 0.01). Grip strength in the right hand was lower in the hijab-wearing women (p = 0.05) but this appeared to be due to less participation in intense exercise. Bone status did not differ between groups (p= 0.9). Dietary intake of vitamin D was lower in the hijab-wearers (316 ± 353 vs. 601 ± 341 IU/day, p= 0.001). This pilot study suggests that women living in a northern maritime location appear to be at risk for vitamin D insufficiency and therefore should consider taking vitamin D supplements. PMID:22690323

  20. Inborn errors of metabolism

    MedlinePlus

    Metabolism - inborn errors of ... Bodamer OA. Approach to inborn errors of metabolism. In: Goldman L, Schafer AI, eds. Goldman's Cecil Medicine . 25th ed. Philadelphia, PA: Elsevier Saunders; 2015:chap 205. Rezvani I, Rezvani G. An ...

  1. Programming Errors in APL.

    ERIC Educational Resources Information Center

    Kearsley, Greg P.

    This paper discusses and provides some preliminary data on errors in APL programming. Data were obtained by analyzing listings of 148 complete and partial APL sessions collected from student terminal rooms at the University of Alberta. Frequencies of errors for the various error messages are tabulated. The data, however, are limited because they…

  2. Refractive errors in children.

    PubMed

    Tongue, A C

    1987-12-01

    Optical correction of refractive errors in infants and young children is indicated when the refractive errors are sufficiently large to cause unilateral or bilateral amblyopia, if they are impairing the child's ability to function normally, or if the child has accommodative strabismus. Screening for refractive errors is important and should be performed as part of the annual physical examination in all verbal children. Screening for significant refractive errors in preverbal children is more difficult; however, the red reflex test of Bruckner is useful for the detection of anisometropic refractive errors. The photorefraction test, which is an adaptation of Bruckner's red reflex test, may prove to be a useful screening device for detecting bilateral as well as unilateral refractive errors. Objective testing as well as subjective testing enables ophthalmologists to prescribe proper optical correction for refractive errors for infants and children of any age. PMID:3317238

  3. Error-prone signalling.

    PubMed

    Johnstone, R A; Grafen, A

    1992-06-22

    The handicap principle of Zahavi is potentially of great importance to the study of biological communication. Existing models of the handicap principle, however, make the unrealistic assumption that communication is error free. It seems possible, therefore, that Zahavi's arguments do not apply to real signalling systems, in which some degree of error is inevitable. Here, we present a general evolutionarily stable strategy (ESS) model of the handicap principle which incorporates perceptual error. We show that, for a wide range of error functions, error-prone signalling systems must be honest at equilibrium. Perceptual error is thus unlikely to threaten the validity of the handicap principle. Our model represents a step towards greater realism, and also opens up new possibilities for biological signalling theory. Concurrent displays, direct perception of quality, and the evolution of 'amplifiers' and 'attenuators' are all probable features of real signalling systems, yet handicap models based on the assumption of error-free communication cannot accommodate these possibilities. PMID:1354361

  4. Aircraft system modeling error and control error

    NASA Technical Reports Server (NTRS)

    Kulkarni, Nilesh V. (Inventor); Kaneshige, John T. (Inventor); Krishnakumar, Kalmanje S. (Inventor); Burken, John J. (Inventor)

    2012-01-01

    A method for modeling error-driven adaptive control of an aircraft. Normal aircraft plant dynamics is modeled, using an original plant description in which a controller responds to a tracking error e(k) to drive the component to a normal reference value according to an asymptote curve. Where the system senses that (1) at least one aircraft plant component is experiencing an excursion and (2) the return of this component value toward its reference value is not proceeding according to the expected controller characteristics, neural network (NN) modeling of aircraft plant operation may be changed. However, if (1) is satisfied but the error component is returning toward its reference value according to expected controller characteristics, the NN will continue to model operation of the aircraft plant according to an original description.

  5. Dimensional jump in quantum error correction

    NASA Astrophysics Data System (ADS)

    Bombín, Héctor

    2016-04-01

    Topological stabilizer codes with different spatial dimensions have complementary properties. Here I show that the spatial dimension can be switched using gauge fixing. Combining 2D and 3D gauge color codes in a 3D qubit lattice, fault-tolerant quantum computation can be achieved with constant time overhead on the number of logical gates, up to efficient global classical computation, using only local quantum operations. Single-shot error correction plays a crucial role.

  6. Error detection method

    DOEpatents

    Olson, Eric J.

    2013-06-11

    An apparatus, program product, and method that run an algorithm on a hardware based processor, generate a hardware error as a result of running the algorithm, generate an algorithm output for the algorithm, compare the algorithm output to another output for the algorithm, and detect the hardware error from the comparison. The algorithm is designed to cause the hardware based processor to heat to a degree that increases the likelihood of hardware errors to manifest, and the hardware error is observable in the algorithm output. As such, electronic components may be sufficiently heated and/or sufficiently stressed to create better conditions for generating hardware errors, and the output of the algorithm may be compared at the end of the run to detect a hardware error that occurred anywhere during the run that may otherwise not be detected by traditional methodologies (e.g., due to cooling, insufficient heat and/or stress, etc.).

  7. The Error in Total Error Reduction

    PubMed Central

    Witnauer, James E.; Urcelay, Gonzalo P.; Miller, Ralph R.

    2013-01-01

    Most models of human and animal learning assume that learning is proportional to the discrepancy between a delivered outcome and the outcome predicted by all cues present during that trial (i.e., total error across a stimulus compound). This total error reduction (TER) view has been implemented in connectionist and artificial neural network models to describe the conditions under which weights between units change. Electrophysiological work has revealed that the activity of dopamine neurons is correlated with the total error signal in models of reward learning. Similar neural mechanisms presumably support fear conditioning, human contingency learning, and other types of learning. Using a computational modelling approach, we compared several TER models of associative learning to an alternative model that rejects the TER assumption in favor of local error reduction (LER), which assumes that learning about each cue is proportional to the discrepancy between the delivered outcome and the outcome predicted by that specific cue on that trial. The LER model provided a better fit to the reviewed data than the TER models. Given the superiority of the LER model with the present data sets, acceptance of TER should be tempered. PMID:23891930

  8. Error coding simulations

    NASA Technical Reports Server (NTRS)

    Noble, Viveca K.

    1993-01-01

    There are various elements such as radio frequency interference (RFI) which may induce errors in data being transmitted via a satellite communication link. When a transmission is affected by interference or other error-causing elements, the transmitted data becomes indecipherable. It becomes necessary to implement techniques to recover from these disturbances. The objective of this research is to develop software which simulates error control circuits and evaluate the performance of these modules in various bit error rate environments. The results of the evaluation provide the engineer with information which helps determine the optimal error control scheme. The Consultative Committee for Space Data Systems (CCSDS) recommends the use of Reed-Solomon (RS) and convolutional encoders and Viterbi and RS decoders for error correction. The use of forward error correction techniques greatly reduces the received signal to noise needed for a certain desired bit error rate. The use of concatenated coding, e.g. inner convolutional code and outer RS code, provides even greater coding gain. The 16-bit cyclic redundancy check (CRC) code is recommended by CCSDS for error detection.

  9. Model Error Budgets

    NASA Technical Reports Server (NTRS)

    Briggs, Hugh C.

    2008-01-01

    An error budget is a commonly used tool in design of complex aerospace systems. It represents system performance requirements in terms of allowable errors and flows these down through a hierarchical structure to lower assemblies and components. The requirements may simply be 'allocated' based upon heuristics or experience, or they may be designed through use of physics-based models. This paper presents a basis for developing an error budget for models of the system, as opposed to the system itself. The need for model error budgets arises when system models are a principle design agent as is increasingly more common for poorly testable high performance space systems.

  10. Error coding simulations

    NASA Astrophysics Data System (ADS)

    Noble, Viveca K.

    1993-11-01

    There are various elements such as radio frequency interference (RFI) which may induce errors in data being transmitted via a satellite communication link. When a transmission is affected by interference or other error-causing elements, the transmitted data becomes indecipherable. It becomes necessary to implement techniques to recover from these disturbances. The objective of this research is to develop software which simulates error control circuits and evaluate the performance of these modules in various bit error rate environments. The results of the evaluation provide the engineer with information which helps determine the optimal error control scheme. The Consultative Committee for Space Data Systems (CCSDS) recommends the use of Reed-Solomon (RS) and convolutional encoders and Viterbi and RS decoders for error correction. The use of forward error correction techniques greatly reduces the received signal to noise needed for a certain desired bit error rate. The use of concatenated coding, e.g. inner convolutional code and outer RS code, provides even greater coding gain. The 16-bit cyclic redundancy check (CRC) code is recommended by CCSDS for error detection.

  11. Effects of perceived reliability and generalization of crime-related information on detection in the concealed information test.

    PubMed

    Elaad, Eitan

    2010-03-01

    The accuracy of the Concealed Information Test (CIT) in detecting information concealed by informed innocent participants was assessed under varying levels of probability that the obtained information is related to the crime and is therefore correct. For this purpose, 64 participants were randomly assigned to four experimental conditions that were formed by probability levels that the gathered information is correct and is related to the crime. Either absolutely correct (100% correct), highly correct (80%, correct), highly incorrect (20% correct) or totally incorrect (0%, correct) conditions were created. Response generalization was manipulated by replacing 3 of 6 correct items with related stimuli. The replaced stimuli were related to the correct items either semantically, phonetically, or numerically. Informed innocent participants showed larger electrodermal responses to items with a higher probability of being correct. It was further found that participants elicited stronger responses to correct than to replaced items. Theoretical and practical implications of the present results are discussed. PMID:20093151

  12. Task relevance and recognition of concealed information have different influences on electrodermal activity and event-related brain potentials.

    PubMed

    Gamer, Matthias; Berti, Stefan

    2010-03-01

    This study aimed at differentiating between memory- and task-related processes and their correlates on the electrodermal and electrocortical level during information concealment. Variations of the Guilty Knowledge Test were implemented in two experiments while we measured skin conductance responses (SCRs) and event-related brain potentials. P300 amplitudes were specifically enhanced for items requiring a deviant behavioral response but they were not sensitive to concealed knowledge. In contrast, N200 amplitudes differed between memorized and irrelevant items in both experiments. SCR measures reflected a combined influence of task relevance and probe recognition, and they provided incremental validity above N200 amplitudes. These results suggest that the P300 mainly reflects task relevance in the given experimental setting whereas the N200 amplitude is sensitive to previously encoded information and potentially linked to response monitoring processes. PMID:20003148

  13. The compassion of concealment: silence between older caregivers and dying patients in the AIDS era, northwest Tanzania.

    PubMed

    de Klerk, Josien

    2012-01-01

    In northwest Tanzania, where AIDS has been present for 25 years, AIDS-related illness is a trigger through which community members discuss personal experiences of loss and assess social relationships. The terminal phase of AIDS demands intimate social relations between patients and caretakers. In this final phase of illness, caretakers are scrutinised for their behaviour towards the patient. In the moral world in which caregiving takes place, the act of concealing is considered an intrinsic part of proper care. Current debates on morality, stigma and secrecy inform my argument that acts of concealment around dying are not so much related to the exclusion and ostracism of patients but to inclusion and compassionate care. PMID:22092190

  14. Grossly calcified choroid plexus concealing foramen of Monro meningiomas as an unusual cause of obstructive hydrocephalus

    PubMed Central

    Kawaguchi, Tomohiro; Fujimura, Miki; Tominaga, Teiji

    2016-01-01

    Various intraventricular tumors can present with calcifications; however, the choroid plexus can also have physiological calcifications. This is the first case report of meningiomas located at the bilateral foramen of Monro (FOM), concealed by a grossly calcified choroid plexus, presenting with obstructive hydrocephalus. A 60-year-old woman with disturbed consciousness was admitted by ambulance. Head computed tomography revealed significantly high-density lesions that smoothly extended from the choroid plexus of the lateral ventricles to the third ventricle. They occupied both sides of the FOM, resulting in obstructive hydrocephalus. The diagnostic endoscopic biopsy was performed using a flexible neuroendoscopic system, and an egg shell-like grossly calcified choroid plexus was found to smoothly extend toward the FOM. Resection was not selected because the calcified lesions had tightly adhered to the veins and fornix; therefore, the patient underwent ventriculo-peritoneal shunting. The lesions were histologically identified as psammomatous meningiomas with low proliferation potential (the Ki-67 labeling index was lower than 1%). She was discharged 10 days after surgery without neurological deficits. As calcifications can have tumoral and nontumoral origins, we considered neuroendoscopic exploration to be essential in order to achieve an accurate diagnosis and select optimal management. PMID:26889294

  15. Hiding true emotions: micro-expressions in eyes retrospectively concealed by mouth movements

    PubMed Central

    Iwasaki, Miho; Noguchi, Yasuki

    2016-01-01

    When we encounter someone we dislike, we may momentarily display a reflexive disgust expression, only to follow-up with a forced smile and greeting. Our daily lives are replete with a mixture of true and fake expressions. Nevertheless, are these fake expressions really effective at hiding our true emotions? Here we show that brief emotional changes in the eyes (micro-expressions, thought to reflect true emotions) can be successfully concealed by follow-up mouth movements (e.g. a smile). In the same manner as backward masking, mouth movements of a face inhibited conscious detection of all types of micro-expressions in that face, even when viewers paid full attention to the eye region. This masking works only in a backward direction, however, because no disrupting effect was observed when the mouth change preceded the eye change. These results provide scientific evidence for everyday behaviours like smiling to dissemble, and further clarify a major reason for the difficulty we face in discriminating genuine from fake emotional expressions. PMID:26915796

  16. Detection of contraband concealed on the body using x-ray imaging

    NASA Astrophysics Data System (ADS)

    Smith, Gerald J.

    1997-01-01

    In an effort to avoid detection, smugglers and terrorists are increasingly using the body as a vehicle for transporting illicit drugs, weapons, and explosives. This trend illustrates the natural tendency of traffickers to seek the path of least resistance, as improved interdiction technology and operational effectiveness have been brought to bear on other trafficking avenues such as luggage, cargo, and parcels. In response, improved technology for human inspection is being developed using a variety of techniques. ASE's BodySearch X-ray Inspection Systems uses backscatter x-ray imaging of the human body to quickly, safely, and effectively screen for drugs, weapons, and explosives concealed on the body. This paper reviews the law enforcement and social issues involved in human inspections, and briefly describes the ASE BodySearch systems. Operator training, x-ray image interpretation, and maximizing systems effectiveness are also discussed. Finally, data collected from operation of the BodySearch system in the field is presented, and new law enforcement initiatives which have come about due to recent events are reviewed.

  17. Paternal signature in kin recognition cues of a social insect: concealed in juveniles, revealed in adults

    PubMed Central

    Wong, Janine W. Y.; Meunier, Joël; Lucas, Christophe; Kölliker, Mathias

    2014-01-01

    Kin recognition is a key mechanism to direct social behaviours towards related individuals or avoid inbreeding depression. In insects, recognition is generally mediated by cuticular hydrocarbon (CHC) compounds, which are partly inherited from parents. However, in social insects, potential nepotistic conflicts between group members from different patrilines are predicted to select against the expression of patriline-specific signatures in CHC profiles. Whereas this key prediction in the evolution of insect signalling received empirical support in eusocial insects, it remains unclear whether it can be generalized beyond eusociality to less-derived forms of social life. Here, we addressed this issue by manipulating the number of fathers siring clutches tended by females of the European earwig, Forficula auricularia, analysing the CHC profiles of the resulting juvenile and adult offspring, and using discriminant analysis to estimate the information content of CHC with respect to the maternal and paternal origin of individuals. As predicted, if paternally inherited cues are concealed during family life, increases in mating number had no effect on information content of CHC profiles among earwig juveniles, but significantly decreased the one among adult offspring. We suggest that age-dependent expression of patriline-specific cues evolved to limit the risks of nepotism as family-living juveniles and favour sibling-mating avoidance as group-living adults. These results highlight the role of parental care and social life in the evolution of chemical communication and recognition cues. PMID:25165768

  18. Paternal signature in kin recognition cues of a social insect: concealed in juveniles, revealed in adults.

    PubMed

    Wong, Janine W Y; Meunier, Joël; Lucas, Christophe; Kölliker, Mathias

    2014-10-22

    Kin recognition is a key mechanism to direct social behaviours towards related individuals or avoid inbreeding depression. In insects, recognition is generally mediated by cuticular hydrocarbon (CHC) compounds, which are partly inherited from parents. However, in social insects, potential nepotistic conflicts between group members from different patrilines are predicted to select against the expression of patriline-specific signatures in CHC profiles. Whereas this key prediction in the evolution of insect signalling received empirical support in eusocial insects, it remains unclear whether it can be generalized beyond eusociality to less-derived forms of social life. Here, we addressed this issue by manipulating the number of fathers siring clutches tended by females of the European earwig, Forficula auricularia, analysing the CHC profiles of the resulting juvenile and adult offspring, and using discriminant analysis to estimate the information content of CHC with respect to the maternal and paternal origin of individuals. As predicted, if paternally inherited cues are concealed during family life, increases in mating number had no effect on information content of CHC profiles among earwig juveniles, but significantly decreased the one among adult offspring. We suggest that age-dependent expression of patriline-specific cues evolved to limit the risks of nepotism as family-living juveniles and favour sibling-mating avoidance as group-living adults. These results highlight the role of parental care and social life in the evolution of chemical communication and recognition cues. PMID:25165768

  19. Grossly calcified choroid plexus concealing foramen of Monro meningiomas as an unusual cause of obstructive hydrocephalus.

    PubMed

    Kawaguchi, Tomohiro; Fujimura, Miki; Tominaga, Teiji

    2016-01-01

    Various intraventricular tumors can present with calcifications; however, the choroid plexus can also have physiological calcifications. This is the first case report of meningiomas located at the bilateral foramen of Monro (FOM), concealed by a grossly calcified choroid plexus, presenting with obstructive hydrocephalus. A 60-year-old woman with disturbed consciousness was admitted by ambulance. Head computed tomography revealed significantly high-density lesions that smoothly extended from the choroid plexus of the lateral ventricles to the third ventricle. They occupied both sides of the FOM, resulting in obstructive hydrocephalus. The diagnostic endoscopic biopsy was performed using a flexible neuroendoscopic system, and an egg shell-like grossly calcified choroid plexus was found to smoothly extend toward the FOM. Resection was not selected because the calcified lesions had tightly adhered to the veins and fornix; therefore, the patient underwent ventriculo-peritoneal shunting. The lesions were histologically identified as psammomatous meningiomas with low proliferation potential (the Ki-67 labeling index was lower than 1%). She was discharged 10 days after surgery without neurological deficits. As calcifications can have tumoral and nontumoral origins, we considered neuroendoscopic exploration to be essential in order to achieve an accurate diagnosis and select optimal management. PMID:26889294

  20. Finding concealed active faults: Extending the southern Whidbey Island fault across the Puget Lowland, Washington

    NASA Astrophysics Data System (ADS)

    Sherrod, Brian L.; Blakely, Richard J.; Weaver, Craig S.; Kelsey, Harvey M.; Barnett, Elizabeth; Liberty, Lee; Meagher, Karen L.; Pape, Kristin

    2008-05-01

    The southern Whidbey Island fault zone (SWIF), as previously mapped using borehole data, potential field anomalies, and marine seismic reflection surveys, consists of three subparallel, northwest trending strands extending ˜100 km from near Vancouver Island to the northern Puget Lowland. East of Puget Sound, the SWIF makes landfall between the cities of Seattle and Everett but is concealed beneath a thick mantle of young glacial deposits and vegetation. A ˜20-km-wide, northwest trending swath of subparallel, low-amplitude aeromagnetic anomalies crosses this region of the Puget Lowland and is on strike with the SWIF. The most prominent aeromagnetic anomaly, the Cottage Lake lineament, extends at least 18 km and lies approximately on strike with the SWIF on Whidbey Island. Subtle scarps and topographic lineaments on Pleistocene surfaces, visible on high-resolution lidar topography at a number of locations along the SWIF, lie on or near these magnetic anomalies. In the field, scarps exhibit northeast-side-up and vertical relief of 1 to 5 m. Excavations across several lidar scarps lying on or near magnetic anomalies show evidence for multiple folding and faulting events since deglaciation, most likely above buried reverse/oblique faults. Excavations in areas away from magnetic anomalies do not show evidence of tectonic deformation. In total, paleoseismological evidence suggests that the SWIF produced at least four earthquakes since deglaciation about 16,400 years ago, the most recent less than 2700 years ago.

  1. Children's Lie-Telling to Conceal a Parent's Transgression: Legal Implications

    PubMed Central

    Talwar, Victoria; Lee, Kang; Bala, Nicholas; Lindsay, R. C. L.

    2008-01-01

    Children's lie-telling behavior to conceal the transgression of a parent was examined in 2 experiments. In Experiment 1 (N = 137), parents broke a puppet and told their children (3–11-year-olds) not to tell anyone. Children answered questions about the event. Children's moral understanding of truth- and lie-telling was assessed by a second interviewer and the children then promised to tell the truth (simulating court competence examination procedures). Children were again questioned about what happened to the puppet. Regardless of whether the interview was conducted with their parent absent or present, most children told the truth about their parents' transgression. When the likelihood of the child being blamed for the transgression was reduced, significantly more children lied. There was a significant, yet limited, relation between children's lie-telling behavior and their moral understanding of lie- or truth-telling. Further, after children were questioned about issues concerning truth- and lie-telling and asked to promise to tell the truth, significantly more children told the truth about their parents' transgression. Experiment 2 (N = 64) replicated these findings, with children who were questioned about lies and who then promised to tell the truth more likely to tell the truth in a second interview than children who did not participate in this procedure before questioning. Implications for the justice system are discussed. PMID:15499823

  2. Mobile TNA system to detect explosives and drugs concealed in cars and trucks

    NASA Astrophysics Data System (ADS)

    Bendahan, Joseph; Gozani, Tsahi

    1998-12-01

    The drug problem in the U.S. is serious and efforts to fight it are constrained by the lack of adequate means to curb the inflow of smuggled narcotics into the country through cargo containers. Also, events such as the disastrous explosion in Oklahoma City, the IRA bombing in London, and the bombing of the U.S. military residence in Dharan make the development of new tools for the detection of explosives and drugs in vehicles imperative. Thermal neutron analysis (TNA) technology, developed for the detection of explosives in suitcases, and detection of landmines and unexploded ordnance is presently being applied to the nonintrusive detection of significant amounts of explosives and drugs concealed in cars, trucks and large cargo containers. TNA technology is based on the analysis of characteristic gamma rays emitted following thermal neutron capture. A TNA system can be used in a variety of operational scenarios, such as inspection before an unloaded cargo container from a spit is moved to temporary storage, inspection of trucks unloaded from a ferry, or inspection of vehicles parked close to Federal building or military bases. This paper will discuss the detection process and operational scenarios, and will present results from recent simulations and measurements.

  3. Fourier transform infared spectroscopic imaging for the identification of concealed drug residue particles and fingerprints

    NASA Astrophysics Data System (ADS)

    Ricci, Camilla; Chan, K. L. Andrew; Kazarian, Sergei G.

    2006-09-01

    Conventional FTIR spectroscopy and microscopy has been widely used in forensic science. New opportunities exist to obtain rapid chemical images and to enhance the sensitivity of detection of trace materials using attenuated total reflection (ATR) Fourier transform infrared (FTIR) spectroscopy coupled with a focal-plane array (FPA) detector. In this work, the sensitivity of ATR-FTIR spectroscopic imaging using three different kinds of ATR crystals (Ge coupled with an infrared microscope, ZnSe and diamond) and resulting in three different optical arrangements for the detection of model drug particles is discussed. Model systems of ibuprofen and paracetamol particles having a size below 32 micrometers have been prepared by sieving. The sensitivity level in the three different approaches has been compared and it has been found that both micro and macro-ATR imaging methods have proven to be a promising techniques for the identification of concealed drug particles. To demonstrate the power and applicability of FTIR chemical imaging to forensic research, various examples are discussed. This includes investigation of the changes of chemical nature of latent fingerprint residue under controlled conditions of humidity and temperature studied by ATR-FTIR imaging. This study demonstrates the potential of spectroscopic imaging for visualizing the chemical changes of fingerprints.

  4. Detection and classification of concealed weapons using a magnetometer-based portal

    NASA Astrophysics Data System (ADS)

    Kotter, Dale K.; Roybal, Lyle G.; Polk, Robert E.

    2002-08-01

    A concealed weapons detection technology was developed through the support of the National Institute of Justice (NIJ) to provide a non intrusive means for rapid detection, location, and archiving of data (including visual) of potential suspects and weapon threats. This technology, developed by the Idaho National Engineering and Environmental Laboratory (INEEL), has been applied in a portal style weapons detection system using passive magnetic sensors as its basis. This paper will report on enhancements to the weapon detection system to enable weapon classification and to discriminate threats from non-threats. Advanced signal processing algorithms were used to analyze the magnetic spectrum generated when a person passes through a portal. These algorithms analyzed multiple variables including variance in the magnetic signature from random weapon placement and/or orientation. They perform pattern recognition and calculate the probability that the collected magnetic signature correlates to a known database of weapon versus non-weapon responses. Neural networks were used to further discriminate weapon type and identify controlled electronic items such as cell phones and pagers. False alarms were further reduced by analyzing the magnetic detector response by using a Joint Time Frequency Analysis digital signal processing technique. The frequency components and power spectrum for a given sensor response were derived. This unique fingerprint provided additional information to aid in signal analysis. This technology has the potential to produce major improvements in weapon detection and classification.

  5. Hiding true emotions: micro-expressions in eyes retrospectively concealed by mouth movements.

    PubMed

    Iwasaki, Miho; Noguchi, Yasuki

    2016-01-01

    When we encounter someone we dislike, we may momentarily display a reflexive disgust expression, only to follow-up with a forced smile and greeting. Our daily lives are replete with a mixture of true and fake expressions. Nevertheless, are these fake expressions really effective at hiding our true emotions? Here we show that brief emotional changes in the eyes (micro-expressions, thought to reflect true emotions) can be successfully concealed by follow-up mouth movements (e.g. a smile). In the same manner as backward masking, mouth movements of a face inhibited conscious detection of all types of micro-expressions in that face, even when viewers paid full attention to the eye region. This masking works only in a backward direction, however, because no disrupting effect was observed when the mouth change preceded the eye change. These results provide scientific evidence for everyday behaviours like smiling to dissemble, and further clarify a major reason for the difficulty we face in discriminating genuine from fake emotional expressions. PMID:26915796

  6. The caregiving bind: concealing the demands of informal care can undermine the caregiving identity.

    PubMed

    Moore, Helen; Gillespie, Alex

    2014-09-01

    Disagreements and misunderstandings between informal caregivers and care-receivers have been widely reported, but the causes are unclear. The present article compares the views of people with acquired brain injury and their main informal caregivers (28 dyads, n = 56). First, we report a quantitative analysis finding that the majority of disagreements were about caregivers' identity. Caregivers saw themselves as less confident, less intelligent, more embarrassed, more independent and more overprotective than care-receivers rated them to be. Caregivers understood the care-receivers' ratings but disagreed with them' Second, we report a qualitative analysis focussing on how caregivers felt themselves to be perceived by significant others. Caregivers felt that the care-receiver, family members, the general public, health services and even friends often have negative views of them. The 'caregiving bind' is proposed as a cause of caregivers' negative identity. It arises when caregivers try to protect the care-receiver's identity by concealing the extent of informal care provision, with the unintended consequence of undermining the prospects of the caregiver receiving positive social recognition for the challenging work of caregiving. The caregiving bind has implications for therapy and points to the potential of friends and health services to provide caregivers with positive social recognition. PMID:24996218

  7. Effect of Temperature and Moisture on the Development of Concealed Damage in Raw Almonds (Prunus dulcis).

    PubMed

    Rogel-Castillo, Cristian; Zuskov, David; Chan, Bronte Lee; Lee, Jihyun; Huang, Guangwei; Mitchell, Alyson E

    2015-09-23

    Concealed damage (CD) is a brown discoloration of nutmeat that appears only after kernels are treated with moderate heat (e.g., roasting). Identifying factors that promote CD in almonds is of significant interest to the nut industry. Herein, the effect of temperature (35 and 45 °C) and moisture (<5, 8, and 11%) on the composition of volatiles in raw almonds (Prunus dulcis var. Nonpareil) was studied using HS-SPME-GC/MS. A CIE LCh colorimetric method was developed to identify raw almonds with CD. A significant increase in CD was demonstrated in almonds exposed to moisture (8% kernel moisture content) at 45 °C as compared to 35 °C. Elevated levels of volatiles related to lipid peroxidation and amino acid degradation were observed in almonds with CD. These results suggest that postharvest moisture exposure resulting in an internal kernel moisture ≥ 8% is a key factor in the development of CD in raw almonds and that CD is accelerated by temperature. PMID:26320359

  8. Systematic changes in tonic physiological activities during the Concealed Information Test.

    PubMed

    Ogawa, Tokihiro; Matsuda, Izumi; Hirota, Akihisa; Takasawa, Noriyoshi

    2014-12-01

    Many studies on the Concealed Information Test have focused on phasic physiological changes that are temporally locked to stimulus presentation. However, little is known about changes in tonic, basal physiological levels throughout a stimulus series. This study focused on changes in tonic physiological activities during the CIT. Thirty-nine participants carried out a mock theft and subsequently received a CIT. Skin conductance, heart rate, and normalized pulse volume (NPV) were recorded. The pre-stimulus physiological level of these measures throughout the CIT series was compared across a question series with different serial positions of the relevant item. Results showed that changes in the pre-stimulus level differed depending on the serial position of the relevant item. Skin conductance declined throughout the series, but showed a transient increase after relevant item presentation. Heart rate was relatively constant throughout the series, but decreased after relevant item presentation. NPV continued to decrease until the relevant item, but increased thereafter, indicating a pattern similar to the classic Peak of Tension concept. In addition, the pre-stimulus NPV showed a significant relevant-irrelevant difference. Theoretical and practical implications of these findings are discussed. PMID:25152172

  9. Psychophysiological detection of concealed information shared by groups: an empirical study of the searching CIT.

    PubMed

    Breska, Assaf; Zaidenberg, Daphna; Gronau, Nurit; Ben-Shakhar, Gershon

    2014-06-01

    This study focused on the application of the Concealed Information Test (CIT) to situations in which the crime-related information is shared by a group of suspects but is not available to the investigators (a method known as the "searching CIT," or SCIT). Twenty-two groups, each comprising 4 to 7 participants (115 in total), planned 1 of 2 mock crimes (kidnapping or bank robbery). While planning the crime, each group decided on 5 crime-related critical items (e.g., the city in which the bank was located). Each critical item was chosen from a predefined set of 4 alternatives. At a second stage, the SCIT was administered individually and each participant was tested on the 2 crimes-the actual planned crime, in which the participant was "guilty," and the unplanned crime, in which the participant was "innocent." Two algorithms, adopted from Breska, Ben-Shakhar, and Gronau (2012), were applied to detect the critical items and to differentiate between "guilty" and "innocent" participants. Findings revealed that differentiation efficiency based on electrodermal and respiration measures was identical to that obtained with the standard CIT when applied to large groups, but lower, although significantly greater than chance, when applied to differentiate between small groups. PMID:24564513

  10. Improved method for calculating the respiratory line length in the Concealed Information Test.

    PubMed

    Matsuda, Izumi; Ogawa, Tokihiro

    2011-08-01

    The Concealed Information Test (CIT) assesses an examinee's knowledge about a crime based on response differences between crime-relevant and crime-irrelevant items. One effective measure in the CIT is the respiration line length, which is the average of the moving distances of the respiration curve in a specified time interval after the item onset. However, the moving distance differs between parts of a respiratory cycle. As a result, the calculated respiration line length is biased by how the parts of the respiratory cycles are included in the time interval. To resolve this problem, we propose a weighted average method, which calculates the respiration line length per cycle and weights it with the proportion that the cycle occupies in the time interval. Simulation results indicated that the weighted average method removes the bias of respiration line lengths compared to the original method. The results of experimental CIT data demonstrated that the weighted average method significantly increased the discrimination performance as compared with the original method. The weighted average method is a promising method for assessing respiration changes in response to question items more accurately, which improves the respiration-based discrimination performance of the CIT. PMID:21689693

  11. A possible concealed pluton in Beaverhead and Madison Counties, Montana, and Clark County, Idaho

    USGS Publications Warehouse

    Witkind, Irving Jerome

    1974-01-01

    A northeast-trending magnetic anomaly in parts of Beaverhead and Madison Counties, Mont., and Clark County, Idaho, may reflect the trend, shape, and size of a concealed pluton. The type of rock that forms the pluton(?) is unknown. A small volcanic pipe, possibly a diatreme, is at the southeast end of the high. The pipe, about 92 m (300 ft) in diameter, consists of a rubbly basalt-like matrix through which are scattered xenoliths of Precambrian crystalline rocks and of various Paleozoic and Mesozoic strata. It is uncertain whether the juxtaposition of the pipe and the magnetic high is meaningful or is merely fortuitous. Although no mineralized rock was found in the area underlain by the anomaly, placer gold has been found nearby. Some 113 km (70 mi) to the west, in Custer and Lemhi Counties, Idaho, a similar northeast-trending magnetic high marks the site of the Gilmore mining district. The similarities in trend, shape, and magnitude between the two anomalies suggest that the high in Beaverhead and Madison Counties should be investigated for undetected mineral deposits, possibly by a geochemical survey.

  12. Current Research and Potential Applications of the Concealed Information Test: An Overview

    PubMed Central

    Ben-Shakhar, Gershon

    2012-01-01

    Research interest in psychophysiological detection of deception has significantly increased since the September 11 terror attack in the USA. In particular, the concealed information test (CIT), designed to detect memory traces that can connect suspects to a certain crime, has been extensively studied. In this paper I will briefly review several psychophysiological detection paradigms that have been studied, with a focus on the CIT. The theoretical background of the CIT, its strength and weaknesses, its potential applications as well as research finings related to its validity (based on a recent meta-analytic study), will be discussed. Several novel research directions, with a focus on factors that may affect CIT detection in realistic settings (e.g., memory for crime details; the effect of emotional stress during crime execution) will be described. Additionally, research focusing on mal-intentions and attempts to detect terror networks using information gathered from groups of suspects using both the standard CIT and the searching CIT will be reviewed. Finally, implications of current research to the actual application of the CIT will be discussed and several recommendations that can enhance the use of the CIT will be made. PMID:23060826

  13. New way for concealed object detection using passive THz images without their viewing

    NASA Astrophysics Data System (ADS)

    Trofimov, Vyacheslav A.; Trofimov, Vladislav V.

    2015-10-01

    We developed new real-time algorithm, based on the correlation function, for concealed object detection using computer processing of the passive THz images without their viewing. This algorithm allows us to make a conclusion about presence of forbidden objects on the human body. To increase the THz image quality we propose a new algorithm in comparison with algorithms which have developed by us early. It allows to increase a temperature resolution of the passive THz camera at least 20 times. This approach is based on a correlation function application for computer processing of the raw THz image. The correlation computing occurs between characteristics of the raw THz image, produced by the passive THz camera, and characteristics of a standard image corresponding to one of the detecting objects (knife, gun,…). The standard image moves in two directions along a image under analysis. As a result, 2 D correlation function is obtained. Multiplying this function by color number belonging to a grey scale, we restore the image under the analysis. This allows to suppress a noise on a new image. This algorithm is very convenient for using and has a high performance. Developed approach opens also new type of algorithms for the passive THz image quality enhancing.

  14. Influence of countermeasures on the validity of the Concealed Information Test.

    PubMed

    Peth, Judith; Suchotzki, Kristina; Gamer, Matthias

    2016-09-01

    The Concealed Information Test (CIT) is a psychophysiological technique that allows for detecting crime-related knowledge. Usually, autonomic response measures are used for this purpose, but ocular measures have also been proposed recently. Prior studies reported heterogeneous results for the usage of countermeasures (CM) to corrupt the CIT's validity, depending on the CM technique and the dependent measure. The current study systematically compared the application of physical and mental CM on autonomic and ocular measures during the CIT. Sixty participants committed a mock crime and were assigned to one of three guilty conditions: standard guilty (without CM), physical CM, or mental CM. An additional group of 20 innocents was investigated with the same CIT to calculate validity estimates. Electrodermal responses were more vulnerable for CM usage compared to heart rate and respiration, and physical CM were more effective than mental CM. Independent of CM usage, a combined score of autonomic responses enabled a valid differentiation between guilty and innocent examinees. Fixations and blinks also allowed for detecting crime-related knowledge, but these measures were more affected by CM application than autonomic responses. The current study delivered further evidence that CM differentially impact physiological and ocular responses in the CIT. Whereas individual data channels were strongly affected by CM usage, a combination of different response measures yielded a relatively stable differentiation of guilty and innocent examinees when mental CM were used. These findings are especially relevant for field applications and might inspire future studies to detect or prevent CM usage in CIT examinations. PMID:27338719

  15. The Invisible Work of Closeting: A Qualitative Study About Strategies Used by Lesbian and Gay Persons to Conceal Their Sexual Orientation.

    PubMed

    Malterud, Kirsti; Bjorkman, Mari

    2016-10-01

    The last decades have offered substantial improvement regarding human rights for lesbian and gay (LG) persons. Yet LG persons are often in the closet, concealing their sexual orientation. We present a qualitative study based on 182 histories submitted from 161 LG individuals to a Web site. The aim was to explore experiences of closeting among LG persons in Norway. A broad range of strategies was used for closeting, even among individuals who generally considered themselves to be out of the closet. Concealment was enacted by blunt denial, clever avoidance, or subtle vagueness. Other strategies included changing or eliminating the pronoun or name of the partner in ongoing conversations. Context-dependent concealment, differentiating between persons, situations, or arenas, was repeatedly applied for security or convenience. We propose a shift from "being in the closet" to "situated concealment of sexual orientation." PMID:26914706

  16. Everyday Scale Errors

    ERIC Educational Resources Information Center

    Ware, Elizabeth A.; Uttal, David H.; DeLoache, Judy S.

    2010-01-01

    Young children occasionally make "scale errors"--they attempt to fit their bodies into extremely small objects or attempt to fit a larger object into another, tiny, object. For example, a child might try to sit in a dollhouse-sized chair or try to stuff a large doll into it. Scale error research was originally motivated by parents' and…

  17. Medical error and disclosure.

    PubMed

    White, Andrew A; Gallagher, Thomas H

    2013-01-01

    Errors occur commonly in healthcare and can cause significant harm to patients. Most errors arise from a combination of individual, system, and communication failures. Neurologists may be involved in harmful errors in any practice setting and should familiarize themselves with tools to prevent, report, and examine errors. Although physicians, patients, and ethicists endorse candid disclosure of harmful medical errors to patients, many physicians express uncertainty about how to approach these conversations. A growing body of research indicates physicians often fail to meet patient expectations for timely and open disclosure. Patients desire information about the error, an apology, and a plan for preventing recurrence of the error. To meet these expectations, physicians should participate in event investigations and plan thoroughly for each disclosure conversation, preferably with a disclosure coach. Physicians should also anticipate and attend to the ongoing medical and emotional needs of the patient. A cultural change towards greater transparency following medical errors is in motion. Substantial progress is still required, but neurologists can further this movement by promoting policies and environments conducive to open reporting, respectful disclosure to patients, and support for the healthcare workers involved. PMID:24182370

  18. Comparing Absolute Error with Squared Error for Evaluating Empirical Models of Continuous Variables: Compositions, Implications, and Consequences

    NASA Astrophysics Data System (ADS)

    Gao, J.

    2014-12-01

    Reducing modeling error is often a major concern of empirical geophysical models. However, modeling errors can be defined in different ways: When the response variable is continuous, the most commonly used metrics are squared (SQ) and absolute (ABS) errors. For most applications, ABS error is the more natural, but SQ error is mathematically more tractable, so is often used as a substitute with little scientific justification. Existing literature has not thoroughly investigated the implications of using SQ error in place of ABS error, especially not geospatially. This study compares the two metrics through the lens of bias-variance decomposition (BVD). BVD breaks down the expected modeling error of each model evaluation point into bias (systematic error), variance (model sensitivity), and noise (observation instability). It offers a way to probe the composition of various error metrics. I analytically derived the BVD of ABS error and compared it with the well-known SQ error BVD, and found that not only the two metrics measure the characteristics of the probability distributions of modeling errors differently, but also the effects of these characteristics on the overall expected error are different. Most notably, under SQ error all bias, variance, and noise increase expected error, while under ABS error certain parts of the error components reduce expected error. Since manipulating these subtractive terms is a legitimate way to reduce expected modeling error, SQ error can never capture the complete story embedded in ABS error. I then empirically compared the two metrics with a supervised remote sensing model for mapping surface imperviousness. Pair-wise spatially-explicit comparison for each error component showed that SQ error overstates all error components in comparison to ABS error, especially variance-related terms. Hence, substituting ABS error with SQ error makes model performance appear worse than it actually is, and the analyst would more likely accept a

  19. Uncorrected refractive errors

    PubMed Central

    Naidoo, Kovin S; Jaggernath, Jyoti

    2012-01-01

    Global estimates indicate that more than 2.3 billion people in the world suffer from poor vision due to refractive error; of which 670 million people are considered visually impaired because they do not have access to corrective treatment. Refractive errors, if uncorrected, results in an impaired quality of life for millions of people worldwide, irrespective of their age, sex and ethnicity. Over the past decade, a series of studies using a survey methodology, referred to as Refractive Error Study in Children (RESC), were performed in populations with different ethnic origins and cultural settings. These studies confirmed that the prevalence of uncorrected refractive errors is considerably high for children in low-and-middle-income countries. Furthermore, uncorrected refractive error has been noted to have extensive social and economic impacts, such as limiting educational and employment opportunities of economically active persons, healthy individuals and communities. The key public health challenges presented by uncorrected refractive errors, the leading cause of vision impairment across the world, require urgent attention. To address these issues, it is critical to focus on the development of human resources and sustainable methods of service delivery. This paper discusses three core pillars to addressing the challenges posed by uncorrected refractive errors: Human Resource (HR) Development, Service Development and Social Entrepreneurship. PMID:22944755

  20. Uncorrected refractive errors.

    PubMed

    Naidoo, Kovin S; Jaggernath, Jyoti

    2012-01-01

    Global estimates indicate that more than 2.3 billion people in the world suffer from poor vision due to refractive error; of which 670 million people are considered visually impaired because they do not have access to corrective treatment. Refractive errors, if uncorrected, results in an impaired quality of life for millions of people worldwide, irrespective of their age, sex and ethnicity. Over the past decade, a series of studies using a survey methodology, referred to as Refractive Error Study in Children (RESC), were performed in populations with different ethnic origins and cultural settings. These studies confirmed that the prevalence of uncorrected refractive errors is considerably high for children in low-and-middle-income countries. Furthermore, uncorrected refractive error has been noted to have extensive social and economic impacts, such as limiting educational and employment opportunities of economically active persons, healthy individuals and communities. The key public health challenges presented by uncorrected refractive errors, the leading cause of vision impairment across the world, require urgent attention. To address these issues, it is critical to focus on the development of human resources and sustainable methods of service delivery. This paper discusses three core pillars to addressing the challenges posed by uncorrected refractive errors: Human Resource (HR) Development, Service Development and Social Entrepreneurship. PMID:22944755

  1. Insulin use: preventable errors.

    PubMed

    2014-01-01

    Insulin is vital for patients with type 1 diabetes and useful for certain patients with type 2 diabetes. The serious consequences of insulin-related medication errors are overdose, resulting in severe hypoglycaemia, causing seizures, coma and even death; or underdose, resulting in hyperglycaemia and sometimes ketoacidosis. Errors associated with the preparation and administration of insulin are often reported, both outside and inside the hospital setting. These errors are preventable. By analysing reports from organisations devoted to medication error prevention and from poison control centres, as well as a few studies and detailed case reports of medication errors, various types of error associated with insulin use have been identified, especially in the hospital setting. Generally, patients know more about the practicalities of their insulin treatment than healthcare professionals with intermittent involvement. Medication errors involving insulin can occur at each step of the medication-use process: prescribing, data entry, preparation, dispensing and administration. When prescribing insulin, wrong-dose errors have been caused by the use of abbreviations, especially "U" instead of the word "units" (often resulting in a 10-fold overdose because the "U" is read as a zero), or by failing to write the drug's name correctly or in full. In electronic prescribing, the sheer number of insulin products is a source of confusion and, ultimately, wrong-dose errors, and often overdose. Prescribing, dispensing or administration software is rarely compatible with insulin prescriptions in which the dose is adjusted on the basis of the patient's subsequent capillary blood glucose readings, and can therefore generate errors. When preparing and dispensing insulin, a tuberculin syringe is sometimes used instead of an insulin syringe, leading to overdose. Other errors arise from confusion created by similar packaging, between different insulin products or between insulin and other

  2. Error Prevention Aid

    NASA Technical Reports Server (NTRS)

    1987-01-01

    In a complex computer environment there is ample opportunity for error, a mistake by a programmer, or a software-induced undesirable side effect. In insurance, errors can cost a company heavily, so protection against inadvertent change is a must for the efficient firm. The data processing center at Transport Life Insurance Company has taken a step to guard against accidental changes by adopting a software package called EQNINT (Equations Interpreter Program). EQNINT cross checks the basic formulas in a program against the formulas that make up the major production system. EQNINT assures that formulas are coded correctly and helps catch errors before they affect the customer service or its profitability.

  3. Spatial abstraction for autonomous robot navigation.

    PubMed

    Epstein, Susan L; Aroor, Anoop; Evanusa, Matthew; Sklar, Elizabeth I; Parsons, Simon

    2015-09-01

    Optimal navigation for a simulated robot relies on a detailed map and explicit path planning, an approach problematic for real-world robots that are subject to noise and error. This paper reports on autonomous robots that rely on local spatial perception, learning, and commonsense rationales instead. Despite realistic actuator error, learned spatial abstractions form a model that supports effective travel. PMID:26227680

  4. Design of spectrally versatile forward-looking ground-penetrating radar for detection of concealed targets

    NASA Astrophysics Data System (ADS)

    Phelan, Brian R.; Ressler, Marc A.; Mazzaro, Gregory J.; Sherbondy, Kelly D.; Narayanan, Ram M.

    2013-05-01

    The design of high-resolution radars which can operate in theater involves a careful consideration of the radar's radiated spectrum. While a wide bandwidth yields better target detectability and classification, it can also interfere with other devices and/or violate federal and international communication laws. Under the Army Research Laboratory (ARL) Partnerships in Research Transition (PIRT) program, we are developing a Stepped-Frequency Radar (SFR) which allows for manipulation of the radiated spectrum, while still maintaining an effective ultra-wide bandwidth for achieving good range resolution. The SFR is a forward-looking, ultra-wideband (UWB) imaging radar capable of detecting concealed targets. This paper presents the research and analysis undertaken during the design of the SFR which will eventually complement an existing ARL system, the Synchronous Impulse REconstruction (SIRE) radar. The SFR is capable of excising prohibited frequency bands, while maintaining the down-range resolution capability of the original SIRE radar. The SFR has two transmit antennas and a 16-element receive antenna array, and this configuration achieves suitable cross-range resolution for target detection. The SFR, like the SIRE radar, is a vehicle mounted, forward-looking, ground penetrating radar (GPR) capable of using synthetic aperture radar (SAR) technology for the detection of subsurface targets via 3D imaging. Many contradicting design considerations are analyzed in this paper. The selection of system bandwidth, antenna types, number of antennas, frequency synthesizers, digitizers, receive amplifiers, wideband splitters, and many other components are critical to the design of the SFR. Leveraging commercial components and SIRE sub-systems were design factors offering an expedited time to the initial implementation of the radar while reducing overall costs. This SFR design will result in an ARL asset to support obscured target detection such as improvised explosive devices

  5. Remote Detection of Concealed Radioactive Materials by Using Focused Powerful Terahertz Radiation

    NASA Astrophysics Data System (ADS)

    Nusinovich, Gregory S.

    2016-06-01

    This review paper summarizes the results of studies of a novel concept of the remote detection of concealed radioactive materials by using focused high-power terahertz (THz) radiation. The concept is based on the known fact that the ambient electron density in air is low (one to three free electrons per cubic centimeter). These electrons can serve as seed electrons from which an avalanche breakdown in strong electromagnetic fields starts. When a powerful THz radiation is focused in a small spot, the breakdown-prone volume can be much smaller than a cubic centimeter. So, the probability of having some free electrons in this volume and, hence, the probability of breakdown are low in the absence of additional sources of air ionization. However, in the vicinity of radioactive materials (10-20 m), the electron density can be higher, and, hence, there are always some seed free electrons from which the avalanche ionization will start. Thus, the breakdown rate in this case can be close to 100 %. Realization of this concept requires studies of various physical and technical issues. First, it is necessary to develop a high-power source of (sub-) THz radiation whose power, frequency, and pulse duration are sufficient for realizing this goal. Second, it is necessary to analyze numerous issues important for realizing this concept. Among these issues are (a) enhancement of the ionization level of air molecules in the presence of hidden radioactive materials, (b) estimating the minimum detectable mass of radioactive material, (c) formation of breakdown-prone volumes in focused THz wave beams, and (d) effect of atmospheric conditions on the propagation and focusing of THz wave beams and on the optimal location of the breakdown-prone volume between a container with hidden radioactive material and a THz antenna. The results of these studies are described below.

  6. Concealed d-wave pairs in the s± condensate of iron-based superconductors.

    PubMed

    Ong, Tzen; Coleman, Piers; Schmalian, Jörg

    2016-05-17

    A central question in iron-based superconductivity is the mechanism by which the paired electrons minimize their strong mutual Coulomb repulsion. In most unconventional superconductors, Coulomb repulsion is minimized through the formation of higher angular momentum Cooper pairs, with Fermi surface nodes in the pair wavefunction. The apparent absence of such nodes in the iron-based superconductors has led to a belief they form an s-wave ([Formula: see text]) singlet state, which changes sign between the electron and hole pockets. However, the multiorbital nature of these systems opens an alternative possibility. Here, we propose a new class of [Formula: see text] state containing a condensate of d-wave Cooper pairs, concealed by their entanglement with the iron orbitals. By combining the d-wave ([Formula: see text]) motion of the pairs with the internal angular momenta [Formula: see text] of the iron orbitals to make a singlet ([Formula: see text]), an [Formula: see text] superconductor with a nontrivial topology is formed. This scenario allows us to understand the development of octet nodes in potassium-doped Ba1-x KXFe2As2 as a reconfiguration of the orbital and internal angular momentum into a high spin ([Formula: see text]) state; the reverse transition under pressure into a fully gapped state can then be interpreted as a return to the low-spin singlet. The formation of orbitally entangled pairs is predicted to give rise to a shift in the orbital content at the Fermi surface, which can be tested via laser-based angle-resolved photoemission spectroscopy. PMID:27140626

  7. Expanded opportunities of THz passive camera for the detection of concealed objects

    NASA Astrophysics Data System (ADS)

    Trofimov, Vyacheslav A.; Trofimov, Vladislav V.; Kuchik, Igor E.

    2013-10-01

    Among the security problems, the detection of object implanted into either the human body or animal body is the urgent problem. At the present time the main tool for the detection of such object is X-raying only. However, X-ray is the ionized radiation and therefore can not be used often. Other way for the problem solving is passive THz imaging using. In our opinion, using of the passive THz camera may help to detect the object implanted into the human body under certain conditions. The physical reason of such possibility arises from temperature trace on the human skin as a result of the difference in temperature between object and parts of human body. Modern passive THz cameras have not enough resolution in temperature to see this difference. That is why, we use computer processing to enhance the passive THz camera resolution for this application. After computer processing of images captured by passive THz camera TS4, developed by ThruVision Systems Ltd., we may see the pronounced temperature trace on the human body skin from the water, which is drunk by person, or other food eaten by person. Nevertheless, there are many difficulties on the way of full soution of this problem. We illustrate also an improvement of quality of the image captured by comercially available passive THz cameras using computer processing. In some cases, one can fully supress a noise on the image without loss of its quality. Using computer processing of the THz image of objects concealed on the human body, one may improve it many times. Consequently, the instrumental resolution of such device may be increased without any additional engineering efforts.

  8. Using brain MERMER testing to detect knowledge despite efforts to conceal.

    PubMed

    Farwell, L A; Smith, S S

    2001-01-01

    This experiment examined the accuracy and reliability of the memory and encoding related multifaceted electroencephalographic response (MERMER) technique for detecting information related to events subjects have experienced, despite subjects' efforts to conceal that knowledge. Information obtained through interviews was used to develop stimulus sets consisting of words and phrases presented to subjects visually by computer. Sets were composed of three types of stimuli: life experience-related (Probes), stimuli the subject was asked to memorize and respond to (Targets), and irrelevant information (Irrelevants). Each set of stimuli was tested on two individuals: (1) one individual who had participated in the event in question--and thus had the relevant information stored in his/her brain, and (2) one who had not. Six subjects were tested. Electrical brain responses to the stimuli were recorded non-invasively from the scalp and analyzed. MERMERs, (memory and encoding related multifaceted electroencephalographic responses), of which the P300 is a sub-component, were used to determine whether the subject had the relevant information stored in his brain (information present) or not (information absent), thus indicating whether or not each subject had participated in the real-life event in question. Bootstrapping was used to analyze and compare the responses to the three types of stimuli. As predicted, MERMERs were elicited by Probe stimuli only in the subjects who had participated in the investigated event, by Target stimuli in all subjects, and in no case by Irrelevant stimuli. For each of the six subjects, brain MERMER testing correctly determined whether the subject had participated in and consequently knew about the event in question (information present) or had not participated (information absent). The statistical confidence for this determination was 99.9% in five cases and 90.0% in one case. The article concludes with a discussion of areas of future research and

  9. A novel concealed information test method based on independent component analysis and support vector machine.

    PubMed

    Gao, Junfeng; Lu, Liang; Yang, Yong; Yu, Gang; Na, Liantao; Rao, NiNi

    2012-01-01

    The concealed information test (CIT) has drawn much attention and has been widely investigated in recent years. In this study, a novel CIT method based on denoised P3 and machine learning was proposed to improve the accuracy of lie detection. Thirty participants were chosen as the guilty and innocent participants to perform the paradigms of 3 types of stimuli. The electroencephalogram (EEG) signals were recorded and separated into many single trials. In order to enhance the signal noise ratio (SNR) of P3 components, the independent component analysis (ICA) method was adopted to separate non-P3 components (i.e., artifacts) from every single trial. In order to automatically identify the P3 independent components (ICs), a new method based on topography template was proposed to automatically identify the P3 ICs. Then the P3 waveforms with high SNR were reconstructed on Pz electrodes. Second, the 3 groups of features based on time,frequency, and wavelets were extracted from the reconstructed P3 waveforms. Finally, 2 classes of feature samples were used to train a support vector machine (SVM) classifier because it has higher performance compared with several other classifiers. Meanwhile, the optimal number of P3 ICs and some other parameter values in the classifiers were determined by the cross-validation procedures. The presented method achieved a balance test accuracy of 84.29% on detecting P3 components for the guilty and innocent participants. The presented method improves the efficiency of CIT in comparison with previous reported methods. PMID:22423552

  10. Facts about Refractive Errors

    MedlinePlus

    ... the lens can cause refractive errors. What is refraction? Refraction is the bending of light as it passes ... rays entering the eye, causing a more precise refraction or focus. In many cases, contact lenses provide ...

  11. Errors in prenatal diagnosis.

    PubMed

    Anumba, Dilly O C

    2013-08-01

    Prenatal screening and diagnosis are integral to antenatal care worldwide. Prospective parents are offered screening for common fetal chromosomal and structural congenital malformations. In most developed countries, prenatal screening is routinely offered in a package that includes ultrasound scan of the fetus and the assay in maternal blood of biochemical markers of aneuploidy. Mistakes can arise at any point of the care pathway for fetal screening and diagnosis, and may involve individual or corporate systemic or latent errors. Special clinical circumstances, such as maternal size, fetal position, and multiple pregnancy, contribute to the complexities of prenatal diagnosis and to the chance of error. Clinical interventions may lead to adverse outcomes not caused by operator error. In this review I discuss the scope of the errors in prenatal diagnosis, and highlight strategies for their prevention and diagnosis, as well as identify areas for further research and study to enhance patient safety. PMID:23725900

  12. Error mode prediction.

    PubMed

    Hollnagel, E; Kaarstad, M; Lee, H C

    1999-11-01

    The study of accidents ('human errors') has been dominated by efforts to develop 'error' taxonomies and 'error' models that enable the retrospective identification of likely causes. In the field of Human Reliability Analysis (HRA) there is, however, a significant practical need for methods that can predict the occurrence of erroneous actions--qualitatively and quantitatively. The present experiment tested an approach for qualitative performance prediction based on the Cognitive Reliability and Error Analysis Method (CREAM). Predictions of possible erroneous actions were made for operators using different types of alarm systems. The data were collected as part of a large-scale experiment using professional nuclear power plant operators in a full scope simulator. The analysis showed that the predictions were correct in more than 70% of the cases, and also that the coverage of the predictions depended critically on the comprehensiveness of the preceding task analysis. PMID:10582035

  13. Pronominal Case-Errors

    ERIC Educational Resources Information Center

    Kaper, Willem

    1976-01-01

    Contradicts a previous assertion by C. Tanz that children commit substitution errors usually using objective pronoun forms for nominative ones. Examples from Dutch and German provide evidence that substitutions are made in both directions. (CHK)

  14. Estimating Bias Error Distributions

    NASA Technical Reports Server (NTRS)

    Liu, Tian-Shu; Finley, Tom D.

    2001-01-01

    This paper formulates the general methodology for estimating the bias error distribution of a device in a measuring domain from less accurate measurements when a minimal number of standard values (typically two values) are available. A new perspective is that the bias error distribution can be found as a solution of an intrinsic functional equation in a domain. Based on this theory, the scaling- and translation-based methods for determining the bias error distribution arc developed. These methods are virtually applicable to any device as long as the bias error distribution of the device can be sufficiently described by a power series (a polynomial) or a Fourier series in a domain. These methods have been validated through computational simulations and laboratory calibration experiments for a number of different devices.

  15. Error-Compensated Telescope

    NASA Technical Reports Server (NTRS)

    Meinel, Aden B.; Meinel, Marjorie P.; Stacy, John E.

    1989-01-01

    Proposed reflecting telescope includes large, low-precision primary mirror stage and small, precise correcting mirror. Correcting mirror machined under computer control to compensate for error in primary mirror. Correcting mirror machined by diamond cutting tool. Computer analyzes interferometric measurements of primary mirror to determine shape of surface of correcting mirror needed to compensate for errors in wave front reflected from primary mirror and commands position and movement of cutting tool accordingly.

  16. Thermodynamics of Error Correction

    NASA Astrophysics Data System (ADS)

    Sartori, Pablo; Pigolotti, Simone

    2015-10-01

    Information processing at the molecular scale is limited by thermal fluctuations. This can cause undesired consequences in copying information since thermal noise can lead to errors that can compromise the functionality of the copy. For example, a high error rate during DNA duplication can lead to cell death. Given the importance of accurate copying at the molecular scale, it is fundamental to understand its thermodynamic features. In this paper, we derive a universal expression for the copy error as a function of entropy production and work dissipated by the system during wrong incorporations. Its derivation is based on the second law of thermodynamics; hence, its validity is independent of the details of the molecular machinery, be it any polymerase or artificial copying device. Using this expression, we find that information can be copied in three different regimes. In two of them, work is dissipated to either increase or decrease the error. In the third regime, the protocol extracts work while correcting errors, reminiscent of a Maxwell demon. As a case study, we apply our framework to study a copy protocol assisted by kinetic proofreading, and show that it can operate in any of these three regimes. We finally show that, for any effective proofreading scheme, error reduction is limited by the chemical driving of the proofreading reaction.

  17. Noninvasive, quantitative analysis of drug mixtures in containers using spatially offset Raman spectroscopy (SORS) and multivariate statistical analysis.

    PubMed

    Olds, William J; Sundarajoo, Shankaran; Selby, Mark; Cletus, Biju; Fredericks, Peter M; Izake, Emad L

    2012-05-01

    In this paper, spatially offset Raman spectroscopy (SORS) is demonstrated for noninvasively investigating the composition of drug mixtures inside an opaque plastic container. The mixtures consisted of three components including a target drug (acetaminophen or phenylephrine hydrochloride) and two diluents (glucose and caffeine). The target drug concentrations ranged from 5% to 100%. After conducting SORS analysis to ascertain the Raman spectra of the concealed mixtures, principal component analysis (PCA) was performed on the SORS spectra to reveal trends within the data. Partial least squares (PLS) regression was used to construct models that predicted the concentration of each target drug, in the presence of the other two diluents. The PLS models were able to predict the concentration of acetaminophen in the validation samples with a root-mean-square error of prediction (RMSEP) of 3.8% and the concentration of phenylephrine hydrochloride with an RMSEP of 4.6%. This work demonstrates the potential of SORS, used in conjunction with multivariate statistical techniques, to perform noninvasive, quantitative analysis on mixtures inside opaque containers. This has applications for pharmaceutical analysis, such as monitoring the degradation of pharmaceutical products on the shelf, in forensic investigations of counterfeit drugs, and for the analysis of illicit drug mixtures which may contain multiple components. PMID:22524958

  18. Human error in aviation operations

    NASA Technical Reports Server (NTRS)

    Nagel, David C.

    1988-01-01

    The role of human error in commercial and general aviation accidents and the techniques used to evaluate it are reviewed from a human-factors perspective. Topics addressed include the general decline in accidents per million departures since the 1960s, the increase in the proportion of accidents due to human error, methods for studying error, theoretical error models, and the design of error-resistant systems. Consideration is given to information acquisition and processing errors, visually guided flight, disorientation, instrument-assisted guidance, communication errors, decision errors, debiasing, and action errors.

  19. Design and analysis of vector color error diffusion halftoning systems.

    PubMed

    Damera-Venkata, N; Evans, B L

    2001-01-01

    Traditional error diffusion halftoning is a high quality method for producing binary images from digital grayscale images. Error diffusion shapes the quantization noise power into the high frequency regions where the human eye is the least sensitive. Error diffusion may be extended to color images by using error filters with matrix-valued coefficients to take into account the correlation among color planes. For vector color error diffusion, we propose three contributions. First, we analyze vector color error diffusion based on a new matrix gain model for the quantizer, which linearizes vector error diffusion. The model predicts the key characteristics of color error diffusion, esp. image sharpening and noise shaping. The proposed model includes linear gain models for the quantizer by Ardalan and Paulos (1987) and by Kite et al. (1997) as special cases. Second, based on our model, we optimize the noise shaping behavior of color error diffusion by designing error filters that are optimum with respect to any given linear spatially-invariant model of the human visual system. Our approach allows the error filter to have matrix-valued coefficients and diffuse quantization error across color channels in an opponent color representation. Thus, the noise is shaped into frequency regions of reduced human color sensitivity. To obtain the optimal filter, we derive a matrix version of the Yule-Walker equations which we solve by using a gradient descent algorithm. Finally, we show that the vector error filter has a parallel implementation as a polyphase filterbank. PMID:18255498

  20. Errata: Papers in Error Analysis.

    ERIC Educational Resources Information Center

    Svartvik, Jan, Ed.

    Papers presented at the symposium of error analysis in Lund, Sweden, in September 1972, approach error analysis specifically in its relation to foreign language teaching and second language learning. Error analysis is defined as having three major aspects: (1) the description of the errors, (2) the explanation of errors by means of contrastive…

  1. Compact disk error measurements

    NASA Technical Reports Server (NTRS)

    Howe, D.; Harriman, K.; Tehranchi, B.

    1993-01-01

    The objectives of this project are as follows: provide hardware and software that will perform simple, real-time, high resolution (single-byte) measurement of the error burst and good data gap statistics seen by a photoCD player read channel when recorded CD write-once discs of variable quality (i.e., condition) are being read; extend the above system to enable measurement of the hard decision (i.e., 1-bit error flags) and soft decision (i.e., 2-bit error flags) decoding information that is produced/used by the Cross Interleaved - Reed - Solomon - Code (CIRC) block decoder employed in the photoCD player read channel; construct a model that uses data obtained via the systems described above to produce meaningful estimates of output error rates (due to both uncorrected ECC words and misdecoded ECC words) when a CD disc having specific (measured) error statistics is read (completion date to be determined); and check the hypothesis that current adaptive CIRC block decoders are optimized for pressed (DAD/ROM) CD discs. If warranted, do a conceptual design of an adaptive CIRC decoder that is optimized for write-once CD discs.

  2. Experimental Quantum Error Detection

    PubMed Central

    Jin, Xian-Min; Yi, Zhen-Huan; Yang, Bin; Zhou, Fei; Yang, Tao; Peng, Cheng-Zhi

    2012-01-01

    Faithful transmission of quantum information is a crucial ingredient in quantum communication networks. To overcome the unavoidable decoherence in a noisy channel, to date, many efforts have been made to transmit one state by consuming large numbers of time-synchronized ancilla states. However, such huge demands of quantum resources are hard to meet with current technology and this restricts practical applications. Here we experimentally demonstrate quantum error detection, an economical approach to reliably protecting a qubit against bit-flip errors. Arbitrary unknown polarization states of single photons and entangled photons are converted into time bins deterministically via a modified Franson interferometer. Noise arising in both 10 m and 0.8 km fiber, which induces associated errors on the reference frame of time bins, is filtered when photons are detected. The demonstrated resource efficiency and state independence make this protocol a promising candidate for implementing a real-world quantum communication network. PMID:22953047

  3. Measurement error revisited

    NASA Astrophysics Data System (ADS)

    Henderson, Robert K.

    1999-12-01

    It is widely accepted in the electronics industry that measurement gauge error variation should be no larger than 10% of the related specification window. In a previous paper, 'What Amount of Measurement Error is Too Much?', the author used a framework from the process industries to evaluate the impact of measurement error variation in terms of both customer and supplier risk (i.e., Non-conformance and Yield Loss). Application of this framework in its simplest form suggested that in many circumstances the 10% criterion might be more stringent than is reasonably necessary. This paper reviews the framework and results of the earlier work, then examines some of the possible extensions to this framework suggested in that paper, including variance component models and sampling plans applicable in the photomask and semiconductor businesses. The potential impact of imperfect process control practices will be examined as well.

  4. First record of genus Puliciphora Dahl (Diptera: Phoridae) associated with rabbit carcasses placed in concealed environments in Malaysia.

    PubMed

    Zuha, Raja Muhammad; See, Huong Wen; Disney, R Henry L; Omar, Baharudin

    2014-12-01

    Scuttle flies of genus Puliciphora Dahl (Diptera: Phoridae) are recorded for the first time in Malaysia from rabbit carcasses placed in concealed environments. They consist of Puliciphora borinquenensis Wheeler ♂♀, Puliciphora obtecta Meijere ♀ and Puliciphora beckeri Meijere ♀. All species were obtained from rabbit carcasses in used luggage and garbage bin placed at Forensic Science Simulation Site, Universiti Kebangsaan Malaysia, Bangi, Selangor. The specimens were collected from the carcasses using a modified Malaise trap, an entomological aspirator and preserved in 70% ethanol. This report expands the geographical distributions of these species and their microhabitat, suggests its possible important role in forensic entomology. PMID:25466156

  5. Using pretest data to screen low-reactivity individuals in the autonomic-based concealed information test.

    PubMed

    Matsuda, Izumi; Ogawa, Tokihiro; Tsuneoka, Michiko; Verschuere, Bruno

    2015-03-01

    The concealed information test (CIT) can be used to assess whether an individual possesses crime-related information. However, its discrimination performance has room for improvement. We examined whether screening out participants who do not respond distinctively on a pretest improves the diagnosticity of a mock-crime CIT. Before conducting the CIT, we gave a pretest to 152 participants, 80 of whom were assigned as guilty. Pretest screening significantly improved the diagnostic value of the mock-crime CIT; however, it also led to a substantial number of undiagnosed participants (33.6%). Pretest screening holds promise, but its application would benefit from dedicated measures for screening out participants. PMID:25208848

  6. Concealed carry weapon permits: a Second Amendment right or a recipe for disaster on our nation's campuses?

    PubMed

    Fennell, Reginald

    2009-01-01

    Crimes on college campuses can "strike fear" into the lives of those in higher education and a shooting is one of the crimes that ranks at the top of the most feared acts of violence. Maybe more direct counseling for clients who have weapons with regard to anticipatory guidance on firearms is needed. However, the debate continues with proposed legislation in different states regarding Second Amendment rights to legally carry concealed weapons on our Nation's campuses. What should be our response to this legislation? PMID:19892645

  7. Surprise beyond prediction error

    PubMed Central

    Chumbley, Justin R; Burke, Christopher J; Stephan, Klaas E; Friston, Karl J; Tobler, Philippe N; Fehr, Ernst

    2014-01-01

    Surprise drives learning. Various neural “prediction error” signals are believed to underpin surprise-based reinforcement learning. Here, we report a surprise signal that reflects reinforcement learning but is neither un/signed reward prediction error (RPE) nor un/signed state prediction error (SPE). To exclude these alternatives, we measured surprise responses in the absence of RPE and accounted for a host of potential SPE confounds. This new surprise signal was evident in ventral striatum, primary sensory cortex, frontal poles, and amygdala. We interpret these findings via a normative model of surprise. PMID:24700400

  8. Evolution of error diffusion

    NASA Astrophysics Data System (ADS)

    Knox, Keith T.

    1999-10-01

    As we approach the new millennium, error diffusion is approaching the 25th anniversary of its invention. Because of its exceptionally high image quality, it continues to be a popular choice among digital halftoning algorithms. Over the last 24 years, many attempts have been made to modify and improve the algorithm--to eliminate unwanted textures and to extend it to printing media and color. Some of these modifications have been very successful and are in use today. This paper will review the history of the algorithm and its modifications. Three watershed events in the development of error diffusion will be described, together with the lessons learned along the way.

  9. Evolution of error diffusion

    NASA Astrophysics Data System (ADS)

    Knox, Keith T.

    1998-12-01

    As we approach the new millennium, error diffusion is approaching the 25th anniversary of its invention. Because of its exceptionally high image quality, it continues to be a popular choice among digital halftoning algorithms. Over the last 24 years, many attempts have been made to modify and improve the algorithm - to eliminate unwanted textures and to extend it to printing media and color. Some of these modifications have been very successful and are in use today. This paper will review the history of the algorithm and its modifications. Three watershed events in the development of error diffusion will be described, together with the lesions learned along the way.

  10. Error Free Software

    NASA Technical Reports Server (NTRS)

    1985-01-01

    A mathematical theory for development of "higher order" software to catch computer mistakes resulted from a Johnson Space Center contract for Apollo spacecraft navigation. Two women who were involved in the project formed Higher Order Software, Inc. to develop and market the system of error analysis and correction. They designed software which is logically error-free, which, in one instance, was found to increase productivity by 600%. USE.IT defines its objectives using AXES -- a user can write in English and the system converts to computer languages. It is employed by several large corporations.

  11. Impact of GRACE Error Correlations on Hydrological Data Assimilation

    NASA Astrophysics Data System (ADS)

    Schumacher, Maike; Kusche, Jürgen; Döll, Petra

    2015-04-01

    Recently, ensemble Kalman filters (EnKF) have found increasing application for merging hydrological models with total water storage anomaly (TWSA) fields from the Gravity Recovery And Climate Experiment (GRACE) satellite mission. Previous studies have disregarded the strong effect of GRACE spatial error correlation in their investigations. Here, for the first time, we show that it is important to consider the characteristic error structure by carrying out an in-depth assessment of the impact of spatially correlated GRACE-TWSA errors on the GRACE-adjusted water states. Our investigations include (i) assimilating gridded GRACE-derived TWSA into the WaterGAP Global Hydrology Model (WGHM) and, simultaneously, calibrating its parameters, (ii) introducing GRACE observations with different spatial scales, (iii) modeling observation errors as either white or correlated in the assimilation, and (vi) replacing the original EnKF algorithm with a square root analysis scheme (SQRA) or, alternatively, the Singular Evolutive Interpolated Kalman (SEIK) filter. Results of a synthetic experiment for the Mississippi River Basin indicate that the hydrological parameters were sensitive to TWSA assimilation. We found a significant influence of the spatial error correlation for all implemented filter variants, mainly over subbasins with north-south spatial extensions on the adjusted water states. We conclude that considering the characteristic GRACE error correlations is at least as important as the selection of the resolution of TWSA observations, while the choice of the filter method should be based on the computational simplicity and efficiency.

  12. Instrumental error in chromotomosynthetic hyperspectral imaging.

    PubMed

    Bostick, Randall L; Perram, Glen P

    2012-07-20

    Chromotomosynthetic imaging (CTI) is a method of convolving spatial and spectral information that can be reconstructed into a hyperspectral image cube using the same transforms employed in medical tomosynthesis. A direct vision prism instrument operating in the visible (400-725 nm) with 0.6 mrad instantaneous field of view (IFOV) and 0.6-10 nm spectral resolution has been constructed and characterized. Reconstruction of hyperspectral data cubes requires an estimation of the instrument component properties that define the forward transform. We analyze the systematic instrumental error in collected projection data resulting from prism spectral dispersion, prism alignment, detector array position, and prism rotation angle. The shifting and broadening of both the spectral lineshape function and the spatial point spread function in the reconstructed hyperspectral imagery is compared with experimental results for monochromatic point sources. The shorter wavelength (λ<500 nm) region where the prism has the highest spectral dispersion suffers mostly from degradation of spectral resolution in the presence of systematic error, while longer wavelengths (λ>600 nm) suffer mostly from a shift of the spectral peaks. The quality of the reconstructed hyperspectral imagery is most sensitive to the misalignment of the prism rotation mount. With less than 1° total angular error in the two axes of freedom, spectral resolution was degraded by as much as a factor of 2 in the blue spectral region. For larger errors than this, spectral peaks begin to split into bimodal distributions, and spatial point response functions are reconstructed in rings with radii proportional to wavelength and spatial resolution. PMID:22858961

  13. Target tracking based on spatio-temporal fractal error

    NASA Astrophysics Data System (ADS)

    Allen, Brian S.

    2007-04-01

    This paper presents a novel approach to target tracking using a measurement process based on spatio-temporal fractal error. Moving targets are automatically detected using one-dimensional temporal fractal error. A template derived from the two-dimensional spatial fractal error is then extracted for a designated target to allow for correlation-based template matching in subsequent frames. The outputs of both the spatial and temporal fractal error components are combined and presented as input to a kinematic tracking filter. It is shown that combining the two outputs provides improved tracking performance in the presence of noise, occlusion, other moving objects, and when the target of interest stops moving. Furthermore, reconciliation of the spatial and temporal components also provides a useful mechanism for detecting occlusion and avoiding template drift, a problem typically present in correlation-based trackers. Results are demonstrated using airborne MWIR sequences from the DARPA VIVID dataset.

  14. Help prevent hospital errors

    MedlinePlus

    ... A.D.A.M. Editorial team. Related MedlinePlus Health Topics Medication Errors Patient Safety Browse the Encyclopedia A.D.A.M., Inc. is accredited by URAC, also known as the American Accreditation HealthCare Commission ... for online health information and services. Learn more about A.D. ...

  15. Orwell's Instructive Errors

    ERIC Educational Resources Information Center

    Julian, Liam

    2009-01-01

    In this article, the author talks about George Orwell, his instructive errors, and the manner in which Orwell pierced worthless theory, faced facts and defended decency (with fluctuating success), and largely ignored the tradition of accumulated wisdom that has rendered him a timeless teacher--one whose inadvertent lessons, while infrequently…

  16. Challenge and Error: Critical Events and Attention-Related Errors

    ERIC Educational Resources Information Center

    Cheyne, James Allan; Carriere, Jonathan S. A.; Solman, Grayden J. F.; Smilek, Daniel

    2011-01-01

    Attention lapses resulting from reactivity to task challenges and their consequences constitute a pervasive factor affecting everyday performance errors and accidents. A bidirectional model of attention lapses (error [image omitted] attention-lapse: Cheyne, Solman, Carriere, & Smilek, 2009) argues that errors beget errors by generating attention…

  17. The impact of transmission errors on progressive 720 lines HDTV coded with H.264

    NASA Astrophysics Data System (ADS)

    Brunnström, Kjell; Stålenbring, Daniel; Pettersson, Martin; Gustafsson, Jörgen

    2010-02-01

    TV sent over the networks based on the Internet Protocol i.e IPTV is moving towards high definition (HDTV). There has been quite a lot of work on how the HDTV is affected by different codecs and bitrates, but the impact of transmission errors over IP-networks have been less studied. The study was focusing on H.264 encoded 1280x720 progressive HDTV format and was comparing three different concealment methods for different packet loss rates. One is included in a propriety decoder, one is part of FFMPEG and different length of freezing. The target is to simulate what typically IPTV settop-boxes will do when encountering packet loss. Another aim is to study whether the presentation upscaled on the full HDTV screen or presented pixel mapped in a smaller area in the center of the sceen would have an effect on the quality. The results show that there were differences between the two packet loss concealment methods in FFMPEG and in the propriety codec. Freezing seemed to have similar effect as been reported before. For low rates of transmission errors the coding impairments has impact on the quality, but for higher degree of transmission errors these does not affect the quality, since they become overshadowed by transmission error. An interesting effect where the higher bitrate videos goes from having higher quality for lower degree of packet loss, to having lower quality than the lower bitrate video at higher packet loss, was discovered. The different way of presenting the video i.e. upscaled or not-upscaled was significant on the 95% level, but just about.

  18. Characterizing Radar Raingauge Errors for NWP Assimilation

    NASA Astrophysics Data System (ADS)

    Dance, S.; Seed, A.

    2012-04-01

    The statistical characterisation of errors in quantitative precipitation estimates (QPE) is needed when generating QPE ensembles, combining multiple radars into a single mosaic, and when assimilating QPE into numerical weather prediction (NWP) models. The first step in the analysis was to characterise the errors at pixel resolution (1 km) as a function of radar specification, geographical location under the radar, and meteorology using data from 18 radars and 1500 rain gauges over a two-year period. The probability distribution of the radar - rain gauge residuals was evaluated and, as expected, the log-Normal distribution was found to fit the data better than the Normal distribution. Therefore the subsequent analysis was performed on the residuals expressed as decibels. The impact of beam width on the estimation errors was evaluated by comparing the errors from a one-degree S band radar (S1) with a two-degree S band radar (S2) for the same location (Brisbane) and time period. The standard deviation of the errors was found to increase by 0.2 dB per km for the S2 radar while the standard deviation for the S1 radar was constant out to the maximum range of 150 km. When data from all the S1 radars over the two years were pooled and compared with the S2 radars the standard deviation of the errors for the S1 radars increased by 0.1 dB per km compared with 0.25 dB per km for the S2 radars. The mean of the errors was found to vary significantly with range for all radars with underestimation at close range (< 30 km) and at far range (> 100 km). We think that this points to artefacts in the data due to clutter suppression at close range and over shooting the echo tops at the far range. The spatial distribution of the errors as a function of the altitude and roughness of the topography was investigated using the data from the S1 and S2 radars in Brisbane, but no relationship was found although there is clearly structure in the field. We also attempted to quantify the

  19. A Concealed Intracranial Aneurysm Detected after Recanalization of an Occluded Vessel: A Case Report and Literature Review

    PubMed Central

    Torikoshi, Sadaharu; Akiyama, Yoshinori

    2016-01-01

    Background Based on the results of several randomized controlled trials, acute endovascular thrombectomy is strongly recommended for patients with acute ischemic stroke due to large artery occlusion (LAO). The incidence of an intracranial aneurysm has been reported to be approximately 5% in the general population. Therefore, the possibility of the coincidence of LAO and an intracranial aneurysm at the distal part of an occluded vessel should be considered. Summary A 74-year-old female patient presented with the sudden onset of consciousness disturbance and left-sided weakness. Neuroimages demonstrated an acute infarction due to right middle cerebral artery occlusion. The occlusion was successfully treated, and an aneurysm was incidentally detected at the occluded artery. We reviewed the literature and identified 11 cases in 8 reports, which were similar to our case. Among the 11 cases, aneurysms ruptured during endovascular therapy in 2 cases. In the present report, we discussed the prediction of concealed aneurysms and avoidance of their rupture during endovascular intervention. Key Message The presence of an aneurysm concealed behind an embolus should be carefully assessed on preoperative and intraoperative neuroimages. The important findings for suspecting such an aneurysm are a hyperdense nodular sign on preoperative computed tomography and unusual motion of the microwire during the endovascular intervention. Even if there is no finding indicative of an aneurysm, the catheter and thrombectomy devices should be more carefully advanced than usual, especially at the common sites of aneurysms, and the devices should be appropriately chosen. PMID:27051404

  20. An interfering n-back task facilitates the detection of concealed information with EDA but impedes it with cardiopulmonary physiology.

    PubMed

    Ambach, Wolfgang; Stark, Rudolf; Vaitl, Dieter

    2011-06-01

    One approach to investigate psychophysiological processes occurring in the Concealed Information Test (CIT) is to use a parallel task, which engages specific mental activity in addition to the CIT. In the present study, the influence of an interfering n-back task on the physiological responses in a Concealed Information Test (CIT) was investigated. Forty participants underwent a mock-crime experiment with a modified CIT. In a within-subject design, the CIT was applied in blocks with and without an additional n-back task. Electrodermal activity (EDA), respiration line length (RLL), heart rate (HR), and finger pulse waveform length (FPWL) were registered. Reaction times in the n-back task and the CIT were recorded. The parallel task enhanced the differential EDA response to probe vs. irrelevant items, while it diminished the response differences for RLL and phasic HR. Results shed light upon working-memory-related processes in the CIT. The diverging effects of the interfering mental activity on electrodermal and cardiopulmonary measures, if replicable, might contribute to a better understanding of the psychophysiological responsiveness underlying the CIT. PMID:21440579

  1. A functional analysis of deception detection of a mock crime using infrared thermal imaging and the Concealed Information Test

    PubMed Central

    Park, Kevin K.; Suk, Hye Won; Hwang, Heungsun; Lee, Jang-Han

    2013-01-01

    The purpose of this study was to utilize thermal imaging and the Concealed Information Test to detect deception in participants who committed a mock crime. A functional analysis using a functional ANOVA and a functional discriminant analysis was conducted to decrease the variation in the physiological data collected through the thermal imaging camera. Participants chose between a non-crime mission (Innocent Condition: IC), or a mock crime (Guilty Condition: GC) of stealing a wallet in a computer lab. Temperature in the periorbital region of the face was measured while questioning participants regarding mock crime details. Results revealed that the GC showed significantly higher temperatures when responding to crime relevant items compared to irrelevant items, while the IC did not. The functional ANOVA supported the initial results that facial temperatures of the GC elevated when responding to crime relevant items, demonstrating an interaction between group (guilty/innocent) and relevance (relevant/irrelevant). The functional discriminant analysis revealed that answering crime relevant items can be used to discriminate guilty from innocent participants. These results suggest that measuring facial temperatures in the periorbital region while conducting the Concealed Information Test is able to differentiate the GC from the IC. PMID:23470924

  2. Electron beam injected into ground generates subsoil x-rays that may deactivate concealed electronics used to trigger explosive devices

    NASA Astrophysics Data System (ADS)

    Retsky, Michael

    2008-04-01

    Explosively formed projectiles (EFP) are a major problem in terrorism and asymmetrical warfare. EFPs are often triggered by ordinary infrared motion detectors. A potential weak link is that such electronics are not hardened to ionizing radiation and can latch-up or enter other inoperative states after exposure to a single short event of ionizing radiation. While these can often be repaired with a power restart, they also can produce shorts and permanent damage. A problem of course is that we do not want to add radiation exposure to the long list of war related hazards. Biological systems are highly sensitive to integrated dosage but show no particular sensitivity to short pulses. There may be a way to generate short pulsed subsoil radiation to deactivate concealed electronics without introducing radiation hazards to military personnel and civilian bystanders. Electron beams of 30 MeV that can be produced by portable linear accelerators (linacs) propagate >20 m in air and 10-12 cm in soil. X-radiation is produced by bremsstrahlung and occurs subsoil beneath the point of impact and is mostly forward directed. Linacs 1.5 m long can produce 66 MWatt pulses of subsoil x-radiation 1 microsecond or less in duration. Untested as yet, such a device could be mounted on a robotic vehicle that precedes a military convoy and deactivates any concealed electronics within 10-20 meters on either side of the road.

  3. Ultra wide band detection of on body concealed weapons using the out of plane polarized late time response

    NASA Astrophysics Data System (ADS)

    Harmer, Stuart; Andrews, David; Bowring, Nicholas; Rezgui, Nacer; Southgate, Matthew

    2009-09-01

    A method of detecting concealed handguns and knives, both on and off body, has been developed. The method utilizes aspect-independent natural, complex resonances (poles) excited by illuminating the target with frequency swept, ultrawide band microwaves in the range 0.5 - 18 GHz. These natural resonances manifest as a Late Time Response (LTR) that extends significantly (~ 5 ns) beyond the direct reflections from the human body (the Early Time Response) and are of the form of a superposition of exponentially decaying sinusoidal waveforms. Two handguns are examined, both on the human body and in isolation, by the established methodology of applying the Generalised-Pencil-Of-Function to the late time response data of the target. These poles allow the weapon to be effectively classified. Out of plane polarized (cross-polarized) scattered response is used here as this gives improved discrimination between the early and late time responses. Determination of the presence or absence of particular weapons concealed under clothing, on the human body, is demonstrated. A novel bow-tie slot antenna is described which has good pulse and frequency response over the range 0.3-1 GHz and which is suitable for excitation of the fundamental natural resonances.

  4. [The error, source of learning].

    PubMed

    Joyeux, Stéphanie; Bohic, Valérie

    2016-05-01

    The error itself is not recognised as a fault. It is the intentionality which differentiates between an error and a fault. An error is unintentional while a fault is a failure to respect known rules. The risk of error is omnipresent in health institutions. Public authorities have therefore set out a series of measures to reduce this risk. PMID:27155272

  5. Imagery of Errors in Typing

    ERIC Educational Resources Information Center

    Rieger, Martina; Martinez, Fanny; Wenke, Dorit

    2011-01-01

    Using a typing task we investigated whether insufficient imagination of errors and error corrections is related to duration differences between execution and imagination. In Experiment 1 spontaneous error imagination was investigated, whereas in Experiment 2 participants were specifically instructed to imagine errors. Further, in Experiment 2 we…

  6. Neural Correlates of Reach Errors

    PubMed Central

    Hashambhoy, Yasmin; Rane, Tushar; Shadmehr, Reza

    2005-01-01

    Reach errors may be broadly classified into errors arising from unpredictable changes in target location, called target errors, and errors arising from miscalibration of internal models, called execution errors. Execution errors may be caused by miscalibration of dynamics (e.g.. when a force field alters limb dynamics) or by miscalibration of kinematics (e.g., when prisms alter visual feedback). While all types of errors lead to similar online corrections, we found that the motor system showed strong trial-by-trial adaptation in response to random execution errors but not in response to random target errors. We used fMRI and a compatible robot to study brain regions involved in processing each kind of error. Both kinematic and dynamic execution errors activated regions along the central and the post-central sulci and in lobules V, VI, and VIII of the cerebellum, making these areas possible sites of plastic changes in internal models for reaching. Only activity related to kinematic errors extended into parietal area 5. These results are inconsistent with the idea that kinematics and dynamics of reaching are computed in separate neural entities. In contrast, only target errors caused increased activity in the striatum and the posterior superior parietal lobule. The cerebellum and motor cortex were as strongly activated as with execution errors. These findings indicate a neural and behavioral dissociation between errors that lead to switching of behavioral goals, and errors that lead to adaptation of internal models of limb dynamics and kinematics. PMID:16251440

  7. Automatic Error Analysis Using Intervals

    ERIC Educational Resources Information Center

    Rothwell, E. J.; Cloud, M. J.

    2012-01-01

    A technique for automatic error analysis using interval mathematics is introduced. A comparison to standard error propagation methods shows that in cases involving complicated formulas, the interval approach gives comparable error estimates with much less effort. Several examples are considered, and numerical errors are computed using the INTLAB…

  8. The Insufficiency of Error Analysis

    ERIC Educational Resources Information Center

    Hammarberg, B.

    1974-01-01

    The position here is that error analysis is inadequate, particularly from the language-teaching point of view. Non-errors must be considered in specifying the learner's current command of the language, its limits, and his learning tasks. A cyclic procedure of elicitation and analysis, to secure evidence of errors and non-errors, is outlined.…

  9. Control by model error estimation

    NASA Technical Reports Server (NTRS)

    Likins, P. W.; Skelton, R. E.

    1976-01-01

    Modern control theory relies upon the fidelity of the mathematical model of the system. Truncated modes, external disturbances, and parameter errors in linear system models are corrected by augmenting to the original system of equations an 'error system' which is designed to approximate the effects of such model errors. A Chebyshev error system is developed for application to the Large Space Telescope (LST).

  10. Manson's triple error.

    PubMed

    F, Delaporte

    2008-09-01

    The author discusses the significance, implications and limitations of Manson's work. How did Patrick Manson resolve some of the major problems raised by the filarial worm life cycle? The Amoy physician showed that circulating embryos could only leave the blood via the percutaneous route, thereby requiring a bloodsucking insect. The discovery of a new autonomous, airborne, active host undoubtedly had a considerable impact on the history of parasitology, but the way in which Manson formulated and solved the problem of the transfer of filarial worms from the body of the mosquito to man resulted in failure. This article shows how the epistemological transformation operated by Manson was indissociably related to a series of errors and how a major breakthrough can be the result of a series of false proposals and, consequently, that the history of truth often involves a history of error. PMID:18814729

  11. Modular error embedding

    DOEpatents

    Sandford, II, Maxwell T.; Handel, Theodore G.; Ettinger, J. Mark

    1999-01-01

    A method of embedding auxiliary information into the digital representation of host data containing noise in the low-order bits. The method applies to digital data representing analog signals, for example digital images. The method reduces the error introduced by other methods that replace the low-order bits with auxiliary information. By a substantially reverse process, the embedded auxiliary data can be retrieved easily by an authorized user through use of a digital key. The modular error embedding method includes a process to permute the order in which the host data values are processed. The method doubles the amount of auxiliary information that can be added to host data values, in comparison with bit-replacement methods for high bit-rate coding. The invention preserves human perception of the meaning and content of the host data, permitting the addition of auxiliary data in the amount of 50% or greater of the original host data.

  12. Error-Free Software

    NASA Technical Reports Server (NTRS)

    1989-01-01

    001 is an integrated tool suited for automatically developing ultra reliable models, simulations and software systems. Developed and marketed by Hamilton Technologies, Inc. (HTI), it has been applied in engineering, manufacturing, banking and software tools development. The software provides the ability to simplify the complex. A system developed with 001 can be a prototype or fully developed with production quality code. It is free of interface errors, consistent, logically complete and has no data or control flow errors. Systems can be designed, developed and maintained with maximum productivity. Margaret Hamilton, President of Hamilton Technologies, also directed the research and development of USE.IT, an earlier product which was the first computer aided software engineering product in the industry to concentrate on automatically supporting the development of an ultrareliable system throughout its life cycle. Both products originated in NASA technology developed under a Johnson Space Center contract.

  13. What is the influence of randomisation sequence generation and allocation concealment on treatment effects of physical therapy trials? A meta-epidemiological study

    PubMed Central

    Armijo-Olivo, Susan; Saltaji, Humam; da Costa, Bruno R; Fuentes, Jorge; Ha, Christine; Cummings, Greta G

    2015-01-01

    Objective To determine if adequacy of randomisation and allocation concealment is associated with changes in effect sizes (ES) when comparing physical therapy (PT) trials with and without these methodological characteristics. Design Meta-epidemiological study. Participants A random sample of randomised controlled trials (RCTs) included in meta-analyses in the PT discipline were identified. Intervention Data extraction including assessments of random sequence generation and allocation concealment was conducted independently by two reviewers. To determine the association between sequence generation, and allocation concealment and ES, a two-level analysis was conducted using a meta-meta-analytic approach. Primary and secondary outcome measures association between random sequence generation and allocation concealment and ES in PT trials. Results 393 trials included in 43 meta-analyses, analysing 44 622 patients contributed to this study. Adequate random sequence generation and appropriate allocation concealment were accomplished in only 39.7% and 11.5% of PT trials, respectively. Although trials with inappropriate allocation concealment tended to have an overestimate treatment effect when compared with trials with adequate concealment of allocation, the difference was non-statistically significant (ES=0.12; 95% CI −0.06 to 0.30). When pooling our results with those of Nuesch et al, we obtained a pooled statistically significant value (ES=0.14; 95% CI 0.02 to 0.26). There was no difference in ES in trials with appropriate or inappropriate random sequence generation (ES=0.02; 95% CI −0.12 to 0.15). Conclusions Our results suggest that when evaluating risk of bias of primary RCTs in PT area, systematic reviewers and clinicians implementing research into practice should pay attention to these biases since they could exaggerate treatment effects. Systematic reviewers should perform sensitivity analysis including trials with low risk of bias in these domains as primary

  14. Error-correction coding

    NASA Technical Reports Server (NTRS)

    Hinds, Erold W. (Principal Investigator)

    1996-01-01

    This report describes the progress made towards the completion of a specific task on error-correcting coding. The proposed research consisted of investigating the use of modulation block codes as the inner code of a concatenated coding system in order to improve the overall space link communications performance. The study proposed to identify and analyze candidate codes that will complement the performance of the overall coding system which uses the interleaved RS (255,223) code as the outer code.

  15. Subseasonal GNSS errors in IGS products

    NASA Astrophysics Data System (ADS)

    Ray, Jim; Griffiths, Jake; Collilieux, Xavier; Rebischung, Paul

    2014-05-01

    Global Navigation Satellite System (GNSS) station coordinate errors over seasonal and longer time scales are known to be spatially and temporally correlated with flicker noise spectra. The corresponding orbit errors have generally similar characteristics. Overlaying the background are strong annual and semiannual variations that cannot be explained by any single phenomenon. Next most prominent are harmonics of the GPS draconitic year with periods of (351.4/N) days. It is likely that errors in the standard model for Earth orientation parameter (EOP) tidal variations near 12 and 24 h periods are absorbed into the resonant GPS orbit and daily EOP estimates, resulting mainly in draconitic and fortnightly alias signatures for 24 h product sampling. With the change in International GNSS Service (IGS) station coordinates from weekly to daily resolution in August 2012, it is now possible to study subseasonal performance. And since that time, most IGS Analysis Center (AC) orbits are more nearly independent between days. All ACs show fortnightly signals, but the resolution for station positions will not be sufficient to distinguish direct tide model from aliased subdaily error sources till two more years of data are available. All but one of the ACs that includes GLONASS data have signals at ~8 day periods, the ground repeat period for GLONASS orbits. This probably arises from larger geographically correlated orbit errors for GLONASS. Two ACs possess unique short-period features that appear to be caused by unknown peculiarities of their analysis strategies.

  16. Bayesian Error Estimation Functionals

    NASA Astrophysics Data System (ADS)

    Jacobsen, Karsten W.

    The challenge of approximating the exchange-correlation functional in Density Functional Theory (DFT) has led to the development of numerous different approximations of varying accuracy on different calculated properties. There is therefore a need for reliable estimation of prediction errors within the different approximation schemes to DFT. The Bayesian Error Estimation Functionals (BEEF) have been developed with this in mind. The functionals are constructed by fitting to experimental and high-quality computational databases for molecules and solids including chemisorption and van der Waals systems. This leads to reasonably accurate general-purpose functionals with particual focus on surface science. The fitting procedure involves considerations on how to combine different types of data, and applies Tikhonov regularization and bootstrap cross validation. The methodology has been applied to construct GGA and metaGGA functionals with and without inclusion of long-ranged van der Waals contributions. The error estimation is made possible by the generation of not only a single functional but through the construction of a probability distribution of functionals represented by a functional ensemble. The use of the functional ensemble is illustrated on compound heat of formation and by investigations of the reliability of calculated catalytic ammonia synthesis rates.

  17. Human Error In Complex Systems

    NASA Technical Reports Server (NTRS)

    Morris, Nancy M.; Rouse, William B.

    1991-01-01

    Report presents results of research aimed at understanding causes of human error in such complex systems as aircraft, nuclear powerplants, and chemical processing plants. Research considered both slips (errors of action) and mistakes (errors of intention), and influence of workload on them. Results indicated that: humans respond to conditions in which errors expected by attempting to reduce incidence of errors; and adaptation to conditions potent influence on human behavior in discretionary situations.

  18. Error analysis and data reduction for interferometric surface measurements

    NASA Astrophysics Data System (ADS)

    Zhou, Ping

    High-precision optical systems are generally tested using interferometry, since it often is the only way to achieve the desired measurement precision and accuracy. Interferometers can generally measure a surface to an accuracy of one hundredth of a wave. In order to achieve an accuracy to the next order of magnitude, one thousandth of a wave, each error source in the measurement must be characterized and calibrated. Errors in interferometric measurements are classified into random errors and systematic errors. An approach to estimate random errors in the measurement is provided, based on the variation in the data. Systematic errors, such as retrace error, imaging distortion, and error due to diffraction effects, are also studied in this dissertation. Methods to estimate the first order geometric error and errors due to diffraction effects are presented. Interferometer phase modulation transfer function (MTF) is another intrinsic error. The phase MTF of an infrared interferometer is measured with a phase Siemens star, and a Wiener filter is designed to recover the middle spatial frequency information. Map registration is required when there are two maps tested in different systems and one of these two maps needs to be subtracted from the other. Incorrect mapping causes wavefront errors. A smoothing filter method is presented which can reduce the sensitivity to registration error and improve the overall measurement accuracy. Interferometric optical testing with computer-generated holograms (CGH) is widely used for measuring aspheric surfaces. The accuracy of the drawn pattern on a hologram decides the accuracy of the measurement. Uncertainties in the CGH manufacturing process introduce errors in holograms and then the generated wavefront. An optimal design of the CGH is provided which can reduce the sensitivity to fabrication errors and give good diffraction efficiency for both chrome-on-glass and phase etched CGHs.

  19. Evaluating a medical error taxonomy.

    PubMed Central

    Brixey, Juliana; Johnson, Todd R.; Zhang, Jiajie

    2002-01-01

    Healthcare has been slow in using human factors principles to reduce medical errors. The Center for Devices and Radiological Health (CDRH) recognizes that a lack of attention to human factors during product development may lead to errors that have the potential for patient injury, or even death. In response to the need for reducing medication errors, the National Coordinating Council for Medication Errors Reporting and Prevention (NCC MERP) released the NCC MERP taxonomy that provides a standard language for reporting medication errors. This project maps the NCC MERP taxonomy of medication error to MedWatch medical errors involving infusion pumps. Of particular interest are human factors associated with medical device errors. The NCC MERP taxonomy of medication errors is limited in mapping information from MEDWATCH because of the focus on the medical device and the format of reporting. PMID:12463789

  20. Speech Errors, Error Correction, and the Construction of Discourse.

    ERIC Educational Resources Information Center

    Linde, Charlotte

    Speech errors have been used in the construction of production models of the phonological and semantic components of language, and for a model of interactional processes. Errors also provide insight into how speakers plan discourse and syntactic structure,. Different types of discourse exhibit different types of error. The present data are taken…

  1. Retrace error reconstruction based on point characteristic function.

    PubMed

    Yiwei, He; Hou, Xi; Haiyang, Quan; Song, Weihong

    2015-11-01

    Figure measuring interferometers generally work in the null condition, i.e., the reference rays share the same optical path with the test rays through the imaging system. In this case, except field distortion error, effect of other aberrations cancels out and doesn't result in measureable systematic error. However, for spatial carrier interferometry and non-null aspheric test cases, null condition cannot be achieved typically, and there is excessive measurement error that is referenced as retrace error. Previous studies about retrace error can be generally distinguished into two categories: one based on 4th-order aberration formalism, the other based on ray tracing through interferometer model. In this paper, point characteristic function (PCF) is used to analyze retrace error in a Fizeau interferometer working in high spatial carrier condition. We present the process of reconstructing retrace error with and without element error in detail. Our results are in contrast with those obtained by ray tracing through interferometer model. The small difference between them (less than 3%) shows that our method is effective. PMID:26561092

  2. Discovery of a concealed geothermal resource in the Alturas Basin, and its implications for further exploration in northeastern California

    SciTech Connect

    Bohm, B.; Juncal, R.W.

    1995-12-31

    In 1988 a so far unknown geothermal resource was drilled into under the City of Alturas in northeastern California. A fracture was tapped below 2300 feet, in cemented fine-grained tuffs and mudflows, producing 182{degrees}F water. The well has been used since 1990 to heat the local high school. A second well was drilled in 1991, producing about 250 gpm 182{degrees}F water from a fracture below 1893 ft. Well productivities and artesian pressures are variable, depending on distance from a major fault zone and local hydrologic regime. It appears as if the wells produce from deep reaching fractures in a caprock, that may conceal a 300 to 400{degrees}F resource between 4000 and 6000 feet depth. The results have important implications for geothermal exploration in northeastern California, i.e. just because there are no surface manifestations in a basin, it does not necessarily mean there is no geothermal resource at depth.

  3. The impact of prior knowledge from participant instructions in a mock crime P300 Concealed Information Test.

    PubMed

    Winograd, Michael R; Rosenfeld, J Peter

    2014-12-01

    In P300-Concealed Information Tests used with mock crime scenarios, the amount of detail revealed to a participant prior to the commission of the mock crime can have a serious impact on a study's validity. We predicted that exposure to crime details through instructions would bias detection rates toward enhanced sensitivity. In a 2 × 2 factorial design, participants were either informed (through mock crime instructions) or naïve as to the identity of a to-be-stolen item, and then either committed (guilty) or did not commit (innocent) the crime. Results showed that prior knowledge of the stolen item was sufficient to cause 69% of innocent-informed participants to be incorrectly classified as guilty. Further, we found a trend toward enhanced detection rate for guilty-informed participants over guilty-naïve participants. Results suggest that revealing details to participants through instructions biases detection rates in the P300-CIT toward enhanced sensitivity. PMID:25128283

  4. Lead isotopes in iron and manganese oxide coatings and their use as an exploration guide for concealed mineralization

    USGS Publications Warehouse

    Gulson, B.L.; Church, S.E.; Mizon, K.J.; Meier, A.L.

    1992-01-01

    Lead isotopes from Fe and Mn oxides that coat stream pebbles from around the Mount Emmons porphyry molybdenum deposit in Colorado were studied to assess the feasibility of using Pb isotopes to detect concealed mineral deposits. The Fe/Mn oxide coatings were analyzed to determine their elemental concentrations using ICP-AES. The Pb isotope compositions of solutions from a selected suite of samples were measured, using both thermal ionization and ICP mass spectrometry, to compare results determined by the two analytical methods. Heavy mineral concentrates from the same sites were also analyzed to compare the Pb isotope compositions of the Fe/Mn coatings with those found in panned concentrates. The Fe/Mn and 206Pb/204Pb ratios of the oxide coatings are related to the lithology of the host rocks; Fe/Mn oxide coatings on pebbles of black shale have higher Fe/Mn values than do the coatings on either sandstone or igneous rocks. The shale host rocks have a more radiogenic signature (e.g. higher 206Pb/ 204Pb) than the sandstone or igneous host rocks. The Pb isotope data from sandstone and igneous hosts can detect concealed mineralized rock on both a regional and local scale, even though there are contributions from: (1) metals from the main-stage molybdenite ore deposit; (2) metals from the phyllic alteration zone which has a more radiogenic Pb isotope signature reflecting hydrothermal leaching of Pb from the Mancos Shale; (3) Pb-rich base metal veins with a highly variable Pb isotope signature; and (4) sedimentary country rocks which have a more radiogenic Pb isotope signature. An investigation of within-stream variation shows that the Pb isotope signature of the molybdenite ore zone is retained in the Fe/Mn oxide coatings and is not camouflaged by contributions from Pb-rich base-metal veins that crop out upstream. In another traverse, the Pb isotope data from Fe/Mn oxide coatings reflect a complex mixing of Pb from the molybdenite ore zone and its hornfels margin, Pb

  5. Mental Health Stigma, Self-Concealment, and Help-Seeking Attitudes among Asian American and European American College Students with No Help-Seeking Experience

    ERIC Educational Resources Information Center

    Masuda, Akihiko; Boone, Matthew S.

    2011-01-01

    The present study examined whether mental health stigma (i.e., negative attitudes toward people with a psychological disorder) and self-concealment are unique predictors of help-seeking attitudes in Asian American and European American college students with no history of seeking professional psychological services. The Asian American group had…

  6. Mental Health Stigma and Self-Concealment as Predictors of Help-Seeking Attitudes among Latina/o College Students in the United States

    ERIC Educational Resources Information Center

    Mendoza, Hadrian; Masuda, Akihiko; Swartout, Kevin M.

    2015-01-01

    The study examined whether mental health stigma and self-concealment are uniquely related to various dimensions of attitudes toward seeking professional psychological services (i.e., help-seeking attitudes) in Latina/o college students. Data from 129 Latina/o undergraduates (76% female) were used in the analysis. Results revealed that mental…

  7. Attitudes toward Face-to-Face and Online Counseling: Roles of Self-Concealment, Openness to Experience, Loss of Face, Stigma, and Disclosure Expectations among Korean College Students

    ERIC Educational Resources Information Center

    Bathje, Geoff J.; Kim, Eunha; Rau, Ellen; Bassiouny, Muhammad Adam; Kim, Taehoon

    2014-01-01

    This study examined attitudes toward face-to-face (f2f) and online counseling among 228 Korean college students. In addition, it tested a hypothesized model proposing that general propensities (i.e., self-concealment, openness to experience, and loss of face) would influence counseling-specific expectations (i.e., self-stigma and disclosure…

  8. Hidden from health: structural stigma, sexual orientation concealment, and HIV across 38 countries in the European MSM Internet Survey

    PubMed Central

    Pachankis, John E.; Hatzenbuehler, Mark L.; Hickson, Ford; Weatherburn, Peter; Berg, Rigmor C.; Marcus, Ulrich; Schmidt, Axel J.

    2016-01-01

    Objective Substantial country-level variation exists in prejudiced attitudes towards male homosexuality and in the extent to which countries promote the unequal treatment of MSM through discriminatory laws. The impact and underlying mechanisms of country-level stigma on odds of diagnosed HIV, sexual opportunities, and experience of HIV-prevention services, needs and behaviours have rarely been examined, however. Design Data come from the European MSM Internet Survey (EMIS), which was administered between June and August 2010 across 38 European countries (N =174 209). Methods Country-level stigma was assessed using a combination of national laws and policies affecting sexual minorities and a measure of attitudes held by the citizens of each country. We also assessed concealment, HIV status, number of past 12-month male sex partners, and eight HIV-preventive services, knowledge, and behavioural outcomes. Results MSM living in countries with higher levels of stigma had reduced odds of diagnosed HIV and fewer partners but higher odds of sexual risk behaviour, unmet prevention needs, not using testing services, and not discussing their sexuality in testing services. Sexual orientation concealment mediated associations between country-level stigma and these outcomes. Conclusion Country-level stigma may have historically limited HIV transmission opportunities among MSM, but by restricting MSM’s public visibility, it also reduces MSM’s ability to access HIV-preventive services, knowledge and precautionary behaviours. These findings suggest that MSM in European countries with high levels of stigma are vulnerable to HIV infection. Although they have less opportunity to identify and contact other MSM, this might change with emerging technologies. PMID:26035323

  9. Skylab water balance error analysis

    NASA Technical Reports Server (NTRS)

    Leonard, J. I.

    1977-01-01

    Estimates of the precision of the net water balance were obtained for the entire Skylab preflight and inflight phases as well as for the first two weeks of flight. Quantitative estimates of both total sampling errors and instrumentation errors were obtained. It was shown that measurement error is minimal in comparison to biological variability and little can be gained from improvement in analytical accuracy. In addition, a propagation of error analysis demonstrated that total water balance error could be accounted for almost entirely by the errors associated with body mass changes. Errors due to interaction between terms in the water balance equation (covariances) represented less than 10% of the total error. Overall, the analysis provides evidence that daily measurements of body water changes obtained from the indirect balance technique are reasonable, precise, and relaible. The method is not biased toward net retention or loss.

  10. Standard Errors for Matrix Correlations.

    ERIC Educational Resources Information Center

    Ogasawara, Haruhiko

    1999-01-01

    Derives the asymptotic standard errors and intercorrelations for several matrix correlations assuming multivariate normality for manifest variables and derives the asymptotic standard errors of the matrix correlations for two factor-loading matrices. (SLD)

  11. Uncertainty quantification and error analysis

    SciTech Connect

    Higdon, Dave M; Anderson, Mark C; Habib, Salman; Klein, Richard; Berliner, Mark; Covey, Curt; Ghattas, Omar; Graziani, Carlo; Seager, Mark; Sefcik, Joseph; Stark, Philip

    2010-01-01

    UQ studies all sources of error and uncertainty, including: systematic and stochastic measurement error; ignorance; limitations of theoretical models; limitations of numerical representations of those models; limitations on the accuracy and reliability of computations, approximations, and algorithms; and human error. A more precise definition for UQ is suggested below.

  12. Grammatical Errors and Communication Breakdown.

    ERIC Educational Resources Information Center

    Tomiyama, Machiko

    This study investigated the relationship between grammatical errors and communication breakdown by examining native speakers' ability to correct grammatical errors. The assumption was that communication breakdown exists to a certain degree if a native speaker cannot correct the error or if the correction distorts the information intended to be…

  13. 'I am doing fine only because I have not told anyone': the necessity of concealment in the lives of people living with HIV in India.

    PubMed

    George, Mathew Sunil; Lambert, Helen

    2015-01-01

    In HIV prevention and care programmes, disclosure of status by HIV-positive individuals is generally encouraged to contain the infection and provide adequate support to the person concerned. Lack of disclosure is generally framed as a barrier to preventive behaviours and accessing support. The assumption that disclosure is beneficial is also reflected in studies that aim to identify determinants of disclosure and recommend individual-level measures to promote disclosure. However, in contexts where HIV infection is stigmatised and there is fear of rejection and discrimination among those living with HIV, concealment of status becomes a way to try and regain as much as possible the life that was disrupted by the discovery of HIV infection. In this study of HIV-positive women and children in India, concealment was considered essential by individuals and families of those living with HIV to re-establish and maintain their normal lives in an environment where stigma and discrimination were prevalent. This paper describes why women and care givers of children felt the need to conceal HIV status, the various ways in which people tried to do so and the implications for treatment of people living with HIV. We found that while women were generally willing to disclose their status to their husband or partner, they were very keen to conceal their status from all others, including family members. Parents and carers with an HIV-positive child were not willing to disclose this status to the child or to others. Understanding the different rationales for concealment would help policy makers and programme managers to develop more appropriate care management strategies and train care providers to assist clients in accessing care and support without disrupting their lives. PMID:25706959

  14. ‘I am doing fine only because I have not told anyone’: the necessity of concealment in the lives of people living with HIV in India

    PubMed Central

    George, Mathew Sunil; Lambert, Helen

    2015-01-01

    In HIV prevention and care programmes, disclosure of status by HIV-positive individuals is generally encouraged to contain the infection and provide adequate support to the person concerned. Lack of disclosure is generally framed as a barrier to preventive behaviours and accessing support. The assumption that disclosure is beneficial is also reflected in studies that aim to identify determinants of disclosure and recommend individual-level measures to promote disclosure. However, in contexts where HIV infection is stigmatised and there is fear of rejection and discrimination among those living with HIV, concealment of status becomes a way to try and regain as much as possible the life that was disrupted by the discovery of HIV infection. In this study of HIV-positive women and children in India, concealment was considered essential by individuals and families of those living with HIV to re-establish and maintain their normal lives in an environment where stigma and discrimination were prevalent. This paper describes why women and care givers of children felt the need to conceal HIV status, the various ways in which people tried to do so and the implications for treatment of people living with HIV. We found that while women were generally willing to disclose their status to their husband or partner, they were very keen to conceal their status from all others, including family members. Parents and carers with an HIV-positive child were not willing to disclose this status to the child or to others. Understanding the different rationales for concealment would help policy makers and programme managers to develop more appropriate care management strategies and train care providers to assist clients in accessing care and support without disrupting their lives. PMID:25706959

  15. Spatial cognition

    NASA Technical Reports Server (NTRS)

    Kaiser, Mary Kister; Remington, Roger

    1988-01-01

    Spatial cognition is the ability to reason about geometric relationships in the real (or a metaphorical) world based on one or more internal representations of those relationships. The study of spatial cognition is concerned with the representation of spatial knowledge, and our ability to manipulate these representations to solve spatial problems. Spatial cognition is utilized most critically when direct perceptual cues are absent or impoverished. Examples are provided of how human spatial cognitive abilities impact on three areas of space station operator performance: orientation, path planning, and data base management. A videotape provides demonstrations of relevant phenomena (e.g., the importance of orientation for recognition of complex, configural forms). The presentation is represented by abstract and overhead visuals only.

  16. Errors inducing radiation overdoses.

    PubMed

    Grammaticos, Philip C

    2013-01-01

    There is no doubt that equipments exposing radiation and used for therapeutic purposes should be often checked for possibly administering radiation overdoses to the patients. Technologists, radiation safety officers, radiologists, medical physicists, healthcare providers and administration should take proper care on this issue. "We must be beneficial and not harmful to the patients", according to the Hippocratic doctrine. Cases of radiation overdose are often reported. A series of cases of radiation overdoses have recently been reported. Doctors who were responsible, received heavy punishments. It is much better to prevent than to treat an error or a disease. A Personal Smart Card or Score Card has been suggested for every patient undergoing therapeutic and/or diagnostic procedures by the use of radiation. Taxonomy may also help. PMID:24251304

  17. Beta systems error analysis

    NASA Technical Reports Server (NTRS)

    1984-01-01

    The atmospheric backscatter coefficient, beta, measured with an airborne CO Laser Doppler Velocimeter (LDV) system operating in a continuous wave, focussed model is discussed. The Single Particle Mode (SPM) algorithm, was developed from concept through analysis of an extensive amount of data obtained with the system on board a NASA aircraft. The SPM algorithm is intended to be employed in situations where one particle at a time appears in the sensitive volume of the LDV. In addition to giving the backscatter coefficient, the SPM algorithm also produces as intermediate results the aerosol density and the aerosol backscatter cross section distribution. A second method, which measures only the atmospheric backscatter coefficient, is called the Volume Mode (VM) and was simultaneously employed. The results of these two methods differed by slightly less than an order of magnitude. The measurement uncertainties or other errors in the results of the two methods are examined.

  18. Medical device error.

    PubMed

    Goodman, Gerald R

    2002-12-01

    This article discusses principal concepts for the analysis, classification, and reporting of problems involving medical device technology. We define a medical device in regulatory terminology and define and discuss concepts and terminology used to distinguish the causes and sources of medical device problems. Database classification systems for medical device failure tracking are presented, as are sources of information on medical device failures. The importance of near-accident reporting is discussed to alert users that reported medical device errors are typically limited to those that have caused an injury or death. This can represent only a fraction of the true number of device problems. This article concludes with a summary of the most frequently reported medical device failures by technology type, clinical application, and clinical setting. PMID:12400632

  19. Sources of Error in UV Radiation Measurements

    PubMed Central

    Larason, Thomas C.; Cromer, Christopher L.

    2001-01-01

    Increasing commercial, scientific, and technical applications involving ultraviolet (UV) radiation have led to the demand for improved understanding of the performance of instrumentation used to measure this radiation. There has been an effort by manufacturers of UV measuring devices (meters) to produce simple, optically filtered sensor systems to accomplish the varied measurement needs. We address common sources of measurement errors using these meters. The uncertainty in the calibration of the instrument depends on the response of the UV meter to the spectrum of the sources used and its similarity to the spectrum of the quantity to be measured. In addition, large errors can occur due to out-of-band, non-linear, and non-ideal geometric or spatial response of the UV meters. Finally, in many applications, how well the response of the UV meter approximates the presumed action spectrum needs to be understood for optimal use of the meters.

  20. Field Vectors to Metamorphosed Ores: A Prelude to Finding Currently Concealed Volcano-Plutonic Arc Settings and Their Mineral Deposits in The Grenville Province

    NASA Astrophysics Data System (ADS)

    Corriveau, L.; Bonnet, A.; van Breemen, O.

    2004-05-01

    Recent mineral deposits synthesis highlights the largely barren nature of the high-grade metamorphic terrains of the Canadian Shield in terms of large mining camps. No where is the gap most startling than in the Grenville Province even though a lot of its Paleo- to Mesoproterozoic crust consists of magmatic arcs renown worldwide to host IOCG, VHMS and Porphyry Cu deposits. All these deposit types have significant alteration halos that can serve as vectors to ore. The use of such vectors forced a complete reinterpretation of the nature of the La Romaine domain in the eastern Grenville Province. Mapped in the 70's as being a metasedimentary basin with >500 km2 of meta-arkose and minor pelite, quartzite, conglomerate and marble, the domain is herein reassessed as a major 1.5 Ga Pinwarian continental magmatic arc fertile in Cu-sulphides and Fe-oxides mineralizing systems. The original markers used to prognosticate a sedimentary origin can now be demonstrated to be a series of rhyolitic to dacitic lapillistone, sericitized tuff with Al nodules and veins, Al gneiss locally with lapilli textures, garnetite, ironstones and calc-silicate rocks. The distribution, paragenesis and mode of the Al-, Fe- and Ca-rich units significantly depart from those of normal metasediments but are very diagnostic of metamorphosed hydrothermal alteration zones and meta-exhalites. Mapping alteration vectors provided clues to search for and find the volcanic rocks concealed among the composite granitic gneiss, the zones of hydrothermal leaching (e.g., sericitic, argillic and advanced argillic alterations) and discharge, the cap rocks, and the Cu mineralization. Spatial and stratigraphic relationships provided a means to compare their settings with ore deposit models. Roof pendants of Ba-rich meta-exhalite in surrounding 1.5 Ga granitic plutons and intrusion of 1495 Ma Qtz-Kfs porphyry across hydrothermally altered 1500 Ma tuffs attest to coeval hydrothermal activity and sub-volcanic plutons. The

  1. Register file soft error recovery

    DOEpatents

    Fleischer, Bruce M.; Fox, Thomas W.; Wait, Charles D.; Muff, Adam J.; Watson, III, Alfred T.

    2013-10-15

    Register file soft error recovery including a system that includes a first register file and a second register file that mirrors the first register file. The system also includes an arithmetic pipeline for receiving data read from the first register file, and error detection circuitry to detect whether the data read from the first register file includes corrupted data. The system further includes error recovery circuitry to insert an error recovery instruction into the arithmetic pipeline in response to detecting the corrupted data. The inserted error recovery instruction replaces the corrupted data in the first register file with a copy of the data from the second register file.

  2. Rapid mapping of volumetric errors

    SciTech Connect

    Krulewich, D.; Hale, L.; Yordy, D.

    1995-09-13

    This paper describes a relatively inexpensive, fast, and easy to execute approach to mapping the volumetric errors of a machine tool, coordinate measuring machine, or robot. An error map is used to characterize a machine or to improve its accuracy by compensating for the systematic errors. The method consists of three steps: (1) modeling the relationship between the volumetric error and the current state of the machine; (2) acquiring error data based on length measurements throughout the work volume; and (3) optimizing the model to the particular machine.

  3. Social aspects of clinical errors.

    PubMed

    Richman, Joel; Mason, Tom; Mason-Whitehead, Elizabeth; McIntosh, Annette; Mercer, Dave

    2009-08-01

    Clinical errors, whether committed by doctors, nurses or other professions allied to healthcare, remain a sensitive issue requiring open debate and policy formulation in order to reduce them. The literature suggests that the issues underpinning errors made by healthcare professionals involve concerns about patient safety, professional disclosure, apology, litigation, compensation, processes of recording and policy development to enhance quality service. Anecdotally, we are aware of narratives of minor errors, which may well have been covered up and remain officially undisclosed whilst the major errors resulting in damage and death to patients alarm both professionals and public with resultant litigation and compensation. This paper attempts to unravel some of these issues by highlighting the historical nature of clinical errors and drawing parallels to contemporary times by outlining the 'compensation culture'. We then provide an overview of what constitutes a clinical error and review the healthcare professional strategies for managing such errors. PMID:19201405

  4. Correction of Errors in Polarization Based Dynamic Phase Shifting Interferometers

    NASA Astrophysics Data System (ADS)

    Kimbrough, Brad

    2014-10-01

    Polarization based interferometers for single snap-shot measurements allow single frame, quantitative phase acquisition for vibration insensitive measurements of optical surfaces. Application of these polarization based phase sensors requires the test and reference beams of the interferometer to be orthogonally polarized. As with all polarization based interferometers, these systems can suffer from phase dependent errors resulting from systematic polarization aberrations. This type of measurement error presents a particular challenge because it varies in magnitude both spatially and temporally between each measurement. In this article, a general discussion of phase calculation error is presented. We then present an algorithm that is capable of mitigating phase-dependent measurement errors on-the-fly. The algorithm implementation is non-iterative providing sensor frame rate limited phase calculations. Finally, results are presented for both a high numerical aperture system, where the residual error is reduced to the shot noise limit, and a system with significant birefringence in the test arm.

  5. Spatial Displays and Spatial Instruments

    NASA Technical Reports Server (NTRS)

    Ellis, Stephen R. (Editor); Kaiser, Mary K. (Editor); Grunwald, Arthur J. (Editor)

    1989-01-01

    The conference proceedings topics are divided into two main areas: (1) issues of spatial and picture perception raised by graphical electronic displays of spatial information; and (2) design questions raised by the practical experience of designers actually defining new spatial instruments for use in new aircraft and spacecraft. Each topic is considered from both a theoretical and an applied direction. Emphasis is placed on discussion of phenomena and determination of design principles.

  6. A Posteriori Error Estimation for a Nodal Method in Neutron Transport Calculations

    SciTech Connect

    Azmy, Y.Y.; Buscaglia, G.C.; Zamonsky, O.M.

    1999-11-03

    An a posteriori error analysis of the spatial approximation is developed for the one-dimensional Arbitrarily High Order Transport-Nodal method. The error estimator preserves the order of convergence of the method when the mesh size tends to zero with respect to the L{sup 2} norm. It is based on the difference between two discrete solutions that are available from the analysis. The proposed estimator is decomposed into error indicators to allow the quantification of local errors. Some test problems with isotropic scattering are solved to compare the behavior of the true error to that of the estimated error.

  7. Sampling Errors in Satellite-derived Infrared Sea Surface Temperatures

    NASA Astrophysics Data System (ADS)

    Liu, Y.; Minnett, P. J.

    2014-12-01

    Sea Surface Temperature (SST) measured from satellites has been playing a crucial role in understanding geophysical phenomena. Generating SST Climate Data Records (CDRs) is considered to be the one that imposes the most stringent requirements on data accuracy. For infrared SSTs, sampling uncertainties caused by cloud presence and persistence generate errors. In addition, for sensors with narrow swaths, the swath gap will act as another sampling error source. This study is concerned with quantifying and understanding such sampling errors, which are important for SST CDR generation and for a wide range of satellite SST users. In order to quantify these errors, a reference Level 4 SST field (Multi-scale Ultra-high Resolution SST) is sampled by using realistic swath and cloud masks of Moderate Resolution Imaging Spectroradiometer (MODIS) and Advanced Along Track Scanning Radiometer (AATSR). Global and regional SST uncertainties are studied by assessing the sampling error at different temporal and spatial resolutions (7 spatial resolutions from 4 kilometers to 5.0° at the equator and 5 temporal resolutions from daily to monthly). Global annual and seasonal mean sampling errors are large in the high latitude regions, especially the Arctic, and have geographical distributions that are most likely related to stratus clouds occurrence and persistence. The region between 30°N and 30°S has smaller errors compared to higher latitudes, except for the Tropical Instability Wave area, where persistent negative errors are found. Important differences in sampling errors are also found between the broad and narrow swath scan patterns and between day and night fields. This is the first time that realistic magnitudes of the sampling errors are quantified. Future improvement in the accuracy of SST products will benefit from this quantification.

  8. The 13 errors.

    PubMed

    Flower, J

    1998-01-01

    The reality is that most change efforts fail. McKinsey & Company carried out a fascinating research project on change to "crack the code" on creating and managing change in large organizations. One of the questions they asked--and answered--is why most organizations fail in their efforts to manage change. They found that 80 percent of these failures could be traced to 13 common errors. They are: (1) No winning strategy; (2) failure to make a compelling and urgent case for change; (3) failure to distinguish between decision-driven and behavior-dependent change; (4) over-reliance on structure and systems to change behavior; (5) lack of skills and resources; (6) failure to experiment; (7) leaders' inability or unwillingness to confront how they and their roles must change; (8) failure to mobilize and engage pivotal groups; (9) failure to understand and shape the informal organization; (10) inability to integrate and align all the initiatives; (11) no performance focus; (12) excessively open-ended process; and (13) failure to make the whole process transparent and meaningful to individuals. PMID:10351717

  9. Error analysis in laparoscopic surgery

    NASA Astrophysics Data System (ADS)

    Gantert, Walter A.; Tendick, Frank; Bhoyrul, Sunil; Tyrrell, Dana; Fujino, Yukio; Rangel, Shawn; Patti, Marco G.; Way, Lawrence W.

    1998-06-01

    Iatrogenic complications in laparoscopic surgery, as in any field, stem from human error. In recent years, cognitive psychologists have developed theories for understanding and analyzing human error, and the application of these principles has decreased error rates in the aviation and nuclear power industries. The purpose of this study was to apply error analysis to laparoscopic surgery and evaluate its potential for preventing complications. Our approach is based on James Reason's framework using a classification of errors according to three performance levels: at the skill- based performance level, slips are caused by attention failures, and lapses result form memory failures. Rule-based mistakes constitute the second level. Knowledge-based mistakes occur at the highest performance level and are caused by shortcomings in conscious processing. These errors committed by the performer 'at the sharp end' occur in typical situations which often times are brought about by already built-in latent system failures. We present a series of case studies in laparoscopic surgery in which errors are classified and the influence of intrinsic failures and extrinsic system flaws are evaluated. Most serious technical errors in lap surgery stem from a rule-based or knowledge- based mistake triggered by cognitive underspecification due to incomplete or illusory visual input information. Error analysis in laparoscopic surgery should be able to improve human performance, and it should detect and help eliminate system flaws. Complication rates in laparoscopic surgery due to technical errors can thus be considerably reduced.

  10. Random errors in egocentric networks.

    PubMed

    Almquist, Zack W

    2012-10-01

    The systematic errors that are induced by a combination of human memory limitations and common survey design and implementation have long been studied in the context of egocentric networks. Despite this, little if any work exists in the area of random error analysis on these same networks; this paper offers a perspective on the effects of random errors on egonet analysis, as well as the effects of using egonet measures as independent predictors in linear models. We explore the effects of false-positive and false-negative error in egocentric networks on both standard network measures and on linear models through simulation analysis on a ground truth egocentric network sample based on facebook-friendships. Results show that 5-20% error rates, which are consistent with error rates known to occur in ego network data, can cause serious misestimation of network properties and regression parameters. PMID:23878412

  11. Random errors in egocentric networks

    PubMed Central

    Almquist, Zack W.

    2013-01-01

    The systematic errors that are induced by a combination of human memory limitations and common survey design and implementation have long been studied in the context of egocentric networks. Despite this, little if any work exists in the area of random error analysis on these same networks; this paper offers a perspective on the effects of random errors on egonet analysis, as well as the effects of using egonet measures as independent predictors in linear models. We explore the effects of false-positive and false-negative error in egocentric networks on both standard network measures and on linear models through simulation analysis on a ground truth egocentric network sample based on facebook-friendships. Results show that 5–20% error rates, which are consistent with error rates known to occur in ego network data, can cause serious misestimation of network properties and regression parameters. PMID:23878412

  12. Dopamine reward prediction error coding

    PubMed Central

    Schultz, Wolfram

    2016-01-01

    Reward prediction errors consist of the differences between received and predicted rewards. They are crucial for basic forms of learning about rewards and make us strive for more rewards—an evolutionary beneficial trait. Most dopamine neurons in the midbrain of humans, monkeys, and rodents signal a reward prediction error; they are activated by more reward than predicted (positive prediction error), remain at baseline activity for fully predicted rewards, and show depressed activity with less reward than predicted (negative prediction error). The dopamine signal increases nonlinearly with reward value and codes formal economic utility. Drugs of addiction generate, hijack, and amplify the dopamine reward signal and induce exaggerated, uncontrolled dopamine effects on neuronal plasticity. The striatum, amygdala, and frontal cortex also show reward prediction error coding, but only in subpopulations of neurons. Thus, the important concept of reward prediction errors is implemented in neuronal hardware. PMID:27069377

  13. [Error factors in spirometry].

    PubMed

    Quadrelli, S A; Montiel, G C; Roncoroni, A J

    1994-01-01

    Spirometry is the more frequently used method to estimate pulmonary function in the clinical laboratory. It is important to comply with technical requisites to approximate the real values sought as well as adequate interpretation of results. Recommendations are made to establish: 1--quality control 2--define abnormality 3--classify the change from normal and its degree 4--define reversibility. In relation to quality control several criteria are pointed out such as end of the test, back-extrapolation and extrapolated volume in order to delineate most common errors. Daily calibration is advised. Inspection of graphical records of the test is mandatory. The limitations to the common use of 80% of predicted values to establish abnormality is stressed. The reasons for employing 95% confidence limits are detailed. It is important to select the reference values equation (in view of the differences in predicted values). It is advisable to validate the selection with local population normal values. In relation to the definition of the defect as restrictive or obstructive, the limitations of vital capacity (VC) to establish restriction, when obstruction is also present, are defined. Also the limitations of maximal mid-expiratory flow 25-75 (FMF 25-75) as an isolated marker of obstruction. Finally the qualities of forced expiratory volume in 1 sec (VEF1) and the difficulties with other indicators (CVF, FMF 25-75, VEF1/CVF) to estimate reversibility after bronchodilators are evaluated. The value of different methods used to define reversibility (% of change in initial value, absolute change or % of predicted), is commented. Clinical spirometric studies in order to be valuable should be performed with the same technical rigour as any other more complex studies. PMID:7990690

  14. Statistical errors in Monte Carlo estimates of systematic errors

    NASA Astrophysics Data System (ADS)

    Roe, Byron P.

    2007-01-01

    For estimating the effects of a number of systematic errors on a data sample, one can generate Monte Carlo (MC) runs with systematic parameters varied and examine the change in the desired observed result. Two methods are often used. In the unisim method, the systematic parameters are varied one at a time by one standard deviation, each parameter corresponding to a MC run. In the multisim method (see ), each MC run has all of the parameters varied; the amount of variation is chosen from the expected distribution of each systematic parameter, usually assumed to be a normal distribution. The variance of the overall systematic error determination is derived for each of the two methods and comparisons are made between them. If one focuses not on the error in the prediction of an individual systematic error, but on the overall error due to all systematic errors in the error matrix element in data bin m, the number of events needed is strongly reduced because of the averaging effect over all of the errors. For simple models presented here the multisim model was far better if the statistical error in the MC samples was larger than an individual systematic error, while for the reverse case, the unisim model was better. Exact formulas and formulas for the simple toy models are presented so that realistic calculations can be made. The calculations in the present note are valid if the errors are in a linear region. If that region extends sufficiently far, one can have the unisims or multisims correspond to k standard deviations instead of one. This reduces the number of events required by a factor of k2. The specific terms unisim and multisim were coined by Peter Meyers and Steve Brice, respectively, for the MiniBooNE experiment. However, the concepts have been developed over time and have been in general use for some time.

  15. A study on heterogeneous distributed spatial information platform based on semantic Web services

    NASA Astrophysics Data System (ADS)

    Peng, Shuang-yun; Yang, Kun; Xu, Quan-li; Huang, Bang-mei

    2008-10-01

    With the development of Semantic Web technology, the spatial information service based on ontology is an effective way for sharing and interoperation of heterogeneous information resources in the distributed network environment. This paper discusses spatial information sharing and interoperability in the Semantic Web Services architecture. Through using Ontology record spatial information in sharing knowledge system, explicit and formalization expresses the default and the concealment semantic information. It provides the prerequisite for spatial information sharing and interoperability; Through Semantic Web Services technology parses Ontology and intelligent buildings services under network environment, form a network of services. In order to realize the practical applications of spatial information sharing and interoperation in different brunches of CDC system, a prototype system for HIV/AIDS information sharing based on geo-ontology has also been developed by using the methods described above.

  16. Teratogenic inborn errors of metabolism.

    PubMed Central

    Leonard, J. V.

    1986-01-01

    Most children with inborn errors of metabolism are born healthy without malformations as the fetus is protected by the metabolic activity of the placenta. However, certain inborn errors of the fetus have teratogenic effects although the mechanisms responsible for the malformations are not generally understood. Inborn errors in the mother may also be teratogenic. The adverse effects of these may be reduced by improved metabolic control of the biochemical disorder. PMID:3540927

  17. Confidence limits and their errors

    SciTech Connect

    Rajendran Raja

    2002-03-22

    Confidence limits are common place in physics analysis. Great care must be taken in their calculation and use especially in cases of limited statistics. We introduce the concept of statistical errors of confidence limits and argue that not only should limits be calculated but also their errors in order to represent the results of the analysis to the fullest. We show that comparison of two different limits from two different experiments becomes easier when their errors are also quoted. Use of errors of confidence limits will lead to abatement of the debate on which method is best suited to calculate confidence limits.

  18. Compensating For GPS Ephemeris Error

    NASA Technical Reports Server (NTRS)

    Wu, Jiun-Tsong

    1992-01-01

    Method of computing position of user station receiving signals from Global Positioning System (GPS) of navigational satellites compensates for most of GPS ephemeris error. Present method enables user station to reduce error in its computed position substantially. User station must have access to two or more reference stations at precisely known positions several hundred kilometers apart and must be in neighborhood of reference stations. Based on fact that when GPS data used to compute baseline between reference station and user station, vector error in computed baseline is proportional ephemeris error and length of baseline.

  19. Retransmission error control with memory

    NASA Technical Reports Server (NTRS)

    Sindhu, P. S.

    1977-01-01

    In this paper, an error control technique that is a basic improvement over automatic-repeat-request ARQ is presented. Erroneously received blocks in an ARQ system are used for error control. The technique is termed ARQ-with-memory (MRQ). The general MRQ system is described, and simple upper and lower bounds are derived on the throughput achievable by MRQ. The performance of MRQ with respect to throughput, message delay and probability of error is compared to that of ARQ by simulating both systems using error data from a VHF satellite channel being operated in the ALOHA packet broadcasting mode.

  20. Medication Errors in Outpatient Pediatrics.

    PubMed

    Berrier, Kyla

    2016-01-01

    Medication errors may occur during parental administration of prescription and over-the-counter medications in the outpatient pediatric setting. Misinterpretation of medication labels and dosing errors are two types of errors in medication administration. Health literacy may play an important role in parents' ability to safely manage their child's medication regimen. There are several proposed strategies for decreasing these medication administration errors, including using standardized dosing instruments, using strictly metric units for medication dosing, and providing parents and caregivers with picture-based dosing instructions. Pediatric healthcare providers should be aware of these strategies and seek to implement many of them into their practices. PMID:27537086

  1. Physical examination. Frequently observed errors.

    PubMed

    Wiener, S; Nathanson, M

    1976-08-16

    A method allowing for direct observation of intern and resident physicians while interviewing and examining patients has been in use on our medical wards for the last five years. A large number of errors in the performance of the medical examination by young physicians were noted and a classification of these errors into those of technique, omission, detection, interpretation, and recording was made. An approach to detection and correction of each of these kinds of errors is presented, as well as a discussion of possible reasons for the occurrence of these errors in physician performance. PMID:947266

  2. A theory of human error

    NASA Technical Reports Server (NTRS)

    Mcruer, D. T.; Clement, W. F.; Allen, R. W.

    1980-01-01

    Human error, a significant contributing factor in a very high proportion of civil transport, general aviation, and rotorcraft accidents is investigated. Correction of the sources of human error requires that one attempt to reconstruct underlying and contributing causes of error from the circumstantial causes cited in official investigative reports. A validated analytical theory of the input-output behavior of human operators involving manual control, communication, supervisory, and monitoring tasks which are relevant to aviation operations is presented. This theory of behavior, both appropriate and inappropriate, provides an insightful basis for investigating, classifying, and quantifying the needed cause-effect relationships governing propagation of human error.

  3. A posteriori error estimator and error control for contact problems

    NASA Astrophysics Data System (ADS)

    Weiss, Alexander; Wohlmuth, Barbara I.

    2009-09-01

    In this paper, we consider two error estimators for one-body contact problems. The first error estimator is defined in terms of H( div ) -conforming stress approximations and equilibrated fluxes while the second is a standard edge-based residual error estimator without any modification with respect to the contact. We show reliability and efficiency for both estimators. Moreover, the error is bounded by the first estimator with a constant one plus a higher order data oscillation term plus a term arising from the contact that is shown numerically to be of higher order. The second estimator is used in a control-based AFEM refinement strategy, and the decay of the error in the energy is shown. Several numerical tests demonstrate the performance of both estimators.

  4. Error propagation in energetic carrying capacity models

    USGS Publications Warehouse

    Pearse, Aaron T.; Stafford, Joshua D.

    2014-01-01

    Conservation objectives derived from carrying capacity models have been used to inform management of landscapes for wildlife populations. Energetic carrying capacity models are particularly useful in conservation planning for wildlife; these models use estimates of food abundance and energetic requirements of wildlife to target conservation actions. We provide a general method for incorporating a foraging threshold (i.e., density of food at which foraging becomes unprofitable) when estimating food availability with energetic carrying capacity models. We use a hypothetical example to describe how past methods for adjustment of foraging thresholds biased results of energetic carrying capacity models in certain instances. Adjusting foraging thresholds at the patch level of the species of interest provides results consistent with ecological foraging theory. Presentation of two case studies suggest variation in bias which, in certain instances, created large errors in conservation objectives and may have led to inefficient allocation of limited resources. Our results also illustrate how small errors or biases in application of input parameters, when extrapolated to large spatial extents, propagate errors in conservation planning and can have negative implications for target populations.

  5. Wavefront error simulator for evaluating optical testing instrumentation

    NASA Technical Reports Server (NTRS)

    Golden, L. J.

    1975-01-01

    A wavefront error simulator has been designed and fabricated to evaluate experimentally test instrumentation for the Large Space Telescope (LST) program. The principal operating part of the simulator is an aberration generator that introduces low-order aberrations of several waves magnitude with an incremented adjustment capability of lambda/100. Each aberration type can be introduced independently with any desired spatial orientation.

  6. Error Growth Rate in the MM5 Model

    NASA Astrophysics Data System (ADS)

    Ivanov, S.; Palamarchuk, J.

    2006-12-01

    The goal of this work is to estimate model error growth rates in simulations of the atmospheric circulation by the MM5 model all the way from the short range to the medium range and beyond. The major topics are addressed to: (i) search the optimal set of parameterization schemes; (ii) evaluate the spatial structure and scales of the model error for various atmospheric fields; (iii) determine geographical regions where model errors are largest; (iv) define particular atmospheric patterns contributing to the fast and significant model error growth. Results are presented for geopotential, temperature, relative humidity and horizontal wind components fields on standard surfaces over the Atlantic-European region during winter 2002. Various combinations of parameterization schemes for cumulus, PBL, moisture and radiation are used to identify which one provides a lesser difference between the model state and analysis. The comparison of the model fields is carried out versus ERA-40 reanalysis of the ECMWF. Results show that the rate, at which the model error grows as well as its magnitude, varies depending on the forecast range, atmospheric variable and level. The typical spatial scale and structure of the model error also depends on the particular atmospheric variable. The distribution of the model error over the domain can be separated in two parts: the steady and transient. The first part is associated with a few high mountain regions including Greenland, where model error is larger. The transient model error mainly moves along with areas of high gradients in the atmospheric flow. Acknowledgement: This study has been supported by NATO Science for Peace grant #981044. The MM5 modelling system used in this study has been provided by UCAR. ERA-40 re-analysis data have been obtained from the ECMWF data server.

  7. Error coding simulations in C

    NASA Technical Reports Server (NTRS)

    Noble, Viveca K.

    1994-01-01

    When data is transmitted through a noisy channel, errors are produced within the data rendering it indecipherable. Through the use of error control coding techniques, the bit error rate can be reduced to any desired level without sacrificing the transmission data rate. The Astrionics Laboratory at Marshall Space Flight Center has decided to use a modular, end-to-end telemetry data simulator to simulate the transmission of data from flight to ground and various methods of error control. The simulator includes modules for random data generation, data compression, Consultative Committee for Space Data Systems (CCSDS) transfer frame formation, error correction/detection, error generation and error statistics. The simulator utilizes a concatenated coding scheme which includes CCSDS standard (255,223) Reed-Solomon (RS) code over GF(2(exp 8)) with interleave depth of 5 as the outermost code, (7, 1/2) convolutional code as an inner code and CCSDS recommended (n, n-16) cyclic redundancy check (CRC) code as the innermost code, where n is the number of information bits plus 16 parity bits. The received signal-to-noise for a desired bit error rate is greatly reduced through the use of forward error correction techniques. Even greater coding gain is provided through the use of a concatenated coding scheme. Interleaving/deinterleaving is necessary to randomize burst errors which may appear at the input of the RS decoder. The burst correction capability length is increased in proportion to the interleave depth. The modular nature of the simulator allows for inclusion or exclusion of modules as needed. This paper describes the development and operation of the simulator, the verification of a C-language Reed-Solomon code, and the possibility of using Comdisco SPW(tm) as a tool for determining optimal error control schemes.

  8. Error coding simulations in C

    NASA Astrophysics Data System (ADS)

    Noble, Viveca K.

    1994-10-01

    When data is transmitted through a noisy channel, errors are produced within the data rendering it indecipherable. Through the use of error control coding techniques, the bit error rate can be reduced to any desired level without sacrificing the transmission data rate. The Astrionics Laboratory at Marshall Space Flight Center has decided to use a modular, end-to-end telemetry data simulator to simulate the transmission of data from flight to ground and various methods of error control. The simulator includes modules for random data generation, data compression, Consultative Committee for Space Data Systems (CCSDS) transfer frame formation, error correction/detection, error generation and error statistics. The simulator utilizes a concatenated coding scheme which includes CCSDS standard (255,223) Reed-Solomon (RS) code over GF(2(exp 8)) with interleave depth of 5 as the outermost code, (7, 1/2) convolutional code as an inner code and CCSDS recommended (n, n-16) cyclic redundancy check (CRC) code as the innermost code, where n is the number of information bits plus 16 parity bits. The received signal-to-noise for a desired bit error rate is greatly reduced through the use of forward error correction techniques. Even greater coding gain is provided through the use of a concatenated coding scheme. Interleaving/deinterleaving is necessary to randomize burst errors which may appear at the input of the RS decoder. The burst correction capability length is increased in proportion to the interleave depth. The modular nature of the simulator allows for inclusion or exclusion of modules as needed. This paper describes the development and operation of the simulator, the verification of a C-language Reed-Solomon code, and the possibility of using Comdisco SPW(tm) as a tool for determining optimal error control schemes.

  9. Accelerated idioventricular rhythm of infundibular origin in patients with a concealed form of arrhythmogenic right ventricular dysplasia.

    PubMed Central

    Martini, B; Nava, A; Thiene, G; Buja, G F; Canciani, B; Miraglia, G; Scognamiglio, R; Boffa, G M; Daliento, L

    1988-01-01

    Five apparently healthy people (aged 16-47) presented with recurrent episodes of accelerated idioventricular rhythm characterised by left bundle branch block and right axis deviation. Clinical history, physical findings, basic electrocardiogram, chest x ray, and blood tests were within normal limits in all. Holter monitoring, exercise stress test, and electrophysiological study (in three patients) showed that accelerated idioventricular rhythm was mainly bradycardia dependent, easily suppressed by effort and overdrive pacing, and originated from the outflow tract of the right ventricle. The mechanism could be enhanced automaticity. Data from cross sectional echocardiography (in all patients) and from haemodynamic evaluation (in three) identified structural or wall motion abnormalities of the right ventricle or both without appreciable dilatation of the ventricle. Biopsy specimens of the right ventricular endomyocardium showed fibrosis in one patient, fibrosis and fatty infiltration in the second, and pronounced fatty infiltration in the third. These results show that some patients with accelerated idioventricular rhythm have right ventricular abnormalities that are typical of the localised and concealed forms of arrhythmogenic right ventricular dysplasia. Images Fig 1 Fig 2 Fig 3 Fig 4 Fig 5 PMID:3382568

  10. Review of recent studies and issues regarding the P300-based complex trial protocol for detection of concealed information.

    PubMed

    Rosenfeld, J Peter; Hu, Xiaoqing; Labkovsky, Elena; Meixner, John; Winograd, Michael R

    2013-11-01

    In this review, the evolution of new P300-based protocols for detection of concealed information is summarized. The P300-based complex trial protocol (CTP) is described as one such countermeasure (CM)-resistant protocol. Recent lapses in diagnostic accuracy (from 90% to 75%) with CTPs applied to mock crime protocols are summarized, as well as recent enhancements to the CTP which have restored accuracy. These enhancements include 1) use of performance feedback during testing, 2) use of other ERP components such as N200 in diagnosis, 3) use of auxiliary tests, including the autobiographical implicit association test, as leading to restored diagnostic accuracy, and 4) a study of the mechanisms underlying CMs. A novel, doubly efficient version of the CTP involving presentation of two probes in one trial is described as a new way to improve accuracy to levels above 90% in mock crime situations. Finally, a thorough analysis of the legal issues surrounding use of the CTP in U.S. is given. PMID:24012907

  11. fMRI-activation patterns in the detection of concealed information rely on memory-related effects.

    PubMed

    Gamer, Matthias; Klimecki, Olga; Bauermann, Thomas; Stoeter, Peter; Vossel, Gerhard

    2012-06-01

    Recent research on potential applications of fMRI in the detection of concealed knowledge primarily ascribed the reported differences in hemodynamic response patterns to deception. This interpretation is challenged by the results of the present study. Participants were required to memorize probe and target items (a banknote and a playing card, each). Subsequently, these items were repeatedly presented along with eight irrelevant items in a modified Guilty Knowledge Test design and participants were instructed to simply acknowledge item presentation by pressing one button after each stimulus. Despite the absence of response monitoring demands and thus overt response conflicts, the experiment revealed a differential physiological response pattern as a function of item type. First, probes elicited the largest skin conductance responses. Second, differential hemodynamic responses were observed in bilateral inferior frontal regions, the right supramarginal gyrus and the supplementary motor area as a function of item type. Probes and targets were accompanied by a larger signal increase than irrelevant items in these regions. Moreover, the responses to probes differed substantially from targets. The observed neural response pattern seems to rely on retrieval processes that depend on the depth of processing in the encoding situation. PMID:19258375

  12. The dengue virus conceals double-stranded RNA in the intracellular membrane to escape from an interferon response

    PubMed Central

    Uchida, Leo; Espada-Murao, Lyre Anni; Takamatsu, Yuki; Okamoto, Kenta; Hayasaka, Daisuke; Yu, Fuxun; Nabeshima, Takeshi; Buerano, Corazon C.; Morita, Kouichi

    2014-01-01

    The dengue virus (DENV) circulates between humans and mosquitoes and requires no other mammals or birds for its maintenance in nature. The virus is well-adapted to humans, as reflected by high-level viraemia in patients. To investigate its high adaptability, the DENV induction of host type-I interferon (IFN) was assessed in vitro in human-derived HeLa cells and compared with that induced by the Japanese encephalitis virus (JEV), a closely related arbovirus that generally exhibits low viraemia in humans. A sustained viral spread with a poor IFN induction was observed in the DENV-infected cells, whereas the JEV infection resulted in a self-limiting and abortive infection with a high IFN induction. There was no difference between DENV and JEV double-stranded RNA (dsRNA) as IFN inducers. Instead, the dsRNA was poorly exposed in the cytosol as late as 48 h post-infection (p.i.), despite the high level of DENV replication in the infected cells. In contrast, the JEV-derived dsRNA appeared in the cytosol as early as 24 h p.i. Our results provided evidence for the first time in DENV, that concealing dsRNA in the intracellular membrane diminishes the effect of the host defence mechanism, a strategy that differs from an active suppression of IFN activity. PMID:25491663

  13. Burst Packet Loss Concealment Using Multiple Codebooks and Comfort Noise for CELP-Type Speech Coders in Wireless Sensor Networks

    PubMed Central

    Park, Nam In; Kim, Hong Kook; Jung, Min A; Lee, Seong Ro; Choi, Seung Ho

    2011-01-01

    In this paper, a packet loss concealment (PLC) algorithm for CELP-type speech coders is proposed in order to improve the quality of decoded speech under burst packet loss conditions in a wireless sensor network. Conventional receiver-based PLC algorithms in the G.729 speech codec are usually based on speech correlation to reconstruct the decoded speech of lost frames by using parameter information obtained from the previous correctly received frames. However, this approach has difficulty in reconstructing voice onset signals since the parameters such as pitch, linear predictive coding coefficient, and adaptive/fixed codebooks of the previous frames are mostly related to silence frames. Thus, in order to reconstruct speech signals in the voice onset intervals, we propose a multiple codebook-based approach that includes a traditional adaptive codebook and a new random codebook composed of comfort noise. The proposed PLC algorithm is designed as a PLC algorithm for G.729 and its performance is then compared with that of the PLC algorithm currently employed in G.729 via a perceptual evaluation of speech quality, a waveform comparison, and a preference test under different random and burst packet loss conditions. It is shown from the experiments that the proposed PLC algorithm provides significantly better speech quality than the PLC algorithm employed in G.729 under all the test conditions. PMID:22163902

  14. Memory detection with the Concealed Information Test: a meta analysis of skin conductance, respiration, heart rate, and P300 data.

    PubMed

    Meijer, Ewout H; Selle, Nathalie Klein; Elber, Lotem; Ben-Shakhar, Gershon

    2014-09-01

    The Concealed Information Test (CIT) uses psychophysiological measures to determine the presence or absence of crime-related information in a suspect's memory. We conducted a meta-analysis on the validity of the CIT based on four physiological measures-skin conductance response (SCR), respiration line length (RLL), changes in heart rate (HR), and enhanced amplitudes of the P300 component of the event-related potential (P300). This meta-analysis relied on laboratory studies that used either the mock-crime or the personal-item paradigm. Results showed a mean effect size (d*) of 1.55 for SCR, 1.11 for RLL, 0.89 for HR, and 1.89 for P300. However, P300 outperformed SCR only in the personal-item paradigm, but not in the mock-crime paradigm. Motivation level, number of questions, publication year, and the inclusion of innocent participants emerged as significant moderators for the SCR, while only the type of paradigm used moderated the P300 effect. PMID:24916920

  15. The Complex Trial Protocol (CTP): a new, countermeasure-resistant, accurate, P300-based method for detection of concealed information.

    PubMed

    Rosenfeld, J Peter; Labkovsky, Elena; Winograd, Michael; Lui, Ming A; Vandenboom, Catherine; Chedid, Erica

    2008-11-01

    A new P300-based concealed information test is described. A rare probe or frequent irrelevant stimulus appears in the same trial in which a target or nontarget later appears. One response follows the first stimulus and uses the same button press regardless of stimulus type. A later second stimulus then appears: target or nontarget. The subject presses one button for a target, another for a nontarget. A P300 to the first stimulus indicates probe recognition. One group was tested in 3 weeks for denied recognition of familiar information. Weeks 1 and 3 were guilty conditions; Week 2 was a countermeasure (CM) condition. The probe-irrelevant differences were significant in all weeks, and percent hits were >90%. Attempted CM use was detectable via elevated reaction time to the first stimulus. In a replication, results were similar. False positive rates for both studies varied from 0 to .08, yielding J. B. Grier (1971) A' values from .9 to 1.0. PMID:18823418

  16. High-sensitivity, and cost-effective system for infrared imaging of concealed objects in dynamic mode.

    SciTech Connect

    Gordiyenko, E.; Yefremenko, V.; Pearson, J.; Bader, S.; Novosad, V.; Materials Science Division

    2005-08-05

    Novel, cost-efficient, and highly-sensitive IR imaging systems play an important role in homeland security functions. Technical limitations in the areas of sensitivity, contrast ratio, bandwidth and cost continue to constrain imaging capabilities. We have designed and prototyped a compact computer-piloted high sensitivity infrared imaging system. The device consists of infrared optics, cryostat, low-noise pre-amplifier, Analog-to-Digital hardware, feedback electronics, and unique image processing software. Important advantages of the developed system are: (i) Eight electronic channels are available for simultaneous registration of IR and visible images in multiple spectral ranges, (ii) Capability of real-time analysis such as comparing the 'sensed' image with 'reference' images from a database, (iii) High accuracy temperature measurement of multiple points on the image by referencing the radiation intensity from the object to a black body model, (iv) Image generation by real-time integration of images from multiple sensors operating from the visible to the terahertz range. The device was tested with a liquid-nitrogen-cooled, single-pixel HgCdTe detector for imaging in 8-12 microns range. The demonstrated examples of infrared imaging of concealed objects in static and dynamic modes include a hammer (metal head and wooden handle), plastic imitator of handguns hidden under clothes, powder in an envelope, and revealing complex wall structures under decorative plaster.

  17. The “Good Cop, Bad Cop” Effect in the RT-Based Concealed Information Test: Exploring the Effect of Emotional Expressions Displayed by a Virtual Investigator

    PubMed Central

    Varga, Mihai; Visu-Petra, George; Miclea, Mircea; Visu-Petra, Laura

    2015-01-01

    Concealing the possession of relevant information represents a complex cognitive process, shaped by contextual demands and individual differences in cognitive and socio-emotional functioning. The Reaction Time-based Concealed Information Test (RT-CIT) is used to detect concealed knowledge based on the difference in RTs between denying recognition of critical (probes) and newly encountered (irrelevant) information. Several research questions were addressed in this scenario implemented after a mock crime. First, we were interested whether the introduction of a social stimulus (facial identity) simulating a virtual investigator would facilitate the process of deception detection. Next, we explored whether his emotional displays (friendly, hostile or neutral) would have a differential impact on speed of responses to probe versus irrelevant items. We also compared the impact of introducing similar stimuli in a working memory (WM) updating context without requirements to conceal information. Finally, we explored the association between deceptive behavior and individual differences in WM updating proficiency or in internalizing problems (state / trait anxiety and depression). Results indicated that the mere presence of a neutral virtual investigator slowed down participants' responses, but not the appended lie-specific time (difference between probes and irrelevants). Emotional expression was shown to differentially affect speed of responses to critical items, with positive displays from the virtual examiner enhancing lie-specific time, compared to negative facial expressions, which had an opposite impact. This valence-specific effect was not visible in the WM updating context. Higher levels of trait / state anxiety were related to faster responses to probes in the negative condition (hostile facial expression) of the RT-CIT. These preliminary findings further emphasize the need to take into account motivational and emotional factors when considering the transfer of

  18. The "good cop, bad cop" effect in the RT-based concealed information test: exploring the effect of emotional expressions displayed by a virtual investigator.

    PubMed

    Varga, Mihai; Visu-Petra, George; Miclea, Mircea; Visu-Petra, Laura

    2015-01-01

    Concealing the possession of relevant information represents a complex cognitive process, shaped by contextual demands and individual differences in cognitive and socio-emotional functioning. The Reaction Time-based Concealed Information Test (RT-CIT) is used to detect concealed knowledge based on the difference in RTs between denying recognition of critical (probes) and newly encountered (irrelevant) information. Several research questions were addressed in this scenario implemented after a mock crime. First, we were interested whether the introduction of a social stimulus (facial identity) simulating a virtual investigator would facilitate the process of deception detection. Next, we explored whether his emotional displays (friendly, hostile or neutral) would have a differential impact on speed of responses to probe versus irrelevant items. We also compared the impact of introducing similar stimuli in a working memory (WM) updating context without requirements to conceal information. Finally, we explored the association between deceptive behavior and individual differences in WM updating proficiency or in internalizing problems (state / trait anxiety and depression). Results indicated that the mere presence of a neutral virtual investigator slowed down participants' responses, but not the appended lie-specific time (difference between probes and irrelevants). Emotional expression was shown to differentially affect speed of responses to critical items, with positive displays from the virtual examiner enhancing lie-specific time, compared to negative facial expressions, which had an opposite impact. This valence-specific effect was not visible in the WM updating context. Higher levels of trait / state anxiety were related to faster responses to probes in the negative condition (hostile facial expression) of the RT-CIT. These preliminary findings further emphasize the need to take into account motivational and emotional factors when considering the transfer of

  19. Explaining Errors in Children's Questions

    ERIC Educational Resources Information Center

    Rowland, Caroline F.

    2007-01-01

    The ability to explain the occurrence of errors in children's speech is an essential component of successful theories of language acquisition. The present study tested some generativist and constructivist predictions about error on the questions produced by ten English-learning children between 2 and 5 years of age. The analyses demonstrated that,…

  20. Dyslexia and Oral Reading Errors

    ERIC Educational Resources Information Center

    Singleton, Chris

    2005-01-01

    Thomson was the first of very few researchers to have studied oral reading errors as a means of addressing the question: Are dyslexic readers different to other readers? Using the Neale Analysis of Reading Ability and Goodman's taxonomy of oral reading errors, Thomson concluded that dyslexic readers are different, but he found that they do not…

  1. Children's Scale Errors with Tools

    ERIC Educational Resources Information Center

    Casler, Krista; Eshleman, Angelica; Greene, Kimberly; Terziyan, Treysi

    2011-01-01

    Children sometimes make "scale errors," attempting to interact with tiny object replicas as though they were full size. Here, we demonstrate that instrumental tools provide special insight into the origins of scale errors and, moreover, into the broader nature of children's purpose-guided reasoning and behavior with objects. In Study 1, 1.5- to…

  2. Robustness and modeling error characterization

    NASA Technical Reports Server (NTRS)

    Lehtomaki, N. A.; Castanon, D. A.; Sandell, N. R., Jr.; Levy, B. C.; Athans, M.; Stein, G.

    1984-01-01

    The results on robustness theory presented here are extensions of those given in Lehtomaki et al., (1981). The basic innovation in these new results is that they utilize minimal additional information about the structure of the modeling error, as well as its magnitude, to assess the robustness of feedback systems for which robustness tests based on the magnitude of modeling error alone are inconclusive.

  3. Human Error: A Concept Analysis

    NASA Technical Reports Server (NTRS)

    Hansen, Frederick D.

    2007-01-01

    Human error is the subject of research in almost every industry and profession of our times. This term is part of our daily language and intuitively understood by most people however, it would be premature to assume that everyone's understanding of human error s the same. For example, human error is used to describe the outcome or consequence of human action, the causal factor of an accident, deliberate violations,a nd the actual action taken by a human being. As a result, researchers rarely agree on the either a specific definition or how to prevent human error. The purpose of this article is to explore the specific concept of human error using Concept Analysis as described by Walker and Avant (1995). The concept of human error is examined as currently used in the literature of a variety of industries and professions. Defining attributes and examples of model, borderline, and contrary cases are described. The antecedents and consequences of human error are also discussed and a definition of human error is offered.

  4. Dual Processing and Diagnostic Errors

    ERIC Educational Resources Information Center

    Norman, Geoff

    2009-01-01

    In this paper, I review evidence from two theories in psychology relevant to diagnosis and diagnostic errors. "Dual Process" theories of thinking, frequently mentioned with respect to diagnostic error, propose that categorization decisions can be made with either a fast, unconscious, contextual process called System 1 or a slow, analytical,…

  5. Measurement Errors in Organizational Surveys.

    ERIC Educational Resources Information Center

    Dutka, Solomon; Frankel, Lester R.

    1993-01-01

    Describes three classes of measurement techniques: (1) interviewing methods; (2) record retrieval procedures; and (3) observation methods. Discusses primary reasons for measurement error. Concludes that, although measurement error can be defined and controlled for, there are other design factors that also must be considered. (CFR)

  6. Barriers to Medical Error Reporting

    PubMed Central

    Poorolajal, Jalal; Rezaie, Shirin; Aghighi, Negar

    2015-01-01

    Background: This study was conducted to explore the prevalence of medical error underreporting and associated barriers. Methods: This cross-sectional study was performed from September to December 2012. Five hospitals, affiliated with Hamadan University of Medical Sciences, in Hamedan, Iran were investigated. A self-administered questionnaire was used for data collection. Participants consisted of physicians, nurses, midwives, residents, interns, and staffs of radiology and laboratory departments. Results: Overall, 50.26% of subjects had committed but not reported medical errors. The main reasons mentioned for underreporting were lack of effective medical error reporting system (60.0%), lack of proper reporting form (51.8%), lack of peer supporting a person who has committed an error (56.0%), and lack of personal attention to the importance of medical errors (62.9%). The rate of committing medical errors was higher in men (71.4%), age of 50–40 years (67.6%), less-experienced personnel (58.7%), educational level of MSc (87.5%), and staff of radiology department (88.9%). Conclusions: This study outlined the main barriers to reporting medical errors and associated factors that may be helpful for healthcare organizations in improving medical error reporting as an essential component for patient safety enhancement. PMID:26605018

  7. Operational Interventions to Maintenance Error

    NASA Technical Reports Server (NTRS)

    Kanki, Barbara G.; Walter, Diane; Dulchinos, VIcki

    1997-01-01

    A significant proportion of aviation accidents and incidents are known to be tied to human error. However, research of flight operational errors has shown that so-called pilot error often involves a variety of human factors issues and not a simple lack of individual technical skills. In aircraft maintenance operations, there is similar concern that maintenance errors which may lead to incidents and accidents are related to a large variety of human factors issues. Although maintenance error data and research are limited, industry initiatives involving human factors training in maintenance have become increasingly accepted as one type of maintenance error intervention. Conscientious efforts have been made in re-inventing the team7 concept for maintenance operations and in tailoring programs to fit the needs of technical opeRAtions. Nevertheless, there remains a dual challenge: 1) to develop human factors interventions which are directly supported by reliable human error data, and 2) to integrate human factors concepts into the procedures and practices of everyday technical tasks. In this paper, we describe several varieties of human factors interventions and focus on two specific alternatives which target problems related to procedures and practices; namely, 1) structured on-the-job training and 2) procedure re-design. We hope to demonstrate that the key to leveraging the impact of these solutions comes from focused interventions; that is, interventions which are derived from a clear understanding of specific maintenance errors, their operational context and human factors components.

  8. Sulfur-containing particles emitted by concealed sulfide ore deposits: an unknown source of sulfur-containing particles in the atmosphere

    NASA Astrophysics Data System (ADS)

    Cao, J.; Li, Y.; Jiang, T.; Hu, G.

    2014-11-01

    Sources of sulfur dioxide, sulfates, and organic sulfur compounds, such as fossil fuels, volcanic eruptions, and animal feeding operations, have attracted considerable attention. In this study, we collected particles carried by geogas flows ascending through soil, geogas flows above the soil that had passed through the soil, and geogas flows ascending through deep faults of concealed sulfide ore deposits and analyzed them using transmission electron microscopy. Numerous crystalline and amorphous sulfur-containing particles or particle aggregations were found in the ascending geogas flows. In addition to S, the particles contained O, Ca, K, Mg, Fe, Na, Pb, Hg, Cu, Zn, As, Ti, Sr, Ba, Si, etc. Such particles are usually a few to several hundred nanometers in diameter with either regular or irregular morphology. The sulfur-containing particles originated from deep-seated weathering or faulting products of concealed sulfide ore deposits. The particles suspended in the ascending geogas flow migrated through faults from deep-seated sources to the atmosphere. This is a previously unknown source of the atmospheric particles. This paper reports, for the first time, the emission of sulfur-containing particles into the atmosphere from concealed sulfide ore deposits. The climatic and ecological influences of these sulfur-containing particles and particle aggregations should to be assessed.

  9. Sulfur-containing particles emitted by concealed sulfide ore deposits: an unknown source of sulfur-containing particles in the atmosphere

    NASA Astrophysics Data System (ADS)

    Cao, J. J.; Li, Y. K.; Jiang, T.; Hu, G.

    2015-06-01

    Sources of sulfur dioxide, sulfates, and organic sulfur compounds, such as fossil fuels, volcanic eruptions, and animal feeding operations, have attracted considerable attention. In this study, we collected particles carried by geogas flows ascending through soil, geogas flows above the soil that had passed through the soil, and geogas flows ascending through deep faults of concealed sulfide ore deposits, and analysed them using transmission electron microscopy. Numerous crystalline and amorphous sulfur-containing particles or particle aggregations were found in the ascending geogas flows. In addition to S, the particles contained O, Ca, K, Mg, Fe, Na, Pb, Hg, Cu, Zn, As, Ti, Sr, Ba, Si, etc. Such particles are usually a few to several hundred nanometres in diameter with either regular or irregular morphology. The sulfur-containing particles originated from deep-seated weathering or faulting products of concealed sulfide ore deposits. The particles suspended in the ascending geogas flow migrated through faults from deep-seated sources to the atmosphere. This is a previously unknown source of the atmospheric particles. This paper reports, for the first time, the emission of sulfur-containing particles into the atmosphere from concealed sulfide ore deposits. The climatic and ecological influences of these sulfur-containing particles and particle aggregations should be assessed.

  10. The effects of sweep numbers per average and protocol type on the accuracy of the p300-based concealed information test.

    PubMed

    Dietrich, Ariana B; Hu, Xiaoqing; Rosenfeld, J Peter

    2014-03-01

    In the first of two experiments, we compared the accuracy of the P300 concealed information test protocol as a function of numbers of trials experienced by subjects and ERP averages analyzed by investigators. Contrary to Farwell et al. (Cogn Neurodyn 6(2):115-154, 2012), we found no evidence that 100 trial based averages are more accurate than 66 or 33 trial based averages (all numbers led to accuracies of 84-94 %). There was actually a trend favoring the lowest trial numbers. The second study compared numbers of irrelevant stimuli recalled and recognized in the 3-stimulus protocol versus the complex trial protocol (Rosenfeld in Memory detection: theory and application of the concealed information test, Cambridge University Press, New York, pp 63-89, 2011). Again, in contrast to expectations from Farwell et al. (Cogn Neurodyn 6(2):115-154, 2012), there were no differences between protocols, although there were more irrelevant stimuli recognized than recalled, and irrelevant 4-digit number group stimuli were neither recalled nor recognized as well as irrelevant city name stimuli. We therefore conclude that stimulus processing in the P300-based complex trial protocol-with no more than 33 sweep averages-is adequate to allow accurate detection of concealed information. PMID:24531833

  11. Reducing latent errors, drift errors, and stakeholder dissonance.

    PubMed

    Samaras, George M

    2012-01-01

    Healthcare information technology (HIT) is being offered as a transformer of modern healthcare delivery systems. Some believe that it has the potential to improve patient safety, increase the effectiveness of healthcare delivery, and generate significant cost savings. In other industrial sectors, information technology has dramatically influenced quality and profitability - sometimes for the better and sometimes not. Quality improvement efforts in healthcare delivery have not yet produced the dramatic results obtained in other industrial sectors. This may be that previously successful quality improvement experts do not possess the requisite domain knowledge (clinical experience and expertise). It also appears related to a continuing misconception regarding the origins and meaning of work errors in healthcare delivery. The focus here is on system use errors rather than individual user errors. System use errors originate in both the development and the deployment of technology. Not recognizing stakeholders and their conflicting needs, wants, and desires (NWDs) may lead to stakeholder dissonance. Mistakes translating stakeholder NWDs into development or deployment requirements may lead to latent errors. Mistakes translating requirements into specifications may lead to drift errors. At the sharp end, workers encounter system use errors or, recognizing the risk, expend extensive and unanticipated resources to avoid them. PMID:22317001

  12. Left neglect dyslexia: Perseveration and reading error types.

    PubMed

    Ronchi, Roberta; Algeri, Lorella; Chiapella, Laura; Gallucci, Marcello; Spada, Maria Simonetta; Vallar, Giuseppe

    2016-08-01

    Right-brain-damaged patients may show a reading disorder termed neglect dyslexia. Patients with left neglect dyslexia omit letters on the left-hand-side (the beginning, when reading left-to-right) part of the letter string, substitute them with other letters, and add letters to the left of the string. The aim of this study was to investigate the pattern of association, if any, between error types in patients with left neglect dyslexia and recurrent perseveration (a productive visuo-motor deficit characterized by addition of marks) in target cancellation. Specifically, we aimed at assessing whether different productive symptoms (relative to the reading and the visuo-motor domains) could be associated in patients with left spatial neglect. Fifty-four right-brain-damaged patients took part in the study: 50 out of the 54 patients showed left spatial neglect, with 27 of them also exhibiting left neglect dyslexia. Neglect dyslexic patients who showed perseveration produced mainly substitution neglect errors in reading. Conversely, omissions were the prevailing reading error pattern in neglect dyslexic patients without perseveration. Addition reading errors were much infrequent. Different functional pathological mechanisms may underlie omission and substitution reading errors committed by right-brain-damaged patients with left neglect dyslexia. One such mechanism, involving the defective stopping of inappropriate responses, may contribute to both recurrent perseveration in target cancellation, and substitution errors in reading. Productive pathological phenomena, together with deficits of spatial attention to events taking place on the left-hand-side of space, shape the manifestations of neglect dyslexia, and, more generally, of spatial neglect. PMID:27450268

  13. A theory of human error

    NASA Technical Reports Server (NTRS)

    Mcruer, D. T.; Clement, W. F.; Allen, R. W.

    1981-01-01

    Human errors tend to be treated in terms of clinical and anecdotal descriptions, from which remedial measures are difficult to derive. Correction of the sources of human error requires an attempt to reconstruct underlying and contributing causes of error from the circumstantial causes cited in official investigative reports. A comprehensive analytical theory of the cause-effect relationships governing propagation of human error is indispensable to a reconstruction of the underlying and contributing causes. A validated analytical theory of the input-output behavior of human operators involving manual control, communication, supervisory, and monitoring tasks which are relevant to aviation, maritime, automotive, and process control operations is highlighted. This theory of behavior, both appropriate and inappropriate, provides an insightful basis for investigating, classifying, and quantifying the needed cause-effect relationships governing propagation of human error.

  14. Onorbit IMU alignment error budget

    NASA Technical Reports Server (NTRS)

    Corson, R. W.

    1980-01-01

    The Star Tracker, Crew Optical Alignment Sight (COAS), and Inertial Measurement Unit (IMU) from a complex navigation system with a multitude of error sources were combined. A complete list of the system errors is presented. The errors were combined in a rational way to yield an estimate of the IMU alignment accuracy for STS-1. The expected standard deviation in the IMU alignment error for STS-1 type alignments was determined to be 72 arc seconds per axis for star tracker alignments and 188 arc seconds per axis for COAS alignments. These estimates are based on current knowledge of the star tracker, COAS, IMU, and navigation base error specifications, and were partially verified by preliminary Monte Carlo analysis.

  15. Spatial Techniques

    NASA Astrophysics Data System (ADS)

    Jabeur, Nafaa; Sahli, Nabil

    The environment, including the Earth and the immense space, is recognized to be the main source of useful information for human beings. During several decades, the acquisition of data from this environment was constrained by tools and techniques with limited capabilities. However, thanks to continuous technological advances,spatial data are available in huge quantities for different applications. The technological advances have been achieved in terms of hardware and software as well. They are allowing for better accuracy and availability, which in turn improves the quality and quantity of useful knowledge that can be extracted from the environment. They have been applied to geography, resulting in geospatial techniques. Applied to both science and technology, geospatial techniques resulted in areas of expertise, such as land surveying, cartography, navigation, remote sensing, Geographic Infor-mation Systems (GISs), and Global Positioning Systems (GPSs). They had evolved quickly with advances in computing, satellite technology and a growing demand to understand our global environment. In this chapter, we will discuss three important techniques that are widely used in spatial data acquisition and analysis: GPS and remote sensing techniques that are used to collect spatial data and a GIS that is used to store, manipulate, analyze, and visualize spatial data. Later in this book, we will discuss the techniques that are currently available for spatial knowledge discovery.

  16. Error diffusion with a more symmetric error distribution

    NASA Astrophysics Data System (ADS)

    Fan, Zhigang

    1994-05-01

    In this paper a new error diffusion algorithm is presented that effectively eliminates the `worm' artifacts appearing in the standard methods. The new algorithm processes each scanline of the image in two passes, a forward pass followed by a backward one. This enables the error made at one pixel to be propagated to all the `future' pixels. A much more symmetric error distribution is achieved than that of the standard methods. The frequency response of the noise shaping filter associated with the new algorithm is mirror-symmetric in magnitude.

  17. Sub-nanometer periodic nonlinearity error in absolute distance interferometers.

    PubMed

    Yang, Hongxing; Huang, Kaiqi; Hu, Pengcheng; Zhu, Pengfei; Tan, Jiubin; Fan, Zhigang

    2015-05-01

    Periodic nonlinearity which can result in error in nanometer scale has become a main problem limiting the absolute distance measurement accuracy. In order to eliminate this error, a new integrated interferometer with non-polarizing beam splitter is developed. This leads to disappearing of the frequency and/or polarization mixing. Furthermore, a strict requirement on the laser source polarization is highly reduced. By combining retro-reflector and angel prism, reference and measuring beams can be spatially separated, and therefore, their optical paths are not overlapped. So, the main cause of the periodic nonlinearity error, i.e., the frequency and/or polarization mixing and leakage of beam, is eliminated. Experimental results indicate that the periodic phase error is kept within 0.0018°. PMID:26026510

  18. Parametric registration of cross test error maps for optical surfaces

    NASA Astrophysics Data System (ADS)

    Chen, Shanyong; Dai, Yifan; Nie, Xuqing; Li, Shengyi

    2015-07-01

    It is necessary to quantitatively compare two measurement results which are typically in the form of error maps of the same surface figure for the purpose of cross test. The error maps are obtained by different methods or even different instruments. Misalignment exists between them including the tip-tilt, lateral shift, clocking and scaling. A fast registration algorithm is proposed to correct the misalignment before we can calculate the pixel-to-pixel difference of the two maps. It is formulated as simply a linear least-squares problem. Sensitivity of registration error to the misalignment is simulated with low-frequency features and mid-frequency features in the surface error maps represented by Zernike polynomials and spatially correlated functions, respectively. Finally by applying it to two cases of real datasets, the algorithm is validated to be comparable in accuracy to general non-linear optimization method based on sequential quadratic programming while the computation time is superiorly incomparable.

  19. Quantum rms error and Heisenberg's error-disturbance relation

    NASA Astrophysics Data System (ADS)

    Busch, Paul

    2014-09-01

    Reports on experiments recently performed in Vienna [Erhard et al, Nature Phys. 8, 185 (2012)] and Toronto [Rozema et al, Phys. Rev. Lett. 109, 100404 (2012)] include claims of a violation of Heisenberg's error-disturbance relation. In contrast, a Heisenberg-type tradeoff relation for joint measurements of position and momentum has been formulated and proven in [Phys. Rev. Lett. 111, 160405 (2013)]. Here I show how the apparent conflict is resolved by a careful consideration of the quantum generalization of the notion of root-mean-square error. The claim of a violation of Heisenberg's principle is untenable as it is based on a historically wrong attribution of an incorrect relation to Heisenberg, which is in fact trivially violated. We review a new general trade-off relation for the necessary errors in approximate joint measurements of incompatible qubit observables that is in the spirit of Heisenberg's intuitions. The experiments mentioned may directly be used to test this new error inequality.

  20. Error compensation for thermally induced errors on a machine tool

    SciTech Connect

    Krulewich, D.A.

    1996-11-08

    Heat flow from internal and external sources and the environment create machine deformations, resulting in positioning errors between the tool and workpiece. There is no industrially accepted method for thermal error compensation. A simple model has been selected that linearly relates discrete temperature measurements to the deflection. The biggest problem is how to locate the temperature sensors and to determine the number of required temperature sensors. This research develops a method to determine the number and location of temperature measurements.