Science.gov

Sample records for adequate allocation concealment

  1. Quality assessment of reporting of randomization, allocation concealment, and blinding in traditional chinese medicine RCTs: A review of 3159 RCTs identified from 260 systematic reviews

    PubMed Central

    2011-01-01

    Background Randomized controlled trials (RCTs) which are of poor quality tend to exaggerate the effect estimate and lead to wrong or misleading conclusions. The aim of this study is to assess the quality of randomization methods, allocation concealment and blinding within traditional Chinese medicine (TCM) RCTs, discuss issues identified for current TCM RCTs, and provide suggestions for quality improvement. Methods We searched Chinese Biomedical Database (CBM, 1978 to July 31, 2009) and the Cochrane Library (Issue 2, 2009) to collect TCM systematic reviews and meta-analyses according to inclusion/exclusion criteria, from which RCTs could be identified. The quality assessment involved whether the randomization methods, allocation concealment and blinding were adequate or not based the study reported. Stratified analyses were conducted of different types of diseases published in different journals (both Chinese and foreign) using different interventions. SPSS 15.0 software was used for statistic analyses. Results A total of 3159 RCTs were included, of which 2580 were published in Chinese journals and 579 in foreign journals. There were 381 (12%) RCTs which used adequate randomization methods; 207 (7%) RCTs which used adequate allocation concealment and 601 (19%) which used adequate blinding; there were 130 (4%) RCTs which both used adequate randomization methods and allocation concealment; and there were only 100 (3%) RCTs which used adequate randomization methods, allocation concealment, as well as blinding. In the RCTs published in foreign journals, the adequate randomization methods, allocation concealment and blinding accounted for a relatively large proportion (25%, 26%, and 60%, respectively) and increased with years, while in the RCTs published in Chinese journals, only the adequate randomization methods improved over time. The quality of non-drug intervention (chiefly acupuncture) RCTs was higher than that of drug intervention RCTs. In drug intervention, the

  2. Concealed wire tracing apparatus

    DOEpatents

    Kronberg, James W.

    1994-01-01

    An apparatus and method that combines a signal generator and a passive signal receiver to detect and record the path of partially or completely concealed electrical wiring without disturbing the concealing surface. The signal generator applies a series of electrical pulses to the selected wiring of interest. The applied pulses create a magnetic field about the wiring that can be detected by a coil contained within the signal receiver. An audible output connected to the receiver and driven by the coil reflects the receivers position with respect to the wiring. The receivers audible signal is strongest when the receiver is directly above the wiring and the long axis of the receivers coil is parallel to the wiring. A marking means is mounted on the receiver to mark the location of the wiring as the receiver is directed over the wiring's concealing surface. Numerous marks made on various locations of the concealing surface will trace the path of the wiring of interest.

  3. Authenticating concealed private data while maintaining concealment

    DOEpatents

    Thomas, Edward V.; Draelos, Timothy J.

    2007-06-26

    A method of and system for authenticating concealed and statistically varying multi-dimensional data comprising: acquiring an initial measurement of an item, wherein the initial measurement is subject to measurement error; applying a transformation to the initial measurement to generate reference template data; acquiring a subsequent measurement of an item, wherein the subsequent measurement is subject to measurement error; applying the transformation to the subsequent measurement; and calculating a Euclidean distance metric between the transformed measurements; wherein the calculated Euclidean distance metric is identical to a Euclidean distance metric between the measurement prior to transformation.

  4. Concealing with Structured Light

    PubMed Central

    Sun, Jingbo; Zeng, Jinwei; Wang, Xi; Cartwright, Alexander N.; Litchinitser, Natalia M.

    2014-01-01

    While making objects less visible (or invisible) to a human eye or a radar has captured people's imagination for centuries, current attempts towards realization of this long-awaited functionality range from various stealth technologies to recently proposed cloaking devices. A majority of proposed approaches share a number of common deficiencies such as design complexity, polarization effects, bandwidth, losses and the physical size or shape requirement complicating their implementation especially at optical frequencies. Here we demonstrate an alternative way to conceal macroscopic objects by structuring light itself. In our approach, the incident light is transformed into an optical vortex with a dark core that can be used to conceal macroscopic objects. Once such a beam passed around the object it is transformed back into its initial Gaussian shape with minimum amplitude and phase distortions. Therefore, we propose to use that dark core of the vortex beam to conceal an object that is macroscopic yet small enough to fit the dark (negligibly low intensity) region of the beam. The proposed concealing approach is polarization independent, easy to fabricate, lossless, operates at wavelengths ranging from 560 to 700 nm, and can be used to hide macroscopic objects providing they are smaller than vortex core. PMID:24522638

  5. Concealed wire tracing apparatus

    DOEpatents

    Kronberg, J.W.

    1994-05-31

    An apparatus and method that combines a signal generator and a passive signal receiver to detect and record the path of partially or completely concealed electrical wiring without disturbing the concealing surface is disclosed. The signal generator applies a series of electrical pulses to the selected wiring of interest. The applied pulses create a magnetic field about the wiring that can be detected by a coil contained within the signal receiver. An audible output connected to the receiver and driven by the coil reflects the receivers position with respect to the wiring. The receivers audible signal is strongest when the receiver is directly above the wiring and the long axis of the receivers coil is parallel to the wiring. A marking means is mounted on the receiver to mark the location of the wiring as the receiver is directed over the wiring's concealing surface. Numerous marks made on various locations of the concealing surface will trace the path of the wiring of interest. 4 figs.

  6. Identifying concealment-related responses in the concealed information test.

    PubMed

    Matsuda, Izumi; Nittono, Hiroshi; Ogawa, Tokihiro

    2013-07-01

    The concealed information test (CIT) assesses an examinee's recognition of a crime-relevant item using physiological measures. However, a guilty examinee not only recognizes the crime-relevant item but also conceals the recognition intentionally. In this study, we attempted to identify the effect of concealing the recognition on event-related potentials and autonomic responses. After committing a mock theft of two items, 30 participants received two CITs: one for an item that they had to conceal, and the other for an item that they had disclosed. N2, P3, heart rate, skin conductance, and cutaneous blood flow differed between crime-relevant and irrelevant items in both CITs. In contrast, late positive potential and respiration differed between crime-relevant and irrelevant items only when the examinee needed to conceal. The former measures appear to be related to orienting process, whereas the latter to controlled process related to concealment.

  7. Detection of a concealed object

    DOEpatents

    Keller, Paul E.; Hall, Thomas E.; McMakin, Douglas L.

    2008-04-29

    Disclosed are systems, methods, devices, and apparatus to determine if a clothed individual is carrying a suspicious, concealed object. This determination includes establishing data corresponding to an image of the individual through interrogation with electromagnetic radiation in the 200 MHz to 1 THz range. In one form, image data corresponding to intensity of reflected radiation and differential depth of the reflecting surface is received and processed to detect the suspicious, concealed object.

  8. Detection of a concealed object

    DOEpatents

    Keller, Paul E [Richland, WA; Hall, Thomas E [Kennewick, WA; McMakin, Douglas L [Richland, WA

    2010-11-16

    Disclosed are systems, methods, devices, and apparatus to determine if a clothed individual is carrying a suspicious, concealed object. This determination includes establishing data corresponding to an image of the individual through interrogation with electromagnetic radiation in the 200 MHz to 1 THz range. In one form, image data corresponding to intensity of reflected radiation and differential depth of the reflecting surface is received and processed to detect the suspicious, concealed object.

  9. Handheld ultrasonic concealed weapon detector

    NASA Astrophysics Data System (ADS)

    Wilde, Norbert; Niederhaus, Steve; Lam, Hon; Lum, Chris

    2002-08-01

    A handheld, battery-operated prototype of a concealed weapon detector (CWD) has been built and tested. Designed to detect both metallic and non-metallic weapons, the sensor utilizes focused ultrasound (40 kHz frequency) to remotely detect concealed objects from beyond arm's length out to a range of about 25 feet (8 meters). Applications include weapon detection in prison settings, by officers in the field for stand-off frisking of suspects, and as supplemental security at courthouse entrances and other monitored portals. The detector emits an adjustable, audible alarm (with provision for an earphone jack) as well as a visible light-bar indicator when an object has been detected. An aiming light, with momentary switch, allows the user to accurately determine the location of the concealed object. A presentation of the detector's capabilities and limitations will be presented along with probability of detection (PD) data obtained using the latest prototype version.

  10. Handheld Concealed Weapons Detector Development

    DTIC Science & Technology

    2003-03-01

    Enforcement, Edward M. Carapezza, Donald Spector, Eds., Proc. SPIE 2938, 110 - 119 (1997). 3. Franklin Felber, Norbert Wild, Scott Nunan , Dennis Breuner... Nunan , D. Breuner, and F. Doft, "Handheld Ultrasound Concealed-Weapons Detector," in Enforcement and Security Technologies, A. Trent DePersia, J. J

  11. Standoff detection of concealed handguns

    NASA Astrophysics Data System (ADS)

    Rezgui, Nacer; Andrews, David; Bowring, Nicholas; Harmer, Stuart; Southgate, Matthew

    2008-04-01

    An active technique for the standoff detection and identification of concealed conducting items such as handguns and knives is presented. This technique entails illuminating an object with wide range stepped millimetre wave radiation and inducing a local electromagnetic field comprised of a superposition of modes. The coupling to these modes from the illuminating and scattered fields is, in general, frequency dependent and this forms the basis for the detection and identification of conducting items. The object needs to be fully illuminated if a full spectrum of modes and therefore a full frequency response are to be excited and collected. The scattered EM power is measured at "stand off" distance of several metres as the illuminating field is frequency swept and patterns in frequency response characteristic to the target item being sought are looked for. This system relies on contributions from the aspect independent late time responses employed by Baum1 together with aspect independent information derived specifically from gun barrels and polarisation from scattering effects. This technique is suitable for a deployable gun and concealed weapons detection system and does not rely on imaging techniques for determining the presence of a gun. Experimental sets of responses from typical metal or partially conducting objects such as keys, mobile phones and concealed handguns are presented at a range of frequencies.

  12. Handheld ultrasonic concealed weapon detector

    NASA Astrophysics Data System (ADS)

    Wild, Norbert C.; Doft, Frank; Breuner, Dennis; Felber, Franklin S.

    2001-02-01

    A handheld, battery-operated prototype of a concealed weapon detector has been built and tested. Designed to detect both metallic and non-metallic weapons, the sensor utilizes focused ultrasound (40 kHz frequency) to remotely detect concealed objects from beyond arm's length out to a range of about 12 feet (4 meters). The detector can be used in prison settings, by officers in the field to allow for stand-off frisking of suspects, and to supplement security at courthouse entrances and other monitored portals. The detector emits an audible alarm (with provision for an earphone jack) as well as a visible light-bar indicator when an object is detected. A high intensity aiming light, with momentary switch, allows the user to accurately determine the location of the concealed object. Current efforts are aimed at increasing the probability of detection, reducing the false-alarm rate, and extending the range of detectability out to 20 feet. Plans for accomplishing these tasks will be presented together with data showing the effective range and probability of detection for the present system.

  13. Method for imaging a concealed object

    DOEpatents

    Davidson, James R [Idaho Falls, ID; Partin, Judy K [Idaho Falls, ID; Sawyers, Robert J [Idaho Falls, ID

    2007-07-03

    A method for imaging a concealed object is described and which includes a step of providing a heat radiating body, and wherein an object to be detected is concealed on the heat radiating body; imaging the heat radiating body to provide a visibly discernible infrared image of the heat radiating body; and determining if the visibly discernible infrared image of the heat radiating body is masked by the presence of the concealed object.

  14. ISAR for concealed objects imaging

    NASA Astrophysics Data System (ADS)

    Zhuravlev, A.; Razevig, V.; Vasiliev, I.; Ivashov, S.; Voronin, V.

    2015-03-01

    A new promising architecture of microwave personnel screening system is analyzed in this paper with numerical simulations. This architecture is based on the concept of inverse aperture synthesis applied to a naturally moving person. The extent of the synthetic aperture is formed by a stationary vertical linear antenna array and by a length of subject's trajectory as he moves in the vicinity of this antenna array. The coherent radar signal processing is achieved by a synchronous 3D video-sensor whose data are used to track the subject. The advantages of the proposed system architecture over currently existing systems are analyzed. Synthesized radar images are obtained by numerical simulations with a human torso model with concealed objects. Various aspects of the system architecture are considered, including: advantages of using sparse antenna arrays to decrease the number of antenna elements, the influence of positioning errors of body surface due to outer clothing. It was shown that detailed radar images of concealed objects can be obtained with a narrow-band signal due to the depth information available from the 3D video sensor. The considered ISAR architecture is considered perspective to be used on infrastructure objects owing to its superior qualities: highest throughput, small footprint, simple design of the radar sub-system, non-required co-operation of the subject.

  15. [Advances in the studies of concealed penis].

    PubMed

    Fan, Sheng-hai; Li, Xue-de

    2015-09-01

    Concealed penis is usually found in children, which affects the patients both physiologically and psychologically. Some of the patients are wrongly treated by circumcision, which may bring about serious consequences to the sexual life of the patients in their adulthood. In the recent years, this disease has been receiving more and more attention from both doctors and parents. However, controversies remain as to its classification, pathogenesis, pathology, and treatment. This paper focuses on the understanding and advances in the studies of concealed penis.

  16. Detecting concealed objects at a checkpoint

    DOEpatents

    McMakin, Douglas L.; Hall, Thomas E.; Sheen, David M.; Severtsen, Ronald H.

    2008-07-29

    Disclosed are systems, methods, devices, and apparatus to interrogate a clothed individual with electromagnetic radiation to determine if a concealed object is being carried. This determination includes establishing data corresponding to an image of the individual with a pair of opposed, semi-cylindrical array panels each configured to interrogate the individual with electromagnetic radiation in the 200 MHz to 1 THz range.

  17. Concealment of Child Sexual Abuse in Sports

    ERIC Educational Resources Information Center

    Hartill, Mike

    2013-01-01

    When the sexual abuse of children is revealed, it is often found that other nonabusing adults were aware of the abuse but failed to act. During the past twenty years or so, the concealment of child sexual abuse (CSA) within organizations has emerged as a key challenge for child protection work. Recent events at Pennsylvania State University (PSU)…

  18. Concealed Questions. In Search of Answers

    ERIC Educational Resources Information Center

    Frana, Ilaria

    2010-01-01

    This dissertation examines the semantic interpretation of various types of DPs in so-called concealed-question (CQ) constructions, as "Bill's phone number" in the sentence "John knows Bill's phone number". The peculiar characteristic of DP-CQs is that they are interpreted as having the meaning of an embedded question. So, for instance, the…

  19. Paraclinoid aneurysm concealed by sphenoid wing meningioma.

    PubMed

    Petrecca, Kevin; Sirhan, Denis

    2009-02-01

    The coexistence of brain tumours and aneurysms is rare. In all previously reported cases the aneurysm was detectable by angiography. We report here a case in which a paraclinoid internal carotid artery aneurysm was coexistent and concealed from angiographic detection by an adjacent parasellar meningioma.

  20. Automated Human Screening for Detecting Concealed Knowledge

    ERIC Educational Resources Information Center

    Twyman, Nathan W.

    2012-01-01

    Screening individuals for concealed knowledge has traditionally been the purview of professional interrogators investigating a crime. But the ability to detect when a person is hiding important information would be of high value to many other fields and functions. This dissertation proposes design principles for and reports on an implementation…

  1. Faculty perceptions and practices regarding carrying concealed handguns on university campuses.

    PubMed

    Thompson, Amy; Price, James H; Dake, Joseph; Teeple, Karen

    2013-04-01

    The presence of firearms in an environment significantly increases firearm trauma. So far, four states have passed legislation permitting the carrying of concealed handguns on university campuses and several other states are considering such legislation. The purpose of this study to assess the perceptions and practices of college faculty regarding support for carrying concealed handguns on their campuses. A valid and reliable questionnaire was sent to a random sample of 1,125 faculty at 15 randomly selected state universities in five Great Lakes states. A two wave postal mailing in the Spring of 2012 was conducted to help ensure an adequate response rate. A total of 791 (70 %) of the faculty responded. The vast majority felt safe on their campuses (98 %) and were not supportive of people carrying concealed handguns on their campuses (94 %). Seven of the eight potential disadvantages of carrying concealed handguns on campus were supported by the majority of faculty members. Those who were significantly more likely to perceive there to be disadvantages to carrying concealed handguns on campus were: those who did not own a firearm (OR = 4.89), Democrats (OR = 4.52) or Independents (OR = 2.25), Asians (OR = 2.49), and females (OR = 1.51). The vast majority of faculty felt safe on their campuses and perceived that carrying concealed handguns on campuses create more risks than benefits to the campus environment. Aggressive efforts are needed to help maintain the uniquely safe environment of college campuses.

  2. Student Attitudes Toward Concealed Handguns on Campus at 2 Universities

    PubMed Central

    Bouffard, Jeffrey A.; Wells, William; Nobles, Matt R.

    2012-01-01

    We examined student support for a policy that would allow carrying of concealed handguns on university campuses. Large percentages of students at 2 universities expressed very low levels of comfort with the idea of permitting concealed handgun carrying on campus, suggesting that students may not welcome less restrictive policies. Students held slightly different opinions about concealed handguns on and off campus, suggesting that they view the campus environment as unique with respect to concealed handgun carrying. PMID:22720763

  3. Student attitudes toward concealed handguns on campus at 2 universities.

    PubMed

    Cavanaugh, Michael R; Bouffard, Jeffrey A; Wells, William; Nobles, Matt R

    2012-12-01

    We examined student support for a policy that would allow carrying of concealed handguns on university campuses. Large percentages of students at 2 universities expressed very low levels of comfort with the idea of permitting concealed handgun carrying on campus, suggesting that students may not welcome less restrictive policies. Students held slightly different opinions about concealed handguns on and off campus, suggesting that they view the campus environment as unique with respect to concealed handgun carrying.

  4. 25 CFR 11.444 - Carrying concealed weapons.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 25 Indians 1 2014-04-01 2014-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor...

  5. 25 CFR 11.444 - Carrying concealed weapons.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor...

  6. 25 CFR 11.444 - Carrying concealed weapons.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 25 Indians 1 2012-04-01 2011-04-01 true Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor...

  7. 25 CFR 11.444 - Carrying concealed weapons.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 25 Indians 1 2013-04-01 2013-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor...

  8. 25 CFR 11.444 - Carrying concealed weapons.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 25 Indians 1 2011-04-01 2011-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor...

  9. Characteristics of women who deny or conceal pregnancy.

    PubMed

    Friedman, Susan Hatters; Heneghan, Amy; Rosenthal, Miriam

    2007-01-01

    In order to assess characteristics of women with denial or concealment of pregnancy until delivery, the authors conducted a retrospective study of women with no history of prenatal care who presented to their institution for delivery or immediately postpartum. Among these women, 29% had denied pregnancy, and 9% had concealed pregnancy. Authors constructed models predicting denial or concealment of pregnancy and further elucidated subtypes of denial and concealment of pregnancy. Strikingly, psychiatric consultation was rare for women who had denied or concealed their pregnancies, and yet they would often subsequently take responsibility for their infants.

  10. Passive millimeter-wave concealed weapon detection

    NASA Astrophysics Data System (ADS)

    Sinclair, Gordon N.; Anderton, Rupert N.; Appleby, Roger

    2001-02-01

    A method of detecting weapons concealed under clothing using passive millimeter wave imaging is described. The optical properties of clothing are discussed and examples given of the spectral reflectivity and transmission. The transmission tends to be constant from 60 to 150 GHz above which it decreases for some clothing materials. The transmission of a cotton T-shirt is typically 95% and of a leather jacket up to 85% at lower frequencies. A model is presented for calculating the contrast of a metallic concealed weapon when hidden under clothing and it indicates contrasts as large as 200 K can be realized outdoors. The advantages of real time over static frame imagery are discussed. It is concluded that real time imagery offers considerable advantages as weapons can be very varied in size, position and orientation and movement offers vital clues to the human observer which aid the recognition process.

  11. Induction detection of concealed bulk banknotes

    NASA Astrophysics Data System (ADS)

    Fuller, Christopher; Chen, Antao

    2012-06-01

    The smuggling of bulk cash across borders is a serious issue that has increased in recent years. In an effort to curb the illegal transport of large numbers of paper bills, a detection scheme has been developed, based on the magnetic characteristics of bank notes. The results show that volumes of paper currency can be detected through common concealing materials such as plastics, cardboard, and fabrics making it a possible potential addition to border security methods. The detection scheme holds the potential of also reducing or eliminating false positives caused by metallic materials found in the vicinity, by observing the stark difference in received signals caused by metal and currency. The detection scheme holds the potential to detect for both the presence and number of concealed bulk notes, while maintaining the ability to reduce false positives caused by metal objects.

  12. Medical makeup for concealing facial scars.

    PubMed

    Mee, Donna; Wong, Brian J F

    2012-10-01

    Surgical, laser, and pharmacological therapies are all used to correct scars and surgical incisions, though have limits with respect to how well facial skin can be restored or enhanced. The use of cosmetics has long been a relevant adjunct to all scar treatment modalities. In recent years, technical advancements in the chemistry and composition of cosmetic products have provided the patient with a broader range of products to employ for concealing scars. This review will provide an overview of contemporary methods for concealing facial scars, birthmarks, and pigmentary changes without the use of traditional/dated, heavy appearing camouflage products. Additionally, general guidelines and information will be provided with respect to identifying competent makeup artists for care of the medical patient. The article by no means is meant to be a tutorial, but rather serves as a starting point in this allied field of medicine.

  13. Concealed evaporite basin drilled in Arizona

    SciTech Connect

    Rauzi, S.L.

    1996-10-21

    The White Mountains of Arizona are a high forested plateau underlain by volcanic rocks of Late Pliocene and Quaternary age on the south margin of the Colorado plateau province. Elevations range from 6,000--11,590 ft, with winter snow and summer rain but ideal conditions for much of the year. There was no evidence of a Permian evaporite basin concealed beneath the White Mountain volcanic field until 1993, when the Tonto 1 Alpine-Federal, a geothermal test well, was drilled. This test did not encounter thermal waters, but it did encounter a surprisingly thick and unexpected sequence of anhydrite, dolomite, and petroliferous limestone assigned to the Supai (Yeso) formation of Permian age. The Tonto test was continuously cored through the Permian section, providing invaluable information that is now stored at the Arizona Geological Survey in Tucson. The paper describes the area geology and the concealed basin.

  14. Concealed weapons detection using electromagnetic resonances

    NASA Astrophysics Data System (ADS)

    Hunt, Allen R.; Hogg, R. Douglas; Foreman, William

    1998-12-01

    Concealed weapons pose a significant threat to both law enforcement and security agency personnel. The uncontrolled environments associated with peacekeeping and the move toward relaxation of concealed weapons laws here in the U.S. provide a strong motivation for developing weapons detection technologies which are noninvasive and can function noncooperatively. Existing weapons detection systems are primarily oriented to detecting metal and require the cooperation of the person being searched. The new generation of detectors under development that focuses primarily on imaging methods, faces problems associated with privacy issues. There remains a need for a weapons detector which is portable, detects weapons remotely, avoids the issues associated with privacy rights, can tell the difference between car keys and a knife, and is affordable enough that one can be issued to every peacekeeper and law enforcement officer. AKELA is developing a concealed weapons detector that uses wideband radar techniques to excite natural electromagnetic resonances that characterize the size, shape, and material composition of an object. Neural network processing is used to classify the difference between weapons and nuisance objects. We have constructed both time and frequency domain test systems and used them to gather experimental data on a variety of armed and unarmed individuals. These experiments have been performed in an environment similar to the operational environment. Preliminary results from these experiments show that it is possible to detect a weapon being carried by an individual from a distance of 10 to 15 feet, and to detect a weapon being concealed behind the back. The power required is about 100 milliwatts. A breadboard system is being fabricated and will be used by AKELA and our law enforcement partner to gather data in operationally realistic situations. While a laptop computer will control the breadboard system, the wideband radar electronics will fit in a box the

  15. Imaging sensor fusion for concealed weapon detection

    NASA Astrophysics Data System (ADS)

    Currie, Nicholas C.; Demma, Fred J.; Ferris, David D., Jr.; McMillan, Robert W.; Wicks, Michael C.; Zyga, Kathleen

    1997-02-01

    Sensors are needed for concealed weapon detection which perform better with regard to weapon classification, identification, probability of detection and false alarm rate than the magnetic sensors commonly used in airports. We have concluded that no single sensor will meet the requirements for a reliable concealed weapon detector and thus that sensor fusion is required to optimize detection probability and false alarm rate by combining sensor outputs in a synergistic fashion. This paper describes microwave, millimeter wave, far infrared, infrared, x-ray, acoustic, and magnetic sensors which have some promise in the field of concealed weapon detection. The strengths and weaknesses of these devices are discussed, and examples of the outputs of most of them are given. Various approaches to fusion of these sensors are also described, from simple cuing of one sensor by another to improvement of image quality by using multiple systems. It is further concluded that none of the sensors described herein will ever replace entirely the airport metal detector, but that many of them meet needs imposed by applications requiring a higher detection probability and lower false alarm rate.

  16. Embedded wavelet video coding with error concealment

    NASA Astrophysics Data System (ADS)

    Chang, Pao-Chi; Chen, Hsiao-Ching; Lu, Ta-Te

    2000-04-01

    We present an error-concealed embedded wavelet (ECEW) video coding system for transmission over Internet or wireless networks. This system consists of two types of frames: intra (I) frames and inter, or predicted (P), frames. Inter frames are constructed by the residual frames formed by variable block-size multiresolution motion estimation (MRME). Motion vectors are compressed by arithmetic coding. The image data of intra frames and residual frames are coded by error-resilient embedded zerotree wavelet (ER-EZW) coding. The ER-EZW coding partitions the wavelet coefficients into several groups and each group is coded independently. Therefore, the error propagation effect resulting from an error is only confined in a group. In EZW coding any single error may result in a totally undecodable bitstream. To further reduce the error damage, we use the error concealment at the decoding end. In intra frames, the erroneous wavelet coefficients are replaced by neighbors. In inter frames, erroneous blocks of wavelet coefficients are replaced by data from the previous frame. Simulations show that the performance of ECEW is superior to ECEW without error concealment by 7 to approximately 8 dB at the error-rate of 10-3 in intra frames. The improvement still has 2 to approximately 3 dB at a higher error-rate of 10-2 in inter frames.

  17. Detecting persons concealed in a vehicle

    DOEpatents

    Tucker, Jr., Raymond W.

    2005-03-29

    An improved method for detecting the presence of humans or animals concealed within in a vehicle uses a combination of the continuous wavelet transform and a ratio-based energy calculation to determine whether the motion detected using seismic sensors placed on the vehicle is due to the presence of a heartbeat within the vehicle or is the result of motion caused by external factors such as the wind. The method performs well in the presence of light to moderate ambient wind levels, producing far fewer false alarm indications. The new method significantly improves the range of ambient environmental conditions under which human presence detection systems can reliably operate.

  18. Induction detection of concealed bulk banknotes

    NASA Astrophysics Data System (ADS)

    Fuller, Christopher; Chen, Antao

    2011-10-01

    Bulk cash smuggling is a serious issue that has grown in volume in recent years. By building on the magnetic characteristics of paper currency, induction sensing is found to be capable of quickly detecting large masses of banknotes. The results show that this method is effective in detecting bulk cash through concealing materials such as plastics, cardboards, fabrics and aluminum foil. The significant difference in the observed phase between the received signals caused by conducting materials and ferrite compounds, found in banknotes, provides a good indication that this process can overcome the interference by metal objects in a real sensing application. This identification strategy has the potential to not only detect the presence of banknotes, but also the number, while still eliminating false positives caused by metal objects.

  19. Color image fusion for concealed weapon detection

    NASA Astrophysics Data System (ADS)

    Toet, Alexander

    2003-09-01

    Recent advances in passive and active imaging sensor technology offer the potential to detect weapons that are concealed underneath a person's clothing or carried along in bags. Although the concealed weapons can sometimes easily be detected, it can be difficult to perceive their context, due to the non-literal nature of these images. Especially for dynamic crowd surveillance purposes it may be impossible to rapidly asses with certainty which individual in the crowd is the one carrying the observed weapon. Sensor fusion is an enabling technology that may be used to solve this problem. Through fusion the signal of the sensor that depicts the weapon can be displayed in the context provided by a sensor of a different modality. We propose an image fusion scheme in which non-literal imagery can be fused with standard color images such that the result clearly displays the observed weapons in the context of the original color image. The procedure is such that the relevant contrast details from the non-literal image are transferred to the color image without altering the original color distribution of this image. The result is a natural looking color image that fluently combines all details from both input sources. When an observer who performs a dynamic crowd surveillance task, detects a weapon in the scene, he will also be able to quickly determine which person in the crowd is actually carrying the observed weapon (e.g. "the man with the red T-shirt and blue jeans"). The method is illustrated by the fusion of thermal 8-12 μm imagery with standard RGB color images.

  20. Concealed semantic and episodic autobiographical memory electrified

    PubMed Central

    Ganis, Giorgio; Schendan, Haline E.

    2013-01-01

    Electrophysiology-based concealed information tests (CIT) try to determine whether somebody possesses concealed information about a crime-related item (probe) by comparing event-related potentials (ERPs) between this item and comparison items (irrelevants). Although the broader field is sometimes referred to as “memory detection,” little attention has been paid to the precise type of underlying memory involved. This study begins addressing this issue by examining the key distinction between semantic and episodic memory in the autobiographical domain within a CIT paradigm. This study also addresses the issue of whether multiple repetitions of the items over the course of the session habituate the brain responses. Participants were tested in a 3-stimulus CIT with semantic autobiographical probes (their own date of birth) and episodic autobiographical probes (a secret date learned just before the study). Results dissociated these two memory conditions on several ERP components. Semantic probes elicited a smaller frontal N2 than episodic probes, consistent with the idea that the frontal N2 decreases with greater pre-existing knowledge about the item. Likewise, semantic probes elicited a smaller central N400 than episodic probes. Semantic probes also elicited a larger P3b than episodic probes because of their richer meaning. In contrast, episodic probes elicited a larger late positive complex (LPC) than semantic probes, because of the recent episodic memory associated with them. All these ERPs showed a difference between probes and irrelevants in both memory conditions, except for the N400, which showed a difference only in the semantic condition. Finally, although repetition affected the ERPs, it did not reduce the difference between probes and irrelevants. These findings show that the type of memory associated with a probe has both theoretical and practical importance for CIT research. PMID:23355816

  1. Concealing their communication: exploring psychosocial predictors of young drivers' intentions and engagement in concealed texting.

    PubMed

    Gauld, Cassandra S; Lewis, Ioni; White, Katherine M

    2014-01-01

    Making a conscious effort to hide the fact that you are texting while driving (i.e., concealed texting) is a deliberate and risky behaviour involving attention diverted away from the road. As the most frequent users of text messaging services and mobile phones while driving, young people appear at heightened risk of crashing from engaging in this behaviour. This study investigated the phenomenon of concealed texting while driving, and utilised an extended Theory of Planned Behaviour (TPB) including the additional predictors of moral norm, mobile phone involvement, and anticipated regret to predict young drivers' intentions and subsequent behaviour. Participants (n=171) were aged 17-25 years, owned a mobile phone, and had a current driver's licence. Participants completed a questionnaire measuring their intention to conceal texting while driving, and a follow-up questionnaire a week later to report their behavioural engagement. The results of hierarchical multiple regression analyses showed overall support for the predictive utility of the TPB with the standard constructs accounting for 69% of variance in drivers' intentions, and the extended predictors contributing an additional 6% of variance in intentions over and above the standard constructs. Attitude, subjective norm, PBC, moral norm, and mobile phone involvement emerged as significant predictors of intentions; and intention was the only significant predictor of drivers' self-reported behaviour. These constructs can provide insight into key focal points for countermeasures including advertising and other public education strategies aimed at influencing young drivers to reconsider their engagement in this risky behaviour.

  2. Concealing Concealment: The Mediating Role of Internalized Heterosexism in Psychological Distress Among Lesbian, Gay, and Bisexual Older Adults.

    PubMed

    Hoy-Ellis, Charles P

    2016-01-01

    Recent population-based studies indicate that sexual minorities aged 50 and older experience significantly higher rates of psychological distress than their heterosexual age-peers. The minority stress model has been useful in explaining disparately high rates of psychological distress among younger sexual minorities. The purpose of this study is to test a hypothesized structural relationship between two minority stressors--internalized heterosexism and concealment of sexual orientation--and consequent psychological distress among a sample of 2,349 lesbian, gay, and bisexual adults aged 50 to 95 years old. Structural equation modeling indicates that concealment has a nonsignificant direct effect on psychological distress but a significant indirect effect that is mediated through internalized heterosexism; the effect of concealment is itself concealed. This may explain divergent results regarding the role of concealment in psychological distress in other studies, and the implications will be discussed.

  3. Concealing Concealment: The Mediating Role of Internalized Heterosexism in Psychological Distress Among Lesbian, Gay, and Bisexual Older Adults

    PubMed Central

    Hoy-Ellis, Charles P.

    2016-01-01

    Recent population-based studies indicate that sexual minorities aged 50 and older experience significantly higher rates of psychological distress than their heterosexual age-peers. The minority stress model has been useful in explaining disparately high rates of psychological distress among younger sexual minorities. The purpose of this study is to test a hypothesized structural relationship between two minority stressors—internalized heterosexism and concealment of sexual orientation—and consequent psychological distress among a sample of 2,349 lesbian, gay, and bisexual adults aged 50 to 95 years old. Structural equation modeling indicates that concealment has a nonsignificant direct effect on psychological distress but a significant indirect effect that is mediated through internalized heterosexism; the effect of concealment is itself concealed. This may explain divergent results regarding the role of concealment in psychological distress in other studies, and the implications will be discussed. PMID:26322654

  4. Concealed identification symbols and nondestructive determination of the identification symbols

    DOEpatents

    Nance, Thomas A.; Gibbs, Kenneth M.

    2014-09-16

    The concealing of one or more identification symbols into a target object and the subsequent determination or reading of such symbols through non-destructive testing is described. The symbols can be concealed in a manner so that they are not visible to the human eye and/or cannot be readily revealed to the human eye without damage or destruction of the target object. The identification symbols can be determined after concealment by e.g., the compilation of multiple X-ray images. As such, the present invention can also provide e.g., a deterrent to theft and the recovery of lost or stolen objects.

  5. The incidence and outcome of concealed pregnancies among hospital deliveries: an 11-year population-based study in South Glamorgan.

    PubMed

    Nirmal, D; Thijs, I; Bethel, J; Bhal, P S

    2006-02-01

    Denial of pregnancy has been implicated in potentially jeopardising prenatal care and subsequent safe planned deliveries. This population-based study of hospital deliveries over an 11-year period, reveals that concealed pregnancies have an incidence of one in 2,500 deliveries. Among this cohort, 12% were married and 58% were multiparous with 8% having had a previous caesarean section. Some 20% of women had a medical disorder complicating the antenatal period. There was a preponderance of concealed pregnancies in the winter months compared with booked deliveries (p = 0.02). Mode of delivery was similar between the booked and concealed pregnancies with a low incidence of maternal morbidity in the latter. Prematurity rates (p = 0.0002) were significantly higher in the concealed pregnancy cohort. A total of 20% of infants had depressed Apgar scores at 1 min and 8% at 5 min. There was no documentation of counselling or follow-up in this group. Despite the low incidence of maternal morbidity, these women should be regarded as high-risk labour due to the increased perinatal morbidity. Greater effort needs to be made towards ensuring these women have adequate counselling and follow-up during the postnatal period.

  6. Approach trajectory planning system for maximum concealment

    NASA Technical Reports Server (NTRS)

    Warner, David N., Jr.

    1986-01-01

    A computer-simulation study was undertaken to investigate a maximum concealment guidance technique (pop-up maneuver), which military aircraft may use to capture a glide path from masked, low-altitude flight typical of terrain following/terrain avoidance flight enroute. The guidance system applied to this problem is the Fuel Conservative Guidance System. Previous studies using this system have concentrated on the saving of fuel in basically conventional land and ship-based operations. Because this system is based on energy-management concepts, it also has direct application to the pop-up approach which exploits aircraft performance. Although the algorithm was initially designed to reduce fuel consumption, the commanded deceleration is at its upper limit during the pop-up and, therefore, is a good approximation of a minimum-time solution. Using the model of a powered-lift aircraft, the results of the study demonstrated that guidance commands generated by the system are well within the capability of an automatic flight-control system. Results for several initial approach conditions are presented.

  7. [Concealed and simulated trauma fatalities(II)].

    PubMed

    Klotzbach, H; Püschel, K

    2001-12-01

    A careful investigation of fatal accidents is required due to the relevant financial consequences for the insured as well as for the insurance company. An evaluation of post-mortem cases handled by our institute from 1988 to 1998 showed that 16% of all fatal accidents were not initially classified as such; it was only possible to determine the cause by post-mortem and criminal investigation. The frequency of a relevant alcoholization varied with different types of accidents. Furthermore, of all fatal accidents, 3% were revealed to be deceptive. Those 42 cases in total, presenting themselves as fatal accidents at first glance, were later determined either to be natural deaths (n = 27), homicide (n = 11) or suicide (n = 4). In addition to this, autopsies showed 83 cases of death to be sequelae to accidents. Particularly in cases of a victim plunging out of the window or into water, it can be difficult to make the distinction between natural death--e.g. as a reason for falling--and suicide or homicide. Further difficulties can result from interpretations of the findings in cases of putrefaction, mauling by animals, defects caused by burning or severely deformed corpses. In these cases, the importance of patho-morphological findings from the autopsy must be emphasized. Indirect sequelae of accidents may be pulmonary embolism or pneumonia. The cause of death has to be classified as accidental if the chain of events is of traumatic origin. Mistakes can be avoided if the medical history is taken conscientiously. If no facts are available, the cause of death should be certificated as undetermined. Our evaluation only included autopsy cases from our institute. The concealed fatal accidents which were incorrectly certified as natural deaths or the cases dismissed by the police and the public prosecutor without performing an autopsy were not evaluated.

  8. Millimeter-wave imaging for concealed weapon detection

    NASA Astrophysics Data System (ADS)

    McMakin, Douglas L.; Sheen, David M.; Hall, Thomas E.

    2003-07-01

    Full body, real-time, millimeter-wave imaging systems have been developed at the Pacific Northwest National Laboratory for the detection of body-worn, concealed weapons and contraband at security checkpoints. These security systems employ methods derived from microwave holography techniques that utilize phase and amplitude information recorded over a two-dimensional aperture to reconstruct a focused image of the target. Millimeter-wave imaging is well suited for the detection of concealed weapons or other contraband carried on personnel, since millimeter waves are non-ionizing, readily penetrate common clothing material, and are reflected from the human body and any concealed items. In this paper, wide-bandwidth, three-dimensional, holographic microwave imaging techniques and a full-body, planar, millimeter-wave imaging system are described.

  9. Millimeter-wave imaging for concealed weapon detection

    SciTech Connect

    McMakin, Douglas L.; Sheen, David M.; Hall, Thomas E.

    2003-07-16

    Full-body, real-time, millimeter-wave imaging systems have been developed at the Pacific Northwest National Laboratory for the detection of body-worn, concealed weapons and contraband at security checkpoints. These security systems employ methods derived from microwave holography techniques that utilize phase and amplitude information recorded over a two-dimensional aperture to reconstruct a focused image of the target. Millimeter-wave imaging is well suited for the detection of concealed weapons or other contraband carried on personnel, since millimeter waves are non-ionizing, readily penetrate common clothing material, and are reflected from the human body and any concealed items. In this paper, wide-bandwidth, three-dimensional, holographic microwave imaging techniques and a full-body, planar, millimeter-wave imaging system are described.

  10. Strategic concealment of sexual identity in an estrilid finch

    PubMed Central

    Langmore, N. E.; Bennett, A. T. D.

    1999-01-01

    One explanation for the evolution of sexual monomorphism is the sexual indistinguishability hypothesis, which argues that in group-living species individuals might benefit by concealing their sex to reduce sexual competition. We tested this hypothesis in long-tailed finches Poephila acuticauda. Males and females could not be reliably distinguished morphologically or by analysis of the reflectance spectra (300 to 700 nm) from the plumage and bill. Males seemed unable to distinguish the sex of an unfamiliar individual in the absence of behavioural cues; they were equally likely to court and copulate with unfamiliar males and females but rarely courted familiar males. Here we report the first experimental evidence that sexual monomorphism enables strategic concealment of sex. Males were more likely to reveal their sex when faced with a solitary unfamiliar individual than a group of unfamiliar individuals. When encountering an unfamiliar male that revealed his sex, subordinate males were more likely to conceal their sex than dominant males.

  11. Concealed pregnancy: prevalence, perinatal measures and socio-demographics.

    PubMed

    Thynne, C; Gaffney, G; O'Neill, M; Tonge, M; Sherlock, C

    2012-09-01

    A target group of women who concealed their pregnancy (n = 43) was compared to an aged-matched control group (n = 30) that experienced a crisis pregnancy. Comparisons were also made with a larger dataset (n = 6363) of births in University Hospital Galway (UHG) (normative group). Data was analysed using the Chi-square test and the Kolmogorov-Smirnoff two-sample test. The number of women from the target group that were from a rural background was 28 (65%), compared to 10 (33%) from the control group. The number of women from the target group that feared a negative parental reaction to the pregnancy was 34 (79%), compared to 12 (40%) from the control group. The birth weight in the target group was 4009 lower than the normative birth weight. The average age of women who concealed was 8 years lower than the normative age. The prevalence of concealed pregnancy in UHG was one in every 148 births.

  12. Detection and identification of concealed weapons using matrix pencil

    NASA Astrophysics Data System (ADS)

    Adve, Raviraj S.; Thayaparan, Thayananthan

    2011-06-01

    The detection and identification of concealed weapons is an extremely hard problem due to the weak signature of the target buried within the much stronger signal from the human body. This paper furthers the automatic detection and identification of concealed weapons by proposing the use of an effective approach to obtain the resonant frequencies in a measurement. The technique, based on Matrix Pencil, a scheme for model based parameter estimation also provides amplitude information, hence providing a level of confidence in the results. Of specific interest is the fact that Matrix Pencil is based on a singular value decomposition, making the scheme robust against noise.

  13. Do Children Understand That People Selectively Conceal or Express Emotion?

    ERIC Educational Resources Information Center

    Hayashi, Hajimu; Shiomi, Yuki

    2015-01-01

    This study examined whether children understand that people selectively conceal or express emotion depending upon the context. We prepared two contexts for a verbal display task for 70 first-graders, 80 third-graders, 64 fifth-graders, and 71 adults. In both contexts, protagonists had negative feelings because of the behavior of the other…

  14. Detection of concealed and buried chemicals by using multifrequency excitations

    SciTech Connect

    Gao Yaohui; Chen, Meng-Ku; Yang, Chia-En; Chang, Yun-Ching; Yao, Jim; Cheng Jiping; Yin, Stuart; Hui Rongqing; Ruffin, Paul; Brantley, Christina; Edwards, Eugene; Luo, Claire

    2010-08-15

    In this paper, we present a new type of concealed and buried chemical detection system by stimulating and enhancing spectroscopic signatures with multifrequency excitations, which includes a low frequency gradient dc electric field, a high frequency microwave field, and higher frequency infrared (IR) radiations. Each excitation frequency plays a unique role. The microwave, which can penetrate into the underground and/or pass through the dielectric covers with low attenuation, could effectively transform its energy into the concealed and buried chemicals and increases its evaporation rate from the sample source. Subsequently, a gradient dc electric field, generated by a Van De Graaff generator, not only serves as a vapor accelerator for efficiently expediting the transportation process of the vapor release from the concealed and buried chemicals but also acts as a vapor concentrator for increasing the chemical concentrations in the detection area, which enables the trace level chemical detection. Finally, the stimulated and enhanced vapors on the surface are detected by the IR spectroscopic fingerprints. Our theoretical and experimental results demonstrate that more than sixfold increase in detection signal can be achieved by using this proposed technology. The proposed technology can also be used for standoff detection of concealed and buried chemicals by adding the remote IR and/or thermal spectroscopic and imaging detection systems.

  15. 21 CFR 1404.900 - Adequate evidence.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 9 2012-04-01 2012-04-01 false Adequate evidence. 1404.900 Section 1404.900 Food and Drugs OFFICE OF NATIONAL DRUG CONTROL POLICY GOVERNMENTWIDE DEBARMENT AND SUSPENSION (NONPROCUREMENT) Definitions § 1404.900 Adequate evidence. Adequate evidence means information sufficient...

  16. 21 CFR 1404.900 - Adequate evidence.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Adequate evidence. 1404.900 Section 1404.900 Food and Drugs OFFICE OF NATIONAL DRUG CONTROL POLICY GOVERNMENTWIDE DEBARMENT AND SUSPENSION (NONPROCUREMENT) Definitions § 1404.900 Adequate evidence. Adequate evidence means information sufficient...

  17. Quantum Image Steganography and Steganalysis Based On LSQu-Blocks Image Information Concealing Algorithm

    NASA Astrophysics Data System (ADS)

    A. AL-Salhi, Yahya E.; Lu, Songfeng

    2016-08-01

    Quantum steganography can solve some problems that are considered inefficient in image information concealing. It researches on Quantum image information concealing to have been widely exploited in recent years. Quantum image information concealing can be categorized into quantum image digital blocking, quantum image stereography, anonymity and other branches. Least significant bit (LSB) information concealing plays vital roles in the classical world because many image information concealing algorithms are designed based on it. Firstly, based on the novel enhanced quantum representation (NEQR), image uniform blocks clustering around the concrete the least significant Qu-block (LSQB) information concealing algorithm for quantum image steganography is presented. Secondly, a clustering algorithm is proposed to optimize the concealment of important data. Finally, we used Con-Steg algorithm to conceal the clustered image blocks. Information concealing located on the Fourier domain of an image can achieve the security of image information, thus we further discuss the Fourier domain LSQu-block information concealing algorithm for quantum image based on Quantum Fourier Transforms. In our algorithms, the corresponding unitary Transformations are designed to realize the aim of concealing the secret information to the least significant Qu-block representing color of the quantum cover image. Finally, the procedures of extracting the secret information are illustrated. Quantum image LSQu-block image information concealing algorithm can be applied in many fields according to different needs.

  18. Campaign for Right to Carry Concealed Guns on Campuses Gains Traction

    ERIC Educational Resources Information Center

    Wiseman, Rachel

    2012-01-01

    Five years after the Virginia Tech massacre prompted a student in Texas to start a Facebook page in favor of the right to carry concealed weapons on college campuses, the resulting group, Students for Concealed Carry, has advanced its cause. In more than a dozen states, legislation has been introduced to allow the carrying of concealed firearms on…

  19. Dynamic Channel Allocation

    DTIC Science & Technology

    2003-09-01

    7 1 . Fixed Channel Allocation (FCA) ........................................................7 2. Dynamic Channel ...19 7. CSMA/CD-Based Multiple Network Lines .....................................20 8. Hybrid Channel Allocation in Wireless Networks...28 1 . Channel Allocation

  20. Concealed objects detection based on FWT in active millimeter-wave images

    NASA Astrophysics Data System (ADS)

    Du, Kun; Zhang, Lu; Chen, Wei; Wan, Guolong; Fu, Ruoran

    2017-01-01

    Active millimeter-wave (MMW) near-filed human imaging is a means for concealed objects detection. A method of concealed objects detection based on fast wavelet transforms (FWT) in the usage of active MMW images is presented as a result of image characteristics, which includes high resolution, characteristics varying in different parts of the human, imaging influenced among human, concealed objects and other objects, and different textures of concealed objects. Images segmentation utilizing results of edge detection based on FWT is conducted and preliminary segmentation results can be obtained. Some kinds of concealed objects according to comparing gray value of concealed objects to human average gray value can be detected in this paper. The experiments of concealed objects on images of actual acquisition are conducted with a result of accurate rate 80.92% and false alarm rate 11.78%, illustrating the effectiveness of the method proposed in this paper.

  1. A hybrid frame concealment algorithm for H.264/AVC.

    PubMed

    Yan, Bo; Gharavi, Hamid

    2010-01-01

    In packet-based video transmissions, packets loss due to channel errors may result in the loss of the whole video frame. Recently, many error concealment algorithms have been proposed in order to combat channel errors; however, most of the existing algorithms can only deal with the loss of macroblocks and are not able to conceal the whole missing frame. In order to resolve this problem, in this paper, we have proposed a new hybrid motion vector extrapolation (HMVE) algorithm to recover the whole missing frame, and it is able to provide more accurate estimation for the motion vectors of the missing frame than other conventional methods. Simulation results show that it is highly effective and significantly outperforms other existing frame recovery methods.

  2. Could plate tectonics on Venus be concealed by volcanic deposits

    NASA Technical Reports Server (NTRS)

    Kaula, W. M.; Muradian, L. M.

    1982-01-01

    The present investigation is supplementary to a study reported by Kaula and Phillips (1981). From an analysis of Pioneer Venus altimetry, Kaula and Phillips had inferred that any heat loss from the planet by plate tectonics must be small compared to that from the earth. However, it has been suggested by others that plate tectonic may exist on Venus, but that the expected 'square root of s' dependence of the topographic drop off is not observed because it is concealed by lava flows. The present investigation has the objective to conduct an examination whether this suggestion of concealment by lava flow is correct. On the basis of the performed analysis, it is concluded that the results obtained by Kaula and Phillips appear to be well justified.

  3. ID-Check: Online Concealed Information Test Reveals True Identity.

    PubMed

    Verschuere, Bruno; Kleinberg, Bennett

    2016-01-01

    The Internet has already changed people's lives considerably and is likely to drastically change forensic research. We developed a web-based test to reveal concealed autobiographical information. Initial studies identified a number of conditions that affect diagnostic efficiency. By combining these moderators, this study investigated the full potential of the online ID-check. Participants (n = 101) tried to hide their identity and claimed a false identity in a reaction time-based Concealed Information Test. Half of the participants were presented with personal details (e.g., first name, last name, birthday), whereas the others only saw irrelevant details. Results showed that participants' true identity could be detected with high accuracy (AUC = 0.98; overall accuracy: 86-94%). Online memory detection can reliably and validly detect whether someone is hiding their true identity. This suggests that online memory detection might become a valuable tool for forensic applications.

  4. Content-based retransmission with error concealment for astronomical images

    NASA Astrophysics Data System (ADS)

    Thienphrapa, Paul; Boussalis, Helen; Liu, Charles; Rad, Khosrow; Dong, Jane

    2005-10-01

    The James Webb Space Telescope (JWST) is expected to produce a vast amount of images that are valuable for astronomical research and education. To support research activities related to JWST mission, NASA has provided funds to establish the Structures Pointing and Control Engineering (SPACE) Laboratory at the California State University, Los Angeles (CSULA). One of the research activities in SPACE lab is to design an effective and efficient transmission system to disseminate JWST images across the Internet. This paper presents a prioritized transmission method to provide the best quality of the transferred image based on the joint-optimization of content-based retransmission and error concealment. First, the astronomical image is compressed using a scalable wavelet-based approach, then packetized into independently decodable packets. To facilitate the joint-optimization of two mutually dependent error control methods, a novel content index is declared to represent the significance of the packet content as well as its importance in error concealment. Based on the defined content index, the optimal retransmission schedule is determined to maximize the quality of the received image under delay constraint with the given error concealment method. Experimental results demonstrate that the proposed approach is very effective to combat the packet loss during transmission to achieve a desirable quality of the received astronomical images.

  5. Biomedical psychiatry and its concealed metaphors: an anthropological perspective.

    PubMed

    Martínez-Hernáez, Angel

    2013-09-01

    The idea that power relations structure social life is self-evident to most anthropologists. Western medical knowledge or biomedicine, and by extension science or scientific knowledge, however, has until relatively recently been exempt from anthropological scrutiny in political terms. An understanding of biomedicine as a system of knowledge that is not a copy of facts but a representation of them has entailed a break with the traditional separation of folk knowledge and scientific knowledge in anthropology, making it possible to include biomedicine in the repertoire of ethnographic objects. The peculiarity of biomedicine as a cultural system, seen from this perspective, lies in a paradox: its self-characterization as a set of non-ideological discourses and practices is a representation that conceals its ideological and power-saturated nature. Through an analysis of DSM-IV-TR, this article explores some of the representational strategies through which this concealment takes place in biomedical psychiatry: the asocial and universal character of mental illness categories; the neutrality of clinical practice; and the non-moral nature of clinical criteria and judgment. These are concealed metaphors in the true sense, for not only do they speak of something without naming it but they also deny their own existence as metaphors.

  6. 5 CFR 919.900 - Adequate evidence.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Adequate evidence. 919.900 Section 919.900 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS (CONTINUED) GOVERNMENTWIDE DEBARMENT AND SUSPENSION (NONPROCUREMENT) Definitions § 919.900 Adequate...

  7. Millimeter-wave concealed weapons detection and through-the-wall imaging systems

    NASA Astrophysics Data System (ADS)

    Huguenin, G. Richard

    1997-02-01

    Millimetrix' millimeter wave passive imaging technology offers the opportunity for rapid and remote detection of metallic and non-metallic weapons, plastic explosives, drugs, and other contraband concealed under multiple layers of clothing without the necessity of a direct physical search. The purely passive imaging technique relies solely on the existing natural emissions from the scene objects, does not expose the person to any man-made radiation, and is therefore completely harmless to the person being observed and to all others in the area. Screening can be done remotely and with as much discretion as the situation requires. The passive imaging approach to the detection of concealed weapons and contraband hidden under people's clothing works well at millimeter wavelengths because of a fortunate convergence of a number of key factors: (1) adequate resolution in a reasonable sensor size; (2) high transparency of virtually all clothing; and (3) the extraordinarily high emissivity of human flesh compared to the vast majority of other materials. Longer (microwave) wavelengths are impractical because of sensor size and resolution issues, and shorter (infrared) wavelengths are impractical because of the poor transparency of most clothing. The ability of millimeter wave emissions to penetrate many common building materials permits the remote observation, using active millimeter wave sensors, of people and other objects within a room from outside of that room. The resulting through-the-wall 'live' video images of people and furnishings will indicate their location, posture, and activity within a room which should be valuable knowledge to Special Operations, SWAT, and other military and law enforcement personnel prior to their entering that room. Millimeter wave radar imaging systems based on passive MillivisionR camera technology are being developed by Millimetrix (and other members of the MIRTAC TRP consortium) for through-the-wall imaging system (TWIS) applications.

  8. ‘I am doing fine only because I have not told anyone’: the necessity of concealment in the lives of people living with HIV in India

    PubMed Central

    George, Mathew Sunil; Lambert, Helen

    2015-01-01

    In HIV prevention and care programmes, disclosure of status by HIV-positive individuals is generally encouraged to contain the infection and provide adequate support to the person concerned. Lack of disclosure is generally framed as a barrier to preventive behaviours and accessing support. The assumption that disclosure is beneficial is also reflected in studies that aim to identify determinants of disclosure and recommend individual-level measures to promote disclosure. However, in contexts where HIV infection is stigmatised and there is fear of rejection and discrimination among those living with HIV, concealment of status becomes a way to try and regain as much as possible the life that was disrupted by the discovery of HIV infection. In this study of HIV-positive women and children in India, concealment was considered essential by individuals and families of those living with HIV to re-establish and maintain their normal lives in an environment where stigma and discrimination were prevalent. This paper describes why women and care givers of children felt the need to conceal HIV status, the various ways in which people tried to do so and the implications for treatment of people living with HIV. We found that while women were generally willing to disclose their status to their husband or partner, they were very keen to conceal their status from all others, including family members. Parents and carers with an HIV-positive child were not willing to disclose this status to the child or to others. Understanding the different rationales for concealment would help policy makers and programme managers to develop more appropriate care management strategies and train care providers to assist clients in accessing care and support without disrupting their lives. PMID:25706959

  9. The role of need satisfaction in self-concealment and well-being.

    PubMed

    Uysal, Ahmet; Lin, Helen Lee; Knee, C Raymond

    2010-02-01

    The present research tests a model derived from self-determination theory to explain why self-concealment (the tendency to keep distressing personal information secret) is associated with negative well-being outcomes. Two studies tested a model in which self-concealment predicts the thwarting of basic needs for autonomy, competence, and relatedness, which then results in negative psychological outcomes. Study 1 involved a cross-sectional design. Structural equation modeling analyses revealed that the model provided an acceptable fit to the data. Study 2 involved a multilevel design. Participants completed daily measures of self-concealment, need satisfaction, and well-being over 16 days. Results supported the proposed mediation model. Furthermore, the associations between daily self-concealment, daily need satisfaction, and daily well-being were independent of trait self-concealment. Overall, the findings suggest that concealing personal distressing information is detrimental to the satisfaction of basic psychological needs, which in turn predicts negative well-being.

  10. The nitrogen camera and the detection of concealed explosives

    NASA Astrophysics Data System (ADS)

    Trower, W. P.

    1993-06-01

    The nitrogen camera is an instrument based on a nuclear technique which is capable of imaging nitrogen concentrations with surface densities and amounts typical of currently concealed conventional explosives. Its signal is the totality of high-energy gamma rays detected in the multiscalar mode after the irradiation of a target pixel by a beam from a 50 MeV electron racetrack microtron. The sole interfering signal, from 13C, can be disentangled by two methods. Images of 180 2 × 2 cm 2 pixels, which are shown, eventually will be produced in ˜ 7.2 s. Progress towards an operational nitrogen camera is discussed.

  11. 3-D Imaging of Partly Concealed Targets by Laser Radar

    DTIC Science & Technology

    2005-10-01

    laser in the green wavelength region was used for illumination. 3-D Imaging of Partly Concealed Targets by Laser Radar 11 - 8 RTO-MP-SET-094...acknowledge Marie Carlsson and Ann Charlotte Gustavsson for their assistance in some of the experiments. 7.0 REFERENCES [1] U. Söderman, S. Ahlberg...SPIE Vol. 3707, pp. 432-448, USA, 1999. [14] D. Letalick, H. Larsson, M. Carlsson, and A.-C. Gustavsson , “Laser sensors for urban warfare,” FOI

  12. [Effects of false memories on the Concealed Information Test].

    PubMed

    Zaitsu, Wataru

    2012-10-01

    The effects of false memories on polygraph examinations with the Concealed Information Test (CIT) were investigated by using the Deese-Roediger-McDermott (DRM) paradigm, which allows participants to evoke false memories. Physiological responses to questions consisting of learned, lure, and unlearned items were measured and recorded. The results indicated that responses to lure questions showed critical responses to questions about learned items. These responses included repression of respiration, an increase in electrodermal activity, and a drop in heart rate. These results suggest that critical response patterns are generated in the peripheral nervous system by true and false memories.

  13. Concealed target detection using augmented reality with SIRE radar

    NASA Astrophysics Data System (ADS)

    Saponaro, Philip; Kambhamettu, Chandra; Ranney, Kenneth; Sullivan, Anders

    2013-05-01

    The Synchronous Impulse Reconstruction (SIRE) forward-looking radar, developed by the U.S. Army Research Laboratory (ARL), can detect concealed targets using ultra-wideband synthetic aperture technology. The SIRE radar has been mounted on a Ford Expedition and combined with other sensors, including a pan/tilt/zoom camera, to test its capabilities of concealed target detection in a realistic environment. Augmented Reality (AR) can be used to combine the SIRE radar image with the live camera stream into one view, which provides the user with information that is quicker to assess and easier to understand than each separated. In this paper we present an AR system which utilizes a global positioning system (GPS) and inertial measurement unit (IMU) to overlay a SIRE radar image onto a live video stream. We describe a method for transforming 3D world points in the UTM coordinate system onto the video stream by calibrating for the intrinsic parameters of the camera. This calibration is performed offline to save computation time and achieve real time performance. Since the intrinsic parameters are affected by the zoom of the camera, we calibrate at eleven different zooms and interpolate. We show the results of a real time transformation of the SAR imagery onto the video stream. Finally, we quantify both the 2D error and 3D residue associated with our transformation and show that the amount of error is reasonable for our application.

  14. Separating deceptive and orienting components in a Concealed Information Test.

    PubMed

    Ambach, Wolfgang; Stark, Rudolf; Peper, Martin; Vaitl, Dieter

    2008-11-01

    The Concealed Information Test (CIT) requires the examinee to deceptively deny recognition of known stimuli and to truthfully deny recognition of unknown stimuli. Because deception and orienting are typically coupled, it is unclear how exactly these sub-processes affect the physiological responses measured in the CIT. The present study aimed at separating the effects of deception from those of orienting. In a mock-crime study, using a modified CIT, thirty-six of seventy-two subjects answered truthfully ('truth group'), whereas the other thirty-six concealed their knowledge ('lie group'). Answering was delayed for 4 s after item presentation. Electrodermal activity (EDA), respiration (RLL), and phasic heart rate (HR) were recorded. A decomposition of EDA responses revealed two response components; the response in the first interval was expected to indicate orienting, stimulus evaluation, and answer preparation, whereas the response in the second interval was assumed to reflect answer-related processes. Inconclusively, both EDA components differentiated between 'probe' and 'irrelevant' items in both groups. Phasic HR and RLL differed between item classes only in the 'lie' group, thus reflecting answer-related processes, possibly deception, rather than merely orienting responses. The findings further support the notion that psychophysiological measures elicited by a modified CIT may reflect different mental processes involved in orienting and deception.

  15. Multispectral concealed weapon detection in visible, infrared, and terahertz

    NASA Astrophysics Data System (ADS)

    Kowalski, Marcin; Kastek, Mariusz; Polakowski, Henryk; Palka, Norbert; Piszczek, Marek; Szustakowski, Mieczyslaw

    2014-05-01

    Detection of concealed dangerous objects is a very demanding problem of public safety. So far, the problem of detecting objects hidden under clothing was considered only in the case of airports but it is becoming more and more important for public places like metro stations, and government buildings. The development of imaging devices and exploration of new spectral bands is a chance to introduce new equipment for assuring public safety. It has been proved that objects hidden under clothing can be detected and visualized using terahertz (THz) cameras. However, passive THz cameras still offer too low image resolution for objects recognition. On the other hand new infrared cameras offer sufficient parameters to detect objects covered with fabrics in some conditions, as well as high image quality and big pixel resolutions. The purpose of the studies is to investigate the possibilities of using various cameras operating in different spectral ranges for detection of concealed objects. In the article, we present the measurement setup consisting of medium wavelength infrared (MWIR), long wavelength infrared (LWIR), THz and visible cameras and the initial results of measurements with various types of clothing and test objects.

  16. Concealed by conspicuousness: distractive prey markings and backgrounds

    PubMed Central

    Dimitrova, Marina; Stobbe, Nina; Schaefer, H. Martin; Merilaita, Sami

    2009-01-01

    High-contrast markings, called distractive or dazzle markings, have been suggested to draw and hold the attention of a viewer, thus hindering detection or recognition of revealing prey characteristics, such as the body outline. We tested this hypothesis in a predation experiment with blue tits (Cyanistes caeruleus) and artificial prey. We also tested whether this idea can be extrapolated to the background appearance and whether high-contrast markings in the background would improve prey concealment. We compared search times for a high-contrast range prey (HC-P) and a low-contrast range prey (LC-P) in a high-contrast range background (HC-B) and a low-contrast range background (LC-B). The HC-P was more difficult to detect in both backgrounds, although it did not match the LC-B. Also, both prey types were more difficult to find in the HC-B than in the LC-B, in spite of the mismatch of the LC-P. In addition, the HC-P was more difficult to detect, in both backgrounds, when compared with a generalist prey, not mismatching either background. Thus, we conclude that distractive prey pattern markings and selection of microhabitats with distractive features may provide an effective way to improve camouflage. Importantly, high-contrast markings, both as part of the prey coloration and in the background, can indeed increase prey concealment. PMID:19324754

  17. Concealed Threat Detection at Multiple Frames-per-second

    SciTech Connect

    Chang, J T

    2005-11-08

    In this LDRD project, our research purpose is to investigate the science and technology necessary to enable real-time array imaging as a rapid way to detect hidden threats through obscurants such as smoke, fog, walls, doors, and clothing. The goal of this research is to augment the capabilities of protective forces in concealed threat detection. In the current context, threats include people as well as weapons. In most cases, security personnel must make very fast assessments of a threat based upon limited amount of data. Among other attributes, UWB has been shown and quantified to penetrate and propagate through many materials (wood, some concretes, non-metallic building materials, some soils, etc.) while maintaining high range resolution. We have build collaborations with university partners and government agencies. We have considered the impact of psychometrics on target recognition and identification. Specifically we have formulated images in real-time that will engage the user's vision system in a more active way to enhance image interpretation capabilities. In this project, we are researching the use of real time (field programmable gate arrays) integrated with high resolution (cm scale), ultra wide band (UWB) electromagnetic signals for imaging personnel through smoke and walls. We evaluated the ability of real-time UWB imaging for detecting smaller objects, such as concealed weapons that are carried by the obscured personnel. We also examined the cognitive interpretation process of real time UWB electromagnetic images.

  18. Passive millimeter-wave imaging for concealed article detection

    NASA Astrophysics Data System (ADS)

    Lovberg, John A.; Galliano, Joseph A., Jr.; Clark, Stuart E.

    1997-02-01

    Passive-millimeter-wave imaging (PMI) provides a powerful sensing tool for law enforcement, allowing an unobtrusive means for detecting concealed weapons, explosives, or contraband on persons or in baggage. Natural thermal emissions at millimeter wavelengths from bodies, guns, explosives, and other articles pass easily through clothing or other concealment materials, where they can be detected and converted into conventional 2-dimensional images. A new implementation of PMI has demonstrated a large-area, near- real-time staring capability for personnel inspection at standoff ranges of greater than 10 meters. In this form, PMI does not require operator cuing based on subjective 'profiles' of suspicious appearance or behaviors, which may otherwise be construed as violations of civil rights. To the contrary, PMI detects and images heat generated by any object with no predisposition as to its nature or function (e.g. race or gender of humans). As a totally passive imaging tool, it generates no radio-frequency or other radiation which might raise public health concerns. Specifics of the new PMI architecture are presented along with a host of imaging data representing the current state- of-the-art.

  19. Terahertz imaging system performance model for concealed-weapon identification

    NASA Astrophysics Data System (ADS)

    Murrill, Steven R.; Jacobs, Eddie L.; Moyer, Steven K.; Halford, Carl E.; Griffin, Steven T.; De Lucia, Frank C.; Petkie, Douglas T.; Franck, Charmaine C.

    2008-03-01

    The U.S. Army Night Vision and Electronic Sensors Directorate (NVESD) and the U.S. Army Research Laboratory have developed a terahertz (THz) -band imaging system performance model for detection and identification of concealed weaponry. The MATLAB-based model accounts for the effects of all critical sensor and display components and for the effects of atmospheric attenuation, concealment material attenuation, and active illumination. The model is based on recent U.S. Army NVESD sensor performance modeling technology that couples system design parameters to observer-sensor field performance by using the acquire methodology for weapon identification performance predictions. This THz model has been developed in support of the Defense Advanced Research Project Agencies' Terahertz Imaging Focal-Plane Technology (TIFT) program and is currently being used to guide the design and development of a 0.650 THz active-passive imaging system. This paper will describe the THz model in detail, provide and discuss initial modeling results for a prototype THz imaging system, and outline plans to calibrate and validate the model through human perception testing.

  20. Terahertz imaging system performance model for concealed weapon identification

    NASA Astrophysics Data System (ADS)

    Murrill, Steven R.; Jacobs, Eddie L.; Moyer, Steven K.; Halford, Carl E.; Griffin, Steven T.; De Lucia, Frank C.; Petkie, Douglas T.; Franck, Charmaine C.

    2005-11-01

    The U.S. Army Night Vision and Electronic Sensors Directorate and the U.S. Army Research Laboratory have developed a terahertz-band imaging system performance model for detection and identification of concealed weaponry. The MATLAB-based model accounts for the effects of all critical sensor and display components, and for the effects of atmospheric attenuation, concealment material attenuation, and active illumination. The model is based on recent U.S. Army NVESD sensor performance models that couple system design parameters to observer-sensor field performance using the acquire methodology for weapon identification performance predictions. This THz model has been developed in support of the Defense Advanced Research Project Agencies' Terahertz Imaging Focal-Plane-Array Technology (TIFT) program and is presently being used to guide the design and development of a 0.650 THz active/passive imaging system. This paper will describe the THz model in detail, provide and discuss initial modeling results for a prototype THz imaging system, and outline plans to validate and calibrate the model through human perception testing.

  1. Optical 3D imaging and visualization of concealed objects

    NASA Astrophysics Data System (ADS)

    Berginc, G.; Bellet, J.-B.; Berechet, I.; Berechet, S.

    2016-09-01

    This paper gives new insights on optical 3D imagery. In this paper we explore the advantages of laser imagery to form a three-dimensional image of the scene. 3D laser imaging can be used for three-dimensional medical imaging and surveillance because of ability to identify tumors or concealed objects. We consider the problem of 3D reconstruction based upon 2D angle-dependent laser images. The objective of this new 3D laser imaging is to provide users a complete 3D reconstruction of objects from available 2D data limited in number. The 2D laser data used in this paper come from simulations that are based on the calculation of the laser interactions with the different meshed objects of the scene of interest or from experimental 2D laser images. We show that combining the Radom transform on 2D laser images with the Maximum Intensity Projection can generate 3D views of the considered scene from which we can extract the 3D concealed object in real time. With different original numerical or experimental examples, we investigate the effects of the input contrasts. We show the robustness and the stability of the method. We have developed a new patented method of 3D laser imaging based on three-dimensional reflective tomographic reconstruction algorithms and an associated visualization method. In this paper we present the global 3D reconstruction and visualization procedures.

  2. 3D laser imaging for concealed object identification

    NASA Astrophysics Data System (ADS)

    Berechet, Ion; Berginc, Gérard; Berechet, Stefan

    2014-09-01

    This paper deals with new optical non-conventional 3D laser imaging. Optical non-conventional imaging explores the advantages of laser imaging to form a three-dimensional image of the scene. 3D laser imaging can be used for threedimensional medical imaging, topography, surveillance, robotic vision because of ability to detect and recognize objects. In this paper, we present a 3D laser imaging for concealed object identification. The objective of this new 3D laser imaging is to provide the user a complete 3D reconstruction of the concealed object from available 2D data limited in number and with low representativeness. The 2D laser data used in this paper come from simulations that are based on the calculation of the laser interactions with the different interfaces of the scene of interest and from experimental results. We show the global 3D reconstruction procedures capable to separate objects from foliage and reconstruct a threedimensional image of the considered object. In this paper, we present examples of reconstruction and completion of three-dimensional images and we analyse the different parameters of the identification process such as resolution, the scenario of camouflage, noise impact and lacunarity degree.

  3. Target Speaker Detection with Concealed EEG Around the Ear

    PubMed Central

    Mirkovic, Bojana; Bleichner, Martin G.; De Vos, Maarten; Debener, Stefan

    2016-01-01

    Target speaker identification is essential for speech enhancement algorithms in assistive devices aimed toward helping the hearing impaired. Several recent studies have reported that target speaker identification is possible through electroencephalography (EEG) recordings. If the EEG system could be reduced to acceptable size while retaining the signal quality, hearing aids could benefit from the integration with concealed EEG. To compare the performance of a multichannel around-the-ear EEG system with high-density cap EEG recordings an envelope tracking algorithm was applied in a competitive speaker paradigm. The data from 20 normal hearing listeners were concurrently collected from the traditional state-of-the-art laboratory wired EEG system and a wireless mobile EEG system with two bilaterally-placed around-the-ear electrode arrays (cEEGrids). The results show that the cEEGrid ear-EEG technology captured neural signals that allowed the identification of the attended speaker above chance-level, with 69.3% accuracy, while cap-EEG signals resulted in the accuracy of 84.8%. Further analyses investigated the influence of ear-EEG signal quality and revealed that the envelope tracking procedure was unaffected by variability in channel impedances. We conclude that the quality of concealed ear-EEG recordings as acquired with the cEEGrid array has potential to be used in the brain-computer interface steering of hearing aids. PMID:27512364

  4. Asbestos/NESHAP adequately wet guidance

    SciTech Connect

    Shafer, R.; Throwe, S.; Salgado, O.; Garlow, C.; Hoerath, E.

    1990-12-01

    The Asbestos NESHAP requires facility owners and/or operators involved in demolition and renovation activities to control emissions of particulate asbestos to the outside air because no safe concentration of airborne asbestos has ever been established. The primary method used to control asbestos emissions is to adequately wet the Asbestos Containing Material (ACM) with a wetting agent prior to, during and after demolition/renovation activities. The purpose of the document is to provide guidance to asbestos inspectors and the regulated community on how to determine if friable ACM is adequately wet as required by the Asbestos NESHAP.

  5. Funding the Formula Adequately in Oklahoma

    ERIC Educational Resources Information Center

    Hancock, Kenneth

    2015-01-01

    This report is a longevity, simulational study that looks at how the ratio of state support to local support effects the number of school districts that breaks the common school's funding formula which in turns effects the equity of distribution to the common schools. After nearly two decades of adequately supporting the funding formula, Oklahoma…

  6. Management of a Concealable Stigmatized Identity: A Qualitative Study of Concealment, Disclosure, and Role Flexing Among Young, Resilient Sexual and Gender Minority Individuals.

    PubMed

    Bry, Laura Jane; Mustanski, Brian; Garofalo, Robert; Burns, Michelle Nicole

    2017-01-01

    Disclosure of a sexual or gender minority status has been associated with both positive and negative effects on wellbeing. Few studies have explored the disclosure and concealment process in young people. Interviews were conducted with 10 sexual and/or gender minority individuals, aged 18-22 years, of male birth sex. Data were analyzed qualitatively, yielding determinants and effects of disclosure and concealment. Determinants of disclosure included holding positive attitudes about one's identity and an implicit devaluation of acceptance by society. Coming out was shown to have both positive and negative effects on communication and social support and was associated with both increases and decreases in experiences of stigma. Determinants of concealment included lack of comfort with one's identity and various motivations to avoid discrimination. Concealment was also related to hypervigilance and unique strategies of accessing social support. Results are discussed in light of their clinical implications.

  7. When Concealed Handgun Licensees Break Bad: Criminal Convictions of Concealed Handgun Licensees in Texas, 2001–2009

    PubMed Central

    Nwaiwu, Obioma; McMaughan Moudouni, Darcy K.; Edwards, Rachel; Lin, Szu-hsuan

    2013-01-01

    Objectives. We explored differences in criminal convictions between holders and nonholders of a concealed handgun license (CHL) in Texas. Methods. The Texas Department of Public Safety (DPS) provides annual data on criminal convictions of holders and nonholders of CHLs. We used 2001 to 2009 DPS data to investigate the differences in the distribution of convictions for these 2 groups across 9 types of criminal offenses. We calculated z scores for the differences in the types of crimes for which CHL holders and nonholders were convicted. Results. CHL holders were much less likely than nonlicensees to be convicted of crimes. Most nonholder convictions involved higher-prevalence crimes (burglary, robbery, or simple assault). CHL holders’ convictions were more likely to involve lower-prevalence crimes, such as sexual offenses, gun offenses, or offenses involving a death. Conclusions. Our results imply that expanding the settings in which concealed carry is permitted may increase the risk of specific types of crimes, some quite serious in those settings. These increased risks may be relatively small. Nonetheless, policymakers should consider these risks when contemplating reducing the scope of gun-free zones. PMID:23153139

  8. Mobile TNA system to detect explosives and drugs concealed in cars and trucks

    NASA Astrophysics Data System (ADS)

    Bendahan, Joseph; Gozani, Tsahi

    1998-12-01

    The drug problem in the U.S. is serious and efforts to fight it are constrained by the lack of adequate means to curb the inflow of smuggled narcotics into the country through cargo containers. Also, events such as the disastrous explosion in Oklahoma City, the IRA bombing in London, and the bombing of the U.S. military residence in Dharan make the development of new tools for the detection of explosives and drugs in vehicles imperative. Thermal neutron analysis (TNA) technology, developed for the detection of explosives in suitcases, and detection of landmines and unexploded ordnance is presently being applied to the nonintrusive detection of significant amounts of explosives and drugs concealed in cars, trucks and large cargo containers. TNA technology is based on the analysis of characteristic gamma rays emitted following thermal neutron capture. A TNA system can be used in a variety of operational scenarios, such as inspection before an unloaded cargo container from a spit is moved to temporary storage, inspection of trucks unloaded from a ferry, or inspection of vehicles parked close to Federal building or military bases. This paper will discuss the detection process and operational scenarios, and will present results from recent simulations and measurements.

  9. 27 CFR 447.62 - False statements or concealment of facts.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO... IMPLEMENTS OF WAR Penalties, Seizures and Forfeitures § 447.62 False statements or concealment of facts. Any... fact or fails to state a material fact required to be stated therein or necessary to make...

  10. 27 CFR 447.62 - False statements or concealment of facts.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO... IMPLEMENTS OF WAR Penalties, Seizures and Forfeitures § 447.62 False statements or concealment of facts. Any... fact or fails to state a material fact required to be stated therein or necessary to make...

  11. Worker's refusal to conceal HIV tattoo amounts to misconduct.

    PubMed

    1997-07-25

    [Name removed] was fired in 1994 from his job as a nurse's aide at the Seattle, WA Harborview Medical Center after refusing to cover a tattoo on his left inside forearm that reads HIV POSITIVE. The 9th U.S. Circuit Court of Appeals rejected [name removed]'s arguments that he was terminated because of his HIV status and not the tattoo. He contended that the hospital violated the Americans with Disabilities Act (ADA), the Rehabilitation Act, and his First Amendment right to free speech. The judge agreed with the hospital that [name removed]'s refusal to conceal the tattoo amounted to insubordination. The appeals panel affirmed the granting of summary judgment on [name removed]'s ADA and Rehabilitation Act claims. [Name removed] said he had himself tattooed to help dispel the stigma attached to his infection. The hospital said the tattoo alarmed some patients.

  12. Pathways Between Concealable Stigmatized Identities and Substance Misuse

    PubMed Central

    Talley, Amelia E.; Littlefield, Andrew K.

    2015-01-01

    Individuals with concealable stigmatized identities often possess no obviously devalued attributes, yet are at greater risk for problematic substance use compared to their privileged counterparts. We present a conceptual model, which proposes that identity-relevant content and characteristics have important implications for cognitive, affective, and behavioral consequences of stigma-related stress. In doing so, we synthesize stigma-related models from the extant literature and attempt to integrate these concepts with previous work detailing potential contributors to substance use behaviors specifically. Finally, we ask readers to consider the various ways in which the content and characteristics of an individual’s stigmatized identity might combine with situational and additional individual difference factors to influence the likelihood of substance misuse. PMID:26379766

  13. Self-envy and the concealment of inner resources.

    PubMed

    Berman, A

    1999-01-01

    Self-envy refers to envy of one's own inner resources. This term is an adjunct to the psychodynamic understanding of developmental self-arrest, defined as deliberate and defensive impairment of one's own abilities and accomplishments and the concealment of inner resources. The article suggests possible explanations for the formation of self-envy, emphasizing the formation of envious object representations and the construction of a part of the personality based on these introjections. The effects of self-envy on patient therapist relations are also described, focusing on two particular manifestations: attachment to the therapist as a defense against self-envy and attacking the therapeutic contract as one of the patient's assets. Excerpts from a case study are included.

  14. Geophysical investigations of concealed faults near Yucca Mountain, Southwest Nevada

    USGS Publications Warehouse

    Ponce, D.A.

    1993-01-01

    Detailed gravity and ground magnetic data collected along surveyed traverses across Midway Valley, on the eastern flank of Yucca Mountain, Nevada reveal that these methods can be used to delineate concealed faults. These studies are part of an effort to evaluate faulting in the vicinity of the proposed surface facilities for a potential nuclear waste repository at Yucca Mountain. The largest gravity and magnetic anomaly in the vicinity of Midway Valley is associated with the Paintbrush fault on the west flank of Alice Ridge. Geophysical data infer a vertical offset of about 200 m (650 ft). Another prominent gravity and magnetic anomaly is associated with the Bow Ridge fault in the western part of Midway Valley.

  15. Selection of food patches by sympatric herbivores in response to concealment and distance from a refuge.

    PubMed

    Crowell, Miranda M; Shipley, Lisa A; Camp, Meghan J; Rachlow, Janet L; Forbey, Jennifer S; Johnson, Timothy R

    2016-05-01

    Small herbivores face risks of predation while foraging and are often forced to trade off food quality for safety. Life history, behaviour, and habitat of predator and prey can influence these trade-offs. We compared how two sympatric rabbits (pygmy rabbit, Brachylagus idahoensis; mountain cottontail, Sylvilagus nuttallii) that differ in size, use of burrows, and habitat specialization in the sagebrush-steppe of western North America respond to amount and orientation of concealment cover and proximity to burrow refuges when selecting food patches. We predicted that both rabbit species would prefer food patches that offered greater concealment and food patches that were closer to burrow refuges. However, because pygmy rabbits are small, obligate burrowers that are restricted to sagebrush habitats, we predicted that they would show stronger preferences for greater cover, orientation of concealment, and patches closer to burrow refuges. We offered two food patches to individuals of each species during three experiments that either varied in the amount of concealment cover, orientation of concealment cover, or distance from a burrow refuge. Both species preferred food patches that offered greater concealment, but pygmy rabbits generally preferred terrestrial and mountain cottontails preferred aerial concealment. Only pygmy rabbits preferred food patches closer to their burrow refuge. Different responses to concealment and proximity to burrow refuges by the two species likely reflect differences in perceived predation risks. Because terrestrial predators are able to dig for prey in burrows, animals like pygmy rabbits that rely on burrow refuges might select food patches based more on terrestrial concealment. In contrast, larger habitat generalists that do not rely on burrow refuges, like mountain cottontails, might trade off terrestrial concealment for visibility to detect approaching terrestrial predators. This study suggests that body size and evolutionary adaptations

  16. Microwave-Spectral Signatures Would Reveal Concealed Objects

    NASA Technical Reports Server (NTRS)

    Arndt, G.; Ngo, P.; Carl, J. R.; Byerly, K.; Stolarcyzk, L.

    2004-01-01

    A proposed technique for locating concealed objects (especially small antipersonnel land mines) involves the acquisition and processing of spectral signatures over broad microwave frequency bands. This technique was conceived to overcome the weaknesses of older narrow- band electromagnetic techniques like ground-probing radar and low-frequency electromagnetic induction. Ground-probing radar is susceptible to false detections and/or interference caused by rocks, roots, air pockets, soil inhomogeneities, ice, liquid water, and miscellaneous buried objects other than those sought. Moreover, if the radar frequency happens to be one for which the permittivity of a sought object matches the permittivity of the surrounding soil or there is an unfavorable complex-amplitude addition of the radar reflection at the receiver, then the object is not detected. Low-frequency electromagnetic induction works well for detecting metallic objects, but the amounts of metal in plastic mines are often too small to be detectable. The potential advantage of the proposed technique arises from the fact that wideband spectral signatures generally contain more relevant information than do narrow-band signals. Consequently, spectral signatures could be used to make better decisions regarding whether concealed objects are present and whether they are the ones sought. In some cases, spectral signatures could provide information on the depths, sizes, shapes, and compositions of objects. An apparatus to implement the proposed technique (see Figure 1) could be assembled from equipment already in common use. Typically, such an apparatus would include a radio-frequency (RF) transmitter/receiver, a broad-band microwave antenna, and a fast personal computer loaded with appropriate software. In operation, the counter would be turned on, the antenna would be aimed at the ground or other mass suspected to contain a mine or other sought object, and the operating frequency would be swept over the band of

  17. Channel Allocation Options.

    ERIC Educational Resources Information Center

    Powers, Robert S.

    The Frequency Allocation Subcommittee of the Coordinating Committee for Cable Communication Systems, Institute of Electrical and Electronic Engineers, was formed to produce a background report on the general problems of frequency allocation and assignments in cable television. The present paper, based on the subcommittee's interim report,…

  18. Efficient block error concealment code for image and video transmission

    NASA Astrophysics Data System (ADS)

    Min, Jungki; Chan, Andrew K.

    1999-05-01

    Image and video compression standards such as JPEG, MPEG, H.263 are highly sensitive to error during transmission. Among typical error propagation mechanisms in video compression schemes, loss of block synchronization produces the worst image degradation. Even an error of a single bit in block synchronization may result in data to be placed in wrong positions that is caused by spatial shifts. Our proposed efficient block error concealment code (EBECC) virtually guarantees block synchronization and it improves coding efficiency by several hundred folds over the error resilient entropy code (EREC), proposed by N. G. Kingsbury and D. W. Redmill, depending on the image format and size. In addition, the EBECC produces slightly better resolution on the reconstructed images or video frames than those from the EREC. Another important advantage of the EBECC is that it does not require redundancy contrasting to the EREC that requires 2-3 percent of redundancy. Our preliminary results show the EBECC is 240 times faster than EREC for encoding and 330 times for decoding based on the CIF format of H.263 video coding standard. The EBECC can be used on most of the popular image and video compression schemes such as JPEG, MPEG, and H.263. Additionally, it is especially useful to wireless networks in which the percentage of image and video data is high.

  19. Subclinical vitamin D deficiency is increased in adolescent girls who wear concealing clothing.

    PubMed

    Hatun, Sukru; Islam, Omer; Cizmecioglu, Filiz; Kara, Bulent; Babaoglu, Kadir; Berk, Fatma; Gökalp, Ayse Sevim

    2005-02-01

    Vitamin D deficiency continues to be a worldwide problem, especially in developing countries. The aim of this study was to investigate potential risk factors for vitamin D deficiency. Girls (n = 89) aged 13 to 17 y were enrolled in the study. Study subjects were stratified into 3 groups: Group I included girls living in a suburban area; Group II girls lived in an urban area, and Group III girls lived in an urban area and wore concealing clothes for religious reasons. At the end of winter (in April) serum 25-hydroxyvitamin D [25(OH)D] levels were measured and dietary data were collected using questionnaires. Vitamin D deficiency was defined as a serum 25(OH)D concentration < 25 nmol/L, and insufficiency as a 25(OH)D concentration between 25 and 50 nmol/L. The lumbar and femur neck bone mineral densities (BMD) were measured using dual X-ray absorptiometry (DEXA). Overall, 39 girls (43.8%) had vitamin D insufficiency and 19 (21.3%) had vitamin D deficiency. In group III (wearing covered dress) the serum 25(OH)D concentrations (28.13 +/- 12.53 nmol/L) were significantly lower than in the other 2 groups, and within this group, 50% of girls were vitamin D deficient. The lumbar and femur neck BMD of girls with lower 25(OH)D levels did not differ from those with adequate vitamin D levels. We conclude that vitamin D deficiency is an important problem in Turkish adolescent girls, especially in those who follow a religious dress code; therefore, vitamin D supplementation appears to be necessary for adolescent girls.

  20. Real-time outdoor concealed-object detection with passive millimeter wave imaging.

    PubMed

    Yeom, Seokwon; Lee, Dong-Su; Son, Jung-Young; Jung, Min-Kyoo; Jang, YuShin; Jung, Sang-Won; Lee, Seok-Jae

    2011-01-31

    Millimeter wave imaging is finding rapid adoption in security applications such as the detection of objects concealed under clothing. A passive imaging system can be realized as a stand-off type sensor that can operate in open spaces, both indoors and outdoors. In this paper, we address real-time outdoor concealed-object detection and segmentation with a radiometric imaging system operating in the W-band. The imaging system is equipped with a dielectric lens and a receiver array operating at around 94 GHz. Images are analyzed by multilevel segmentation to identify a concealed object. Each level of segmentation comprises vector quantization, expectation-maximization, and Bayesian decision making to cluster pixels on the basis of a Gaussian mixture model. In addition, we describe a faster process that adopts only vector quantization for the first level segmentation. Experiments confirm that the proposed methods provide fast and reliable detection and segmentation for a moving human subject carrying a concealed gun.

  1. Serum thyroglobulin reference intervals in regions with adequate and more than adequate iodine intake.

    PubMed

    Wang, Zhaojun; Zhang, Hanyi; Zhang, Xiaowen; Sun, Jie; Han, Cheng; Li, Chenyan; Li, Yongze; Teng, Xiaochun; Fan, Chenling; Liu, Aihua; Shan, Zhongyan; Liu, Chao; Weng, Jianping; Teng, Weiping

    2016-11-01

    The purpose of this study was to establish normal thyroglobulin (Tg) reference intervals (RIs) in regions with adequate and more than adequate iodine intake according to the National Academy of Clinical Biochemistry (NACB) guidelines and to investigate the relationships between Tg and other factors.A total of 1317 thyroid disease-free adult subjects (578 men, 739 nonpregnant women) from 2 cities (Guangzhou and Nanjing) were enrolled in this retrospective, observational study. Each subject completed a questionnaire and underwent physical and ultrasonic examination. Serum Tg, thyroid-stimulating hormone (TSH), thyroid peroxidase antibody (TPOAb), Tg antibody (TgAb), and urinary iodine concentration (UIC) were measured. Reference groups were established on the basis of TSH levels: 0.5 to 2.0 and 0.27 to 4.2 mIU/L.The Tg RIs for Guangzhou and Nanjing were 1.6 to 30.0 and 1.9 to 25.8 ng/mL, respectively. No significant differences in Tg were found between genders or among different reference groups. Stepwise linear regression analyses showed that TgAb, thyroid volume, goiter, gender, age, and TSH levels were correlated with Tg.In adults from regions with adequate and more than adequate iodine intake, we found that Tg may be a suitable marker of iodine status; gender-specific Tg RI was unnecessary; there was no difference between Tg RIs in regions with adequate and more than adequate iodine intake; and the TSH criterion for selecting the Tg reference population could follow the local TSH reference rather than 0.5 to 2.0 mIU/L.

  2. Serum thyroglobulin reference intervals in regions with adequate and more than adequate iodine intake

    PubMed Central

    Wang, Zhaojun; Zhang, Hanyi; Zhang, Xiaowen; Sun, Jie; Han, Cheng; Li, Chenyan; Li, Yongze; Teng, Xiaochun; Fan, Chenling; Liu, Aihua; Shan, Zhongyan; Liu, Chao; Weng, Jianping; Teng, Weiping

    2016-01-01

    Abstract The purpose of this study was to establish normal thyroglobulin (Tg) reference intervals (RIs) in regions with adequate and more than adequate iodine intake according to the National Academy of Clinical Biochemistry (NACB) guidelines and to investigate the relationships between Tg and other factors. A total of 1317 thyroid disease-free adult subjects (578 men, 739 nonpregnant women) from 2 cities (Guangzhou and Nanjing) were enrolled in this retrospective, observational study. Each subject completed a questionnaire and underwent physical and ultrasonic examination. Serum Tg, thyroid-stimulating hormone (TSH), thyroid peroxidase antibody (TPOAb), Tg antibody (TgAb), and urinary iodine concentration (UIC) were measured. Reference groups were established on the basis of TSH levels: 0.5 to 2.0 and 0.27 to 4.2 mIU/L. The Tg RIs for Guangzhou and Nanjing were 1.6 to 30.0 and 1.9 to 25.8 ng/mL, respectively. No significant differences in Tg were found between genders or among different reference groups. Stepwise linear regression analyses showed that TgAb, thyroid volume, goiter, gender, age, and TSH levels were correlated with Tg. In adults from regions with adequate and more than adequate iodine intake, we found that Tg may be a suitable marker of iodine status; gender-specific Tg RI was unnecessary; there was no difference between Tg RIs in regions with adequate and more than adequate iodine intake; and the TSH criterion for selecting the Tg reference population could follow the local TSH reference rather than 0.5 to 2.0 mIU/L. PMID:27902589

  3. Concealing Emotions at Work Is Associated with Allergic Rhinitis in Korea.

    PubMed

    Seok, Hongdeok; Yoon, Jin-Ha; Won, Jong-Uk; Lee, Wanhyung; Lee, June-Hee; Jung, Pil Kyun; Roh, Jaehoon

    2016-01-01

    Concealing emotions at work can cause considerable psychological stress. While there is extensive research on the adverse health effects of concealing emotions and the association between allergic diseases and stress, research has not yet investigated whether concealing emotions at work is associated with allergic rhinitis. Allergic rhinitis is a common disease in many industrialized countries, and its prevalence is increasing. Thus, our aim was to determine the strength of this association using data from three years (2007-2009) of the 4th Korean National Health and Nutrition Examination Survey. Participants (aged 20-64) were 8,345 individuals who were economically active and who had completed the questionnaire items on concealing emotions at work. Odds ratio (OR) and 95% confidence intervals (95% CIs) were calculated for allergic rhinitis using logistic regression models. Among all participants, 3,140 subjects (37.6%) reported concealing their emotions at work: 1,661 men and 1,479 women. The OR (95% CIs) for allergic rhinitis among those who concealed emotions at work versus those who did not was 1.318 (1.148-1.512). Stratified by sex, the OR (95% CIs) was 1.307 (1.078-1.585) among men and 1.346 (1.105-1.639) among women. Thus, individuals who concealed their emotions at work were significantly more likely to have a diagnosis of AR in comparison to those who did not. Because concealing emotions at work has adverse health effects, labor policies that aim to reduce this practice are needed.

  4. Impulse radar imaging system for concealed object detection

    NASA Astrophysics Data System (ADS)

    Podd, F. J. W.; David, M.; Iqbal, G.; Hussain, F.; Morris, D.; Osakue, E.; Yeow, Y.; Zahir, S.; Armitage, D. W.; Peyton, A. J.

    2013-10-01

    Electromagnetic systems for imaging concealed objects at checkpoints typically employ radiation at millimetre and terahertz frequencies. These systems have been shown to be effective and provide a sufficiently high resolution image. However there are difficulties and current electromagnetic systems have limitations particularly in accurately differentiating between threat and innocuous objects based on shape, surface emissivity or reflectivity, which are indicative parameters. In addition, water has a high absorption coefficient at millimetre wavelength and terahertz frequencies, which makes it more difficult for these frequencies to image through thick damp clothing. This paper considers the potential of using ultra wideband (UWB) in the low gigahertz range. The application of this frequency band to security screening appears to be a relatively new field. The business case for implementing the UWB system has been made financially viable by the recent availability of low-cost integrated circuits operating at these frequencies. Although designed for the communication sector, these devices can perform the required UWB radar measurements as well. This paper reports the implementation of a 2 to 5 GHz bandwidth linear array scanner. The paper describes the design and fabrication of transmitter and receiver antenna arrays whose individual elements are a type of antipodal Vivaldi antenna. The antenna's frequency and angular response were simulated in CST Microwave Studio and compared with laboratory measurements. The data pre-processing methods of background subtraction and deconvolution are implemented to improve the image quality. The background subtraction method uses a reference dataset to remove antenna crosstalk and room reflections from the dataset. The deconvolution method uses a Wiener filter to "sharpen" the returned echoes which improves the resolution of the reconstructed image. The filter uses an impulse response reference dataset and a signal

  5. Robust identification of concealed dangerous substances using THz imaging spectroscopy

    NASA Astrophysics Data System (ADS)

    Nystad, Helle E.; Haakestad, Magnus W.; van Rheenen, Arthur D.

    2015-05-01

    False alarm rates must be kept sufficiently low if a method to detect and identify objects or substances is to be implemented in real life applications. This is also true when trying to detect and identify dangerous substances such as explosives and drugs that are concealed in packaging materials. THz technology may be suited to detect these substances, especially when imaging and spectroscopy are combined. To achieve reasonable throughput, the detection and identification process must be automated and this implies reliance on algorithms to perform this task, rather than human beings. The identification part of the algorithm must compare spectral features of the unknown substance with those in a library of features and determining the distance, in some sense, between these features. If the distance is less than some defined threshold a match is declared. In this paper we consider two types of spectral characteristic that are derived from measured time-domain signals measured in the THz regime: the absorbance and its derivative. Also, we consider two schemes to measure the distance between the unknown and library characteristics: Spectral Angle Mapping (SAM) and Principal Component Analysis (PCA). Finally, the effect of windowing of the measured time-domain signal on the performance of the algorithms is studied, by varying the Blackman-Harris (B-H) window width. Algorithm performance is quantified by studying the receiver-operating characteristics (ROC). For the data considered in this study we conclude that the best performance is obtained when the derivative of the absorbance is used in combination with a narrow B-H window and SAM. SAM is a more straight-forward method and requires no large training data sets and tweaking.

  6. Auto-concealment of supersymmetry in extra dimensions

    SciTech Connect

    Dimopoulos, Savas; Howe, Kiel; March-Russell, John; Scoville, James

    2015-06-05

    In supersymmetric (SUSY) theories with extra dimensions the visible energy in sparticle decays can be significantly reduced and its energy distribution broadened, thus significantly weakening the present collider limits on SUSY. The mechanism applies when the lightest supersymmetric particle (LSP) is a bulk state — e.g. a bulk modulino, axino, or gravitino — the size of the extra dimensions ≳ 10–14 cm, and for a broad variety of visible sparticle spectra. In such cases the lightest ordinary supersymmetric particle (LOSP), necessarily a brane-localised state, decays to the Kaluza-Klein (KK) discretuum of the LSP. This dynamically realises the compression mechanism for hiding SUSY as decays into the more numerous heavier KK LSP states are favored. We find LHC limits on right-handed slepton LOSPs evaporate, while LHC limits on stop LOSPs weaken to ~350 ÷ 410 GeV compared to ~700 GeV for a stop decaying to a massless LSP. Similarly, for the searches we consider, present limits on direct production of degenerate first and second generation squarks drop to ~450 GeV compared to ~800 GeV for a squark decaying to a massless LSP. Auto-concealment typically works for a fundamental gravitational scale of M* ~10 ÷ 100 TeV, a scale sufficiently high that traditional searches for signatures of extra dimensions are mostly avoided. If superpartners are discovered, their prompt, displaced, or stopped decays can also provide new search opportunities for extra dimensions with the potential to reach M* ~109 GeV. As a result, this mechanism applies more generally than just SUSY theories, pertaining to any theory where there is a discrete quantum number shared by both brane and bulk sectors.

  7. Auto-concealment of supersymmetry in extra dimensions

    DOE PAGES

    Dimopoulos, Savas; Howe, Kiel; March-Russell, John; ...

    2015-06-05

    In supersymmetric (SUSY) theories with extra dimensions the visible energy in sparticle decays can be significantly reduced and its energy distribution broadened, thus significantly weakening the present collider limits on SUSY. The mechanism applies when the lightest supersymmetric particle (LSP) is a bulk state — e.g. a bulk modulino, axino, or gravitino — the size of the extra dimensions ≳ 10–14 cm, and for a broad variety of visible sparticle spectra. In such cases the lightest ordinary supersymmetric particle (LOSP), necessarily a brane-localised state, decays to the Kaluza-Klein (KK) discretuum of the LSP. This dynamically realises the compression mechanism formore » hiding SUSY as decays into the more numerous heavier KK LSP states are favored. We find LHC limits on right-handed slepton LOSPs evaporate, while LHC limits on stop LOSPs weaken to ~350 ÷ 410 GeV compared to ~700 GeV for a stop decaying to a massless LSP. Similarly, for the searches we consider, present limits on direct production of degenerate first and second generation squarks drop to ~450 GeV compared to ~800 GeV for a squark decaying to a massless LSP. Auto-concealment typically works for a fundamental gravitational scale of M* ~10 ÷ 100 TeV, a scale sufficiently high that traditional searches for signatures of extra dimensions are mostly avoided. If superpartners are discovered, their prompt, displaced, or stopped decays can also provide new search opportunities for extra dimensions with the potential to reach M* ~109 GeV. As a result, this mechanism applies more generally than just SUSY theories, pertaining to any theory where there is a discrete quantum number shared by both brane and bulk sectors.« less

  8. [Abortion in unsafe conditions. Concealment, illegality, corruption and negligence].

    PubMed

    Ortiz Ortega, A

    1993-01-01

    "Abortion practiced under conditions of risk" is a phrase used to refer to illegal abortion. The phrase does not highlight the disappearance of risk when legislation changes. Rather, it calls attention to the fact that legal restrictions significantly increase dangers while failing to discourage women determined to terminate pregnancies. The International Planned Parenthood Federation defines abortion under conditions of risk as the use of nonoptimal technology, lack of counseling and services to orient the woman's decision and provide postabortion counseling, and the limitation of freedom to make the decision. The phrase encompasses concealment, illegality, corruption, and negligence. It is designed to impose a reproductive health perspective in response to an unresolved social conflict. Steps have been developed to improve the situation of women undergoing abortion even without a change in its legal status. Such steps include training and purchase of equipment for treatment of incomplete abortions and development of counseling and family planning services. The central difficulty of abortion induced in conditions of risk derives from the laws imposing the need for secrecy. In Mexico, the abortion decision belongs to the government and the society, while individual absorb the consequences of the practice of abortion. Public decision making about abortion is dominated by the concept that the female has an obligation to carry any pregnancy to term. Women who interfere with male descendency and practice a sexuality distinct from reproduction are made to pay a price in health and emotional balance. Resolution of the problem of abortion will require new concepts in terms of legal status, public health issues, and the rights of women. The problem becomes more pressing as abortion becomes more common in a country anxious to advance in the demographic transition. Only a commitment to the reproductive health of women and the full development of their rights as citizens will

  9. Geometry, structure, and concealed lithology of the San Rafael Basin, southeastern Arizona

    USGS Publications Warehouse

    Bultman, Mark W.

    1999-01-01

    The contiguous United States has been well explored for exposed conventional mineral deposits. Therefore, it is likely that many economically viable and strategically significant conventional undiscovered mineral deposits will be found in bedrock concealed beneath basin sediments. Mineral resource assessments must incorporate an understanding of the geometry, structure, and concealed lithology of basins in order to be accurate. This report presents an analysis of the basin geometry and structure of the San Rafael basin in southeastern Arizona. In addition, a new methodology for inferring concealed lithology is presented and applied in the San Rafael basin. Gravity data is used to model the geometry of the basin using recent models of sediment density vs. depth developed in the region. This modeling indicates that the basin has a maximum depth of approximately 1.05 km plus or minus 0.10 km. In the southern portion, the basin can be modeled as an asymmetric graben faulted on the western margin. The northern portion of the basin is structurally more complex and may have high angle faults on the western, northern, and eastern margin. Near-ground closely spaced Earth’s total intensity magnetic field data is used to locate concealed faults within the basin. This data is also used to infer lithology concealed by shallow basin sediments. Airborne Earth’s total intensity magnetic field data is used to help infer concealed lithology in deep portions of the basin. The product of integrating all data and interpretations is a map which presents the geometry of the basin, faults and contacts concealed by basin sediments, and an estimate of the bedrock lithology concealed by basin sediment. Based on basin geometry and concealed lithology, the San Rafael basin has a high potential for concealed mineral deposits on its western and northern margin. In particular, a newly discovered magnetic anomaly in the northern portion of the basin can be modeled as a granitic intrusion with

  10. Adequate mathematical modelling of environmental processes

    NASA Astrophysics Data System (ADS)

    Chashechkin, Yu. D.

    2012-04-01

    In environmental observations and laboratory visualization both large scale flow components like currents, jets, vortices, waves and a fine structure are registered (different examples are given). The conventional mathematical modeling both analytical and numerical is directed mostly on description of energetically important flow components. The role of a fine structures is still remains obscured. A variety of existing models makes it difficult to choose the most adequate and to estimate mutual assessment of their degree of correspondence. The goal of the talk is to give scrutiny analysis of kinematics and dynamics of flows. A difference between the concept of "motion" as transformation of vector space into itself with a distance conservation and the concept of "flow" as displacement and rotation of deformable "fluid particles" is underlined. Basic physical quantities of the flow that are density, momentum, energy (entropy) and admixture concentration are selected as physical parameters defined by the fundamental set which includes differential D'Alembert, Navier-Stokes, Fourier's and/or Fick's equations and closing equation of state. All of them are observable and independent. Calculations of continuous Lie groups shown that only the fundamental set is characterized by the ten-parametric Galilelian groups reflecting based principles of mechanics. Presented analysis demonstrates that conventionally used approximations dramatically change the symmetries of the governing equations sets which leads to their incompatibility or even degeneration. The fundamental set is analyzed taking into account condition of compatibility. A high order of the set indicated on complex structure of complete solutions corresponding to physical structure of real flows. Analytical solutions of a number problems including flows induced by diffusion on topography, generation of the periodic internal waves a compact sources in week-dissipative media as well as numerical solutions of the same

  11. 7 CFR 1780.18 - Allocation of program funds.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... adequately met with a formula allocation. (7) Reserve.An amount retained under the National Office control... percentage of national rural population will be 50 percent. (B) State's percentage of national rural population with incomes below the poverty level will be 25 percent. (C) State's percentage of...

  12. Exploring the characteristics of the attentional blink paradigm when used to discover concealed knowledge.

    PubMed

    Niziurski, Julie; Andre, Jeffrey

    2015-12-01

    Ganis and Patnaik (Appl Psychophysiol Biofeedback 34:189-196, 2009) reported that the attentional blink paradigm using faces could be used to detect the presence of concealed knowledge. The attentional blink is defined as the inability to successfully detect the second of two target items presented within a short inter-stimulus interval. The present study tested the use of the attentional blink paradigm in a concealed knowledge test by investigating the effect that familiar faces may have on the attentional blink. Participants completed 200 trials where they were told to look for the same familiar target (Target 2; actor Brad Pitt) that was intermixed with neutral face stimuli and one other familiar face (Target 1; actor George Clooney). Target 1 was to act as the concealed knowledge as participants familiar with Target 1 would be distracted by his unannounced presence and report not seeing Target 2 thereby showing an attentional blink. Despite all participants being familiar with Target 2, an attentional blink still occurred, but with higher than normal Target 2 accuracy rates. Overall, we found support for using the AB paradigm with the concealed knowledge test; however, a possible countermeasure to the attentional blink is familiarity with Target 2 as eight of 21 participants who recognized Target 1 (the concealed knowledge) were also able to detect Target 2 on 100 % of the trials where Target 1's presence should have created an attentional blink.

  13. How many more guns?: Estimating the effect of allowing licensed concealed handguns on a college campus.

    PubMed

    Bouffard, Jeffrey A; Nobles, Matt R; Wells, William; Cavanaugh, Michael R

    2012-01-01

    Among other arguments, advocates for lifting bans on carrying concealed handguns on campus propose that this would increase the prevalence of legitimately carried handguns, which might then deter crimes or be used to intervene in campus shooting incidents like the one that took place at Virginia Tech in 2007. Opponents suggest that increased prevalence of concealed handguns would lead to increases in other negative consequences, such as accidental shootings. Little empirical research has examined the potential outcomes of such a policy change, nor has existing research examined the prerequisite issue of whether lifting these bans would result in substantial increases in the prevalence of concealed handguns among students. Using a sample of undergraduate classrooms selected from five academic buildings at a public university in Texas, this study examines the potential impact of lifting the concealed handgun ban on the likelihood that a given classroom would contain at least one legally carried handgun. Results reveal that the impact of potential policy changes in this area vary based on the building under consideration and the measure of potential handgun prevalence. Limitations of the study and implications for future research on the issue of concealed handgun carrying on college campuses are discussed.

  14. Real-time concealed-object detection and recognition with passive millimeter wave imaging.

    PubMed

    Yeom, Seokwon; Lee, Dong-Su; Jang, Yushin; Lee, Mun-Kyo; Jung, Sang-Won

    2012-04-23

    Millimeter wave (MMW) imaging is finding rapid adoption in security applications such as concealed object detection under clothing. A passive MMW imaging system can operate as a stand-off type sensor that scans people in both indoors and outdoors. However, the imaging system often suffers from the diffraction limit and the low signal level. Therefore, suitable intelligent image processing algorithms would be required for automatic detection and recognition of the concealed objects. This paper proposes real-time outdoor concealed-object detection and recognition with a radiometric imaging system. The concealed object region is extracted by the multi-level segmentation. A novel approach is proposed to measure similarity between two binary images. Principal component analysis (PCA) regularizes the shape in terms of translation and rotation. A geometric-based feature vector is composed of shape descriptors, which can achieve scale and orientation-invariant and distortion-tolerant property. Class is decided by minimum Euclidean distance between normalized feature vectors. Experiments confirm that the proposed methods provide fast and reliable recognition of the concealed object carried by a moving human subject.

  15. Segmentation of Concealed Objects in Passive Millimeter-Wave Images Based on the Gaussian Mixture Model

    NASA Astrophysics Data System (ADS)

    Yu, Wangyang; Chen, Xiangguang; Wu, Lei

    2015-04-01

    Passive millimeter wave (PMMW) imaging has become one of the most effective means to detect the objects concealed under clothing. Due to the limitations of the available hardware and the inherent physical properties of PMMW imaging systems, images often exhibit poor contrast and low signal-to-noise ratios. Thus, it is difficult to achieve ideal results by using a general segmentation algorithm. In this paper, an advanced Gaussian Mixture Model (GMM) algorithm for the segmentation of concealed objects in PMMW images is presented. Our work is concerned with the fact that the GMM is a parametric statistical model, which is often used to characterize the statistical behavior of images. Our approach is three-fold: First, we remove the noise from the image using both a notch reject filter and a total variation filter. Next, we use an adaptive parameter initialization GMM algorithm (APIGMM) for simulating the histogram of images. The APIGMM provides an initial number of Gaussian components and start with more appropriate parameter. Bayesian decision is employed to separate the pixels of concealed objects from other areas. At last, the confidence interval (CI) method, alongside local gradient information, is used to extract the concealed objects. The proposed hybrid segmentation approach detects the concealed objects more accurately, even compared to two other state-of-the-art segmentation methods.

  16. Drug Use and Spatial Dynamics of Household Allocation

    PubMed Central

    Dunlap, Eloise; Brown, Emma J

    2016-01-01

    Household space allocation by women who consume drugs in New York and North Florida is depicted to demonstrate the complex character of household space and social relations. Some parents attempt to hide their drug consumption through the allocation space in the household for drug use. Women allocation of space for drug use within their households and the impact of this on the household are relevant issues with implications for therapy and prevention. Objective The use of household space has not been a focus of social scientists. Middle class households have been used by decoration literature to specify space utilization. Modest literature pay attention to the utilization of household space among drug focused households. Analysis herein looks at the lived social relations of drug users to their children through controlling household space. Methods Data presented comes from two studies, New York and Florida. The studies involved a total of 158 participants in 72 families from New York and 26 participants in 23 families in North Florida. Both researches used an ethnographic methodology focusing on a variety of behavior patterns and conduct norms occurring within drug abusing households. Repeated interviews and observations took place in households which were visited at different times and days of the week. Florida study was conducted over a 2-year period; New York study took place over a 5-year period. Results Data suggest parents attempted to conceal their drug use from their offspring by using various strategies. Mental, social, and physical were tied together in space allocation. Household space acquired a different meaning and arose from use practice. Conclusion In urban and rural settings a pattern of household allocation space and drug consumption is emerging. Although drug consumption is still prominent, it is not all consuming or the primary focus in the lives of women who use drugs. These women may have learned to integrate their consumption into their daily

  17. Real-time detection of concealed chemical hazards under ambient light conditions using Raman spectroscopy.

    PubMed

    Cletus, Biju; Olds, William; Fredericks, Peter M; Jaatinen, Esa; Izake, Emad L

    2013-07-01

    Current concerns regarding terrorism and international crime highlight the need for new techniques for detecting unknown and hazardous substances. A novel Raman spectroscopy-based technique, spatially offset Raman spectroscopy (SORS), was recently devised for noninvasively probing the contents of diffusely scattering and opaque containers. Here, we demonstrate a modified portable SORS sensor for detecting concealed substances in-field under different background lighting conditions. Samples including explosive precursors, drugs, and an organophosphate insecticide (chemical warfare agent surrogate) were concealed inside diffusely scattering packaging including plastic, paper, and cloth. Measurements were carried out under incandescent and fluorescent light as well as under daylight to assess the suitability of the probe for different real-life conditions. In each case, it was possible to identify the substances against their reference Raman spectra in less than 1 min. The developed sensor has potential for rapid detection of concealed hazardous substances in airports, mail distribution centers, and customs checkpoints.

  18. Approaches to Resource Allocation

    ERIC Educational Resources Information Center

    Dressel, Paul; Simon, Lou Anna Kimsey

    1976-01-01

    Various budgeting patterns and strategies are currently in use, each with its own particular strengths and weaknesses. Neither cost-benefit analysis nor cost-effectiveness analysis offers any better solution to the allocation problem than do the unsupported contentions of departments or the historical unit costs. An operable model that performs…

  19. Time delay signature concealment of optical feedback induced chaos in an external cavity semiconductor laser.

    PubMed

    Wu, Jia-Gui; Xia, Guang-Qiong; Tang, Xi; Lin, Xiao-Dong; Deng, Tao; Fan, Li; Wu, Zheng-Mao

    2010-03-29

    The time delay (TD) signature concealment of optical feedback induced chaos in an external cavity semiconductor laser is experimentally demonstrated. Both the evolution curve and the distribution map of TD signature are obtained in the parameter space of external feedback strength and injection current. The optimum parameter scope of the TD signature concealment is also specified. Furthermore, the approximately periodic evolution relation between TD signature and external cavity length is observed and indicates that the intrinsic relaxation oscillation of semiconductor laser may play an important role during the process of TD signature suppression.

  20. The association between concealing emotions at work and medical utilization in Korea

    PubMed Central

    2014-01-01

    Objectives We aimed to investigate the association between concealing emotions at work and medical utilization. Methods Data from the 2007–2009 4th Korea National Health and Nutrition Examination Survey (KNHANES IV) was used, 7,094 participants (3,837 males, 3,257 females) aged between 20 and 54 who were economically active and completed all necessary questionnaire items were included. Odds ratios (ORs) and 95% confidence intervals (95% CI) for differences in hospitalization, outpatient visits, and pharmaceutical drug use between those who concealed their emotions and those who did not were investigated using logistic regression models with and without gender stratification. Results Among those who concealed their emotions (n = 2,763), 47.4% were females, and 50.1% had chronic disease. In addition, 9.7% of the concealing emotions group had been hospitalized within the last year, 24.8% had been outpatients in the last two weeks, and 28.3% had used pharmaceutical drugs in the last two weeks. All ORs represent the odds of belonging to the concealing emotions group over the non-concealing emotions group. After adjustment for individual, occupational, socioeconomic and disease factors, the adjusted ORs (95% CI) in hospitalization are 1.29 (1.08 ~ 1.53) in the total population, 1.25 (0.98 ~ 1.60) in males and 1.30 (1.02 ~ 1.66) in females, in outpatient visits are 1.15 (1.02 ~ 1.29) in the total population, 1.05 (0.88 ~ 1.24) in males and 1.25 (1.06 ~ 1.47) in females and in pharmaceutical drug use are 1.12 (1.01 ~ 1.25) in the total population, 1.08 (0.92 ~ 1.27) in males and 1.14 (0.98 ~ 1.33) in females. Conclusions Those who concealed their emotions at work were more likely to use medical services. Moreover, the health effects of concealing emotions at work might be more detrimental in women than in men. PMID:25852941

  1. Identifying the location of a concealed object through unintentional eye movements.

    PubMed

    Neuman, Yair; Assaf, Dan; Israeli, Navot

    2015-01-01

    In some investigative and interrogative contexts, the investigator is seeking to identify the location of an object (e.g., implanted bomb) which is known to a given subject (e.g., a terrorist). In this paper, we present a non-intrusive methodology for uncovering the loci of a concealed object by analyzing the subject's eye movements. Using a combination of eye tracking, psychological manipulation and a search algorithm, we have performed two experiments. In the first experiment, we have gained 58% hit rate in identifying the location of the concealed object and in the second experiment 56% hit rate. The pros and cons of the methodology for forensic investigation are discussed.

  2. Constrained control allocation

    NASA Technical Reports Server (NTRS)

    Durham, Wayne C.

    1992-01-01

    This paper addresses the problem of the allocation of several flight controls to the generation of specified body-axis moments. The number of controls is greater than the number of moments being controlled, and the ranges of the controls are constrained to certain limits. The controls are assumed to be individually linear in their effect throughout their ranges of motion, and independent of one another in their effects. The geometries of the subset of the constrained controls and of its image in moment space are examined. A direct method of allocating these several controls is presented, that guarantees the maximum possible moment is generated within the constraints of the controls. The results are illustrated by an example problem involving three controls and two moments.

  3. Myrmics Memory Allocator

    SciTech Connect

    Lymperis, S.

    2011-09-23

    MMA is a stand-alone memory management system for MPI clusters. It implements a shared Partitioned Global Address Space, where multiple MPI processes request objects from the allocator and the latter provides them with system-wide unique memory addresses for each object. It provides applications with an intuitive way of managing the memory system in a unified way, thus enabling easier writing of irregular application code.

  4. A time period study on the efficiency of luminol in the detection of bloodstains concealed by paint on different surfaces.

    PubMed

    Nagesh, Deepthi; Ghosh, Shayani

    2017-02-11

    Forensic Science is the application of science to the criminal and civil laws that are enforced by police agencies in a criminal justice system. It is a science which relies on physical evidence; one of the important physical evidences being blood. The purpose of this research was to determine the efficacy of luminol reagent in detecting bloodstains on different surfaces, concealed by multiple layers of paint, over a period of time and also to compare the intensities of chemiluminescence exhibited by them. In this study, dry wall, wooden planks and metal surfaces were identified as commonly encountered surfaces at crime scenes and hence 25 of each surface were simulated and blood was spattered, which were then concealed by progressive layers of paint specific to each surface. Thereafter, each surface was critically observed for the intensity of chemiluminescence, following the application of luminol and the results were documented as photographs. The research was conducted for duration of 50 days, in order to study the effect of ageing of concealment upon detection of bloodstains using luminol. Varying intensities of chemiluminescence were displayed by all the three simulated surfaces deposited with paint over bloodstains up to three layers of concealment, depending on the nature of the surface which were captured using photography. The highest intensity of chemiluminescence was shown by concealed bloodstains on dry wall and metal surfaces, despite the number of layers of concealment. However, an increase in the number of layers of concealment produced a significant decrease in the intensity of chemiluminescenece displayed by the bloodstains concealed by paint upon reacting with luminol on metal sheets, which was not found to be uniform and consistent on the other surfaces. These findings highlight the fact that bloodstains concealed by paint could be effectively detected by luminol reagent, despite the nature and ageing of concealment and thereby provide a lead to

  5. Novel, ERP-based, concealed information detection: Combining recognition-based and feedback-evoked ERPs.

    PubMed

    Sai, Liyang; Lin, Xiaohong; Rosenfeld, J Peter; Sang, Biao; Hu, Xiaoqing; Fu, Genyue

    2016-02-01

    The present study introduced a novel variant of the concealed information test (CIT), called the feedback-CIT. By providing participants with feedbacks regarding their memory concealment performance during the CIT, we investigated the feedback-related neural activity underlying memory concealment. Participants acquired crime-relevant memories via enacting a lab crime, and were tested with the feedback-CIT while EEGs were recorded. We found that probes (e.g., crime-relevant memories) elicited larger recognition-P300s than irrelevants among guilty participants. Moreover, feedback-related negativity (FRN) and feedback-P300 could also discriminate probes from irrelevants among guilty participants. Both recognition- and feedback-ERPs were highly effective in distinguishing between guilty and innocent participants (recognition-P300: AUC=.73; FRN: AUC=.95; feedback-P300: AUC=.97). This study sheds new light on brain-based memory detection, such that feedback-related neural signals can be employed to detect concealed memories.

  6. The Cost of Question Concealment: Eye-Tracking and MEG Evidence

    ERIC Educational Resources Information Center

    Harris, Jesse; Pylkkanen, Liina; McElree, Brian; Frisson, Steven

    2008-01-01

    Although natural language appears to be largely compositional, the meanings of certain expressions cannot be straightforwardly recovered from the meanings of their parts. This study examined the online processing of one such class of expressions: "concealed questions", in which the meaning of a complex noun phrase ("the proof of the theorem")…

  7. Ego Identity, Social Anxiety, Social Support, and Self-Concealment in Lesbian, Gay, and Bisexual Individuals

    ERIC Educational Resources Information Center

    Potoczniak, Daniel J.; Aldea, Mirela A.; DeBlaere, Cirleen

    2007-01-01

    This study examined a model in which the relationship between social anxiety and two dimensions of ego identity (commitment and exploration) was expected to be mediated by social support and self-concealment for a sample of lesbian, gay, and bisexual individuals (N=347). Statistically significant paths were found from social anxiety to social…

  8. A neighbourhood analysis based technique for real-time error concealment in H.264 intra pictures

    NASA Astrophysics Data System (ADS)

    Beesley, Steven T. C.; Grecos, Christos; Edirisinghe, Eran

    2007-02-01

    H.264s extensive use of context-based adaptive binary arithmetic or variable length coding makes streams highly susceptible to channel errors, a common occurrence over networks such as those used by mobile devices. Even a single bit error will cause a decoder to discard all stream data up to the next fixed length resynchronisation point, the worst scenario is that an entire slice is lost. In cases where retransmission and forward error concealment are not possible, a decoder should conceal any erroneous data in order to minimise the impact on the viewer. Stream errors can often be spotted early in the decode cycle of a macroblock which if aborted can provide unused processor cycles, these can instead be used to conceal errors at minimal cost, even as part of a real time system. This paper demonstrates a technique that utilises Sobel convolution kernels to quickly analyse the neighbourhood surrounding erroneous macroblocks before performing a weighted multi-directional interpolation. This generates significantly improved statistical (PSNR) and visual (IEEE structural similarity) results when compared to the commonly used weighted pixel value averaging. Furthermore it is also computationally scalable, both during analysis and concealment, achieving maximum performance from the spare processing power available.

  9. 36-Month-Olds Conceal Visual and Auditory Information from Others

    ERIC Educational Resources Information Center

    Melis, Alicia P.; Call, Josep; Tomasello, Michael

    2010-01-01

    By three years of age, children are skilled at assessing under which circumstances others can see things. However, nothing is known about whether they can use this knowledge to guide their own deceptive behaviour. Here we investigated 3-year-olds' ability to strategically inhibit or conceal forbidden actions that a nearby adult experimenter could…

  10. Fear Perceptions in Public Parks: Interactions of Environmental Concealment, the Presence of People Recreating, and Gender

    ERIC Educational Resources Information Center

    Jorgensen, Lisa J.; Ellis, Gary D.; Ruddell, Edward

    2013-01-01

    This research examined the effect of concealment (environmental cues), presence or absence of people recreating (social cues), and gender on individuals' fear of crime in a community park setting. Using a 7-point single-item indicator, 732 participants from two samples (540 park visitors and 192 college students) rated their estimates of fear of…

  11. The Effects of Concealing Academic Achievement Information on Adolescents' Self-Concept

    ERIC Educational Resources Information Center

    Zhang, Baoshan; Wang, Mo; Li, Juan; Yu, Guoliang; Bi, Yan-Ling

    2011-01-01

    Using an experimental design, the effect of concealing academic achievement information on adolescents' self-concept was examined in the current study. Specifically, adolescents with low academic achievement and adolescents with average to high academic achievement (N = 129) were randomly assigned to different interview contexts wherein…

  12. Digital image processing in the SECURE concealed-object detection system

    NASA Astrophysics Data System (ADS)

    Smith, Steven W.

    1993-04-01

    A new technology has been developed for detecting explosives and other dangerous objects concealed under persons' clothing. The 'Subambient Exposure, Computer Utilized Reflected Energy' (SECURE) method uses a very low level of back-scattered x-rays in conjunction with digital image processing to produce an image of the person and any concealed objects. Image processing algorithms, used in the system are directed at presenting information to a human operator in the best possible manner for foreign object detection. These algorithms are viewed as being near optimum, and additional development is probably not justified. Algorithm development is needed in the area of automatic threat detection. This has the potential of reducing the invasion of privacy associated with having a security operator view each image. It also has the potential of reducing the serious problem of operator complacency. In one approach, the new algorithm must (1) recognize and isolate objects in the image, (2) discriminate between concealed objects and human anatomy, and (3) discriminate between dangerous and benign concealed objects. The images produced with the SECURE technology are extremely noisy due to the low levels of radiation used. Any algorithm developed must perform well in this noisy environment. Execution of the algorithm must be accomplished in less than a few seconds. Hardware to implement the algorithm must be of a complexity and cost compatible with the commercial SECURE system.

  13. Productive and Inclusive? How Documentation Concealed Racialising Practices in a Diversity Project

    ERIC Educational Resources Information Center

    Miller, Melinda G.

    2014-01-01

    This article examines how documentation concealed racialising practices in a diversity project that was seen to be productive and inclusive. Documentation examples are taken from a doctoral study about embedding Indigenous perspectives in early childhood education curricula in two Australian urban childcare centres. In place of reporting examples…

  14. University Presidents' Perceptions and Practice Regarding the Carrying of Concealed Handguns on College Campuses

    ERIC Educational Resources Information Center

    Price, James H.; Thompson, Amy; Khubchandani, Jagdish; Dake, Joseph; Payton, Erica; Teeple, Karen

    2014-01-01

    Objective: To assess the perceptions and practices of a national sample of college and university presidents regarding their support for concealed handguns being carried on college campuses. Participants: The sample for this study consisted of a national random sample of 900 college or university presidents. Methods: In the spring of 2013, a…

  15. How Many More Guns?: Estimating the Effect of Allowing Licensed Concealed Handguns on a College Campus

    ERIC Educational Resources Information Center

    Bouffard, Jeffrey A.; Nobles, Matt R.; Wells, William; Cavanaugh, Michael R.

    2012-01-01

    Among other arguments, advocates for lifting bans on carrying concealed handguns on campus propose that this would increase the prevalence of legitimately carried handguns, which might then deter crimes or be used to intervene in campus shooting incidents like the one that took place at Virginia Tech in 2007. Opponents suggest that increased…

  16. 40 CFR 716.25 - Adequate file search.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 31 2011-07-01 2011-07-01 false Adequate file search. 716.25 Section 716.25 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT HEALTH AND SAFETY DATA REPORTING General Provisions § 716.25 Adequate file search. The scope of...

  17. 40 CFR 716.25 - Adequate file search.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 31 2014-07-01 2014-07-01 false Adequate file search. 716.25 Section 716.25 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT HEALTH AND SAFETY DATA REPORTING General Provisions § 716.25 Adequate file search. The scope of...

  18. "Something Adequate"? In Memoriam Seamus Heaney, Sister Quinlan, Nirbhaya

    ERIC Educational Resources Information Center

    Parker, Jan

    2014-01-01

    Seamus Heaney talked of poetry's responsibility to represent the "bloody miracle", the "terrible beauty" of atrocity; to create "something adequate". This article asks, what is adequate to the burning and eating of a nun and the murderous gang rape and evisceration of a medical student? It considers Njabulo Ndebele's…

  19. 40 CFR 716.25 - Adequate file search.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Adequate file search. 716.25 Section... ACT HEALTH AND SAFETY DATA REPORTING General Provisions § 716.25 Adequate file search. The scope of a person's responsibility to search records is limited to records in the location(s) where the...

  20. 40 CFR 51.354 - Adequate tools and resources.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 2 2013-07-01 2013-07-01 false Adequate tools and resources. 51.354... Requirements § 51.354 Adequate tools and resources. (a) Administrative resources. The program shall maintain the administrative resources necessary to perform all of the program functions including...

  1. 40 CFR 51.354 - Adequate tools and resources.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 2 2014-07-01 2014-07-01 false Adequate tools and resources. 51.354... Requirements § 51.354 Adequate tools and resources. (a) Administrative resources. The program shall maintain the administrative resources necessary to perform all of the program functions including...

  2. 40 CFR 51.354 - Adequate tools and resources.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 2 2010-07-01 2010-07-01 false Adequate tools and resources. 51.354... Requirements § 51.354 Adequate tools and resources. (a) Administrative resources. The program shall maintain the administrative resources necessary to perform all of the program functions including...

  3. 40 CFR 51.354 - Adequate tools and resources.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 2 2011-07-01 2011-07-01 false Adequate tools and resources. 51.354... Requirements § 51.354 Adequate tools and resources. (a) Administrative resources. The program shall maintain the administrative resources necessary to perform all of the program functions including...

  4. 40 CFR 51.354 - Adequate tools and resources.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 2 2012-07-01 2012-07-01 false Adequate tools and resources. 51.354... Requirements § 51.354 Adequate tools and resources. (a) Administrative resources. The program shall maintain the administrative resources necessary to perform all of the program functions including...

  5. 9 CFR 305.3 - Sanitation and adequate facilities.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 9 Animals and Animal Products 2 2012-01-01 2012-01-01 false Sanitation and adequate facilities. 305.3 Section 305.3 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF... OF VIOLATION § 305.3 Sanitation and adequate facilities. Inspection shall not be inaugurated if...

  6. 9 CFR 305.3 - Sanitation and adequate facilities.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 9 Animals and Animal Products 2 2011-01-01 2011-01-01 false Sanitation and adequate facilities. 305.3 Section 305.3 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF... OF VIOLATION § 305.3 Sanitation and adequate facilities. Inspection shall not be inaugurated if...

  7. 9 CFR 305.3 - Sanitation and adequate facilities.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 9 Animals and Animal Products 2 2014-01-01 2014-01-01 false Sanitation and adequate facilities. 305.3 Section 305.3 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF... OF VIOLATION § 305.3 Sanitation and adequate facilities. Inspection shall not be inaugurated if...

  8. 9 CFR 305.3 - Sanitation and adequate facilities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Sanitation and adequate facilities. 305.3 Section 305.3 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF... OF VIOLATION § 305.3 Sanitation and adequate facilities. Inspection shall not be inaugurated if...

  9. 9 CFR 305.3 - Sanitation and adequate facilities.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 9 Animals and Animal Products 2 2013-01-01 2013-01-01 false Sanitation and adequate facilities. 305.3 Section 305.3 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF... OF VIOLATION § 305.3 Sanitation and adequate facilities. Inspection shall not be inaugurated if...

  10. 21 CFR 201.5 - Drugs; adequate directions for use.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 4 2011-04-01 2011-04-01 false Drugs; adequate directions for use. 201.5 Section 201.5 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) DRUGS: GENERAL LABELING General Labeling Provisions § 201.5 Drugs; adequate directions for use....

  11. Computationally efficient control allocation

    NASA Technical Reports Server (NTRS)

    Durham, Wayne (Inventor)

    2001-01-01

    A computationally efficient method for calculating near-optimal solutions to the three-objective, linear control allocation problem is disclosed. The control allocation problem is that of distributing the effort of redundant control effectors to achieve some desired set of objectives. The problem is deemed linear if control effectiveness is affine with respect to the individual control effectors. The optimal solution is that which exploits the collective maximum capability of the effectors within their individual physical limits. Computational efficiency is measured by the number of floating-point operations required for solution. The method presented returned optimal solutions in more than 90% of the cases examined; non-optimal solutions returned by the method were typically much less than 1% different from optimal and the errors tended to become smaller than 0.01% as the number of controls was increased. The magnitude of the errors returned by the present method was much smaller than those that resulted from either pseudo inverse or cascaded generalized inverse solutions. The computational complexity of the method presented varied linearly with increasing numbers of controls; the number of required floating point operations increased from 5.5 i, to seven times faster than did the minimum-norm solution (the pseudoinverse), and at about the same rate as did the cascaded generalized inverse solution. The computational requirements of the method presented were much better than that of previously described facet-searching methods which increase in proportion to the square of the number of controls.

  12. Out and healthy: Being more "out" about a concealable stigmatized identity may boost the health benefits of social support.

    PubMed

    Weisz, Bradley M; Quinn, Diane M; Williams, Michelle K

    2016-12-01

    This research examined whether the relationship between perceived social support and health would be moderated by level of outness for people living with different concealable stigmatized identities (mental illness, substance abuse, domestic violence, rape, or childhood abuse). A total of 394 people living with a concealable stigmatized identity completed a survey. Consistent with hypotheses, at high levels of outness, social support predicted better health; at low levels of outness, social support was less predictive of health. People concealing a stigmatized identity may only be able to reap the health benefits of social support if they are "out" about the stigmatized identity.

  13. Standard Deviation and Intra Prediction Mode Based Adaptive Spatial Error Concealment (SEC) in H.264/AVC

    NASA Astrophysics Data System (ADS)

    Wang, Jun; Wang, Lei; Ikenaga, Takeshi; Goto, Satoshi

    Transmission of compressed video over error prone channels may result in packet losses or errors, which can significantly degrade the image quality. Therefore an error concealment scheme is applied at the video receiver side to mask the damaged video. Considering there are 3 types of MBs (Macro Blocks) in natural video frame, i. e., Textural MB, Edged MB, and Smooth MB, this paper proposes an adaptive spatial error concealment which can choose 3 different methods for these 3 different MBs. For criteria of choosing appropriate method, 2 factors are taken into consideration. Firstly, standard deviation of our proposed edge statistical model is exploited. Secondly, some new features of latest video compression standard H.264/AVC, i. e., intra prediction mode is also considered for criterion formulation. Compared with previous works, which are only based on deterministic measurement, proposed method achieves the best image recovery. Subjective and objective image quality evaluations in experiments confirmed this.

  14. Identifying the location of a concealed object through unintentional eye movements

    PubMed Central

    Neuman, Yair; Assaf, Dan; Israeli, Navot

    2015-01-01

    In some investigative and interrogative contexts, the investigator is seeking to identify the location of an object (e.g., implanted bomb) which is known to a given subject (e.g., a terrorist). In this paper, we present a non-intrusive methodology for uncovering the loci of a concealed object by analyzing the subject's eye movements. Using a combination of eye tracking, psychological manipulation and a search algorithm, we have performed two experiments. In the first experiment, we have gained 58% hit rate in identifying the location of the concealed object and in the second experiment 56% hit rate. The pros and cons of the methodology for forensic investigation are discussed. PMID:25904879

  15. A mock terrorism application of the P300-based concealed information test.

    PubMed

    Meixner, John B; Rosenfeld, J Peter

    2011-02-01

    Previous studies examining the P300-based concealed information test typically tested for mock crime or autobiographical details, but no studies have used this test in a counterterrorism scenario. Subjects in the present study covertly planned a mock terrorist attack on a major city. They were then given three separate blocks of concealed information testing, examining for knowledge of the location, method, and date of the planned terrorist attack, using the Complex Trial Protocol (Rosenfeld et al., 2008). With prior knowledge of the probe items, we detected 12/12 guilty subjects as having knowledge of the planned terrorist attack with no false positives among 12 innocent subjects. Additionally, we were able to identify 10/12 subjects and among them 20/30 crime-related details with no false positives using restricted a priori knowledge of the crime details, suggesting that the protocol could potentially identify future terrorist activity.

  16. Research on allocation efficiency of the daisy chain allocation algorithm

    NASA Astrophysics Data System (ADS)

    Shi, Jingping; Zhang, Weiguo

    2013-03-01

    With the improvement of the aircraft performance in reliability, maneuverability and survivability, the number of the control effectors increases a lot. How to distribute the three-axis moments into the control surfaces reasonably becomes an important problem. Daisy chain method is simple and easy to be carried out in the design of the allocation system. But it can not solve the allocation problem for entire attainable moment subset. For the lateral-directional allocation problem, the allocation efficiency of the daisy chain can be directly measured by the area of its subset of attainable moments. Because of the non-linear allocation characteristic, the subset of attainable moments of daisy-chain method is a complex non-convex polygon, and it is difficult to solve directly. By analyzing the two-dimensional allocation problems with a "micro-element" idea, a numerical calculation algorithm is proposed to compute the area of the non-convex polygon. In order to improve the allocation efficiency of the algorithm, a genetic algorithm with the allocation efficiency chosen as the fitness function is proposed to find the best pseudo-inverse matrix.

  17. Unraveling the roles of orienting and inhibition in the Concealed Information Test.

    PubMed

    Klein Selle, Nathalie; Verschuere, Bruno; Kindt, Merel; Meijer, Ewout; Ben-Shakhar, Gershon

    2017-04-01

    The Concealed Information Test (CIT) is a well-validated tool for physiological and behavioral detection of concealed knowledge. Two distinct theoretical frameworks have been proposed to explain the differential responses to the concealed critical items: orienting response theory versus arousal inhibition theory. klein Selle, Verschuere, Kindt, Meijer, and Ben-Shakhar (2016), however, argued for a response fractionation model and showed that, while the skin conductance reflects pure orienting, both the respiratory and heart rate measures reflect arousal inhibition. The present study intends to (1) provide a constructive replication of klein Selle et al. (2016) using the autobiographical CIT, and (2) extend their work by testing an additional prediction derived from orienting theory, using an item-salience manipulation. One hundred and nine participants were tested on four high salient and four low salient identity items. Half of the participants were motivated to hide their identity (orienting + arousal inhibition), while the other half were motivated to reveal their identity (orienting only). Confirming earlier findings, the results revealed a fractionation between the different measures: while the skin conductance response (SCR) increased to a similar extent in the two motivational conditions, the respiration line length (RLL) shortened and the heart rate (HR) decelerated solely in the conceal condition. Moreover, while the SCR was larger for high than for low salient critical items, the RLL and HR responses were similar for these two item types. These data led us to conclude that, in the CIT, the skin conductance measure reflects orienting and the respiratory and heart rate measures reflect arousal inhibition.

  18. ARPA/NIJ/Rome Laboratory concealed weapon detection program: an overview

    NASA Astrophysics Data System (ADS)

    Currie, Nicholas C.; Demma, Fred J.; Ferris, David D., Jr.; McMillan, Robert W.; Wicks, Michael C.

    1996-06-01

    Recent advances in passive and active imaging and non- imaging sensor technology offer the potential to detect weapons that are concealed beneath a person's clothing. Sensors that are discussed in this paper are characterized as either non-imaging or imaging. Non-imaging sensors include wide band radar and portal devices such as metal detectors. In general the strength of non-imaging sensors rest with the fact that they are generally inexpensive and can rapidly perform bulk separation between regions where persons are likely to be carrying concealed weapons and those regions that are likely to contain persons who are unarmed. The bulk process is typically accomplished at the expense of false alarm rate. Millimeter-wave (MMW), microwave, x-ray, acoustic, magnetic, and infrared (IR) imaging sensor technologies provide with greater certainty the means to isolate persons within a crowd that are carrying concealed weapons and to identify the weapon type. The increased certainty associated with imaging sensors is accomplished at the expense of cost and bulk surveillance of the crowd. CWD technologies have a variety of military and civilian applications. This technology focus area addresses specific military needs under the Defense Advanced Research Projects Agency's (DARPA) operations other than war/law enforcement (OOTW/LE). Additionally, this technology has numerous civilian law enforcement applications that are being investigated under the National Institute of Justice's (NIJ) Concealed Weapons Detection program. This paper discusses the wide variety of sensors that might be employed in support of a typical scenario, the strengths and weaknesses of each of the sensors relative to the given scenario, and how CWD breadboards will be tested to determine the optimal CWD application. It rapidly becomes apparent that no single sensor will completely satisfy the CWD mission necessitating the fusion of two or more of these sensors.

  19. Fiber Optic Coupled Raman Based Detection of Hazardous Liquids Concealed in Commercial Products

    DTIC Science & Technology

    2012-01-01

    Detecting explosives by portable Raman ana- lyzers: a comparison of 785, 976, 1064 ,and 1550 nm (Retina- Safe) laser excitation,” Spectroscopy, pp...agent (CWA) simulant triethyl phosphate (TEP), hydrogen peroxide, and acetone as representative of toxic industrial compounds (TICs). Fiber optic...distribution is unlimited. Fiber Optic Coupled Raman Based Detection of Hazardous Liquids Concealed in Commercial Products The views, opinions and/or

  20. Detection of concealed information by P3 and frontal EEG asymmetry.

    PubMed

    Matsuda, Izumi; Nittono, Hiroshi; Allen, John J B

    2013-03-14

    Psychophysiological detection of deception has seen increased attention in both research and applied settings. In this field, the most scientifically validated paradigm is the Concealed Information Test (CIT). The CIT does not directly deal with whether a participant is lying, but examines whether a participant recognizes a critical relevant detail, inferred by differences in physiological responses between critical and non-critical items. Although event-related potential (ERP) approaches to the CIT have shown high accuracy, a combination of measures might improve the test's performance. We thus assessed whether a new CIT index, frontal EEG asymmetry that is supposed to reflect differences in approach/withdrawal motivation, would prove useful. Nineteen participants were asked to steal one item in a mock crime, and were then administered two CITs while concealing the stolen item. One CIT included the stolen item (i.e., guilty condition), whereas the other CIT did not (i.e., innocent condition). In the guilty condition, the concealed stolen item elicited greater relative left frontal alpha activity (indicative of relative right frontal cortical activity) as compared to the other items, suggesting that the recognition of the concealed item might have induced withdrawal motivation. Although the discrimination between guilty and innocent conditions by the asymmetry score alone was not as good as that by the ERP P3 index, combining the asymmetry score and P3 improved the detection performance significantly. The results suggest that the frontal EEG asymmetry can be used as a new measure in the CIT that provides additional information beyond that captured by the traditional ERP index.

  1. [Analysis of forensic-medical expert conclusions on rap and concealed rape (data from anonymous questionnaires)].

    PubMed

    Pigolkin, Iu I; Dmitrieva, O A

    2001-01-01

    Specific features of modern cases of raping are analyzed on the basis of the data of forensic medical obstetrical and gynecological expert evaluations carried out in the Primorye territory. Age and risk groups are defined, health status of victims is characterized, and specific injuries of the body and genitals are described. Specific features of concealed sexual violations in Vladivostok are defined and the need in creation of rehabilitation centers for victims of raping is discussed.

  2. Antidromic Atrioventricular Reciprocating Tachycardia Using a Concealed Retrograde Conducting Left Lateral Accessory Pathway.

    PubMed

    Gonzalez, Jaime E; Zipse, Matthew M; Nguyen, Duy T; Sauer, William H

    2016-03-01

    Atrioventricular reciprocating tachycardia is a common cause of undifferentiated supraventricular tachycardia. In patients with manifest or concealed accessory pathways, it is imperative to assess for the presence of other accessory pathways. Multiple accessory pathways are present in 4% to 10% of patients and are more common in patients with structural heart disease. In rare cases, multiple accessory pathways can act as the anterograde and retrograde limbs of the tachycardia.

  3. Region 9: Arizona Adequate Letter (10/14/2003)

    EPA Pesticide Factsheets

    This is a letter from Jack P. Broadben,. Director, to Nancy Wrona and Dennis Smith informing them that Maricopa County's motor vehicle emissions budgets in the 2003 MAGCO Maintenance Plan are adequate for transportation conformity purposes.

  4. Region 6: Texas Adequate Letter (4/16/2010)

    EPA Pesticide Factsheets

    This letter from EPA to Texas Commission on Environmental Quality determined 2021 motor vehicle emission budgets for nitrogen oxides (NOx) and volatile organic compounds (VOCs) for Beaumont/Port Arthur area adequate for transportation conformity purposes

  5. Region 2: New Jersey Adequate Letter (5/23/2002)

    EPA Pesticide Factsheets

    This April 22, 2002 letter from EPA to the New Jersey Department of Environmental Protection determined 2007 and 2014 Carbon Monoxide (CO) Mobile Source Emissions Budgets adequate for transportation conformity purposes and will be announced in the Federal

  6. Region 8: Colorado Adequate Letter (10/29/2001)

    EPA Pesticide Factsheets

    This letter from EPA to Colorado Department of Public Health and Environment determined Denvers' particulate matter (PM10) maintenance plan for Motor Vehicle Emissions Budgets adequate for transportation conformity purposes.

  7. Region 1: New Hampshire Adequate Letter (8/12/2008)

    EPA Pesticide Factsheets

    This July 9, 2008 letter from EPA to the New Hampshire Department of Environmental Services, determined the 2009 Motor Vehicle Emissions Budgets (MVEBs) are adequate for transportation conformity purposes and will be announced in the Federal Register (FR).

  8. Region 8: Colorado Adequate Letter (1/20/2004)

    EPA Pesticide Factsheets

    This letter from EPA to Colorado Department of Public Health and Environment determined Greeleys' Carbon Monoxide (CO) maintenance plan for Motor Vehicle Emissions Budgets adequate for transportation conformity purposes and will be announced in the FR.

  9. Region 8: Utah Adequate Letter (6/10/2005)

    EPA Pesticide Factsheets

    This letter from EPA to Utah Department of Environmental Quality determined Salt Lake Citys' and Ogdens' Carbon Monoxide (CO) maintenance plan for Motor Vehicle Emissions Budgets adequate for transportation conformity purposes.

  10. 15 CFR 970.404 - Adequate exploration plan.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... ENVIRONMENTAL DATA SERVICE DEEP SEABED MINING REGULATIONS FOR EXPLORATION LICENSES Certification of Applications § 970.404 Adequate exploration plan. Before he may certify an application, the Administrator must...

  11. 15 CFR 970.404 - Adequate exploration plan.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... ENVIRONMENTAL DATA SERVICE DEEP SEABED MINING REGULATIONS FOR EXPLORATION LICENSES Certification of Applications § 970.404 Adequate exploration plan. Before he may certify an application, the Administrator must...

  12. 15 CFR 970.404 - Adequate exploration plan.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... ENVIRONMENTAL DATA SERVICE DEEP SEABED MINING REGULATIONS FOR EXPLORATION LICENSES Certification of Applications § 970.404 Adequate exploration plan. Before he may certify an application, the Administrator must...

  13. 15 CFR 970.404 - Adequate exploration plan.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... ENVIRONMENTAL DATA SERVICE DEEP SEABED MINING REGULATIONS FOR EXPLORATION LICENSES Certification of Applications § 970.404 Adequate exploration plan. Before he may certify an application, the Administrator must...

  14. 15 CFR 970.404 - Adequate exploration plan.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... ENVIRONMENTAL DATA SERVICE DEEP SEABED MINING REGULATIONS FOR EXPLORATION LICENSES Certification of Applications § 970.404 Adequate exploration plan. Before he may certify an application, the Administrator must...

  15. Region 6: New Mexico Adequate Letter (8/21/2003)

    EPA Pesticide Factsheets

    This is a letter from Carl Edlund, Director, to Alfredo Santistevan regarding MVEB's contained in the latest revision to the Albuquerque Carbon Monoxide State Implementation Plan (SIP) are adequate for transportation conformity purposes.

  16. 10 CFR 1304.114 - Responsibility for maintaining adequate safeguards.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... contained in a system of records are adequately trained to protect the security and privacy of such records..., by degaussing or by overwriting with the appropriate security software, in accordance...

  17. 4 CFR 200.14 - Responsibility for maintaining adequate safeguards.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... require access to and use of records contained in a system of records are adequately trained to protect... with the appropriate security software, in accordance with regulations of the Archivist of the...

  18. 10 CFR 1304.114 - Responsibility for maintaining adequate safeguards.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... contained in a system of records are adequately trained to protect the security and privacy of such records..., by degaussing or by overwriting with the appropriate security software, in accordance...

  19. 4 CFR 200.14 - Responsibility for maintaining adequate safeguards.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... require access to and use of records contained in a system of records are adequately trained to protect... with the appropriate security software, in accordance with regulations of the Archivist of the...

  20. 10 CFR 1304.114 - Responsibility for maintaining adequate safeguards.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... contained in a system of records are adequately trained to protect the security and privacy of such records..., by degaussing or by overwriting with the appropriate security software, in accordance...

  1. 10 CFR 1304.114 - Responsibility for maintaining adequate safeguards.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... contained in a system of records are adequately trained to protect the security and privacy of such records..., by degaussing or by overwriting with the appropriate security software, in accordance...

  2. 4 CFR 200.14 - Responsibility for maintaining adequate safeguards.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... require access to and use of records contained in a system of records are adequately trained to protect... with the appropriate security software, in accordance with regulations of the Archivist of the...

  3. Region 9: Nevada Adequate Letter (3/30/2006)

    EPA Pesticide Factsheets

    This is a letter from Deborah Jordan, Director, to Leo M. Drozdoff regarding Nevada's motor vehicle emissions budgets in the 2005 Truckee Meadows CO Redesignation Request and Maintenance Plan are adequate for transportation conformity decisions.

  4. Hydrogeological Studies to Identify the Trend of Concealed Section of the North Tabriz Fault (Iran).

    PubMed

    Rajabpour, Hossein; Vaezihir, Abdorreza

    2016-10-17

    The North Tabriz Fault (NTF) is the predominant regional-scale tectonic structure in the northwest of Iran. In the east side of the city of Tabriz, a portion of the fault trend has been completely concealed by recent sediments and urbanization. In this paper, some hydrogeological methods are used to locate the concealed sector. As is clear from the pumping tests results, despite the fact that the northern observation wells were closer to the pumping wells than the southern ones, they have not been affected by pumping. Conversely, all southern wells were affected by pumping and displayed decline of the water table. In addition, obvious differences in groundwater levels combined with clear differences in groundwater quality within a short distance across the probable fault trend are sufficient reasons for the presence of the fault that behaves as a barrier to groundwater lateral flows. Significant change in the elevation of the bedrock base of the aquifer over less than 200 m suggests that the fault has near vertical dip. These results indicate that the inferred trend of the NTF closely conforms to its actual trend. Therefore, the hydrogeological studies can be complementary tools to determine the position and trend of concealed faults.

  5. Active wideband 350GHz imaging system for concealed-weapon detection

    NASA Astrophysics Data System (ADS)

    Sheen, David M.; Hall, Thomas E.; Severtsen, Ronald H.; McMakin, Douglas L.; Hatchell, Brian K.; Valdez, Patrick L. J.

    2009-05-01

    A prototype active wideband 350 GHz imaging system has been developed to address the urgent need for standoff concealed-weapon detection. This system is based on a wideband, heterodyne, frequency-multiplier-based transceiver system coupled to a quasi-optical focusing system and high-speed conical scanner. This system is able to quickly scan personnel for concealed weapons. Additionally, due to the wideband operation, this system provides accurate ranging information, and the images obtained are fully three-dimensional. Waves in the microwave, millimeter-wave, and terahertz (3 GHz to 1 THz) frequency bands are able to penetrate many optical obscurants, and can be used to form the basis of high-resolution imaging systems. Waves in the sub-millimeter-wave band (300 GHz to 1 THz) are particularly interesting for standoff concealed-weapon detection at ranges of 5 - 20+ meters, due to their unique combination of high resolution and clothing penetration. The Pacific Northwest National Laboratory (PNNL) has previously developed portal screening systems that operate at the lower end of the millimeter-wave frequency range around 30 GHz. These systems are well suited for screening within portals; however, increasing the range of these systems would dramatically reduce the resolution due to diffraction at their relatively long wavelength. In this paper, the standoff 350 GHz imaging system is described in detail and numerous imaging results are presented.

  6. Three-Dimensional Millimeter-wave Imaging for Concealed Weapon Detection

    SciTech Connect

    Sheen, David M. ); McMakin, Douglas L. ); Hall, Thomas E. )

    2000-12-01

    Millimeter-wave imaging techniques and systems have been developed at the Pacific Northwest National Laboratory (PNNL) for the detection of concealed weapons and contraband at airports and other secure locations. These techniques were derived from microwave holography techniques which utilize phase and amplitude information recorded over a two-dimensional aperture to reconstruct a focused image of the target. Millimeter-wave imaging is well suited to the detection of concealed weapons or other contraband carried on personnel since millimeter-waves are non-ionizing, readily penetrate common clothing material, and are reflected from the human body and any concealed items. In this paper, a wide-bandwidth, three-dimensional, holographic microwave imaging technique is described. Practical weapon detection systems for airport, or other high-throughput applications, require high-speed scanning on the order of 3 to 10 seconds. To achieve this goal, a prototype imaging system utilizing a 2 7-33 GHz linear sequentially switched array and a high-speed linear scanner has been developed and tested. This system is described in detail along with numerous imaging results.

  7. Preventing shoulder-surfing attack with the concept of concealing the password objects' information.

    PubMed

    Ho, Peng Foong; Kam, Yvonne Hwei-Syn; Wee, Mee Chin; Chong, Yu Nam; Por, Lip Yee

    2014-01-01

    Traditionally, picture-based password systems employ password objects (pictures/icons/symbols) as input during an authentication session, thus making them vulnerable to "shoulder-surfing" attack because the visual interface by function is easily observed by others. Recent software-based approaches attempt to minimize this threat by requiring users to enter their passwords indirectly by performing certain mental tasks to derive the indirect password, thus concealing the user's actual password. However, weaknesses in the positioning of distracter and password objects introduce usability and security issues. In this paper, a new method, which conceals information about the password objects as much as possible, is proposed. Besides concealing the password objects and the number of password objects, the proposed method allows both password and distracter objects to be used as the challenge set's input. The correctly entered password appears to be random and can only be derived with the knowledge of the full set of password objects. Therefore, it would be difficult for a shoulder-surfing adversary to identify the user's actual password. Simulation results indicate that the correct input object and its location are random for each challenge set, thus preventing frequency of occurrence analysis attack. User study results show that the proposed method is able to prevent shoulder-surfing attack.

  8. Concealed neuroanatomy in Michelangelo's Separation of Light From Darkness in the Sistine Chapel.

    PubMed

    Suk, Ian; Tamargo, Rafael J

    2010-05-01

    Michelangelo Buonarroti (1475-1564) was a master anatomist as well as an artistic genius. He dissected cadavers numerous times and developed a profound understanding of human anatomy. From 1508 to 1512, Michelangelo painted the ceiling of the Sistine Chapel in Rome. His Sistine Chapel frescoes are considered one of the monumental achievements of Renaissance art. In the winter of 1511, Michelangelo entered the final stages of the Sistine Chapel project and painted 4 frescoes along the longitudinal apex of the vault, which completed a series of 9 central panels depicting scenes from the Book of Genesis. It is reported that Michelangelo concealed an image of the brain in the first of these last 4 panels, namely, the Creation of Adam. Here we present evidence that he concealed another neuronanatomic structure in the final panel of this series, the Separation of Light From Darkness, specifically a ventral view of the brainstem. The Separation of Light From Darkness is an important panel in the Sistine Chapel iconography because it depicts the beginning of Creation and is located directly above the altar. We propose that Michelangelo, a deeply religious man and an accomplished anatomist, intended to enhance the meaning of this iconographically critical panel and possibly document his anatomic accomplishments by concealing this sophisticated neuroanatomic rendering within the image of God.

  9. Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects' Information

    PubMed Central

    Ho, Peng Foong; Kam, Yvonne Hwei-Syn; Wee, Mee Chin

    2014-01-01

    Traditionally, picture-based password systems employ password objects (pictures/icons/symbols) as input during an authentication session, thus making them vulnerable to “shoulder-surfing” attack because the visual interface by function is easily observed by others. Recent software-based approaches attempt to minimize this threat by requiring users to enter their passwords indirectly by performing certain mental tasks to derive the indirect password, thus concealing the user's actual password. However, weaknesses in the positioning of distracter and password objects introduce usability and security issues. In this paper, a new method, which conceals information about the password objects as much as possible, is proposed. Besides concealing the password objects and the number of password objects, the proposed method allows both password and distracter objects to be used as the challenge set's input. The correctly entered password appears to be random and can only be derived with the knowledge of the full set of password objects. Therefore, it would be difficult for a shoulder-surfing adversary to identify the user's actual password. Simulation results indicate that the correct input object and its location are random for each challenge set, thus preventing frequency of occurrence analysis attack. User study results show that the proposed method is able to prevent shoulder-surfing attack. PMID:24991649

  10. Video inpainting with short-term windows: application to object removal and error concealment.

    PubMed

    Ebdelli, Mounira; Le Meur, Olivier; Guillemot, Christine

    2015-10-01

    In this paper, we propose a new video inpainting method which applies to both static or free-moving camera videos. The method can be used for object removal, error concealment, and background reconstruction applications. To limit the computational time, a frame is inpainted by considering a small number of neighboring pictures which are grouped into a group of pictures (GoP). More specifically, to inpaint a frame, the method starts by aligning all the frames of the GoP. This is achieved by a region-based homography computation method which allows us to strengthen the spatial consistency of aligned frames. Then, from the stack of aligned frames, an energy function based on both spatial and temporal coherency terms is globally minimized. This energy function is efficient enough to provide high quality results even when the number of pictures in the GoP is rather small, e.g. 20 neighboring frames. This drastically reduces the algorithm complexity and makes the approach well suited for near real-time video editing applications as well as for loss concealment applications. Experiments with several challenging video sequences show that the proposed method provides visually pleasing results for object removal, error concealment, and background reconstruction context.

  11. Fixations and eye-blinks allow for detecting concealed crime related memories.

    PubMed

    Peth, Judith; Kim, Johann S C; Gamer, Matthias

    2013-04-01

    The Concealed Information Test (CIT) is a method of forensic psychophysiology that allows for revealing concealed crime related knowledge. Such detection is usually based on autonomic responses but there is a huge interest in other measures that can be acquired unobtrusively. Eye movements and blinks might be such measures but their validity is unclear. Using a mock crime procedure with a manipulation of the arousal during the crime as well as the delay between crime and CIT, we tested whether eye tracking measures allow for detecting concealed knowledge. Guilty participants showed fewer but longer fixations on central crime details and this effect was even present after stimulus offset and accompanied by a reduced blink rate. These ocular measures were partly sensitive for induction of emotional arousal and time of testing. Validity estimates were moderate but indicate that a significant differentiation between guilty and innocent subjects is possible. Future research should further investigate validity differences between gaze measures during a CIT and explore the underlying mechanisms.

  12. Disclosure and Concealment of Sexual Orientation and the Mental Health of Non-Gay-Identified, Behaviorally-Bisexual Men

    PubMed Central

    Schrimshaw, Eric W.; Siegel, Karolynn; Downing, Martin J.; Parsons, Jeffrey T.

    2013-01-01

    Objective Although bisexual men report lower levels of mental health relative to gay men, few studies have examined the factors that contribute to bisexual men’s mental health. Bisexual men are less likely to disclose, and more likely to conceal (i.e., a desire to hide), their sexual orientation than gay men. Theory suggests that this may adversely impact their mental health. This report examined the factors associated with disclosure and with concealment of sexual orientation, the association of disclosure and concealment with mental health, and the potential mediators (i.e., internalized homophobia, social support) of this association with mental health. Method An ethnically-diverse sample of 203 non-gay-identified, behaviorally-bisexual men who do not disclose their same-sex behavior to their female partners were recruited in New York City to complete a single set of self-report measures. Results Concealment was associated with higher income, a heterosexual identification, living with a wife or girlfriend, more frequent sex with women, and less frequent sex with men. Greater concealment, but not disclosure to friends and family, was significantly associated with lower levels of mental health. Multiple mediation analyses revealed that both internalized homophobia and general emotional support significantly mediated the association between concealment and mental health. Conclusions The findings demonstrate that concealment and disclosure are independent constructs among bisexual men. Further, they suggest that interventions addressing concerns about concealment, emotional support, and internalized homophobia may be more beneficial for increasing the mental health of bisexual men than those focused on promoting disclosure. PMID:23276123

  13. The allocation of aquifer resources in Scotland

    NASA Astrophysics Data System (ADS)

    Robins, N. S.

    1987-02-01

    The traditional role of aquifers for groundwater supply may not be appropriate in some areas of Scotland where high rainfall, low evapotranspiration, and abundant upland catchments and storage areas yield more than adequate surface water supplies. Some groundwater will always be required to satisfy specific needs but much aquifer potential will remain untapped. It is suggested that some of this potential could usefully be allocated to the disposal of wastes including oiled beach material, or the storage of heat or fluids, any of which could contaminate the aquifer. Care will be required to ensure that surface waters and other amenities are not put at risk. Resolution of conflicts between water supply and waste disposal usage of an aquifer requires guidelines; suggestions are made for their formulation and the need for legislative and planning controls is outlined.

  14. Clothing adjustments for concealed soft body armor during moderate physical exertion.

    PubMed

    Ryan, Greg A; Bishop, Stacy H; Herron, Robert L; Katica, Charles P; Elbon, Bre'anna L; Bosak, Andrew M; Bishop, Phillip

    2015-01-01

    Previous research has studied the impact of Level II concealed soft body armor (SBA) on the augmentation of heat storage in a hot environment simulating a typical summer day in the southeastern United States (wet bulb globe temperature [WBGT] = 30°C) and noted a significant difference between macro- and micro-WBGTs. The purpose of this study was to characterize the microclimate (micro-WBGT) under a concealed Level II SBA during 60 min of moderately intense work at two separate macro-WBGTs (26°C and 30°C), and to establish WBGT corrections to allow prediction of heat strain in an individual wearing a concealed Level II SBA. A single trial was performed with nine volunteers (27 ± 4 years) outfitted with a simulated standard law enforcement uniform and a traditional concealed Level II SBA, in a moderately warm environment (WBGT = 26°C). Each participant performed cycles of 12 min of walking (1.25 L · min(-1)) and 3 min of arm curls (14.3 kg, 0.6 L · min(-1)) with a 5 min rest after every other cycle, for a total of 60 minutes. This trial was compared to an identical previously completed 60-min work bout at 30°C. A two-way repeated measures ANOVA with Post hoc Bonferroni and paired samples t-test analysis was conducted. A greater difference between macro- micro-WBGTs existed at 26°C compared to the 30°C macro-WBGT. Under these conditions, a moderate work in Level II SBA requires a WBGT correction of 8.9°C and 6.2°C at macro-WBGTs of 26°C and 30°C, respectively. A modified simple linear regression prediction model was established for mean Micro-WBGT for each macro-WBGTs after the plateau point at the 30 min mark. The derivation regressions at 26°C (R(2) = 0.99), and 30°C (R(2) = 0.99) indicate that micro-WBGT could be predicted for each 15 minutes time at both macro-WBGTs tested for individuals doing moderate intensity (300 Kcals · hr(-1)) work wearing concealed Level II SBA.

  15. Resource Balancing Control Allocation

    NASA Technical Reports Server (NTRS)

    Frost, Susan A.; Bodson, Marc

    2010-01-01

    Next generation aircraft with a large number of actuators will require advanced control allocation methods to compute the actuator commands needed to follow desired trajectories while respecting system constraints. Previously, algorithms were proposed to minimize the l1 or l2 norms of the tracking error and of the control effort. The paper discusses the alternative choice of using the l1 norm for minimization of the tracking error and a normalized l(infinity) norm, or sup norm, for minimization of the control effort. The algorithm computes the norm of the actuator deflections scaled by the actuator limits. Minimization of the control effort then translates into the minimization of the maximum actuator deflection as a percentage of its range of motion. The paper shows how the problem can be solved effectively by converting it into a linear program and solving it using a simplex algorithm. Properties of the algorithm are investigated through examples. In particular, the min-max criterion results in a type of resource balancing, where the resources are the control surfaces and the algorithm balances these resources to achieve the desired command. A study of the sensitivity of the algorithms to the data is presented, which shows that the normalized l(infinity) algorithm has the lowest sensitivity, although high sensitivities are observed whenever the limits of performance are reached.

  16. Regulatory requirements for providing adequate veterinary care to research animals.

    PubMed

    Pinson, David M

    2013-09-01

    Provision of adequate veterinary care is a required component of animal care and use programs in the United States. Program participants other than veterinarians, including non-medically trained research personnel and technicians, also provide veterinary care to animals, and administrators are responsible for assuring compliance with federal mandates regarding adequate veterinary care. All program participants therefore should understand the regulatory requirements for providing such care. The author provides a training primer on the US regulatory requirements for the provision of veterinary care to research animals. Understanding the legal basis and conditions of a program of veterinary care will help program participants to meet the requirements advanced in the laws and policies.

  17. Resource allocation using risk analysis

    SciTech Connect

    Bott, T. F.; Eisenhawer, S. W.

    2003-01-01

    Allocating limited resources among competing priorities is an important problem in management. In this paper we describe an approach to resource allocation using risk as a metric. We call this approach the Logic-Evolved Decision (LED) approach because we use logic-models to generate an exhaustive set of competing options and to describe the often highly complex model used for evaluating the risk reduction achieved by different resource allocations among these options. The risk evaluation then proceeds using probabilistic or linguistic input data.

  18. Zinc allocation and re-allocation in rice

    PubMed Central

    Stomph, Tjeerd Jan; Jiang, Wen; Van Der Putten, Peter E. L.; Struik, Paul C.

    2014-01-01

    Aims: Agronomy and breeding actively search for options to enhance cereal grain Zn density. Quantifying internal (re-)allocation of Zn as affected by soil and crop management or genotype is crucial. We present experiments supporting the development of a conceptual model of whole plant Zn allocation and re-allocation in rice. Methods: Two solution culture experiments using 70Zn applications at different times during crop development and an experiment on within-grain distribution of Zn are reported. In addition, results from two earlier published experiments are re-analyzed and re-interpreted. Results: A budget analysis showed that plant zinc accumulation during grain filling was larger than zinc allocation to the grains. Isotope data showed that zinc taken up during grain filling was only partly transported directly to the grains and partly allocated to the leaves. Zinc taken up during grain filling and allocated to the leaves replaced zinc re-allocated from leaves to grains. Within the grains, no major transport barrier was observed between vascular tissue and endosperm. At low tissue Zn concentrations, rice plants maintained concentrations of about 20 mg Zn kg−1 dry matter in leaf blades and reproductive tissues, but let Zn concentrations in stems, sheath, and roots drop below this level. When plant zinc concentrations increased, Zn levels in leaf blades and reproductive tissues only showed a moderate increase while Zn levels in stems, roots, and sheaths increased much more and in that order. Conclusions: In rice, the major barrier to enhanced zinc allocation towards grains is between stem and reproductive tissues. Enhancing root to shoot transfer will not contribute proportionally to grain zinc enhancement. PMID:24478788

  19. Collaborative Resource Allocation

    NASA Technical Reports Server (NTRS)

    Wang, Yeou-Fang; Wax, Allan; Lam, Raymond; Baldwin, John; Borden, Chester

    2007-01-01

    Collaborative Resource Allocation Networking Environment (CRANE) Version 0.5 is a prototype created to prove the newest concept of using a distributed environment to schedule Deep Space Network (DSN) antenna times in a collaborative fashion. This program is for all space-flight and terrestrial science project users and DSN schedulers to perform scheduling activities and conflict resolution, both synchronously and asynchronously. Project schedulers can, for the first time, participate directly in scheduling their tracking times into the official DSN schedule, and negotiate directly with other projects in an integrated scheduling system. A master schedule covers long-range, mid-range, near-real-time, and real-time scheduling time frames all in one, rather than the current method of separate functions that are supported by different processes and tools. CRANE also provides private workspaces (both dynamic and static), data sharing, scenario management, user control, rapid messaging (based on Java Message Service), data/time synchronization, workflow management, notification (including emails), conflict checking, and a linkage to a schedule generation engine. The data structure with corresponding database design combines object trees with multiple associated mortal instances and relational database to provide unprecedented traceability and simplify the existing DSN XML schedule representation. These technologies are used to provide traceability, schedule negotiation, conflict resolution, and load forecasting from real-time operations to long-range loading analysis up to 20 years in the future. CRANE includes a database, a stored procedure layer, an agent-based middle tier, a Web service wrapper, a Windows Integrated Analysis Environment (IAE), a Java application, and a Web page interface.

  20. Comparability and Reliability Considerations of Adequate Yearly Progress

    ERIC Educational Resources Information Center

    Maier, Kimberly S.; Maiti, Tapabrata; Dass, Sarat C.; Lim, Chae Young

    2012-01-01

    The purpose of this study is to develop an estimate of Adequate Yearly Progress (AYP) that will allow for reliable and valid comparisons among student subgroups, schools, and districts. A shrinkage-type estimator of AYP using the Bayesian framework is described. Using simulated data, the performance of the Bayes estimator will be compared to…

  1. 13 CFR 107.200 - Adequate capital for Licensees.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... operate actively in accordance with your Articles and within the context of your business plan, as... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Adequate capital for Licensees. 107.200 Section 107.200 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SMALL...

  2. 13 CFR 107.200 - Adequate capital for Licensees.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... operate actively in accordance with your Articles and within the context of your business plan, as... 13 Business Credit and Assistance 1 2011-01-01 2011-01-01 false Adequate capital for Licensees. 107.200 Section 107.200 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SMALL...

  3. Is the Stock of VET Skills Adequate? Assessment Methodologies.

    ERIC Educational Resources Information Center

    Blandy, Richard; Freeland, Brett

    In Australia and elsewhere, four approaches have been used to determine whether stocks of vocational education and training (VET) skills are adequate to meet industry needs. The four methods are as follows: (1) the manpower requirements approach; (2) the international, national, and industry comparisons approach; (3) the labor market analysis…

  4. Do Beginning Teachers Receive Adequate Support from Their Headteachers?

    ERIC Educational Resources Information Center

    Menon, Maria Eliophotou

    2012-01-01

    The article examines the problems faced by beginning teachers in Cyprus and the extent to which headteachers are considered to provide adequate guidance and support to them. Data were collected through interviews with 25 school teachers in Cyprus, who had recently entered teaching (within 1-5 years) in public primary schools. According to the…

  5. 13 CFR 108.200 - Adequate capital for NMVC Companies.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Companies. 108.200 Section 108.200 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION NEW MARKETS VENTURE CAPITAL (âNMVCâ) PROGRAM Qualifications for the NMVC Program Capitalizing A Nmvc Company § 108.200 Adequate capital for NMVC Companies. You must meet the requirements of §§ 108.200-108.230 in order...

  6. 13 CFR 108.200 - Adequate capital for NMVC Companies.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Companies. 108.200 Section 108.200 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION NEW MARKETS VENTURE CAPITAL (âNMVCâ) PROGRAM Qualifications for the NMVC Program Capitalizing A Nmvc Company § 108.200 Adequate capital for NMVC Companies. You must meet the requirements of §§ 108.200-108.230 in order...

  7. 13 CFR 108.200 - Adequate capital for NMVC Companies.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Companies. 108.200 Section 108.200 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION NEW MARKETS VENTURE CAPITAL (âNMVCâ) PROGRAM Qualifications for the NMVC Program Capitalizing A Nmvc Company § 108.200 Adequate capital for NMVC Companies. You must meet the requirements of §§ 108.200-108.230 in order...

  8. 13 CFR 108.200 - Adequate capital for NMVC Companies.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Companies. 108.200 Section 108.200 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION NEW MARKETS VENTURE CAPITAL (âNMVCâ) PROGRAM Qualifications for the NMVC Program Capitalizing A Nmvc Company § 108.200 Adequate capital for NMVC Companies. You must meet the requirements of §§ 108.200-108.230 in order...

  9. 13 CFR 108.200 - Adequate capital for NMVC Companies.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Companies. 108.200 Section 108.200 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION NEW MARKETS VENTURE CAPITAL (âNMVCâ) PROGRAM Qualifications for the NMVC Program Capitalizing A Nmvc Company § 108.200 Adequate capital for NMVC Companies. You must meet the requirements of §§ 108.200-108.230 in order...

  10. Understanding Your Adequate Yearly Progress (AYP), 2011-2012

    ERIC Educational Resources Information Center

    Missouri Department of Elementary and Secondary Education, 2011

    2011-01-01

    The "No Child Left Behind Act (NCLB) of 2001" requires all schools, districts/local education agencies (LEAs) and states to show that students are making Adequate Yearly Progress (AYP). NCLB requires states to establish targets in the following ways: (1) Annual Proficiency Target; (2) Attendance/Graduation Rates; and (3) Participation…

  11. 34 CFR 200.13 - Adequate yearly progress in general.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 34 Education 1 2011-07-01 2011-07-01 false Adequate yearly progress in general. 200.13 Section 200.13 Education Regulations of the Offices of the Department of Education OFFICE OF ELEMENTARY AND SECONDARY EDUCATION, DEPARTMENT OF EDUCATION TITLE I-IMPROVING THE ACADEMIC ACHIEVEMENT OF THE...

  12. 34 CFR 200.13 - Adequate yearly progress in general.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 34 Education 1 2013-07-01 2013-07-01 false Adequate yearly progress in general. 200.13 Section 200.13 Education Regulations of the Offices of the Department of Education OFFICE OF ELEMENTARY AND SECONDARY EDUCATION, DEPARTMENT OF EDUCATION TITLE I-IMPROVING THE ACADEMIC ACHIEVEMENT OF THE...

  13. Region 9: Arizona Adequate Letter (11/1/2001)

    EPA Pesticide Factsheets

    This is a letter from Jack P. Broadbent, Director, Air Division to Nancy Wrona and James Bourney informing them of the adequacy of Revised MAG 1999 Serious Area Carbon Monoxide Plan and that the MAG CO Plan is adequate for Maricopa County.

  14. Face and Voice as Social Stimuli Enhance Differential Physiological Responding in a Concealed Information Test

    PubMed Central

    Ambach, Wolfgang; Assmann, Birthe; Krieg, Bennet; Vaitl, Dieter

    2012-01-01

    Attentional, intentional, and motivational factors are known to influence the physiological responses in a Concealed Information Test (CIT). Although concealing information is essentially a social action closely related to motivation, CIT studies typically rely on testing participants in an environment lacking of social stimuli: subjects interact with a computer while sitting alone in an experimental room. To address this gap, we examined the influence of social stimuli on the physiological responses in a CIT. Seventy-one participants underwent a mock-crime experiment with a modified CIT. In a between-subjects design, subjects were either questioned acoustically by a pre-recorded male voice presented together with a virtual male experimenter’s uniform face or by a text field on the screen, which displayed the question devoid of face and voice. Electrodermal activity (EDA), respiration line length (RLL), phasic heart rate (pHR), and finger pulse waveform length (FPWL) were registered. The Psychopathic Personality Inventory – Revised (PPI-R) was administered in addition. The differential responses of RLL, pHR, and FPWL to probe vs. irrelevant items were greater in the condition with social stimuli than in the text condition; interestingly, the differential responses of EDA did not differ between conditions. No modulatory influence of the PPI-R sum or subscale scores was found. The results emphasize the relevance of social aspects in the process of concealing information and in its detection. Attentional demands as well as the participants’ motivation to avoid detection might be the important links between social stimuli and physiological responses in the CIT. PMID:23293613

  15. Experimental methods of indoor millimeter-wave radiometric imaging for personnel concealed contraband detection

    NASA Astrophysics Data System (ADS)

    Hu, Taiyang; Xiao, Zelong; Li, Hao; Lv, Rongchuan; Lu, Xuan

    2014-11-01

    The increasingly emerging terrorism attacks and violence crimes around the world have posed severe threats to public security, so carrying out relevant research on advanced experimental methods of personnel concealed contraband detection is crucial and meaningful. All of the advantages of imaging covertly, avoidance of interference with other systems, intrinsic property of being safe to persons under screening , and the superior ability of imaging through natural or manmade obscurants, have significantly combined to enable millimeter-wave (MMW) radiometric imaging to offer great potential in personnel concealed contraband detection. Based upon the current research status of MMW radiometric imaging and urgent demands of personnel security screening, this paper mainly focuses on the experimental methods of indoor MMW radiometric imaging. The reverse radiation noise resulting from super-heterodyne receivers seriously affects the image experiments carried out at short range, so both the generation mechanism and reducing methods of this noise are investigated. Then, the benefit of sky illumination no longer exists for the indoor radiometric imaging, and this leads to the decrease in radiometric temperature contrast between target and background. In order to enhance the radiometric temperature contrast for improving indoor imaging performance, the noise illumination technique is adopted in the indoor imaging scenario. In addition, the speed and accuracy of concealed contraband detection from acquired MMW radiometric images are usually restricted to the deficiencies in traditional artificial interpretation by security inspectors, thus an automatic recognition and location algorithm by integrating improved Fuzzy C-means clustering with moment invariants is put forward. A series of original results are also presented to demonstrate the significance and validity of these methods.

  16. Shaeer’s Technique: A Minimally Invasive Procedure for Monsplasty and Revealing the Concealed Penis

    PubMed Central

    2016-01-01

    Background: A concealed penis is a condition where part of the penis is invisible below the surface of the prepubic skin. Dermolipectomy can correct this condition, although it involves a long abdominal crease incision, or infrapubic incision around the base of the penis, and a possibility for genital lymphedema. This study describes Shaeer’s technique, a minimally invasive method for revealing the concealed penis. Methods: A 1- to 2-cm-long incision was cut over the anterior superior iliac spine (ASIS) on either side. A long curved blunt forceps was inserted from one incision, down to the base of the penis and then up to the contralateral ASIS. A 5-mm wide nonabsorbable tape was picked up by the forceps from 1 incision and pulled through to emerge from the other. Pulling on the tape cephalad pulled the mons pubis and revealed the penis. The tape was sutured to the periosteum overlying the ASIS on either side. Patients were followed up for 18 months for penile length, complications, and overall satisfaction. Results: Twenty patients were operated upon. Preoperatively, flaccid visible length was 3 ± 0.9 cm, and erect visible length was 8 ± 4.6 cm. Postoperatively, the flaccid visible length was 7.1 ± 2.1 cm, with a 57.9% improvement in length (P < 0.0001). Erect visible length was 11.8 ± 2.1 cm, with a 32% improvement in length (P < 0.0001). Length gain was maintained for 18 months. Conclusion: Shaeer’s technique is a minimally invasive, short, and simple procedure for monsplasty and revealing the concealed penis. PMID:27622092

  17. Exploiting synthetic aperture radar imagery for retrieving vibration signatures of concealed machinery

    NASA Astrophysics Data System (ADS)

    Pérez, Francisco; Campbell, Justin B.; Jaramillo, Monica; Dunkel, Ralf; Atwood, Thomas; Doerry, Armin; Gerstle, Walter H.; Santhanam, Balu; Hayat, Majeed M.

    2016-05-01

    It has been demonstrated that the instantaneous acceleration associated with vibrating objects that are directly imaged by synthetic aperture radar (SAR) can be estimated through the application of the discrete fractional Fourier transform (DFrFT) using the information contained in the complex SAR image. In general, vibration signatures may include, for example, the number of chirped sinusoids as well as their respective base frequencies and chirp rates. By further processing the DFrFT-processed data for clutter-noise rejection by means of pseudo- subspace methods, has been shown that the SAR-vibrometry method can be reliable as long as the signal-to-noise ratio (SNR) and the signal-to-clutter ratio (SCR) of the slow-time SAR signal at the range-line of interest exceeds 15dB. Meanwhile, the Nyquist theorem dictates that the maximum measurable vibration frequency is limited by half of the pulse-repetition frequency. This paper focuses on the detection and estimation of vibrations generated by machinery concealed within buildings and other structures. This is a challenging task in general because the vibration signatures of the source are typically altered by their housing structure; moreover, the SNR at the surface of the housing structure tends to be reduced. Here, experimental results for three different vibrating targets, including one concealed target, are reported using complex SAR images acquired by the General Atomics Lynx radar at resolutions of 1-ft and 4-in. The concealed vibrating target is actuated by a gear motor with an off-balance weight attached to it, which is enclosed by a wooden housing. The vibrations of the motor are transmitted to a chimney that extends above the housing structure. Using the SAR vibrometry approach, it is shown that it is possible to distinguish among the three vibrating objects based upon their vibration signatures.

  18. TDCS Guided using fMRI Significantly Accelerates Learning to Identify Concealed Objects

    PubMed Central

    Clark, Vincent P.; Coffman, Brian A.; Mayer, Andy R.; Weisend, Michael P.; Lane, Terran D.R.; Calhoun, Vince D.; Raybourn, Elaine M.; Garcia, Christopher M.; Wassermann, Eric M.

    2011-01-01

    The accurate identification of obscured and concealed objects in complex environments was an important skill required for survival during human evolution, and is required today for many forms of expertise. Here we used transcranial direct current stimulation (tDCS) guided using neuroimaging to increase learning rate in a novel, minimally guided discovery-learning paradigm. Ninety-six subjects identified threat-related objects concealed in naturalistic virtual surroundings used in real-world training. A variety of brain networks were found using fMRI data collected at different stages of learning, with two of these networks focused in right inferior frontal and right parietal cortex. Anodal 2.0 mA tDCS performed for 30 minutes over these regions in a series of single-blind, randomized studies resulted in significant improvements in learning and performance compared with 0.1 mA tDCS. This difference in performance increased to a factor of two after a one-hour delay. A dose-response effect of current strength on learning was also found. Taken together, these brain imaging and stimulation studies suggest that right frontal and parietal cortex are involved in learning to identify concealed objects in naturalistic surroundings. Furthermore, they suggest that the application of anodal tDCS over these regions can greatly increase learning, resulting in one of the largest effects on learning yet reported. The methods developed here may be useful to decrease the time required to attain expertise in a variety of settings. PMID:21094258

  19. Ultra-wide-band 3D microwave imaging scanner for the detection of concealed weapons

    NASA Astrophysics Data System (ADS)

    Rezgui, Nacer-Ddine; Andrews, David A.; Bowring, Nicholas J.

    2015-10-01

    The threat of concealed weapons, explosives and contraband in footwear, bags and suitcases has led to the development of new devices, which can be deployed for security screening. To address known deficiencies of metal detectors and x-rays, an UWB 3D microwave imaging scanning apparatus using FMCW stepped frequency working in the K and Q bands and with a planar scanning geometry based on an x y stage, has been developed to screen suspicious luggage and footwear. To obtain microwave images of the concealed weapons, the targets are placed above the platform and the single transceiver horn antenna attached to the x y stage is moved mechanically to perform a raster scan to create a 2D synthetic aperture array. The S11 reflection signal of the transmitted sweep frequency from the target is acquired by a VNA in synchronism with each position step. To enhance and filter from clutter and noise the raw data and to obtain the 2D and 3D microwave images of the concealed weapons or explosives, data processing techniques are applied to the acquired signals. These techniques include background subtraction, Inverse Fast Fourier Transform (IFFT), thresholding, filtering by gating and windowing and deconvolving with the transfer function of the system using a reference target. To focus the 3D reconstructed microwave image of the target in range and across the x y aperture without using focusing elements, 3D Synthetic Aperture Radar (SAR) techniques are applied to the post-processed data. The K and Q bands, between 15 to 40 GHz, show good transmission through clothing and dielectric materials found in luggage and footwear. A description of the system, algorithms and some results with replica guns and a comparison of microwave images obtained by IFFT, 2D and 3D SAR techniques are presented.

  20. Electromagnetic induction imaging of concealed metallic objects by means of resonating circuits

    NASA Astrophysics Data System (ADS)

    Guilizzoni, R.; Watson, J. C.; Bartlett, P. A.; Renzoni, F.

    2016-05-01

    An electromagnetic induction system, suitable for 2D imaging of metallic samples of different electrical conductivities, has been developed. The system is based on a parallel LCR circuit comprising a ferrite-cored coil (7.8 mm x 9.5 mm, L=680 μH at 1 KHz), a variable resistor and capacitor. The working principle of the system is based on eddy current induction inside a metallic sample when this is introduced into the AC magnetic field created by the coil. The inductance of the LCR circuit is modified due to the presence of the sample, to an extent that depends on its conductivity. Such modification is known to increase when the system is operated at its resonant frequency. Characterizing different metals based on their values of conductivity is therefore possible by utilizing a suitable system operated at resonance. Both imaging and material characterization were demonstrated by means of the proposed electromagnetic induction technique. Furthermore, the choice of using a system with an adjustable resonant frequency made it possible to select resonances that allow magnetic-field penetration through conductive screens. Investigations on the possibility of imaging concealed metals by penetrating such shields have been carried out. A penetration depth of δ~3 mm through aluminium (Al) was achieved. This allowed concealed metallic samples- having conductivities ranging from 0.54 to 59.77 MSm-1 and hidden behind 1.5-mm-thick Al shields- to be imaged. Our results demonstrate that the presence of the concealed metallic objects can be revealed. The technique was thus shown to be a promising detection tool for security applications.

  1. Multispectral illumination and image processing techniques for active millimeter-wave concealed object detection.

    PubMed

    Zhang, Lixiao; Stiens, Johan; Elhawil, Amna; Vounckx, Roger

    2008-12-01

    Active millimeter-wave imaging systems for concealed object detection offer the possibility of much higher image contrast than passive systems, especially in indoor applications. By studying active millimeter-wave images of different test objects derived in the W band, we show that multispectral illumination is critical to the detectability of targets. We also propose to use image change detection techniques, including image differencing, normalized difference vegetation index, and principle component analysis to process the multispectral millimeter-wave images. The results demonstrate that multispectral illumination can significantly reveal the object features hidden by image artifacts and improve the appearance of the objects.

  2. Ambient air cooling for concealed soft body armor in a hot environment.

    PubMed

    Ryan, Greg A; Bishop, Stacy H; Herron, Robert L; Katica, Charles P; Elbon, Bre'anna L; Bosak, Andrew M; Bishop, Phillip

    2014-01-01

    Concealed soft body armor inhibits convective and evaporative heat loss and increases heat storage, especially in hot environments. One option to potentially mitigate heat storage is to promote airflow under the soft body armor. The purpose of this study was to evaluate the effect of ambient air induction (∼100 liters per minute) on heat strain while wearing concealed soft body armor in a hot environment (wet bulb globe temperature = 30°C). A counter-balanced, repeated measures protocol was performed with nine healthy male volunteers. Participants were fitted with either a traditional or modified Level II concealed soft body armor. Participants performed cycles of 12 min of walking (1.25 liters per minute) and 3 min of arm curls (0.6 liters per minute) for a total of 60 min. Two-way repeated measures ANOVA was used to assess the mean differences in physiological measures (rectal temperature, heart rate, micro-environment [temperature and relative humidity]). Post hoc Bonferroni analysis and paired samples t-tests (alpha = 0.01) were conducted on omnibus significant findings. Perceptual measures (perceived exertion, thermal comfort) were analyzed using Wilcoxon Signed Ranks Tests. Modification led to an improvement in perceived exertion at 45 min (MOD: 10 ± 1; CON: 11 ± 2; p ≤ 0.001) and 60 min (MOD: 10 ± 2; CON: 12 ± 2; p ≤ 0.001) and a reduction in micro-environment temperature in MOD (1.0 ± 0.2°C, p = 0.03) compared to CON. Modification did not attenuate change in rectal temperature or heart rate (p < 0.01) during 60-min work bout. Change in rectal temperature approached significance between MOD and CON at the end of the work bout (MOD: 0.4 ± 0.2°C; CON: 0.7 ± 0.3°C; p = 0.048). The slope of rectal temperature was significantly greater (p = 0.04) under CON compared to MOD. These data suggest that air induction may provide small benefits while wearing concealed soft body armor, though improvements are needed to lessen physiological strain.

  3. [Effects of arousal level on the physiological responding on the Concealed Information Test].

    PubMed

    Ogawa, Tokihiro; Tsuruga, Mariko; Kobayashi, Takahiro; Matsuda, Izumi; Hirota, Akihisa; Suzuki, Naoto

    2007-10-01

    This study examined effects of arousal level on the physiological responses in a polygraph examination using the Concealed Information Test (CIT). Thirty-nine healthy college students were tested with or without evaluative observation. Electrodermal activity, blood pressure, heart rate, normalized pulse volume, and respiration were recorded. Observation elevated participants' arousal level, which was manifested in self-reports, high skin conductance level, and low normalized pulse volume (i.e., vasoconstriction). However, differential reactivity to critical and non-critical items on the physiological measures was less affected by observation. These results suggested that participants' arousal level has little effect on differential physiological reactivity on the CIT.

  4. Millimetre wave and terahertz technology for the detection of concealed threats: a review

    NASA Astrophysics Data System (ADS)

    Kemp, Michael C.

    2006-09-01

    There has been intense interest in the use of millimetre wave and terahertz technology for the detection of concealed weapons, explosives and other threats. Electromagnetic waves at these frequencies are safe, penetrate barriers and have short enough wavelengths to allow discrimination between objects. In addition, many solids including explosives have characteristic spectroscopic signatures at terahertz wavelengths which can be used to identify them. This paper reviews the progress which has been made in recent years and identifies the achievements, challenges and prospects for these technologies in checkpoint people screening, stand off detection of improvised explosive devices (IEDs) and suicide bombers as well as more specialized screening tasks.

  5. Standoff concealed weapon detection using a 350 GHz radar imaging system

    SciTech Connect

    Sheen, David M.; Hall, Thomas E.; Severtsen, Ronald H.; McMakin, Douglas L.; Hatchell, Brian K.; Valdez, Patrick LJ

    2010-04-01

    The Pacific Northwest National Laboratory is currently developing a 350 GHz, active, wideband, three-dimensional, radar imaging system to evaluate the feasibility of active sub-mm imaging for standoff concealed weapon detection. The prototype radar imaging system is based on a wideband, heterodyne, frequency-multiplier-based transceiver system coupled to a quasi-optical focusing system and high-speed rotating conical scanner. The wideband operation of this system provides accurate ranging information, and the images obtained are fully three-dimensional. Recent improvements to the system include increased imaging speed using improved balancing techniques, wider bandwidth, and image display techniques.

  6. Parasitism rate, parasitoid community composition and host specificity on exposed and semi-concealed caterpillars from a tropical rainforest.

    PubMed

    Hrcek, Jan; Miller, Scott E; Whitfield, James B; Shima, Hiroshi; Novotny, Vojtech

    2013-10-01

    The processes maintaining the enormous diversity of herbivore-parasitoid food webs depend on parasitism rate and parasitoid host specificity. The two parameters have to be evaluated in concert to make conclusions about the importance of parasitoids as natural enemies and guide biological control. We document parasitism rate and host specificity in a highly diverse caterpillar-parasitoid food web encompassing 266 species of lepidopteran hosts and 172 species of hymenopteran or dipteran parasitoids from a lowland tropical forest in Papua New Guinea. We found that semi-concealed hosts (leaf rollers and leaf tiers) represented 84% of all caterpillars, suffered a higher parasitism rate than exposed caterpillars (12 vs. 5%) and their parasitoids were also more host specific. Semi-concealed hosts may therefore be generally more amenable to biological control by parasitoids than exposed ones. Parasitoid host specificity was highest in Braconidae, lower in Diptera: Tachinidae, and, unexpectedly, the lowest in Ichneumonidae. This result challenges the long-standing view of low host specificity in caterpillar-attacking Tachinidae and suggests higher suitability of Braconidae and lower suitability of Ichneumonidae for biological control of caterpillars. Semi-concealed hosts and their parasitoids are the largest, yet understudied component of caterpillar-parasitoid food webs. However, they still remain much closer in parasitism patterns to exposed hosts than to what literature reports on fully concealed leaf miners. Specifically, semi-concealed hosts keep an equally low share of idiobionts (2%) as exposed caterpillars.

  7. Army General Fund Adjustments Not Adequately Documented or Supported

    DTIC Science & Technology

    2016-07-26

    statements were unreliable and lacked an adequate audit trail. Furthermore, DoD and Army managers could not rely on the data in their accounting...risk that AGF financial statements will be materially misstated and the Army will not achieve audit readiness by the congressionally mandated...and $6.5 trillion in yearend adjustments made to Army General Fund data during FY 2015 financial statement compilation. We conducted this audit in

  8. Are There Limits to Collectivism? Culture and Children's Reasoning About Lying to Conceal a Group Transgression.

    PubMed

    Sweet, Monica A; Heyman, Gail D; Fu, Genyue; Lee, Kang

    2010-07-01

    This study explored the effects of collectivism on lying to conceal a group transgression. Seven-, 9-, and 11-year-old US and Chinese children (N = 374) were asked to evaluate stories in which protagonists either lied or told the truth about their group's transgression and were then asked about either the protagonist's motivations or justification for their own evaluations. Previous research suggests that children in collectivist societies such as China find lying for one's group to be more acceptable than do children from individualistic societies such as the United States. The current study provides evidence that this is not always the case: Chinese children in this study viewed lies told to conceal a group's transgressions less favourably than did US children. An examination of children's reasoning about protagonists' motivations for lying indicated that children in both countries focused on an impact to self when discussing motivations for protagonists to lie for their group. Overall, results suggest that children living in collectivist societies do not always focus on the needs of the group.

  9. Specific NIST projects in support of the NIJ Concealed Weapon Detection and Imaging Program

    NASA Astrophysics Data System (ADS)

    Paulter, Nicholas G.

    1998-12-01

    The Electricity Division of the National Institute of Standards and Technology is developing revised performance standards for hand-held (HH) and walk-through (WT) metal weapon detectors, test procedures and systems for these detectors, and a detection/imaging system for finding concealed weapons. The revised standards will replace the existing National Institute of Justice (NIJ) standards for HH and WT devices and will include detection performance specifications as well as system specifications (environmental conditions, mechanical strength and safety, response reproducibility and repeatability, quality assurance, test reporting, etc.). These system requirements were obtained from the Law Enforcement and corrections Technology Advisory Council, an advisory council for the NIJ. Reproducible and repeatable test procedures and appropriate measurement systems will be developed for evaluating HH and WT detection performance. A guide to the technology and application of non- eddy-current-based detection/imaging methods (such as acoustic, passive millimeter-wave and microwave, active millimeter-wave and terahertz-wave, x-ray, etc.) Will be developed. The Electricity Division is also researching the development of a high- frequency/high-speed (300 GH to 1 THz) pulse-illuminated, stand- off, video-rate, concealed weapons/contraband imaging system.

  10. Survey of state-of-the-art technology in remote concealed weapon detection

    NASA Astrophysics Data System (ADS)

    Currie, Nicholas C.; Demma, Fred J.; Ferris, David D., Jr.; McMillan, Robert W.; Vannicola, Vincent C.; Wicks, Michael C.

    1995-09-01

    Recent advances in millimeter-wave (MMV), microwave, and infrared (IR) technologies provide the means to detect concealed weapons remotely through clothing and is some cases through walls. Since the developemnt of forward-looking infrared instruments, work has been ongoing in attempting to use these devices for concealed weapon detection based on temperatrue differences between metallic weapons and in the infrared has led to the development of techniques based on lower frequencies. Focal plane arrays operating MMW frequencies are becoming available which eliminate the need for a costly and slow mechanical scanner for generating images. These radiometric sensors also detect temperature differences between weapons and the human body background. Holographic imaging systems operating at both microwave and MMW frequencies have been developed which generate images of near photographic quality through clothing and through thin, nonmetallic walls. Finally, a real- aperture radar is useful for observing people and detecting weapons through walls and in the field under reduced visibility conditions. This paper will review all of these technologies and give examples of images generated by each type of sensor. An assessment of the future of this technology with regard to law enforcement applications will also be given.

  11. Development of a longer range standoff millimetre wave radar concealed threat detector

    NASA Astrophysics Data System (ADS)

    Bowring, Nicholas J.; Southgate, Matthew J.; Andrews, David A.; Rezgui, Nacer D.; Harmer, Stuart W.; O'Reilly, Dean

    2013-05-01

    A millimeter wave (75 - 110 GHz) polarimetric radar system (MiRTLE) has been developed for the detection of threat objects, such as guns, knives, or explosive devices, which have been concealed under clothing upon the human body. The system uses a Gaussian lens antenna to enable operation at stand-off ranges up to 25 meters. By utilizing ultra-wideband Swept Frequency Continuous Wave Radar very high range resolution (~ 10mm) is realized. The system is capable of detecting objects positioned in front of the body and of measuring the range of a target. By interpretation of the scattered waveform, the presence of a wide spectrum of threat items concealed on the human body may be detected. Threat detection is autonomously rendered by application of a neural network to the scattered time domain, polarimetric radar returns and the system may be taught to alarm or reject certain classes of objects; this allows for highly specific or broad spectrum threat detection. The radar system is portable and operator steerable allowing standoff monitoring of moving human targets in real time. Rapid (1ms) sweep times and fast signal acquisition and processing allow decisions to be made at video frame rates (30 fps) and integrated directly to a video feed providing the operator with a field of view and facilitating aiming. Performance parameters for detection of guns and simulated explosive devices are presented for ranges up to 25 meters.

  12. Detection of hazardous liquids concealed in glass, plastic, and aluminum containers

    NASA Astrophysics Data System (ADS)

    Ramirez, Michael L.; Ortiz, William; Ruiz, Orlando; Pacheco-Londoño, Leonardo; Hernández-Rivera, Samuel P.

    2007-04-01

    The use of liquid explosives by terrorists has raised the attention to the use of hazardous liquids as threats to people, buildings and transportation systems. Hazardous liquids such as explosive mixtures, flammables or even chemical warfare agents (CWA) can be concealed in common containers and pass security checks undetected. This work presents three non invasive, non destructive detection approaches that can be used to characterize the content of common liquid containers and detect if the liquid is the intended or a concealed hazardous liquid. Fiber optic coupled Raman spectroscopy and Stand off Raman spectroscopy were used to inspect the content of glass and plastic bottles and thermal conductivity was used to asses the liquid inside aluminum cans. Raman spectroscopy experiments were performed at 532 nm, 488 nm and 785 nm excitation wavelengths. The hazardous liquids under consideration included CWA simulant DMMP, hydrogen peroxide, acetone, cyclohexane, ethanol and nitric acid. These techniques have potential use as a detector for hazardous liquids at a check point or to inspect suspicious bottles from a distance.

  13. Noninvasive detection of concealed explosives: depth profiling through opaque plastics by time-resolved Raman spectroscopy.

    PubMed

    Petterson, Ingeborg E Iping; López-López, María; García-Ruiz, Carmen; Gooijer, Cees; Buijs, Joost B; Ariese, Freek

    2011-11-15

    The detection of explosives concealed behind opaque, diffusely scattering materials is a challenge that requires noninvasive analytical techniques for identification without having to manipulate the package. In this context, this study focuses on the application of time-resolved Raman spectroscopy (TRRS) with a picosecond pulsed laser and an intensified charge-coupled device (ICCD) detector for the noninvasive identification of explosive materials through several millimeters of opaque polymers or plastic packaging materials. By means of a short (250 ps) gate which can be delayed several hundred picoseconds after the laser pulse, the ICCD detector allows for the temporal discrimination between photons from the surface of a sample and those from deeper layers. TRRS was applied for the detection of the two main isomers of dinitrotoluene, 2,4-dinitrotoluene, and 2,6-dinitrotoluene as well as for various other components of explosive mixtures, including akardite II, diphenylamine, and ethyl centralite. Spectra were obtained through different diffuse scattering white polymer materials: polytetrafluoroethylene (PTFE), polyoxymethylene (POM), and polyethylene (PE). Common packaging materials of various thicknesses were also selected, including polystyrene (PS) and polyvinyl chloride (PVC). With the demonstration of the ability to detect concealed, explosives-related compounds through an opaque first layer, this study may have important applications in the security and forensic fields.

  14. Concealing of facial expressions by a wild Barbary macaque (Macaca sylvanus).

    PubMed

    Thunström, Maria; Kuchenbuch, Paul; Young, Christopher

    2014-07-01

    Behavioural research on non-vocal communication among non-human primates and its possible links to the origin of human language is a long-standing research topic. Because human language is under voluntary control, it is of interest whether this is also true for any communicative signals of other species. It has been argued that the behaviour of hiding a facial expression with one's hand supports the idea that gestures might be under more voluntary control than facial expressions among non-human primates, and it has also been interpreted as a sign of intentionality. So far, the behaviour has only been reported twice, for single gorilla and chimpanzee individuals, both in captivity. Here, we report the first observation of concealing of facial expressions by a monkey, a Barbary macaque (Macaca sylvanus), living in the wild. On eight separate occasions between 2009 and 2011 an adult male was filmed concealing two different facial expressions associated with play and aggression ("play face" and "scream face"), 22 times in total. The videos were analysed in detail, including gaze direction, hand usage, duration, and individuals present. This male was the only individual in his group to manifest this behaviour, which always occurred in the presence of a dominant male. Several possible interpretations of the function of the behaviour are discussed. The observations in this study indicate that the gestural communication and cognitive abilities of monkeys warrant more research attention.

  15. Combined illumination cylindrical millimeter-wave imaging technique for concealed weapon detection

    NASA Astrophysics Data System (ADS)

    Sheen, David M.; McMakin, Douglas L.; Hall, Thomas E.

    2000-07-01

    A novel millimeter-wave imaging technique has been developed for personnel surveillance applications, including the detection of concealed weapons, explosives, drugs, and other contraband material. Millimeter-waves are high-frequency radio waves in the frequency band of 30 - 300 GHz, and pose no health threat to humans at moderate power levels. These waves readily penetrate common clothing materials, and are reflected by the human body and by concealed items. The combined illumination cylindrical imaging concept consists of a vertical, high-resolution, millimeter-wave array of antennas which is scanned in a cylindrical manner about the person under surveillance. Using a computer, the data from this scan is mathematically reconstructed into a series of focused 3D images of the person. After reconstruction, the images are combined into a single high-resolution 3D image of the person under surveillance. This combined image is then rendered using 3D computer graphics techniques. The combined cylindrical illumination is critical as it allows the display of information from all angles. This is necessary because millimeter-waves do not penetrate the body. Ultimately, the images displayed to the operate will be icon-based to protect the privacy of the person being screened. Novel aspects of this technique include the cylindrical scanning concept and the image reconstruction algorithm, which was developed specifically for this imaging system. An engineering prototype based on this cylindrical imaging technique has been fabricated and tested. This work has been sponsored by the Federal Aviation Administration.

  16. The etiquette of endometriosis: stigmatisation, menstrual concealment and the diagnostic delay.

    PubMed

    Seear, Kate

    2009-10-01

    Endometriosis is a chronic gynaecological condition of uncertain aetiology characterised by menstrual irregularities. Several studies have previously identified a lengthy delay experienced by patients between the first onset of symptoms and eventual diagnosis. Various explanations have been advanced for the diagnostic delay, with both doctors and women being implicated. Such explanations include that doctors normalise women's menstrual pain and that women might delay in seeking medical advice because they have difficulty distinguishing between 'normal' and 'abnormal' menstruation. It has been suggested that the diagnostic delay could be reduced if women were trained in how to distinguish between 'normal' and 'abnormal' menstrual cycles. In this paper I argue that whilst these may be factors in the diagnostic delay, women's reluctance to disclose problems associated with their menstrual cycle may be a more significant and hitherto neglected factor. I argue women are reluctant to disclose menstrual irregularities because menstruation is a 'discrediting attribute' (Goffman, 1963) and disclosure renders women vulnerable to stigmatisation. Women actively conceal their menstrual irregularities through practices of the 'menstrual etiquette' (Laws, 1990) which involves the strategic concealment of menstrual problems. This argument is supported through an analysis of the experiences of 20 Australian women diagnosed with endometriosis. The ramifications of this analysis for chronic pain conditions more generally and for practical strategies designed to address the endometriosis diagnostic delay are considered.

  17. An edge-based temporal error concealment for MPEG-coded video

    NASA Astrophysics Data System (ADS)

    Huang, Yu-Len; Lien, Hsiu-Yi

    2005-07-01

    When transmitted over unreliable channels, the compressed video can suffer severe degradation. Some strategies were employed to make an acceptable quality of the decoded image sequence. Error concealment (EC) technique is one of effective approaches to diminish the quality degradation. A number of EC algorithms have been developed to combat the transmission errors for MPEG-coded video. These methods always work well to reconstruct the smooth or regular damaged macroblocks. However, for damaged macroblocks were irregular or high-detail, the reconstruction may follow noticeable blurring consequence or not match well with the surrounding macroblocks. This paper proposes an edgebased temporal EC model to conceal the errors. In the proposed method, both the spatial and the temporal contextual features in compressed video are measured by using an edge detector, i.e. Sobel operator. The edge information surrounding a damaged macroblock is utilized to estimate the lost motion vectors based on the boundary matching technique. Next, the estimated motion vectors are used to reconstruct the damaged macroblock by exploiting the information in reference frames. In comparison with traditional EC algorithms, the proposed method provides a significant improvement on both objective peak signal-to-noise ratio (PSNR) measurement and subjective visual quality of MPEG-coded video.

  18. Ultra wide band millimeter wave holographic ``3-D`` imaging of concealed targets on mannequins

    SciTech Connect

    Collins, H.D.; Hall, T.E.; Gribble, R.P.

    1994-08-01

    Ultra wide band (chirp frequency) millimeter wave ``3-D`` holography is a unique technique for imaging concealed targets on human subjects with extremely high lateral and depth resolution. Recent ``3-D`` holographic images of full size mannequins with concealed weapons illustrate the efficacy of this technique for airport security. A chirp frequency (24 GHz to 40 GHz) holographic system was used to construct extremely high resolution images (optical quality) using polyrod antenna in a bi-static configuration using an x-y scanner. Millimeter wave chirp frequency holography can be simply described as a multi-frequency detection and imaging technique where the target`s reflected signals are decomposed into discrete frequency holograms and reconstructed into a single composite ``3-D`` image. The implementation of this technology for security at airports, government installations, etc., will require real-time (video rate) data acquisition and computer image reconstruction of large volumetric data sets. This implies rapid scanning techniques or large, complex ``2-D`` arrays and high speed computing for successful commercialization of this technology.

  19. Decision Makers Use Norms, Not Cost-Benefit Analysis, When Choosing to Conceal or Reveal Unfair Rewards

    PubMed Central

    Heimann, Marco; Girotto, Vittorio; Legrenzi, Paolo; Bonnefon, Jean-François

    2013-01-01

    We introduce the Conceal or Reveal Dilemma, in which individuals receive unfair benefits, and must decide whether to conceal or to reveal this unfair advantage. This dilemma has two important characteristics: it does not lend itself easily to cost-benefit analysis, neither to the application of any strong universal norm. As a consequence, it is ideally suited to the study of interindividual and intercultural variations in moral-economic norms. In this paper we focus on interindividual variations, and we report four studies showing that individuals cannot be swayed by financial incentives to conceal or to reveal, and follow instead fixed, idiosyncratic strategies. We discuss how this result can be extended to individual and cultural variations in the tendency to display or to hide unfair rewards. PMID:24066040

  20. Concealment of time delay signature of chaotic output in a slave semiconductor laser with chaos laser injection

    NASA Astrophysics Data System (ADS)

    Wu, Tianan; Sun, Weiyang; Zhang, Xiaoxu; Zhang, Shenghai

    2016-12-01

    An improved chaotic laser system, which has a slave semiconductor laser (SL) injected by a master SL with double optical feedback (DOF), is proposed, so that the time delay (TD) signature can be successfully concealed from both intensity and phase chaos via choosing appropriate parameters. The TD signature is investigated by employing autocorrelation function (ACF) and mutual information (MI) function. Through analyzing the influence on TD signature in the region of injection current and injection strength for the slave SL, we find that, for both intensity chaos and phase chaos, the TD signature can be easily concealed under weak injection strength. When the injection strength is strong, we can not only successfully conceal TD signature, but also improve the bandwidth of chaotic laser output by choosing the optimal detuning frequency.

  1. Applicability and Limitations of Reliability Allocation Methods

    NASA Technical Reports Server (NTRS)

    Cruz, Jose A.

    2016-01-01

    Reliability allocation process may be described as the process of assigning reliability requirements to individual components within a system to attain the specified system reliability. For large systems, the allocation process is often performed at different stages of system design. The allocation process often begins at the conceptual stage. As the system design develops, more information about components and the operating environment becomes available, different allocation methods can be considered. Reliability allocation methods are usually divided into two categories: weighting factors and optimal reliability allocation. When properly applied, these methods can produce reasonable approximations. Reliability allocation techniques have limitations and implied assumptions that need to be understood by system engineers. Applying reliability allocation techniques without understanding their limitations and assumptions can produce unrealistic results. This report addresses weighting factors, optimal reliability allocation techniques, and identifies the applicability and limitations of each reliability allocation technique.

  2. Collective credit allocation in science.

    PubMed

    Shen, Hua-Wei; Barabási, Albert-László

    2014-08-26

    Collaboration among researchers is an essential component of the modern scientific enterprise, playing a particularly important role in multidisciplinary research. However, we continue to wrestle with allocating credit to the coauthors of publications with multiple authors, because the relative contribution of each author is difficult to determine. At the same time, the scientific community runs an informal field-dependent credit allocation process that assigns credit in a collective fashion to each work. Here we develop a credit allocation algorithm that captures the coauthors' contribution to a publication as perceived by the scientific community, reproducing the informal collective credit allocation of science. We validate the method by identifying the authors of Nobel-winning papers that are credited for the discovery, independent of their positions in the author list. The method can also compare the relative impact of researchers working in the same field, even if they did not publish together. The ability to accurately measure the relative credit of researchers could affect many aspects of credit allocation in science, potentially impacting hiring, funding, and promotion decisions.

  3. Collective credit allocation in science

    PubMed Central

    Shen, Hua-Wei; Barabási, Albert-László

    2014-01-01

    Collaboration among researchers is an essential component of the modern scientific enterprise, playing a particularly important role in multidisciplinary research. However, we continue to wrestle with allocating credit to the coauthors of publications with multiple authors, because the relative contribution of each author is difficult to determine. At the same time, the scientific community runs an informal field-dependent credit allocation process that assigns credit in a collective fashion to each work. Here we develop a credit allocation algorithm that captures the coauthors’ contribution to a publication as perceived by the scientific community, reproducing the informal collective credit allocation of science. We validate the method by identifying the authors of Nobel-winning papers that are credited for the discovery, independent of their positions in the author list. The method can also compare the relative impact of researchers working in the same field, even if they did not publish together. The ability to accurately measure the relative credit of researchers could affect many aspects of credit allocation in science, potentially impacting hiring, funding, and promotion decisions. PMID:25114238

  4. Task allocation in a distributed computing system

    NASA Technical Reports Server (NTRS)

    Seward, Walter D.

    1987-01-01

    A conceptual framework is examined for task allocation in distributed systems. Application and computing system parameters critical to task allocation decision processes are discussed. Task allocation techniques are addressed which focus on achieving a balance in the load distribution among the system's processors. Equalization of computing load among the processing elements is the goal. Examples of system performance are presented for specific applications. Both static and dynamic allocation of tasks are considered and system performance is evaluated using different task allocation methodologies.

  5. Optimal sample size allocation for Welch's test in one-way heteroscedastic ANOVA.

    PubMed

    Shieh, Gwowen; Jan, Show-Li

    2015-06-01

    The determination of an adequate sample size is a vital aspect in the planning stage of research studies. A prudent strategy should incorporate all of the critical factors and cost considerations into sample size calculations. This study concerns the allocation schemes of group sizes for Welch's test in a one-way heteroscedastic ANOVA. Optimal allocation approaches are presented for minimizing the total cost while maintaining adequate power and for maximizing power performance for a fixed cost. The commonly recommended ratio of sample sizes is proportional to the ratio of the population standard deviations or the ratio of the population standard deviations divided by the square root of the ratio of the unit sampling costs. Detailed numerical investigations have shown that these usual allocation methods generally do not give the optimal solution. The suggested procedures are illustrated using an example of the cost-efficiency evaluation in multidisciplinary pain centers.

  6. Genetic modification of preimplantation embryos: toward adequate human research policies.

    PubMed

    Dresser, Rebecca

    2004-01-01

    Citing advances in transgenic animal research and setbacks in human trials of somatic cell genetic interventions, some scientists and others want to begin planning for research involving the genetic modification of human embryos. Because this form of genetic modification could affect later-born children and their offspring, the protection of human subjects should be a priority in decisions about whether to proceed with such research. Yet because of gaps in existing federal policies, embryo modification proposals might not receive adequate scientific and ethical scrutiny. This article describes current policy shortcomings and recommends policy actions designed to ensure that the investigational genetic modification of embryos meets accepted standards for research on human subjects.

  7. Elements for adequate informed consent in the surgical context.

    PubMed

    Abaunza, Hernando; Romero, Klaus

    2014-07-01

    Given a history of atrocities and violations of ethical principles, several documents and regulations have been issued by a wide variety of organizations. They aim at ensuring that health care and clinical research adhere to defined ethical principles. A fundamental component was devised to ensure that the individual has been provided the necessary information to make an informed decision regarding health care or participation in clinical research. This article summarizes the history and regulations for informed consent and discusses suggested components for adequate consent forms for daily clinical practice in surgery as well as clinical research.

  8. Brief Report: How Do They Manage Social Interaction? The Influence of Concealing Academic Achievement Information on Self-Monitoring by Adolescents with Low Achievement

    ERIC Educational Resources Information Center

    Zhang, Baoshan; Zhao, Jun-Yan; Yu, Guoliang

    2010-01-01

    During social interactions people self-monitor their behavior at least partially to conceal socially devalued characteristics. This study examined the influences of concealing academic achievement on self-monitoring in an academically-relevant social interaction. An interview paradigm called for school-aged adolescent participants (total N = 86)…

  9. Task allocation among multiple intelligent robots

    NASA Technical Reports Server (NTRS)

    Gasser, L.; Bekey, G.

    1987-01-01

    Researchers describe the design of a decentralized mechanism for allocating assembly tasks in a multiple robot assembly workstation. Currently, the approach focuses on distributed allocation to explore its feasibility and its potential for adaptability to changing circumstances, rather than for optimizing throughput. Individual greedy robots make their own local allocation decisions using both dynamic allocation policies which propagate through a network of allocation goals, and local static and dynamic constraints describing which robots are elibible for which assembly tasks. Global coherence is achieved by proper weighting of allocation pressures propagating through the assembly plan. Deadlock avoidance and synchronization is achieved using periodic reassessments of local allocation decisions, ageing of allocation goals, and short-term allocation locks on goals.

  10. Quantifying dose to the reconstructed breast: Can we adequately treat?

    SciTech Connect

    Chung, Eugene; Marsh, Robin B.; Griffith, Kent A.; Moran, Jean M.; Pierce, Lori J.

    2013-04-01

    To evaluate how immediate reconstruction (IR) impacts postmastectomy radiotherapy (PMRT) dose distributions to the reconstructed breast (RB), internal mammary nodes (IMN), heart, and lungs using quantifiable dosimetric end points. 3D conformal plans were developed for 20 IR patients, 10 autologous reconstruction (AR), and 10 expander-implant (EI) reconstruction. For each reconstruction type, 5 right- and 5 left-sided reconstructions were selected. Two plans were created for each patient, 1 with RB coverage alone and 1 with RB + IMN coverage. Left-sided EI plans without IMN coverage had higher heart Dmean than left-sided AR plans (2.97 and 0.84 Gy, p = 0.03). Otherwise, results did not vary by reconstruction type and all remaining metrics were evaluated using a combined AR and EI dataset. RB coverage was adequate regardless of laterality or IMN coverage (Dmean 50.61 Gy, D95 45.76 Gy). When included, IMN Dmean and D95 were 49.57 and 40.96 Gy, respectively. Mean heart doses increased with left-sided treatment plans and IMN inclusion. Right-sided treatment plans and IMN inclusion increased mean lung V{sub 20}. Using standard field arrangements and 3D planning, we observed excellent coverage of the RB and IMN, regardless of laterality or reconstruction type. Our results demonstrate that adequate doses can be delivered to the RB with or without IMN coverage.

  11. The Discipline of Asset Allocation.

    ERIC Educational Resources Information Center

    Petzel, Todd E.

    2000-01-01

    Discussion of asset allocation for college/university endowment funds focuses on three levels of risk: (1) the absolute risk of the portfolio (usually leading to asset diversification); (2) the benchmark risk (usually comparison with peer institutions; and (3) personal career risk (which may incline managers toward maximizing short-term returns,…

  12. Administrators' Decisions about Resource Allocation

    ERIC Educational Resources Information Center

    Knight, William E.; Folkins, John W.; Hakel, Milton D.; Kennell, Richard P.

    2011-01-01

    Do academic administrators make decisions about resource allocation differently depending on the discipline receiving the funding? Does an administrator's academic identity influence these decisions? This study explored those questions with a sample of 1,690 academic administrators at doctoral-research universities. Participants used fictional…

  13. Regulating nutrient allocation in plants

    DOEpatents

    Udvardi, Michael; Yang, Jiading; Worley, Eric

    2014-12-09

    The invention provides coding and promoter sequences for a VS-1 and AP-2 gene, which affects the developmental process of senescence in plants. Vectors, transgenic plants, seeds, and host cells comprising heterologous VS-1 and AP-2 genes are also provided. Additionally provided are methods of altering nutrient allocation and composition in a plant using the VS-1 and AP-2 genes.

  14. Resource Allocation: A Participatory Process.

    ERIC Educational Resources Information Center

    Reid, Alban E.

    Whether a participatory process for resource allocation in a public community college setting occurs depends upon several key factors: (1) the leadership style of the institutional chief executive officer; (2) the administrative organizational structure of the institution; (3) the relationship which exists between and among members of the various…

  15. Remote concealed weapon detection in millimeter-wave region: active and passive

    NASA Astrophysics Data System (ADS)

    Stanko, Stephan; Klöppel, Frank; Huck, Johann; Nötel, Denis; Hägelen, Manfred; Briese, Gunnar; Gregor, Alexander; Erukulla, Sreenivas; Fuchs, Hans-Hellmuth; Essen, Helmut; Pagels, Anke

    2006-09-01

    Sensors used for Security purposes have to cover the non-invasive inspection of persons, baggage and letters with the aim to detect weapons, explosives and chemical or biological threat material. Currently, emphasis is placed on system concepts and technologies for this type of applications, employing millimeterwave-, submillimeterwave- and terahertz sensors. This is based on the capability of these frequency bands to look through textiles and the possibility to achieve a geometric resolution which is sufficient to resolve critical items within the necessary range. Using multiple frequencies promises to give more detailed information about the structure of the observed objects. Furthermore, to overcome the limitations of passive millimeter- and submillimeterwave sensors which depend on indirect illumination, systems using miniaturized mmw-radar modules are applied as well. This paper describes two approaches for the detection of concealed weapons, the first using a millimeterwave radiometer on a scanner and the second employing a miniaturized radar module based on a synthetic aperture method.

  16. Joint source coding, transport processing, and error concealment for H.323-based packet video

    NASA Astrophysics Data System (ADS)

    Zhu, Qin-Fan; Kerofsky, Louis

    1998-12-01

    In this paper, we investigate how to adapt different parameters in H.263 source coding, transport processing and error concealment to optimize end-to-end video quality at different bitrates and packet loss rates for H.323-based packet video. First different intra coding patterns are compared and we show that the contiguous rectangle or square block pattern offers the best performance in terms of video quality in the presence of packet loss. Second, the optimal intra coding frequency is found for different bitrates and packet loss rates. The optimal number of GOB headers to be inserted in the source coding is then determined. The effect of transport processing strategies such as packetization and retransmission is also examined. For packetization, the impact of packet size and the effect of macroblock segmentation to picture quality are investigated. Finally, we show that the dejitter buffering delay can be used to the advantage for packet loss recovery with video retransmission without incurring any extra delay.

  17. Management of adult concealed penis using a meshed, split-thickness skin graft

    PubMed Central

    Boonjindasup, Aaron; Pinsky, Michael; Stewart, Carrie; Trost, Landon; Chaffin, Abigail; Jansen, David; Hellstrom, Wayne

    2016-01-01

    Introduction Concealed penis (CP) is a rare problem faced by urologists and plastic surgeons. CP occurs secondary to trauma, obesity, or infection. Surgical treatment is individualized and based on patient and provider variables. We aim to review our recent experience using meshed split-thickness skin grafting (STSG) for CP management. Methods A retrospective review was performed on patients who underwent STSG for CP at our institution. Records were reviewed for demographic, operative, and postoperative variables. Preoperative and postoperative photos were obtained to monitor cosmetic results. Results Eleven patients underwent CP release with meshed STSG placement. All cases showed improved functional phallic length and good cosmetic results, regardless of etiology. Conclusions STSG is a viable option for penile coverage for management of this difficult-to-treat CP population. This primary or salvage modality offers excellent cosmetic results and may be used following prior reconstructive attempts. PMID:28096930

  18. 220GHz wideband 3D imaging radar for concealed object detection technology development and phenomenology studies

    NASA Astrophysics Data System (ADS)

    Robertson, Duncan A.; Macfarlane, David G.; Bryllert, Tomas

    2016-05-01

    We present a 220 GHz 3D imaging `Pathfinder' radar developed within the EU FP7 project CONSORTIS (Concealed Object Stand-Off Real-Time Imaging for Security) which has been built to address two objectives: (i) to de-risk the radar hardware development and (ii) to enable the collection of phenomenology data with ~1 cm3 volumetric resolution. The radar combines a DDS-based chirp generator and self-mixing multiplier technology to achieve a 30 GHz bandwidth chirp with such high linearity that the raw point response is close to ideal and only requires minor nonlinearity compensation. The single transceiver is focused with a 30 cm lens mounted on a gimbal to acquire 3D volumetric images of static test targets and materials.

  19. Event-related potentials increase the discrimination performance of the autonomic-based concealed information test.

    PubMed

    Matsuda, Izumi; Nittono, Hiroshi; Ogawa, Tokihiro

    2011-12-01

    The concealed information test (CIT) assesses an examinee's crime-relevant memory on the basis of physiological differences between crime-relevant and irrelevant items. The CIT based on autonomic measures has been used for criminal investigations, while the CIT based on event-related potentials (ERPs) has been suggested as a useful alternative. To combine these two methods, we developed a quantification method of ERPs measured in the autonomic-based CIT where each item was repeated only 5 times. Results showed that the peak amplitude of the ERP difference wave between crime-relevant and irrelevant items could discriminate between guilty and innocent participants effectively even when only 5 trials were used for averaging. This ERP measure could detect some participants who were missed by the autonomic measures. Combining the ERP and autonomic measures significantly improved the discrimination performance of the autonomic-based CIT.

  20. The concealed information test as an instrument of applied differential psychophysiology: methodological considerations.

    PubMed

    Furedy, John J

    2009-09-01

    In this interpretative paper, I consider four sets of methodological issues that may be relevant to improving the concealed information test (CIT) as an instrument of applied differential psychophysiology. The first set has to do with psychophysiological measurement in the CIT (e.g., specific sensitivity testing in lab vs. field). Secondly, I consider the relationships between the psychological process of deception and the CIT. Thirdly, I consider the problem of laboratory-to-field generalization of the CIT, a consideration that includes a discussion of whether the lab/field differences are merely quantitative or actually qualitative. Finally, I discuss theories concerning the hypothetical mechanisms underlying the CIT, and argue that while the purely cognitive, Sokolovian, orienting response (OR) account is widely accepted as the sole mechanism, there is evidence to suggest that not just motivational, but even emotional mechanisms are also relevant.

  1. Temporal spying and concealing process in fibre-optic data transmission systems through polarization bypass

    PubMed Central

    Bony, P.Y.; Guasoni, M.; Morin, P.; Sugny, D.; Picozzi, A.; Jauslin, H.R.; Pitois, S.; Fatome, J.

    2014-01-01

    Recent research has been focused on the ability to manipulate a light beam in such a way to hide, namely to cloak, an event over a finite time or localization in space. The main idea is to create a hole or a gap in the spatial or time domain so as to allow for an object or data to be kept hidden for a while and then to be restored. By enlarging the field of applications of this concept to telecommunications, researchers have recently reported the possibility to hide transmitted data in an optical fibre. Here we report the first experimental demonstration of perpetual temporal spying and blinding process of optical data in fibre-optic transmission line based on polarization bypass. We successfully characterize the performance of our system by alternatively copying and then concealing 100% of a 10-Gb s−1 transmitted signal. PMID:25135759

  2. Sexual harassment of girls in elementary school: a concealed phenomenon within a heterosexual romantic discourse.

    PubMed

    Gådin, Katja Gillander

    2012-06-01

    The aim of this study was to enhance the understanding of young girls' experiences of peer sexual harassment in elementary school and of normalizing processes of school-related sexualized violence. Six focus group interviews with girls in Grade 1 through 6 were carried out in an elementary school in the northern part of Sweden. A content analyses showed that young girls experienced verbal, nonverbal, and sexual assault behaviors at school. Sexual harassment as a concealed phenomenon and manifest within a romantic discourse were themes found in the analysis. A conclusion is that schools have to acknowledge behaviors related to sexual harassment as a potential problem even in young ages and develop methods to approach the subject also for this age group.

  3. Parenting beliefs and practices of opiate-addicted parents: concealment and taboo.

    PubMed

    Hogan, Diane M

    2003-07-01

    The lifestyle associated with opiate dependence, including drug taking, the buying and selling of drugs, and contact with other drug users, carries potential risks for the safety and well-being of children of drug-using parents. Based on a qualitative interview study conducted with 50 opiate-dependent parents in Dublin, Ireland, the parenting beliefs and practices in relation to children's exposure to drugs and the associated lifestyle are described. Parents saw their lifestyle as potentially risky for their children and their families. The most common strategy adopted by parents was to conceal their drug-related activities and maintain a strict family taboo about these activities. Intervention programmes should be offered to support effective family communication about parental drug dependence.

  4. The human operational sex ratio: effects of marriage, concealed ovulation, and menopause on mate competition.

    PubMed

    Marlowe, Frank W; Berbesque, J Colette

    2012-12-01

    Among mammals, male-male competition for sexual access to females frequently involves fighting. Larger body size gives males an advantage in fighting, which explains why males tend to be larger than females in many species, including anthropoid primates. Mitani et al. derived a formula to measure the operational sex ratio (OSR) to reflect the degree of male-male competition using the number of reproductively available males to females who are cycling and capable of conceiving. The OSR should predict the degree of sexual dimorphism in body mass-at least if male-male competition involves much fighting or threatening. Here, we use hunter-gatherer demographic data and the Mitani et al. formula to calculate the human OSR. We show that humans have a much lower degree of body mass sexual dimorphism than is predicted by our OSR. We suggest this is because human competition rarely involves fighting. In human hunter-gatherer societies, differences in the ages of marriage have an impact on competition in that the age of males at first marriage is younger when there is a lower percentage of married men with two or more wives, and older when there is a higher percentage of married men with two or more wives. We discuss the implications of this for females, along with the effects of two key life history traits that influence the OSR, concealed ovulation and menopause. While menopause decreases the number of reproductively available females to males and thus increases male-male competition, concealed ovulation decreases male-male competition. Finally, we discuss the importance of mostly monogamous mate bonds in human evolution.

  5. Vitamin D and musculoskeletal status in Nova Scotian women who wear concealing clothing.

    PubMed

    Ojah, Rani C I; Welch, Jo M

    2012-05-01

    Bone and muscle weakness due to vitamin D deficiency is common among Muslim women who reside in sunny, equatorial countries. The purpose of this study was to determine if living in a northern maritime location additionally disadvantages women who wear concealing clothes. A cross-sectional matched pair design was used to compare women who habitually wore concealing clothing with women who dressed according to western norms. Each premenopausal hijab-wearing woman (n = 11) was matched by age, height, weight and skin tone with a western-dressed woman. Subjects were tested by hand grip dynamometry to assess muscular strength and by quantitative ultrasound at the calcaneus to assess bone status. Nutritional intake was obtained by 24 h recall. Serum 25-hydroxyvitamin D (s-25(OH)D) status was determined in seven matched pairs. The hijab group had lower s-25(OH)D than women who wore western clothes (40 ± 28 vs. 81 ± 32 nmol/L, p= 0.01). Grip strength in the right hand was lower in the hijab-wearing women (p = 0.05) but this appeared to be due to less participation in intense exercise. Bone status did not differ between groups (p= 0.9). Dietary intake of vitamin D was lower in the hijab-wearers (316 ± 353 vs. 601 ± 341 IU/day, p= 0.001). This pilot study suggests that women living in a northern maritime location appear to be at risk for vitamin D insufficiency and therefore should consider taking vitamin D supplements.

  6. Enhanced terahertz imaging system performance analysis and design tool for concealed weapon identification

    NASA Astrophysics Data System (ADS)

    Murrill, Steven R.; Franck, Charmaine C.; Espinola, Richard L.; Petkie, Douglas T.; De Lucia, Frank C.; Jacobs, Eddie L.

    2011-11-01

    The U.S. Army Research Laboratory (ARL) and the U.S. Army Night Vision and Electronic Sensors Directorate (NVESD) have developed a terahertz-band imaging system performance model/tool for detection and identification of concealed weaponry. The details of the MATLAB-based model which accounts for the effects of all critical sensor and display components, and for the effects of atmospheric attenuation, concealment material attenuation, and active illumination, were reported on at the 2005 SPIE Europe Security & Defence Symposium (Brugge). An advanced version of the base model that accounts for both the dramatic impact that target and background orientation can have on target observability as related to specular and Lambertian reflections captured by an active-illumination-based imaging system, and for the impact of target and background thermal emission, was reported on at the 2007 SPIE Defense and Security Symposium (Orlando). This paper will provide a comprehensive review of an enhanced, user-friendly, Windows-executable, terahertz-band imaging system performance analysis and design tool that now includes additional features such as a MODTRAN-based atmospheric attenuation calculator and advanced system architecture configuration inputs that allow for straightforward performance analysis of active or passive systems based on scanning (single- or line-array detector element(s)) or staring (focal-plane-array detector elements) imaging architectures. This newly enhanced THz imaging system design tool is an extension of the advanced THz imaging system performance model that was developed under the Defense Advanced Research Project Agency's (DARPA) Terahertz Imaging Focal-Plane Technology (TIFT) program. This paper will also provide example system component (active-illumination source and detector) trade-study analyses using the new features of this user-friendly THz imaging system performance analysis and design tool.

  7. Analysis of potential dynamic concealed factors in the difficulty of lower third molar extraction

    PubMed Central

    Singh, Pradeep; Ajmera, Deepal-Haresh; Xiao, Shui-Sheng; Liu, Xiong; Peng, Bin

    2016-01-01

    Background The purpose of this study was to identify potential concealed variables associated with the difficulty of lower third molar (M3) extractions. Material and Methods To address the research purpose, we implemented a prospective study and enrolled a sample of subjects presenting for M3 removal. Predictor variables were categorized into Group-I and Group-II, based on predetermined criteria. The primary outcome variable was the difficulty of extraction, measured as extraction time. Appropriate univariate and multivariate statistics were computed using ordinal logistic regression. Results The sample comprised of 1235 subjects with a mean age of 29.49 +/- 8.92 years in Group-I and 26.20 +/- 11.55 years in Group-II subjects. The mean operating time per M3 extraction was 21.24 +/- 12.80 and 20.24 +/- 12.50 minutes for Group-I and Group-II subjects respectively. Three linear parameters including B-M2 height (distance between imaginary point B on the inferior border of mandibular body, and M2), lingual cortical thickness, bone density and one angular parameter including Rc-Cs angle (angle between ramus curvature and curve of spee), in addition to patient’s age, profile type, facial type, cant of occlusal plane, and decreased overbite, were found to be statistically associated (P < or = 0.05) with extraction difficulty under regression models. Conclusions In conclusion, our study indicates that the difficulty of lower M3 extractions is possibly governed by morphological and biomechanical factors with substantial influence of myofunctional factors. Practical Implications: Preoperative evaluation of dynamic concealed factors may not only help in envisaging the difficulty and planning of surgical approach but might also help in better time management in clinical practice. Key words:Third molar, impacted, extraction, mandibular, facial type. PMID:27694781

  8. Brain fingerprinting classification concealed information test detects US Navy military medical information with P300

    PubMed Central

    Farwell, Lawrence A.; Richardson, Drew C.; Richardson, Graham M.; Furedy, John J.

    2014-01-01

    A classification concealed information test (CIT) used the “brain fingerprinting” method of applying P300 event-related potential (ERP) in detecting information that is (1) acquired in real life and (2) unique to US Navy experts in military medicine. Military medicine experts and non-experts were asked to push buttons in response to three types of text stimuli. Targets contain known information relevant to military medicine, are identified to subjects as relevant, and require pushing one button. Subjects are told to push another button to all other stimuli. Probes contain concealed information relevant to military medicine, and are not identified to subjects. Irrelevants contain equally plausible, but incorrect/irrelevant information. Error rate was 0%. Median and mean statistical confidences for individual determinations were 99.9% with no indeterminates (results lacking sufficiently high statistical confidence to be classified). We compared error rate and statistical confidence for determinations of both information present and information absent produced by classification CIT (Is a probe ERP more similar to a target or to an irrelevant ERP?) vs. comparison CIT (Does a probe produce a larger ERP than an irrelevant?) using P300 plus the late negative component (LNP; together, P300-MERMER). Comparison CIT produced a significantly higher error rate (20%) and lower statistical confidences: mean 67%; information-absent mean was 28.9%, less than chance (50%). We compared analysis using P300 alone with the P300 + LNP. P300 alone produced the same 0% error rate but significantly lower statistical confidences. These findings add to the evidence that the brain fingerprinting methods as described here provide sufficient conditions to produce less than 1% error rate and greater than 95% median statistical confidence in a CIT on information obtained in the course of real life that is characteristic of individuals with specific training, expertise, or organizational

  9. Brain fingerprinting classification concealed information test detects US Navy military medical information with P300.

    PubMed

    Farwell, Lawrence A; Richardson, Drew C; Richardson, Graham M; Furedy, John J

    2014-01-01

    A classification concealed information test (CIT) used the "brain fingerprinting" method of applying P300 event-related potential (ERP) in detecting information that is (1) acquired in real life and (2) unique to US Navy experts in military medicine. Military medicine experts and non-experts were asked to push buttons in response to three types of text stimuli. Targets contain known information relevant to military medicine, are identified to subjects as relevant, and require pushing one button. Subjects are told to push another button to all other stimuli. Probes contain concealed information relevant to military medicine, and are not identified to subjects. Irrelevants contain equally plausible, but incorrect/irrelevant information. Error rate was 0%. Median and mean statistical confidences for individual determinations were 99.9% with no indeterminates (results lacking sufficiently high statistical confidence to be classified). We compared error rate and statistical confidence for determinations of both information present and information absent produced by classification CIT (Is a probe ERP more similar to a target or to an irrelevant ERP?) vs. comparison CIT (Does a probe produce a larger ERP than an irrelevant?) using P300 plus the late negative component (LNP; together, P300-MERMER). Comparison CIT produced a significantly higher error rate (20%) and lower statistical confidences: mean 67%; information-absent mean was 28.9%, less than chance (50%). We compared analysis using P300 alone with the P300 + LNP. P300 alone produced the same 0% error rate but significantly lower statistical confidences. These findings add to the evidence that the brain fingerprinting methods as described here provide sufficient conditions to produce less than 1% error rate and greater than 95% median statistical confidence in a CIT on information obtained in the course of real life that is characteristic of individuals with specific training, expertise, or organizational

  10. Disclosure and Concealment of Sexual Orientation and the Mental Health of Non-Gay-Identified, Behaviorally Bisexual Men

    ERIC Educational Resources Information Center

    Schrimshaw, Eric W.; Siegel, Karolynn; Downing, Martin J., Jr.; Parsons, Jeffrey T.

    2013-01-01

    Objective: Although bisexual men report lower levels of mental health relative to gay men, few studies have examined the factors that contribute to bisexual men's mental health. Bisexual men are less likely to disclose, and more likely to conceal (i.e., a desire to hide), their sexual orientation than gay men. Theory suggests that this may…

  11. Limitation of tachycardia zone resulting from longitudinal dissociation of the atrioventricular node in concealed pre-excitation.

    PubMed Central

    Littmann, L; Svenson, R H

    1981-01-01

    Two cases with a concealed left-sided accessory atrioventricular bypass tract are described. In both, functional longitudinal dissociation of the atrioventricular node narrowed the range of atrial premature beat coupling intervals which could initiate re-entry using the accessory pathway. In case 1 early premature atrial beats were followed by an atrioventricular nodal re-entrant echo. The atrial echo pre-empted retrograde conduction over the Kent bundle and thus limited the development of paroxysmal supraventricular tachycardia. In case 2 atrioventricular nodal conduction showed typical features ascribed to dual atrioventricular nodal pathways. In addition there was a bradycardia-related retrograde block in the concealed accessory pathway. Early premature atrial beats, because of exclusive "slow pathway" anterograde conduction, arrived at the ventricles during the period of bradycardia-dependent retrograde block and failed to initiate a macro re-entrant tachycardia. This study shows that (1) longitudinal dissociation within the atrioventricular node may limit the ability to initiate tachycardia in patients with concealed pre-excitation; and (2) discontinuous atrioventricular nodal conduction curves occasionally help to reveal bradycardia-related retrograde block in a concealed accessory pathway. PMID:7295423

  12. Self-Concealment, Social Network Sites Usage, Social Appearance Anxiety, Loneliness of High School Students: A Model Testing

    ERIC Educational Resources Information Center

    Dogan, Ugur; Çolak, Tugba Seda

    2016-01-01

    This study was tested a model for explain to social networks sites (SNS) usage with structural equation modeling (SEM). Using SEM on a sample of 475 high school students (35% male, 65% female) students, model was investigated the relationship between self-concealment, social appearance anxiety, loneliness on SNS such as Twitter and Facebook usage.…

  13. Geochemical Data for Samples Collected in 2008 Near the Concealed Pebble Porphyry Cu-Au-Mo Deposit, Southwest Alaska

    USGS Publications Warehouse

    Fey, David L.; Granitto, Matthew; Giles, Stuart A.; Smith, Steven M.; Eppinger, Robert G.; Kelley, Karen D.

    2009-01-01

    In the summer of 2007, the U.S. Geological Survey (USGS) began an exploration geochemical research study over the Pebble porphyry copper-gold-molybdenum deposit. This report presents the analytical data collected in 2008. The Pebble deposit is world class in size, and is almost entirely concealed by tundra, glacial deposits, and post-Cretaceous volcanic rocks. The Pebble deposit was chosen for this study because it is concealed by surficial cover rocks, is relatively undisturbed (except for exploration company drill holes), is a large mineral system, and is fairly well-constrained at depth by the drill hole geology and geochemistry. The goals of this study are to 1) determine whether the concealed deposit can be detected with surface samples, 2) better understand the processes of metal migration from the deposit to the surface, and 3) test and develop methods for assessing mineral resources in similar concealed terrains. The analytical data are presented as an integrated Microsoft Access 2003 database and as separate Excel files.

  14. Prostate cancer between prognosis and adequate/proper therapy

    PubMed Central

    Grozescu, T; Popa, F

    2017-01-01

    Knowing the indolent, non-invasive nature of most types of prostate cancer, as well as the simple fact that the disease seems more likely to be associated with age rather than with other factors (50% of men at the age of 50 and 80% at the age of 80 have it [1], with or without presenting any symptom), the big challenge of this clinical entity was to determine severity indicators (so far insufficient) to guide the physician towards an adequate attitude in the clinical setting. The risk of over-diagnosing and over-treating many prostate cancer cases (indicated by all the major European and American studies) is real and poses many question marks. The present paper was meant to deliver new research data and to reset the clinical approach in prostate cancer cases. PMID:28255369

  15. The cerebellopontine angle: does the translabyrinthine approach give adequate access?

    PubMed

    Fagan, P A; Sheehy, J P; Chang, P; Doust, B D; Coakley, D; Atlas, M D

    1998-05-01

    A long-standing but unfounded criticism of the translabyrinthine approach is the misperception that this approach does not give adequate access to the cerebellopontine angle. Because of what is perceived as limited visualization and operating space within the cerebellopontine angle, some surgeons still believe that the translabyrinthine approach is inappropriate for large acoustic tumors. In this study, the surgical access to the cerebellopontine angle by virtue of the translabyrinthine approach is measured and analyzed. The parameters are compared with those measured for the retrosigmoid approach. This series objectively confirms that the translabyrinthine approach offers the neurotologic surgeon a shorter operative depth to the tumor, via a similar-sized craniotomy. This permits superior visualization by virtue of a wider angle of surgical access. Such access is achieved with the merit of minimal cerebellar retraction.

  16. Barriers to adequate prenatal care utilization in American Samoa

    PubMed Central

    Hawley, Nicola L; Brown, Carolyn; Nu’usolia, Ofeira; Ah-Ching, John; Muasau-Howard, Bethel; McGarvey, Stephen T

    2013-01-01

    Objective To describe the utilization of prenatal care in American Samoan women and to identify socio-demographic predictors of inadequate prenatal care utilization. Methods Using data from prenatal clinic records, women (n=692) were categorized according to the Adequacy of Prenatal Care Utilization Index as having received adequate plus, adequate, intermediate or inadequate prenatal care during their pregnancy. Categorical socio-demographic predictors of the timing of initiation of prenatal care (week of gestation) and the adequacy of received services were identified using one way Analysis of Variance (ANOVA) and independent samples t-tests. Results Between 2001 and 2008 85.4% of women received inadequate prenatal care. Parity (P=0.02), maternal unemployment (P=0.03), and both parents being unemployed (P=0.03) were negatively associated with the timing of prenatal care initation. Giving birth in 2007–2008, after a prenatal care incentive scheme had been introduced in the major hospital, was associated with earlier initiation of prenatal care (20.75 versus 25.12 weeks; P<0.01) and improved adequacy of received services (95.04% versus 83.8%; P=0.02). Conclusion The poor prenatal care utilization in American Samoa is a major concern. Improving healthcare accessibility will be key in encouraging women to attend prenatal care. The significant improvements in the adequacy of prenatal care seen in 2007–2008 suggest that the prenatal care incentive program implemented in 2006 may be a very positive step toward addressing issues of prenatal care utilization in this population. PMID:24045912

  17. 10 CFR 455.31 - Allocation formulas.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... DEPARTMENT OF ENERGY ENERGY CONSERVATION GRANT PROGRAMS FOR SCHOOLS AND HOSPITALS AND BUILDINGS OWNED BY... conservation measures, including renewable resource measures, for schools and hospitals, shall be allocated... percent of all amounts allocated in any grant program cycle. No State will be allocated more than...

  18. 42 CFR 457.228 - Cost allocation.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 4 2011-10-01 2011-10-01 false Cost allocation. 457.228 Section 457.228 Public...; Reduction of Federal Medical Payments § 457.228 Cost allocation. A State plan must provide that the single or appropriate CHIP Agency will have an approved cost allocation plan on file with the Department...

  19. 42 CFR 433.34 - Cost allocation.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 4 2011-10-01 2011-10-01 false Cost allocation. 433.34 Section 433.34 Public... Provisions § 433.34 Cost allocation. A State plan under Title XIX of the Social Security Act must provide that the single or appropriate Agency will have an approved cost allocation plan on file with...

  20. 50 CFR 600.517 - Allocations.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 50 Wildlife and Fisheries 12 2014-10-01 2014-10-01 false Allocations. 600.517 Section 600.517 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION... allocation. The burden of ascertaining and accurately transmitting current allocations and status of...

  1. 50 CFR 600.517 - Allocations.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 50 Wildlife and Fisheries 10 2011-10-01 2011-10-01 false Allocations. 600.517 Section 600.517 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION... allocation. The burden of ascertaining and accurately transmitting current allocations and status of...

  2. 50 CFR 600.517 - Allocations.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 50 Wildlife and Fisheries 12 2012-10-01 2012-10-01 false Allocations. 600.517 Section 600.517 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION... allocation. The burden of ascertaining and accurately transmitting current allocations and status of...

  3. 24 CFR 945.203 - Allocation plan.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 24 Housing and Urban Development 4 2014-04-01 2014-04-01 false Allocation plan. 945.203 Section... FAMILIES Application and Approval Procedures § 945.203 Allocation plan. (a) Applicable terminology. (1) As used in this section, the terms “initial allocation plan” refers to the PHA's first submission of...

  4. Communication patterns and allocation strategies.

    SciTech Connect

    Leung, Vitus Joseph; Mache, Jens Wolfgang; Bunde, David P.

    2004-01-01

    Motivated by observations about job runtimes on the CPlant system, we use a trace-driven microsimulator to begin characterizing the performance of different classes of allocation algorithms on jobs with different communication patterns in space-shared parallel systems with mesh topology. We show that relative performance varies considerably with communication pattern. The Paging strategy using the Hilbert space-filling curve and the Best Fit heuristic performed best across several communication patterns.

  5. Minority Transportation Expenditure Allocation Model

    SciTech Connect

    Vyas, Anant D.; Santini, Danilo J.; Marik, Sheri K.

    1993-04-12

    MITRAM (Minority TRansportation expenditure Allocation Model) can project various transportation related attributes of minority (Black and Hispanic) and majority (white) populations. The model projects vehicle ownership, vehicle miles of travel, workers, new car and on-road fleet fuel economy, amount and share of household income spent on gasoline, and household expenditures on public transportation and taxis. MITRAM predicts reactions to sustained fuel price changes for up to 10 years after the change.

  6. Algorithms for optimal redundancy allocation

    SciTech Connect

    Vandenkieboom, J.; Youngblood, R.

    1993-01-01

    Heuristic and exact methods for solving the redundancy allocation problem are compared to an approach based on genetic algorithms. The various methods are applied to the bridge problem, which has been used as a benchmark in earlier work on optimization methods. Comparisons are presented in terms of the best configuration found by each method, and the computation effort which was necessary in order to find it.

  7. Systemic Crisis of Civilization: In Search for Adequate Solution

    NASA Astrophysics Data System (ADS)

    Khozin, Grigori

    In December 1972 a jumbo jet crashed in the Florida Everglades with the loss of 101 lives. The pilot, distracted by a minor malfunction, failed to note until too late the warning signal that - correctly - indicated an impending disaster. His sudden, astonished cry of Hey, what happening here? were his last words 1. Three decades after this tragic episode, as the Humankind approaches the threshold of the third Millennium, the problem of adequate reaction to warning signals of different nature and of distinguishing minor malfunctions in everyday life of society, in economy and technology as well as in evolution of biosphere from grave threats to the world community and the phenomenon of life on our planet remains crucial to human survival and the future of Civilization. Rational use of knowledge and technology available to the world community remains in this context the corner stone of discussions on the destiny of the intelligent life both on the planet Earth and in the Universe (the fact of intelligent life in the Universe is to be detected by the Humankind)…

  8. ENSURING ADEQUATE SAFETY WHEN USING HYDROGEN AS A FUEL

    SciTech Connect

    Coutts, D

    2007-01-22

    Demonstration projects using hydrogen as a fuel are becoming very common. Often these projects rely on project-specific risk evaluations to support project safety decisions. This is necessary because regulations, codes, and standards (hereafter referred to as standards) are just being developed. This paper will review some of the approaches being used in these evolving standards, and techniques which demonstration projects can implement to bridge the gap between current requirements and stakeholder desires. Many of the evolving standards for hydrogen-fuel use performance-based language, which establishes minimum performance and safety objectives, as compared with prescriptive-based language that prescribes specific design solutions. This is being done for several reasons including: (1) concern that establishing specific design solutions too early will stifle invention, (2) sparse performance data necessary to support selection of design approaches, and (3) a risk-adverse public which is unwilling to accept losses that were incurred in developing previous prescriptive design standards. The evolving standards often contain words such as: ''The manufacturer shall implement the measures and provide the information necessary to minimize the risk of endangering a person's safety or health''. This typically implies that the manufacturer or project manager must produce and document an acceptable level of risk. If accomplished using comprehensive and systematic process the demonstration project risk assessment can ease the transition to widespread commercialization. An approach to adequately evaluate and document the safety risk will be presented.

  9. DARHT -- an adequate EIS: A NEPA case study

    SciTech Connect

    Webb, M.D.

    1997-08-01

    In April 1996 the US District Court in Albuquerque ruled that the Dual Axis Radiographic Hydrodynamic Test (DARHT) Facility Environmental Impact Statement (EIS), prepared by the Los Alamos Area Office, US Department of Energy (DOE), was adequate. The DARHT EIS had been prepared in the face of a lawsuit in only 10 months, a third of the time usually allotted for a DOE EIS, and for only a small fraction of the cost of a typical DOE EIS, and for only a small fraction of the cost of a typical DOE EIS. It subject was the first major facility to be built in decades for the DOE nuclear weapons stockpile stewardship program. It was the first EIS to be prepared for a proposal at DOE`s Los Alamos National Laboratory since 1979, and the first ever prepared by the Los Alamos Area Office. Much of the subject matter was classified. The facility had been specially designed to minimize impacts to a nearby prehistoric Native American ruin, and extensive consultation with American Indian Pueblos was required. The week that the draft EIS was published Laboratory biologists identified a previously unknown pair of Mexican spotted owls in the immediate vicinity of the project, bringing into play the consultation requirements of the Endangered Species Act. In spite of these obstacles, the resultant DARHT EIS was reviewed by the court and found to meet all statutory and regulatory requirements; the court praised the treatment of the classified material which served as a basis for the environmental analysis.

  10. Dose Limits for Man do not Adequately Protect the Ecosystem

    SciTech Connect

    Higley, Kathryn A.; Alexakhin, Rudolf M.; McDonald, Joseph C.

    2004-08-01

    It has been known for quite some time that different organisms display differing degrees of sensitivity to the effects of ionizing radiations. Some microorganisms such as the bacterium Micrococcus radiodurans, along with many species of invertebrates, are extremely radio-resistant. Humans might be categorized as being relatively sensitive to radiation, and are a bit more resistant than some pine trees. Therefore, it could be argued that maintaining the dose limits necessary to protect humans will also result in the protection of most other species of flora and fauna. This concept is usually referred to as the anthropocentric approach. In other words, if man is protected then the environment is also adequately protected. The ecocentric approach might be stated as; the health of humans is effectively protected only when the environment is not unduly exposed to radiation. The ICRP is working on new recommendations dealing with the protection of the environment, and this debate should help to highlight a number of relevant issues concerning that topic.

  11. Allocating Variability and Reserve Requirements (Presentation)

    SciTech Connect

    Kirby, B.; King, J.; Milligan, M.

    2011-10-01

    This presentation describes how you could conceivably allocate variability and reserve requirements, including how to allocate aggregation benefits. Conclusions of this presentation are: (1) Aggregation provides benefits because individual requirements are not 100% correlated; (2) Method needed to allocate reduced requirement among participants; (3) Differences between allocation results are subtle - (a) Not immediately obvious which method is 'better'; (b) Many are numerically 'correct', they sum to the physical requirement; (c) Many are not 'fair', Results depend on sub-aggregation and/or the order individuals are included; and (4) Vector allocation method is simple and fair.

  12. Concealment, communication and stigma: The perspectives of HIV-positive immigrant Black African men and their partners living in the United Kingdom.

    PubMed

    Owuor, John Oa; Locke, Abigail; Heyman, Bob; Clifton, Andrew

    2016-12-01

    This study explored the perspectives of Black men, originally from East Africa, living in the United Kingdom and their partners on what it means to live with diagnosed HIV. This article reports on concealment of HIV-positive status as a strategy adopted by the affected participants to manage the flow of information about their HIV-positive status. Analysis of the data, collected using in-depth interviews involving 23 participants, found widespread selective concealment of HIV-positive status. However, a few respondents had 'come out' publicly about their condition. HIV prevention initiatives should recognise concealment as a vital strategy in managing communication about one's HIV-positive status.

  13. 45 CFR 402.31 - Determination of allocations.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... ASSISTANCE GRANTS State Allocations § 402.31 Determination of allocations. (a) Allocation formula. Allocations will be computed according to a formula using the following factors and weights: (1) 50...

  14. On Adequate Comparisons of Antenna Phase Center Variations

    NASA Astrophysics Data System (ADS)

    Schoen, S.; Kersten, T.

    2013-12-01

    One important part for ensuring the high quality of the International GNSS Service's (IGS) products is the collection and publication of receiver - and satellite antenna phase center variations (PCV). The PCV are crucial for global and regional networks, since they introduce a global scale factor of up to 16ppb or changes in the height component with an amount of up to 10cm, respectively. Furthermore, antenna phase center variations are also important for precise orbit determination, navigation and positioning of mobile platforms, like e.g. the GOCE and GRACE gravity missions, or for the accurate Precise Point Positioning (PPP) processing. Using the EUREF Permanent Network (EPN), Baire et al. (2012) showed that individual PCV values have a significant impact on the geodetic positioning. The statements are further supported by studies of Steigenberger et al. (2013) where the impact of PCV for local-ties are analysed. Currently, there are five calibration institutions including the Institut für Erdmessung (IfE) contributing to the IGS PCV file. Different approaches like field calibrations and anechoic chamber measurements are in use. Additionally, the computation and parameterization of the PCV are completely different within the methods. Therefore, every new approach has to pass a benchmark test in order to ensure that variations of PCV values of an identical antenna obtained from different methods are as consistent as possible. Since the number of approaches to obtain these PCV values rises with the number of calibration institutions, there is the necessity for an adequate comparison concept, taking into account not only the numerical values but also stochastic information and computational issues of the determined PCVs. This is of special importance, since the majority of calibrated receiver antennas published by the IGS origin from absolute field calibrations based on the Hannover Concept, Wübbena et al. (2000). In this contribution, a concept for the adequate

  15. Are Vancomycin Trough Concentrations Adequate for Optimal Dosing?

    PubMed Central

    Youn, Gilmer; Jones, Brenda; Jelliffe, Roger W.; Drusano, George L.; Rodvold, Keith A.; Lodise, Thomas P.

    2014-01-01

    The current vancomycin therapeutic guidelines recommend the use of only trough concentrations to manage the dosing of adults with Staphylococcus aureus infections. Both vancomycin efficacy and toxicity are likely to be related to the area under the plasma concentration-time curve (AUC). We assembled richly sampled vancomycin pharmacokinetic data from three studies comprising 47 adults with various levels of renal function. With Pmetrics, the nonparametric population modeling package for R, we compared AUCs estimated from models derived from trough-only and peak-trough depleted versions of the full data set and characterized the relationship between the vancomycin trough concentration and AUC. The trough-only and peak-trough depleted data sets underestimated the true AUCs compared to the full model by a mean (95% confidence interval) of 23% (11 to 33%; P = 0.0001) and 14% (7 to 19%; P < 0.0001), respectively. In contrast, using the full model as a Bayesian prior with trough-only data allowed 97% (93 to 102%; P = 0.23) accurate AUC estimation. On the basis of 5,000 profiles simulated from the full model, among adults with normal renal function and a therapeutic AUC of ≥400 mg · h/liter for an organism for which the vancomycin MIC is 1 mg/liter, approximately 60% are expected to have a trough concentration below the suggested minimum target of 15 mg/liter for serious infections, which could result in needlessly increased doses and a risk of toxicity. Our data indicate that adjustment of vancomycin doses on the basis of trough concentrations without a Bayesian tool results in poor achievement of maximally safe and effective drug exposures in plasma and that many adults can have an adequate vancomycin AUC with a trough concentration of <15 mg/liter. PMID:24165176

  16. Is clinical measurement of anatomic axis of the femur adequate?

    PubMed

    Wu, Chi-Chuan

    2017-03-23

    Background and purpose - The accuracy of using clinical measurement from the anterior superior iliac spine (ASIS) to the center of the knee to determine an anatomic axis of the femur has rarely been studied. A radiographic technique with a full-length standing scanogram (FLSS) was used to assess the adequacy of the clinical measurement. Patients and methods - 100 consecutive young adult patients (mean age 34 (20-40) years) with chronic unilateral lower extremity injuries were studied. The pelvis and intact contralateral lower extremity images in the FLSS were selected for study. The angles between the tibial axis and the femoral shaft anatomic axis (S-AA), the piriformis anatomic axis (P-AA), the clinical anatomic axis (C-AA), and the mechanical axis (MA) were compared between sexes. Results - Only the S-AA and C-AA angles were statistically significantly different in the 100 patients (3.6° vs. 2.8°; p = 0.03). There was a strong correlation between S-AA, P-AA, and C-AA angles (r > 0.9). The average intersecting angle between MA and S-AA in the femur in the 100 patients was 5.5°, and it was 4.8° between MA and C-AA. Interpretation - Clinical measurement of an anatomic axis from the ASIS to the center of the knee may be an adequate and acceptable method to determine lower extremity alignment. The optimal inlet for antegrade femoral intramedullary nailing may be the lateral edge of the piriformis fossa.

  17. Evaluation of active and passive near-millimeter-wave radiometric imaging techniques for detection of concealed objects

    SciTech Connect

    Reber, E.E.; Foote, F.B.; Schellenbaum, R.L.; Bradley, R.G.

    1981-07-01

    Active and passive radiometric imaging techniques have been used at 1.4- and 3-mm wavelengths (220 and 100 GHz) to evaluate their potential use in detecting concealed objects. An evaluation of the techniques includes a particular study of their potential in detecting shielded nuclear materials and explosives carried covertly by personnel. We have previously reported images of metal objects and nuclear shielding materials that were detected when concealed under clothing. These images appear with the human body as background. Detection of contraband by radiometric imaging techniques depends upon the differences in emissivity and reflectivity of the contraband relative to human tissue. Explosives, unlike metals and metal composites, generally have high emissivities and low reflectivities that closely approximate those of human tissue making explosives difficult to detect. Samples of several common types of explosives (TNT, Detasheet, C4, and several types of water gels) have been examined at the 1.4- and 3-mm wavelengths using active and passive radiometric techniques.

  18. Being white helps: intersections of self-concealment, stigmatization, identity formation, and psychological distress in racial and sexual minority women.

    PubMed

    McIntyre, Shannon L; Antonucci, Erica A; Haden, Sara C

    2014-01-01

    This study had two objectives: (1) examine the impact of self-concealment on identity formation and on degree of psychological distress and (2) examine the impact of perceived stigma on identity formation and on degree of psychological distress. Analyses were conducted on a diverse sample of 166 women, ages 18-32 (white lesbian, non-white lesbian, white heterosexual, and non-white heterosexual). Findings revealed that self-concealment was positively associated with psychological distress in stigmatized women, but unrelated to psychological distress in the non-stigmatized group. Furthermore, although perceived stigma negatively impacted identity formation in the heterosexual groups, it did not impact either group of lesbians. Finally, non-white heterosexual women's perception of stigma was associated with psychological distress. Implications and specific psychological health disparities between groups are discussed.

  19. A new discrimination method for the Concealed Information Test using pretest data and within-individual comparisons.

    PubMed

    Matsuda, Izumi; Hirota, Akihisa; Ogawa, Tokihiro; Takasawa, Noriyoshi; Shigemasu, Kazuo

    2006-08-01

    A latent class discrimination method is proposed for analyzing autonomic responses on the concealed information test. Because there are significant individual differences in autonomic responses, individual response patterns are estimated on the pretest. Then an appropriate discriminant formula for the response pattern of each individual is applied to the CIT test results. The probability that the individual concealed information is calculated by comparing the discriminant formula value of the crime-related item to that of non-crime-related items. The discrimination performance of the latent class discrimination method was higher than those of the logistic regression method and the discriminant analysis method in an experimental demonstration applying the three methods to the same data set.

  20. Detection of contraband concealed on the body using x-ray imaging

    NASA Astrophysics Data System (ADS)

    Smith, Gerald J.

    1997-01-01

    In an effort to avoid detection, smugglers and terrorists are increasingly using the body as a vehicle for transporting illicit drugs, weapons, and explosives. This trend illustrates the natural tendency of traffickers to seek the path of least resistance, as improved interdiction technology and operational effectiveness have been brought to bear on other trafficking avenues such as luggage, cargo, and parcels. In response, improved technology for human inspection is being developed using a variety of techniques. ASE's BodySearch X-ray Inspection Systems uses backscatter x-ray imaging of the human body to quickly, safely, and effectively screen for drugs, weapons, and explosives concealed on the body. This paper reviews the law enforcement and social issues involved in human inspections, and briefly describes the ASE BodySearch systems. Operator training, x-ray image interpretation, and maximizing systems effectiveness are also discussed. Finally, data collected from operation of the BodySearch system in the field is presented, and new law enforcement initiatives which have come about due to recent events are reviewed.

  1. Physiological responses in a Concealed Information Test are determined interactively by encoding procedure and questioning format.

    PubMed

    Ambach, Wolfgang; Dummel, Sebastian; Lüer, Theresa; Vaitl, Dieter

    2011-09-01

    Physiological responses in the Concealed Information Test (CIT) are known to depend on the depth of encoding critical items; CIT questions commonly refer to knowledge about critical items. It is unclear to what extent (1) different modes of item handling in a mock-crime, and (2) alternative questioning formats, e.g. asking about participants' particular actions with the critical items, influence the physiological responses. In the presented mock-crime study with fifty-three participants, two questioning formats, i.e. "Did you see …?" (viewing questioning) and "Did you steal …?" (stealing questioning), were compared between subjects. The mode of encoding, stealing vs. merely viewing the critical objects, was varied within subject. Skin conductance, electrocardiogram, respiration, and finger pulse were recorded. For both questioning formats and each physiological measure, physiological responses to stolen as well as merely viewed objects differed from those to irrelevant objects. Considering viewing questioning, responses to stolen and merely viewed objects did not differ, with the exception of greater phasic decreases of heart rate for stolen objects. Considering stealing questioning, responses to stolen objects exceeded those to merely viewed objects with each physiological measure. The statistically proven interaction between mode of encoding a particular object and questioning format sheds light on the factors influencing the physiological responses in a CIT. The level of subjective significance of a particular item might emerge interactively from the mode of item handling and the questioning format.

  2. Hiding true emotions: micro-expressions in eyes retrospectively concealed by mouth movements.

    PubMed

    Iwasaki, Miho; Noguchi, Yasuki

    2016-02-26

    When we encounter someone we dislike, we may momentarily display a reflexive disgust expression, only to follow-up with a forced smile and greeting. Our daily lives are replete with a mixture of true and fake expressions. Nevertheless, are these fake expressions really effective at hiding our true emotions? Here we show that brief emotional changes in the eyes (micro-expressions, thought to reflect true emotions) can be successfully concealed by follow-up mouth movements (e.g. a smile). In the same manner as backward masking, mouth movements of a face inhibited conscious detection of all types of micro-expressions in that face, even when viewers paid full attention to the eye region. This masking works only in a backward direction, however, because no disrupting effect was observed when the mouth change preceded the eye change. These results provide scientific evidence for everyday behaviours like smiling to dissemble, and further clarify a major reason for the difficulty we face in discriminating genuine from fake emotional expressions.

  3. Ambulatory blood pressure monitoring during pregnancy with a new, small, easily concealed monitor.

    PubMed

    Tape, T G; Rayburn, W F; Bremer, K D; Schnoor, T A

    1994-12-01

    Before establishing the utility of ambulatory blood pressure monitoring during pregnancy, we evaluated the accuracy of a small, easily concealed monitor. The 59 normotensive pregnant patients were between 13 and 26 gestational weeks. For each monitor reading, two trained observers independently and simultaneously recorded blood pressures using a mercury manometer connected to the monitor cuff. Seven readings in three positions (sitting upright, semirecumbent, standing) were performed on each patient. Averaged differences between the observers' and monitor readings varied from -2.2 to -0.9 mm Hg (systolic) and from -2.8 to -0.6 (fifth-phase diastolic), indicating slight but clinically unimportant overestimation by the monitor. Correlations between averaged observers' readings and the monitor ranged from 0.79 to 0.92 (systolic) and from 0.85 to 0.92 (fifth-phase diastolic). Overall, the observers agreed with the monitor within 5 mm Hg on 94% of systolic readings and 99% of fifth-phase diastolic readings. There was no statistically significant difference in accuracy with changes in body position. We conclude that this small, quiet, noninvasive device accurately determined blood pressures during pregnancy.

  4. Effect of Temperature and Moisture on the Development of Concealed Damage in Raw Almonds (Prunus dulcis).

    PubMed

    Rogel-Castillo, Cristian; Zuskov, David; Chan, Bronte Lee; Lee, Jihyun; Huang, Guangwei; Mitchell, Alyson E

    2015-09-23

    Concealed damage (CD) is a brown discoloration of nutmeat that appears only after kernels are treated with moderate heat (e.g., roasting). Identifying factors that promote CD in almonds is of significant interest to the nut industry. Herein, the effect of temperature (35 and 45 °C) and moisture (<5, 8, and 11%) on the composition of volatiles in raw almonds (Prunus dulcis var. Nonpareil) was studied using HS-SPME-GC/MS. A CIE LCh colorimetric method was developed to identify raw almonds with CD. A significant increase in CD was demonstrated in almonds exposed to moisture (8% kernel moisture content) at 45 °C as compared to 35 °C. Elevated levels of volatiles related to lipid peroxidation and amino acid degradation were observed in almonds with CD. These results suggest that postharvest moisture exposure resulting in an internal kernel moisture ≥ 8% is a key factor in the development of CD in raw almonds and that CD is accelerated by temperature.

  5. Instant detection and identification of concealed explosive-related compounds: Induced Stokes Raman versus infrared.

    PubMed

    Elbasuney, Sherif; El-Sherif, Ashraf F

    2017-01-01

    The instant detection of explosives and explosive-related compounds has become an urgent priority in recent years for homeland security and counter-terrorism applications. Modern techniques should offer enhancement in selectivity, sensitivity, and standoff distances. Miniaturisation, portability, and field-ruggedisation are crucial requirements. This study reports on instant and standoff identification of concealed explosive-related compounds using customized Raman technique. Stokes Raman spectra of common explosive-related compounds were generated and spectrally resolved to create characteristic finger print spectra. The scattered Raman emissions over the band 400:2000cm(-1) were compared to infrared absorption using FTIR. It has been demonstrated that the two vibrational spectroscopic techniques were opposite and completing each other. Molecular vibrations with strong absorption in infrared (those involve strong change in dipole moments) induced weak signals in Raman and vice versa. The tailored Raman offered instant detection, high sensitivity, and standoff detection capabilities. Raman demonstrated characteristic fingerprint spectra with stable baseline and sharp intense peaks. Complete correlations of absorption/scattered signals to certain molecular vibrations were conducted to generate an entire spectroscopic profile of explosive-related compounds. This manuscript shades the light on Raman as one of the prevailing technologies for instantaneous detection of explosive-related compounds.

  6. A new approach to analyze data from EEG-based concealed face recognition system.

    PubMed

    Mehrnam, A H; Nasrabadi, A M; Ghodousi, Mahrad; Mohammadian, A; Torabi, Sh

    2017-02-10

    The purpose of this study is to extend a feature set with non-linear features to improve classification rate of guilty and innocent subjects. Non-linear features can provide extra information about phase space. The Event-Related Potential (ERP) signals were recorded from 49 subjects who participated in concealed face recognition test. For feature extraction, at first, several morphological characteristics, frequency bands, and wavelet coefficients (we call them basic-features) are extracted from each single-trial ERP. Recurrence Quantification Analysis (RQA) measures are then computed as non-linear features from each single-trial. We apply Genetic Algorithm (GA) to select the best feature set and this feature set is used for classification of data using Linear Discriminant Analysis (LDA) classifier. Next, we use a new approach to improve classification results based on introducing an adaptive-threshold. Results indicate that our method is able to correctly detect 91.83% of subjects (45 correct detection of 49 subjects) using combination of basic and non-linear features, that is higher than 87.75% for basic and 79.59% for non-linear features. This shows that combination of non-linear and basic- features could improve classification rate.

  7. Detection and classification of concealed weapons using a magnetometer-based portal

    NASA Astrophysics Data System (ADS)

    Kotter, Dale K.; Roybal, Lyle G.; Polk, Robert E.

    2002-08-01

    A concealed weapons detection technology was developed through the support of the National Institute of Justice (NIJ) to provide a non intrusive means for rapid detection, location, and archiving of data (including visual) of potential suspects and weapon threats. This technology, developed by the Idaho National Engineering and Environmental Laboratory (INEEL), has been applied in a portal style weapons detection system using passive magnetic sensors as its basis. This paper will report on enhancements to the weapon detection system to enable weapon classification and to discriminate threats from non-threats. Advanced signal processing algorithms were used to analyze the magnetic spectrum generated when a person passes through a portal. These algorithms analyzed multiple variables including variance in the magnetic signature from random weapon placement and/or orientation. They perform pattern recognition and calculate the probability that the collected magnetic signature correlates to a known database of weapon versus non-weapon responses. Neural networks were used to further discriminate weapon type and identify controlled electronic items such as cell phones and pagers. False alarms were further reduced by analyzing the magnetic detector response by using a Joint Time Frequency Analysis digital signal processing technique. The frequency components and power spectrum for a given sensor response were derived. This unique fingerprint provided additional information to aid in signal analysis. This technology has the potential to produce major improvements in weapon detection and classification.

  8. Event-related brain potentials during the standard autonomic-based concealed information test.

    PubMed

    Matsuda, Izumi; Nittono, Hiroshi; Hirota, Akihisa; Ogawa, Tokihiro; Takasawa, Noriyoshi

    2009-10-01

    The concealed information test (CIT) has been used to detect information that examinees possess by means of their autonomic responses. However, the central activities related to these autonomic responses remain unclear. In this study, we simultaneously recorded 128-ch event-related potentials (ERPs) and various autonomic responses (heart rate, respiratory rate, respiratory amplitude, cutaneous blood flow, and skin conductance response) to a critical item (i.e., the item that participants memorized) and to non-critical items (i.e., items other than the critical item) using the standard protocol of the autonomic-based CIT. A topographic analysis of variance and a temporal-spatial principal component analysis revealed that the critical item elicited a larger negative potential (N2b, 205-298 ms) at central regions and a larger positive potential (positive slow wave, 502-744 ms) at parieto-occipital regions, compared to the non-critical items. Correlation analysis across 21 participants showed a significant correlation between N2b increase and heart rate deceleration in response to critical items compared to non-critical items, but there were no autonomic correlates of the positive slow wave. The results suggest that at least two brain processes are involved in the autonomic-based CIT: The first is an attentional-orienting process that facilitates the processing of critical items, to which heart rate deceleration was linked, and the second is an additional process after the identification of critical items.

  9. Improved method for calculating the respiratory line length in the Concealed Information Test.

    PubMed

    Matsuda, Izumi; Ogawa, Tokihiro

    2011-08-01

    The Concealed Information Test (CIT) assesses an examinee's knowledge about a crime based on response differences between crime-relevant and crime-irrelevant items. One effective measure in the CIT is the respiration line length, which is the average of the moving distances of the respiration curve in a specified time interval after the item onset. However, the moving distance differs between parts of a respiratory cycle. As a result, the calculated respiration line length is biased by how the parts of the respiratory cycles are included in the time interval. To resolve this problem, we propose a weighted average method, which calculates the respiration line length per cycle and weights it with the proportion that the cycle occupies in the time interval. Simulation results indicated that the weighted average method removes the bias of respiration line lengths compared to the original method. The results of experimental CIT data demonstrated that the weighted average method significantly increased the discrimination performance as compared with the original method. The weighted average method is a promising method for assessing respiration changes in response to question items more accurately, which improves the respiration-based discrimination performance of the CIT.

  10. Systematic changes in tonic physiological activities during the Concealed Information Test.

    PubMed

    Ogawa, Tokihiro; Matsuda, Izumi; Hirota, Akihisa; Takasawa, Noriyoshi

    2014-12-01

    Many studies on the Concealed Information Test have focused on phasic physiological changes that are temporally locked to stimulus presentation. However, little is known about changes in tonic, basal physiological levels throughout a stimulus series. This study focused on changes in tonic physiological activities during the CIT. Thirty-nine participants carried out a mock theft and subsequently received a CIT. Skin conductance, heart rate, and normalized pulse volume (NPV) were recorded. The pre-stimulus physiological level of these measures throughout the CIT series was compared across a question series with different serial positions of the relevant item. Results showed that changes in the pre-stimulus level differed depending on the serial position of the relevant item. Skin conductance declined throughout the series, but showed a transient increase after relevant item presentation. Heart rate was relatively constant throughout the series, but decreased after relevant item presentation. NPV continued to decrease until the relevant item, but increased thereafter, indicating a pattern similar to the classic Peak of Tension concept. In addition, the pre-stimulus NPV showed a significant relevant-irrelevant difference. Theoretical and practical implications of these findings are discussed.

  11. [Effects of recollection and familiarity on recognition memory in the Concealed Information Test].

    PubMed

    Zaitsu, Wataru; Shibuya, Yusuke

    2013-08-01

    The effects of recollection and familiarity on recognition memory in the Concealed Information Test (CIT) were investigated. In the learning phase, participants encoded 20 words that were presented in one of four frames on a personal computer screen. Next, in the recognition test, the participants were divided into "Remember judgment (Recollection)" or "Know judgment (Familiarity)" groups, based on their Remember/Know judgment when recognizing learned items. In the CIT phase, physiological responses to questions about learned (i.e., critical) and non-learned (i.e., non-critical) items were measured and recorded. The results indicated that there was a deceleration of respiration speed (RS), an increase in skin conductance response (SCR), and a drop in heart rate in responses to critical items for both groups. Furthermore, the effect sizes of RS and SCR were greater in the "Remember judgment" group compared to the "Know judgment" group. These results suggest that critical response patterns are generated by recollection and familiarity. However, the more vividly participants recognized critical items the larger were the magnitudes of RS and SCR response patterns.

  12. Shall-issue policy and criminal activity among applicants for permits to carry concealed firearms.

    PubMed

    Romero, M; Wintemute, G; Wright, M; Parham, C

    2003-12-01

    Permits to carry concealed firearms in public (CCW permits) remain controversial. A small scale natural experiment with shall-issue CCW permit policy in California, a may-issue state, is reported. During the mid-1990s, the chief of police of the Sacramento County town of Isleton issued permits to all county residents who applied and passed a standard background check. This program received national publicity. The incidence of subsequent criminal activity among 691 persons applying for CCW permits through Isleton's program in 1995 and that in a statewide sample of 965 CCW applicants from 1993-94 were compared. Subjects were followed up for three years from their application dates. The arrest rates for violent crime among Isleton and statewide applicants were 291 and 104 per 100 000 person-years, respectively (relative risk 2.8, 95% confidence interval 0.7 to 11.2, p = 0.18). This suggests that a shall-issue policy for CCW permits may result in higher rates of violent crime among permit holders, but the results do not reach statistical significance; larger studies are needed.

  13. Paternal signature in kin recognition cues of a social insect: concealed in juveniles, revealed in adults.

    PubMed

    Wong, Janine W Y; Meunier, Joël; Lucas, Christophe; Kölliker, Mathias

    2014-10-22

    Kin recognition is a key mechanism to direct social behaviours towards related individuals or avoid inbreeding depression. In insects, recognition is generally mediated by cuticular hydrocarbon (CHC) compounds, which are partly inherited from parents. However, in social insects, potential nepotistic conflicts between group members from different patrilines are predicted to select against the expression of patriline-specific signatures in CHC profiles. Whereas this key prediction in the evolution of insect signalling received empirical support in eusocial insects, it remains unclear whether it can be generalized beyond eusociality to less-derived forms of social life. Here, we addressed this issue by manipulating the number of fathers siring clutches tended by females of the European earwig, Forficula auricularia, analysing the CHC profiles of the resulting juvenile and adult offspring, and using discriminant analysis to estimate the information content of CHC with respect to the maternal and paternal origin of individuals. As predicted, if paternally inherited cues are concealed during family life, increases in mating number had no effect on information content of CHC profiles among earwig juveniles, but significantly decreased the one among adult offspring. We suggest that age-dependent expression of patriline-specific cues evolved to limit the risks of nepotism as family-living juveniles and favour sibling-mating avoidance as group-living adults. These results highlight the role of parental care and social life in the evolution of chemical communication and recognition cues.

  14. Current Research and Potential Applications of the Concealed Information Test: An Overview

    PubMed Central

    Ben-Shakhar, Gershon

    2012-01-01

    Research interest in psychophysiological detection of deception has significantly increased since the September 11 terror attack in the USA. In particular, the concealed information test (CIT), designed to detect memory traces that can connect suspects to a certain crime, has been extensively studied. In this paper I will briefly review several psychophysiological detection paradigms that have been studied, with a focus on the CIT. The theoretical background of the CIT, its strength and weaknesses, its potential applications as well as research finings related to its validity (based on a recent meta-analytic study), will be discussed. Several novel research directions, with a focus on factors that may affect CIT detection in realistic settings (e.g., memory for crime details; the effect of emotional stress during crime execution) will be described. Additionally, research focusing on mal-intentions and attempts to detect terror networks using information gathered from groups of suspects using both the standard CIT and the searching CIT will be reviewed. Finally, implications of current research to the actual application of the CIT will be discussed and several recommendations that can enhance the use of the CIT will be made. PMID:23060826

  15. Hiding true emotions: micro-expressions in eyes retrospectively concealed by mouth movements

    PubMed Central

    Iwasaki, Miho; Noguchi, Yasuki

    2016-01-01

    When we encounter someone we dislike, we may momentarily display a reflexive disgust expression, only to follow-up with a forced smile and greeting. Our daily lives are replete with a mixture of true and fake expressions. Nevertheless, are these fake expressions really effective at hiding our true emotions? Here we show that brief emotional changes in the eyes (micro-expressions, thought to reflect true emotions) can be successfully concealed by follow-up mouth movements (e.g. a smile). In the same manner as backward masking, mouth movements of a face inhibited conscious detection of all types of micro-expressions in that face, even when viewers paid full attention to the eye region. This masking works only in a backward direction, however, because no disrupting effect was observed when the mouth change preceded the eye change. These results provide scientific evidence for everyday behaviours like smiling to dissemble, and further clarify a major reason for the difficulty we face in discriminating genuine from fake emotional expressions. PMID:26915796

  16. 10 CFR 217.53 - Types of allocation orders.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 3 2013-01-01 2013-01-01 false Types of allocation orders. 217.53 Section 217.53 Energy DEPARTMENT OF ENERGY OIL ENERGY PRIORITIES AND ALLOCATIONS SYSTEM Allocation Actions § 217.53 Types of allocation orders. There are three types of allocation orders available for communicating allocation...

  17. Resource allocation for downlink multiuser video transmission over wireless lossy networks.

    PubMed

    Maani, Ehsan; Pahalawatta, Peshala V; Berry, Randall; Pappas, Thrasyvoulos N; Katsaggelos, Aggelos K

    2008-09-01

    Demand for multimedia services, such as video streaming over wireless networks, has grown dramatically in recent years. The downlink transmission of multiple video sequences to multiple users over a shared resource-limited wireless channel, however, is a daunting task. Among the many challenges in this area are the time-varying channel conditions, limited available resources, such as bandwidth and power, and the different transmission requirements of different video content. This work takes into account the time-varying nature of the wireless channels, as well as the importance of individual video packets, to develop a cross-layer resource allocation and packet scheduling scheme for multiuser video streaming over lossy wireless packet access networks. Assuming that accurate channel feedback is not available at the scheduler, random channel losses combined with complex error concealment at the receiver make it impossible for the scheduler to determine the actual distortion of the sequence at the receiver. Therefore, the objective of the optimization is to minimize the expected distortion of the received sequence, where the expectation is calculated at the scheduler with respect to the packet loss probability in the channel. The expected distortion is used to order the packets in the transmission queue of each user, and then gradients of the expected distortion are used to efficiently allocate resources across users. Simulations show that the proposed scheme performs significantly better than a conventional content-independent scheme for video transmission.

  18. Concealed female external genitals: possible morpho-psychological clue to unique emotional and cognitive evolutionary matrix of man.

    PubMed

    Tosevski, Jovo; Tosevski, Dusica Lecic

    2006-05-01

    Despite genetic similarities between man and other anthropoids, the cognitive abilities of man are distinct. Inaccessible and concealed external female genitals are one of the morphological characteristics distinguishing humans from other higher primates. External female sexual organs in subhuman primates are visible and accessible in the habitual quadrupedal and occasional bipedal posture, whereas these organs in the human female are inaccessible and concealed in any posture. A prospective consequence of gradual bipedalism of hominids during evolution was a shifting of the external female genitals in an anterior direction. In the completely bipedal Homo sapiens, this resulted in the vulvo-cryptic phenomenon, i.e. concealed female genitals in humans. The unique morphology of the human female pelvis served as an obstacle to easy access of the male in the process of copulation, necessitating the female's conscious decision for sexual intercourse. This circumstance might have created a psychological basis for female propellant psychosexual manipulation of the male as a natural consequence. Also, through the process of positive selection it could have formed a basis for linking reproductive success with the development of cognitive and emotional capacities. Female consent to copulation is a conscious and complex act that would be impossible without the involvement of highly developed emotional-cognitive and memoric brain systems. Thus the extraordinary evolutionary strategy might imply a teleological link between concealed female genitals and the emotional-cognitive characteristics of man, creating a permanent promoter of further development of emotional and cognitive brain systems with an impact on all domains of everyday life.

  19. The Invisible Work of Closeting: A Qualitative Study About Strategies Used by Lesbian and Gay Persons to Conceal Their Sexual Orientation.

    PubMed

    Malterud, Kirsti; Bjorkman, Mari

    2016-10-01

    The last decades have offered substantial improvement regarding human rights for lesbian and gay (LG) persons. Yet LG persons are often in the closet, concealing their sexual orientation. We present a qualitative study based on 182 histories submitted from 161 LG individuals to a Web site. The aim was to explore experiences of closeting among LG persons in Norway. A broad range of strategies was used for closeting, even among individuals who generally considered themselves to be out of the closet. Concealment was enacted by blunt denial, clever avoidance, or subtle vagueness. Other strategies included changing or eliminating the pronoun or name of the partner in ongoing conversations. Context-dependent concealment, differentiating between persons, situations, or arenas, was repeatedly applied for security or convenience. We propose a shift from "being in the closet" to "situated concealment of sexual orientation."

  20. Allocation of speech in conversation.

    PubMed

    Simon, Carsta; Baum, William M

    2017-03-01

    In a replication and extension of Conger and Killeen's (1974) widely cited demonstration of matching in conversations, we evaluated nine participants' allocation of speech and gaze to two conversational partners. German speakers participated in two 90-min sessions in which confederates uttered approval on independent variable-interval schedules. In one of the sessions, confederates uttered approval contingent upon and contiguous with eye contact whereas in the other session approval was uttered independent of the participant's gaze. Several measures of participants' verbal behavior were taken, including relative duration and rate of speech and gaze. These were compared to confederates' relative rate of approval and relative duration and rate of talk. The generalized matching equation was fitted to the various relations between participants' behavior and confederates' behavior. Conger and Killeen's results were not replicated; participants' response allocation did not show a systematic relation to the confederates' relative rate of approval. The strongest relations were to overall talk, rather than approval. In both conditions, the participant talked more to the confederate who talked less-inverse or antimatching. Participants' gaze showed the same inverse relation to the confederates' talk. Requiring gaze to be directed toward a confederate for delivery of approval made no difference in the results. The absence of a difference combined with prior research suggests that matching or antimatching in conversations is more likely due to induction than to reinforcement.

  1. Constrained Allocation Flux Balance Analysis

    PubMed Central

    Mori, Matteo; Hwa, Terence; Martin, Olivier C.

    2016-01-01

    New experimental results on bacterial growth inspire a novel top-down approach to study cell metabolism, combining mass balance and proteomic constraints to extend and complement Flux Balance Analysis. We introduce here Constrained Allocation Flux Balance Analysis, CAFBA, in which the biosynthetic costs associated to growth are accounted for in an effective way through a single additional genome-wide constraint. Its roots lie in the experimentally observed pattern of proteome allocation for metabolic functions, allowing to bridge regulation and metabolism in a transparent way under the principle of growth-rate maximization. We provide a simple method to solve CAFBA efficiently and propose an “ensemble averaging” procedure to account for unknown protein costs. Applying this approach to modeling E. coli metabolism, we find that, as the growth rate increases, CAFBA solutions cross over from respiratory, growth-yield maximizing states (preferred at slow growth) to fermentative states with carbon overflow (preferred at fast growth). In addition, CAFBA allows for quantitatively accurate predictions on the rate of acetate excretion and growth yield based on only 3 parameters determined by empirical growth laws. PMID:27355325

  2. Nodal recovery, dual pathway physiology, and concealed conduction determine complex AV dynamics in human atrial tachyarrhythmias.

    PubMed

    Masè, Michela; Glass, Leon; Disertori, Marcello; Ravelli, Flavia

    2012-11-15

    The genesis of complex ventricular rhythms during atrial tachyarrhythmias in humans is not fully understood. To clarify the dynamics of atrioventricular (AV) conduction in response to a regular high-rate atrial activation, 29 episodes of spontaneous or pacing-induced atrial flutter (AFL), covering a wide range of atrial rates (cycle lengths from 145 to 270 ms), were analyzed in 10 patients. AV patterns were identified by applying firing sequence and surrogate data analysis to atrial and ventricular activation series, whereas modular simulation with a difference-equation AV node model was used to correlate the patterns with specific nodal properties. AV node response at high atrial rate was characterized by 1) AV patterns of decreasing conduction ratios at the shortening of atrial cycle length (from 236.3 ± 32.4 to 172.6 ± 17.8 ms) according to a Farey sequence ordering (conduction ratio from 0.34 ± 0.12 to 0.23 ± 0.06; P < 0.01); 2) the appearance of high-order alternating Wenckebach rhythms, such as 6:2, 10:2, and 12:2, associated with ventricular interval oscillations of large amplitude (407.7 ± 150.4 ms); and 3) the deterioration of pattern stability at advanced levels of block, with the percentage of stable patterns decreasing from 64.3 ± 35.2% to 28.3 ± 34.5% (P < 0.01). Simulations suggested these patterns to originate from the combined effect of nodal recovery, dual pathway physiology, and concealed conduction. These results indicate that intrinsic nodal properties may account for the wide spectrum of AV block patterns occurring during regular atrial tachyarrhythmias. The characterization of AV nodal function during different AFL forms constitutes an intermediate step toward the understanding of complex ventricular rhythms during atrial fibrillation.

  3. Concealed d-wave pairs in the s± condensate of iron-based superconductors

    PubMed Central

    Ong, Tzen; Coleman, Piers; Schmalian, Jörg

    2016-01-01

    A central question in iron-based superconductivity is the mechanism by which the paired electrons minimize their strong mutual Coulomb repulsion. In most unconventional superconductors, Coulomb repulsion is minimized through the formation of higher angular momentum Cooper pairs, with Fermi surface nodes in the pair wavefunction. The apparent absence of such nodes in the iron-based superconductors has led to a belief they form an s-wave (s±) singlet state, which changes sign between the electron and hole pockets. However, the multiorbital nature of these systems opens an alternative possibility. Here, we propose a new class of s± state containing a condensate of d-wave Cooper pairs, concealed by their entanglement with the iron orbitals. By combining the d-wave (L=2) motion of the pairs with the internal angular momenta I=2 of the iron orbitals to make a singlet (J=L+I=0), an s± superconductor with a nontrivial topology is formed. This scenario allows us to understand the development of octet nodes in potassium-doped Ba1−x KXFe2As2 as a reconfiguration of the orbital and internal angular momentum into a high spin (J=L+I=4) state; the reverse transition under pressure into a fully gapped state can then be interpreted as a return to the low-spin singlet. The formation of orbitally entangled pairs is predicted to give rise to a shift in the orbital content at the Fermi surface, which can be tested via laser-based angle-resolved photoemission spectroscopy. PMID:27140626

  4. Concealed d-wave pairs in the s± condensate of iron-based superconductors.

    PubMed

    Ong, Tzen; Coleman, Piers; Schmalian, Jörg

    2016-05-17

    A central question in iron-based superconductivity is the mechanism by which the paired electrons minimize their strong mutual Coulomb repulsion. In most unconventional superconductors, Coulomb repulsion is minimized through the formation of higher angular momentum Cooper pairs, with Fermi surface nodes in the pair wavefunction. The apparent absence of such nodes in the iron-based superconductors has led to a belief they form an s-wave ([Formula: see text]) singlet state, which changes sign between the electron and hole pockets. However, the multiorbital nature of these systems opens an alternative possibility. Here, we propose a new class of [Formula: see text] state containing a condensate of d-wave Cooper pairs, concealed by their entanglement with the iron orbitals. By combining the d-wave ([Formula: see text]) motion of the pairs with the internal angular momenta [Formula: see text] of the iron orbitals to make a singlet ([Formula: see text]), an [Formula: see text] superconductor with a nontrivial topology is formed. This scenario allows us to understand the development of octet nodes in potassium-doped Ba1-x KXFe2As2 as a reconfiguration of the orbital and internal angular momentum into a high spin ([Formula: see text]) state; the reverse transition under pressure into a fully gapped state can then be interpreted as a return to the low-spin singlet. The formation of orbitally entangled pairs is predicted to give rise to a shift in the orbital content at the Fermi surface, which can be tested via laser-based angle-resolved photoemission spectroscopy.

  5. Design of spectrally versatile forward-looking ground-penetrating radar for detection of concealed targets

    NASA Astrophysics Data System (ADS)

    Phelan, Brian R.; Ressler, Marc A.; Mazzaro, Gregory J.; Sherbondy, Kelly D.; Narayanan, Ram M.

    2013-05-01

    The design of high-resolution radars which can operate in theater involves a careful consideration of the radar's radiated spectrum. While a wide bandwidth yields better target detectability and classification, it can also interfere with other devices and/or violate federal and international communication laws. Under the Army Research Laboratory (ARL) Partnerships in Research Transition (PIRT) program, we are developing a Stepped-Frequency Radar (SFR) which allows for manipulation of the radiated spectrum, while still maintaining an effective ultra-wide bandwidth for achieving good range resolution. The SFR is a forward-looking, ultra-wideband (UWB) imaging radar capable of detecting concealed targets. This paper presents the research and analysis undertaken during the design of the SFR which will eventually complement an existing ARL system, the Synchronous Impulse REconstruction (SIRE) radar. The SFR is capable of excising prohibited frequency bands, while maintaining the down-range resolution capability of the original SIRE radar. The SFR has two transmit antennas and a 16-element receive antenna array, and this configuration achieves suitable cross-range resolution for target detection. The SFR, like the SIRE radar, is a vehicle mounted, forward-looking, ground penetrating radar (GPR) capable of using synthetic aperture radar (SAR) technology for the detection of subsurface targets via 3D imaging. Many contradicting design considerations are analyzed in this paper. The selection of system bandwidth, antenna types, number of antennas, frequency synthesizers, digitizers, receive amplifiers, wideband splitters, and many other components are critical to the design of the SFR. Leveraging commercial components and SIRE sub-systems were design factors offering an expedited time to the initial implementation of the radar while reducing overall costs. This SFR design will result in an ARL asset to support obscured target detection such as improvised explosive devices

  6. Using fMRI to decode true thoughts independent of intention to conceal.

    PubMed

    Yang, Zhi; Huang, Zirui; Gonzalez-Castillo, Javier; Dai, Rui; Northoff, Georg; Bandettini, Peter

    2014-10-01

    Multi-variate pattern analysis (MVPA) applied to BOLD-fMRI has proven successful at decoding complicated fMRI signal patterns associated with a variety of cognitive processes. One cognitive process, not yet investigated, is the mental representation of "Yes/No" thoughts that precede the actual overt response to a binary "Yes/No" question. In this study, we focus on examining: (1) whether spatial patterns of the hemodynamic response carry sufficient information to allow reliable decoding of "Yes/No" thoughts; and (2) whether decoding of "Yes/No" thoughts is independent of the intention to respond honestly or dishonestly. To achieve this goal, we conducted two separate experiments. Experiment 1, collected on a 3T scanner, examined the whole brain to identify regions that carry sufficient information to permit significantly above-chance prediction of "Yes/No" thoughts at the group level. In Experiment 2, collected on a 7T scanner, we focused on the regions identified in Experiment 1 to examine the capability of achieving high decoding accuracy at the single subject level. A set of regions--namely right superior temporal gyrus, left supra-marginal gyrus, and left middle frontal gyrus--exhibited high decoding power. Decoding accuracy for these regions increased with trial averaging. When 18 trials were averaged, the median accuracies were 82.5%, 77.5%, and 79.5%, respectively. When trials were separated according to deceptive intentions (set via experimental cues), and classifiers were trained on honest trials, but tested on trials where subjects were asked to deceive, the median accuracies of these regions still reached 66%, 75%, and 78.5%. These results provide evidence that concealed "Yes/No" thoughts are encoded in the BOLD signal, retaining some level of independence from the subject's intentions to answer honestly or dishonestly. These findings also suggest the theoretical possibility for more efficient brain-computer interfaces where subjects only need to think

  7. Constant time worker thread allocation via configuration caching

    DOEpatents

    Eichenberger, Alexandre E; O'Brien, John K. P.

    2014-11-04

    Mechanisms are provided for allocating threads for execution of a parallel region of code. A request for allocation of worker threads to execute the parallel region of code is received from a master thread. Cached thread allocation information identifying prior thread allocations that have been performed for the master thread are accessed. Worker threads are allocated to the master thread based on the cached thread allocation information. The parallel region of code is executed using the allocated worker threads.

  8. 75 FR 18016 - Notice of Allocation Availability (NOAA) Inviting Applications for the CY 2010 Allocation Round...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-08

    ... Community Development Financial Institutions Fund Notice of Allocation Availability (NOAA) Inviting...: Notice of Allocation Availability (NOAA) Inviting Applications for the CY 2010 Allocation Round of the... page, investor letters and organizational charts) in electronic form (see Section IV.D. of this...

  9. 21 CFR 801.5 - Medical devices; adequate directions for use.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 8 2012-04-01 2012-04-01 false Medical devices; adequate directions for use. 801... (CONTINUED) MEDICAL DEVICES LABELING General Labeling Provisions § 801.5 Medical devices; adequate directions for use. Adequate directions for use means directions under which the layman can use a device...

  10. 21 CFR 801.5 - Medical devices; adequate directions for use.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Medical devices; adequate directions for use. 801... (CONTINUED) MEDICAL DEVICES LABELING General Labeling Provisions § 801.5 Medical devices; adequate directions for use. Adequate directions for use means directions under which the layman can use a device...

  11. 21 CFR 801.5 - Medical devices; adequate directions for use.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 8 2011-04-01 2011-04-01 false Medical devices; adequate directions for use. 801... (CONTINUED) MEDICAL DEVICES LABELING General Labeling Provisions § 801.5 Medical devices; adequate directions for use. Adequate directions for use means directions under which the layman can use a device...

  12. 21 CFR 801.5 - Medical devices; adequate directions for use.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 8 2014-04-01 2014-04-01 false Medical devices; adequate directions for use. 801... (CONTINUED) MEDICAL DEVICES LABELING General Labeling Provisions § 801.5 Medical devices; adequate directions for use. Adequate directions for use means directions under which the layman can use a device...

  13. 21 CFR 801.5 - Medical devices; adequate directions for use.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 8 2013-04-01 2013-04-01 false Medical devices; adequate directions for use. 801... (CONTINUED) MEDICAL DEVICES LABELING General Labeling Provisions § 801.5 Medical devices; adequate directions for use. Adequate directions for use means directions under which the layman can use a device...

  14. 48 CFR 5452.249 - Allocation.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Allocation. 5452.249 Section 5452.249 Federal Acquisition Regulations System DEFENSE LOGISTICS AGENCY, DEPARTMENT OF DEFENSE SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 5452.249 Allocation. The...

  15. Inferential Aspects of Adaptive Allocation Rules.

    ERIC Educational Resources Information Center

    Berry, Donald A.

    In clinical trials, adaptive allocation means that the therapies assigned to the next patient or patients depend on the results obtained thus far in the trial. Although many adaptive allocation procedures have been proposed for clinical trials, few have actually used adaptive assignment, largely because classical frequentist measures of inference…

  16. Rethinking Reinforcement: Allocation, Induction, and Contingency

    ERIC Educational Resources Information Center

    Baum, William M.

    2012-01-01

    The concept of reinforcement is at least incomplete and almost certainly incorrect. An alternative way of organizing our understanding of behavior may be built around three concepts: "allocation," "induction," and "correlation." Allocation is the measure of behavior and captures the centrality of choice: All behavior entails choice and consists of…

  17. 42 CFR 24.2 - Allocation.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 1 2011-10-01 2011-10-01 false Allocation. 24.2 Section 24.2 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES PERSONNEL SENIOR BIOMEDICAL RESEARCH SERVICE § 24.2 Allocation. (a) The Secretary, within the number authorized in the PHS Act, shall determine...

  18. 42 CFR 24.2 - Allocation.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 42 Public Health 1 2014-10-01 2014-10-01 false Allocation. 24.2 Section 24.2 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES PERSONNEL SENIOR BIOMEDICAL RESEARCH SERVICE § 24.2 Allocation. (a) The Secretary, within the number authorized in the PHS Act, shall determine...

  19. 42 CFR 24.2 - Allocation.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Allocation. 24.2 Section 24.2 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES PERSONNEL SENIOR BIOMEDICAL RESEARCH SERVICE § 24.2 Allocation. (a) The Secretary, within the number authorized in the PHS Act, shall determine...

  20. 42 CFR 24.2 - Allocation.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 42 Public Health 1 2013-10-01 2013-10-01 false Allocation. 24.2 Section 24.2 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES PERSONNEL SENIOR BIOMEDICAL RESEARCH SERVICE § 24.2 Allocation. (a) The Secretary, within the number authorized in the PHS Act, shall determine...

  1. 42 CFR 24.2 - Allocation.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 42 Public Health 1 2012-10-01 2012-10-01 false Allocation. 24.2 Section 24.2 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES PERSONNEL SENIOR BIOMEDICAL RESEARCH SERVICE § 24.2 Allocation. (a) The Secretary, within the number authorized in the PHS Act, shall determine...

  2. Projected 1999-2000 Cost Allocation Summary.

    ERIC Educational Resources Information Center

    Wisconsin Technical Coll. System Board, Madison.

    Information contained in this summary was derived from data submitted by Wisconsin technical colleges on their 1999-2000 projected cost allocation schedules. Cost allocation information is used to calculate the distribution of state aids to each college, and prepare financial and enrollment reports including state statistical summaries and reports…

  3. Resource Allocation: Ration, Fashion, or Innovashun?

    ERIC Educational Resources Information Center

    Lourens, Roy

    1986-01-01

    Resource allocation is a key factor in promoting or retarding innovation. In a restrictive economic climate, it is easy to use resource allocation for decremental rationing and to stifle innovative thinking. The technique can also be used to ensure that the institution's human resources are encouraged to identify opportunities for innovation. (MSE)

  4. 45 CFR 98.55 - Cost allocation.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Cost allocation. 98.55 Section 98.55 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION CHILD CARE AND DEVELOPMENT FUND Use of Child Care and Development Funds § 98.55 Cost allocation. (a) The Lead Agency and...

  5. 45 CFR 98.55 - Cost allocation.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 1 2014-10-01 2014-10-01 false Cost allocation. 98.55 Section 98.55 Public Welfare Department of Health and Human Services GENERAL ADMINISTRATION CHILD CARE AND DEVELOPMENT FUND Use of Child Care and Development Funds § 98.55 Cost allocation. (a) The Lead Agency and...

  6. 45 CFR 98.55 - Cost allocation.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 1 2012-10-01 2012-10-01 false Cost allocation. 98.55 Section 98.55 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION CHILD CARE AND DEVELOPMENT FUND Use of Child Care and Development Funds § 98.55 Cost allocation. (a) The Lead Agency and...

  7. 45 CFR 98.55 - Cost allocation.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 1 2011-10-01 2011-10-01 false Cost allocation. 98.55 Section 98.55 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION CHILD CARE AND DEVELOPMENT FUND Use of Child Care and Development Funds § 98.55 Cost allocation. (a) The Lead Agency and...

  8. 45 CFR 98.55 - Cost allocation.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 1 2013-10-01 2013-10-01 false Cost allocation. 98.55 Section 98.55 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION CHILD CARE AND DEVELOPMENT FUND Use of Child Care and Development Funds § 98.55 Cost allocation. (a) The Lead Agency and...

  9. 24 CFR 92.50 - Formula allocation.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Congress appropriates less than $1.5 billion of HOME funds, $335,000 is substituted for $500,000. (4) The... Development HOME INVESTMENT PARTNERSHIPS PROGRAM Allocation Formula § 92.50 Formula allocation. (a... factors. The first and sixth factors are weighted 0.1; the other four factors are weighted 0.2....

  10. 10 CFR 490.503 - Credit allocation.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 3 2013-01-01 2013-01-01 false Credit allocation. 490.503 Section 490.503 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Alternative Fueled Vehicle... described in section 490.507 of this part, DOE shall allocate one credit for each alternative fueled...

  11. 10 CFR 490.503 - Credit allocation.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 3 2010-01-01 2010-01-01 false Credit allocation. 490.503 Section 490.503 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Alternative Fueled Vehicle Credit Program § 490.503 Credit allocation. (a) Based on annual credit activity report information,...

  12. 10 CFR 490.503 - Credit allocation.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 3 2011-01-01 2011-01-01 false Credit allocation. 490.503 Section 490.503 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Alternative Fueled Vehicle... described in section 490.507 of this part, DOE shall allocate one credit for each alternative fueled...

  13. 10 CFR 490.503 - Credit allocation.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 3 2012-01-01 2012-01-01 false Credit allocation. 490.503 Section 490.503 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Alternative Fueled Vehicle... described in section 490.507 of this part, DOE shall allocate one credit for each alternative fueled...

  14. 10 CFR 490.503 - Credit allocation.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 3 2014-01-01 2014-01-01 false Credit allocation. 490.503 Section 490.503 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Alternative Fueled Vehicle... described in section 490.507 of this part, DOE shall allocate one credit for each alternative fueled...

  15. Projected 1998-99 Cost Allocation Summary.

    ERIC Educational Resources Information Center

    Chin, Edward

    Designed for use in calculating the distribution of state aid to colleges in the Wisconsin Technical College System (WTCS) and in preparing financial and enrollment reports, this document provides a summary of projected cost allocations for the WTCS for 1998-99, derived from data submitted by the colleges on cost allocation schedules. Following a…

  16. 50 CFR 660.55 - Allocations.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... PACIFIC OCEAN PERCH 95 5 WIDOW 91 9 Chilipepper S. of 40°10′ N. lat. 75 25 Splitnose S. of 40°10′ N. lat... rockfish, Pacific Ocean Perch, and widow rockfish, the trawl allocation is further subdivided among the... nonwhiting fishery. (B) Pacific Ocean Perch (POP). Allocate 17 percent or 30 mt, whichever is greater, of...

  17. 50 CFR 660.55 - Allocations.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Sablefish S. of 36° N. lat. 42 58 PACIFIC OCEAN PERCH 95 5 WIDOW 91 9 Chilipepper S. of 40°10′ N. lat. 75 25... rockfish, Pacific Ocean Perch, and widow rockfish, the trawl allocation will be further subdivided among.... For darkblotched rockfish, Pacific Ocean Perch, and widow rockfish, the trawl allocation is...

  18. 50 CFR 660.55 - Allocations.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Sablefish S. of 36° N. lat. 42 58 PACIFIC OCEAN PERCH 95 5 WIDOW 91 9 Chilipepper S. of 40°10′ N. lat. 75 25... rockfish, Pacific Ocean Perch, and widow rockfish, the trawl allocation will be further subdivided among.... For darkblotched rockfish, Pacific Ocean Perch, and widow rockfish, the trawl allocation is...

  19. A Time Allocation Study of University Faculty

    ERIC Educational Resources Information Center

    Link, Albert N.; Swann, Christopher A.; Bozeman, Barry

    2008-01-01

    Many previous time allocation studies treat work as a single activity and examine trade-offs between work and other activities. This paper investigates the at-work allocation of time among teaching, research, grant writing and service by science and engineering faculty at top US research universities. We focus on the relationship between tenure…

  20. 23 CFR 1240.15 - Allocations.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 23 Highways 1 2010-04-01 2010-04-01 false Allocations. 1240.15 Section 1240.15 Highways NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION AND FEDERAL HIGHWAY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION GUIDELINES SAFETY INCENTIVE GRANTS FOR USE OF SEAT BELTS-ALLOCATIONS BASED ON SEAT BELT USE...

  1. 23 CFR 1240.15 - Allocations.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 23 Highways 1 2011-04-01 2011-04-01 false Allocations. 1240.15 Section 1240.15 Highways NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION AND FEDERAL HIGHWAY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION GUIDELINES SAFETY INCENTIVE GRANTS FOR USE OF SEAT BELTS-ALLOCATIONS BASED ON SEAT BELT USE...

  2. 50 CFR 600.517 - Allocations.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 50 Wildlife and Fisheries 12 2013-10-01 2013-10-01 false Allocations. 600.517 Section 600.517 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE MAGNUSON-STEVENS ACT PROVISIONS Foreign Fishing § 600.517 Allocations. The...

  3. 50 CFR 600.517 - Allocations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Allocations. 600.517 Section 600.517 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE MAGNUSON-STEVENS ACT PROVISIONS Foreign Fishing § 600.517 Allocations. The...

  4. 50 CFR 660.320 - Allocations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Indian fishery, is divided into limited entry and open access fisheries. Separate allocations for the limited entry and open access fisheries will be established biennially or annually for certain species and... excluding set asides for recreational or tribal Indian fisheries) minus the allocation to the open...

  5. Are outcome-adaptive allocation trials ethical?

    PubMed

    Hey, Spencer Phillips; Kimmelman, Jonathan

    2015-04-01

    Randomization is firmly established as a cornerstone of clinical trial methodology. Yet, the ethics of randomization continues to generate controversy. The default, and most efficient, allocation scheme randomizes patients equally (1:1) across all arms of study. However, many randomized trials are using outcome-adaptive allocation schemes, which dynamically adjust the allocation ratio in favor of the better performing treatment arm. Advocates of outcome-adaptive allocation contend that it better accommodates clinical equipoise and promotes informed consent, since such trials limit patient-subject exposure to sub-optimal care. In this essay, we argue that this purported ethical advantage of outcome-adaptive allocation does not stand up to careful scrutiny in the setting of two-armed studies and/or early-phase research.

  6. 49 CFR 33.54 - Elements of an allocation order.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 1 2013-10-01 2013-10-01 false Elements of an allocation order. 33.54 Section 33.54 Transportation Office of the Secretary of Transportation TRANSPORTATION PRIORITIES AND ALLOCATION SYSTEM Allocation Actions § 33.54 Elements of an allocation order. Each allocation order must include:...

  7. 10 CFR 217.54 - Elements of an allocation order.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 3 2013-01-01 2013-01-01 false Elements of an allocation order. 217.54 Section 217.54 Energy DEPARTMENT OF ENERGY OIL ENERGY PRIORITIES AND ALLOCATIONS SYSTEM Allocation Actions § 217.54 Elements of an allocation order. Each allocation order must include: (a) A detailed description of...

  8. 10 CFR 217.54 - Elements of an allocation order.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 3 2014-01-01 2014-01-01 false Elements of an allocation order. 217.54 Section 217.54 Energy DEPARTMENT OF ENERGY OIL ENERGY PRIORITIES AND ALLOCATIONS SYSTEM Allocation Actions § 217.54 Elements of an allocation order. Each allocation order must include: (a) A detailed description of...

  9. 49 CFR 33.54 - Elements of an allocation order.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 1 2012-10-01 2012-10-01 false Elements of an allocation order. 33.54 Section 33.54 Transportation Office of the Secretary of Transportation TRANSPORTATION PRIORITIES AND ALLOCATION SYSTEM Allocation Actions § 33.54 Elements of an allocation order. Each allocation order must include:...

  10. 10 CFR 217.54 - Elements of an allocation order.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 3 2012-01-01 2012-01-01 false Elements of an allocation order. 217.54 Section 217.54 Energy DEPARTMENT OF ENERGY OIL ENERGY PRIORITIES AND ALLOCATIONS SYSTEM Allocation Actions § 217.54 Elements of an allocation order. Each allocation order must include: (a) A detailed description of...

  11. 49 CFR 33.54 - Elements of an allocation order.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 1 2014-10-01 2014-10-01 false Elements of an allocation order. 33.54 Section 33.54 Transportation Office of the Secretary of Transportation TRANSPORTATION PRIORITIES AND ALLOCATION SYSTEM Allocation Actions § 33.54 Elements of an allocation order. Each allocation order must include:...

  12. 7 CFR 761.205 - Computing the formula allocation.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 7 2011-01-01 2011-01-01 false Computing the formula allocation. 761.205 Section 761... Funds to State Offices § 761.205 Computing the formula allocation. (a) The formula allocation for FO, CL... program that the National Office allocates to a State Office. formula allocation = (amount available...

  13. Carbon allocation and accumulation in conifers

    SciTech Connect

    Gower, S.T.; Isebrands, J.G.; Sheriff, D.W.

    1995-07-01

    Forests cover approximately 33% of the land surface of the earth, yet they are responsible for 65% of the annual carbon (C) accumulated by all terrestrial biomes. In general, total C content and net primary production rates are greater for forests than for other biomes, but C budgets differ greatly among forests. Despite several decades of research on forest C budgets, there is still an incomplete understanding of the factors controlling C allocation. Yet, if we are to understand how changing global events such as land use, climate change, atmospheric N deposition, ozone, and elevated atmospheric CO{sub 2} affect the global C budget, a mechanistic understanding of C assimilation, partitioning, and allocation is necessary. The objective of this chapter is to review the major factors that influence C allocation and accumulation in conifer trees and forests. In keeping with the theme of this book, we will focus primarily on evergreen conifers. However, even among evergreen conifers, leaf, canopy, and stand-level C and nutrient allocation patterns differ, often as a function of leaf development and longevity. The terminology related to C allocation literature is often inconsistent, confusing and inadequate for understanding and integrating past and current research. For example, terms often used synonymously to describe C flow or movement include translocation, transport, distribution, allocation, partitioning, apportionment, and biomass allocation. A common terminology is needed because different terms have different meanings to readers. In this paper we use C allocation, partitioning, and accumulation according to the definitions of Dickson and Isebrands (1993). Partitioning is the process of C flow into and among different chemical, storage, and transport pools. Allocation is the distribution of C to different plant parts within the plant (i.e., source to sink). Accumulation is the end product of the process of C allocation.

  14. A Space Based Radar Antenna Concept to Counter Camouflage and Concealment

    DTIC Science & Technology

    2006-09-07

    design options already in use for higher frequency SAR antennas include slotted waveguide (ERS-1 and 2 and Radarsat-1) and active phased arrays (ASAR...operating at P-Band or below can adequate penetration of these forests be achieved. The antenna is designed to be used from a spacecraft in a low ...Earth orbit. The antenna design has a monolithic array of feed and radiating patches bonded to a transversally curved structure consisting of two Kevlar

  15. Detection of concealed substances in sealed opaque plastic and coloured glass containers using SORS

    NASA Astrophysics Data System (ADS)

    Bloomfield, Matthew; Loeffen, Paul W.; Matousek, Pavel

    2010-10-01

    The reliable detection of concealed substances in sealed opaque plastic and coloured glass containers, with low falsealarm rate, is a problem in numerous areas of security. For example, in aviation security, there is no reliable methodology for alarm resolution of substances with high chemical specificity unless the substances are in optically transparent containers. We present a recently developed method called Spatially Offset Raman Spectroscopy (SORS) which enables the discrimination of the Raman spectrum of the content substance from the Raman spectrum of the container material with no prior knowledge of either, thereby allowing unambiguous identification of the container contents. The method is effective with coloured plastic containers that are several millimetres thick and which are not see-through to the eye and also for coloured glass bottles. Such cases do not typically yield to conventional backscatter Raman spectroscopy (or have poor false-alarm rates) since the content signal is often overwhelmed by the signal from the container, which may in addition have a strong interfering fluorescence background. SORS measurement can be performed in a few seconds by shining a laser light onto the container and then measuring the Raman signal at the excitation point but also at one or more offset positions. Each measurement has different relative orthogonal contributions from the container and contents Raman spectra, so that, with no prior knowledge, the pure spectra of both the container and contents can be extracted - either by scaled subtraction or via multivariate statistical methods. The content spectrum can then be compared to a reference library of pure materials to give a threat evaluation with a confidence level not compromised by interfering signals originating from the container wall. In this paper, we describe the methods and their optimization, and characterize their performance in practical screening applications. The study shows that there is

  16. An Efficient Shared Adaptive Packet Loss Concealment Scheme through 1-Port Gateway System for Internet Telephony Service

    NASA Astrophysics Data System (ADS)

    Kim, Jinsul; Lee, Hyunwoo; Ryu, Won; Lee, Byungsun; Hahn, Minsoo

    In this letter, we propose a shared adaptive packet loss concealment scheme for the high quality guaranteed Internet telephony service which connects multiple users. In order to recover packet loss efficiently in the all-IP based convergence environment, we provide a robust signal recovery scheme which is based on the shared adaptive both-side information utilization. This scheme is provided according to the average magnitude variation across the frames and the pitch period replication on the 1-port gateway (G/W) system. The simulated performance demonstrates that the proposed scheme has the advantages of low processing times and high recovery rates in the all-IP based ubiquitous environment.

  17. Using pretest data to screen low-reactivity individuals in the autonomic-based concealed information test.

    PubMed

    Matsuda, Izumi; Ogawa, Tokihiro; Tsuneoka, Michiko; Verschuere, Bruno

    2015-03-01

    The concealed information test (CIT) can be used to assess whether an individual possesses crime-related information. However, its discrimination performance has room for improvement. We examined whether screening out participants who do not respond distinctively on a pretest improves the diagnosticity of a mock-crime CIT. Before conducting the CIT, we gave a pretest to 152 participants, 80 of whom were assigned as guilty. Pretest screening significantly improved the diagnostic value of the mock-crime CIT; however, it also led to a substantial number of undiagnosed participants (33.6%). Pretest screening holds promise, but its application would benefit from dedicated measures for screening out participants.

  18. Imaging the concealed section of the Whakatane fault below Whakatane city, New Zealand, with a shear wave land streamer system

    NASA Astrophysics Data System (ADS)

    Polom, Ulrich; Mueller, Christof; Krawczyk, CharLotte M.

    2016-04-01

    The Mw 7.1 Darfield Earthquake in September 2010 ruptured the surface along the Greendale Fault that was not known prior to the earthquake. The subsequent Mw 6.3 Christchurch earthquake in February 2011 demonstrated that concealed active faults have a significant risk potential for urban infrastructure and human life in New Zealand if they are located beneath or close to such areas. Mapping exposures and analysis of active faults incorporated into the National Seismic Hazard Model (NSHM) suggests that several thousands of these active structures are yet to be identified and have the potential to generate moderate to large magnitude earthquakes (i.e. magnitudes >5). Geological mapping suggests that active faults pass beneath, or within many urban areas in New Zealand, including Auckland, Blenheim, Christchurch, Hastings/Napier, Nelson, Rotorua, Taupo, Wellington, and Whakatane. Since no established methodology for routinely locating and assessing the earthquake hazard posed by concealed active faults is available, the principal objective of the presented study was to evaluate the usefulness of high-resolution shear wave seismic reflection profiling using a land streamer to locate buried faults in urban areas of New Zealand. During the survey carried out in the city of Whakatane in February 2015, the method was first tested over a well known surface outcrop of the Edgecumbe Fault 30 km south-west of Whakatane city. This allowed further to investigate the principle shear wave propagation characteristics in the unknown sediments, consisting mainly of effusive rock material of the Taupo volcanic zone mixed with marine transgression units. Subsequently the survey was continued within Whakatane city using night operation time slots to reduce the urban noise. In total, 11 profiles of 5.7 km length in high data quality were acquired, which clearly show concealed rupture structures of obviously different age in the shallow sediments down to 100 m depth. Subject to depth

  19. Decentralization and equity of resource allocation: evidence from Colombia and Chile.

    PubMed Central

    Bossert, Thomas J.; Larrañaga, Osvaldo; Giedion, Ursula; Arbelaez, José Jesus; Bowser, Diana M.

    2003-01-01

    OBJECTIVE: To investigate the relation between decentralization and equity of resource allocation in Colombia and Chile. METHODS: The "decision space" approach and analysis of expenditures and utilization rates were used to provide a comparative analysis of decentralization of the health systems of Colombia and Chile. FINDINGS: Evidence from Colombia and Chile suggests that decentralization, under certain conditions and with some specific policy mechanisms, can improve equity of resource allocation. In these countries, equitable levels of per capita financial allocations at the municipal level were achieved through different forms of decentralization--the use of allocation formulae, adequate local funding choices and horizontal equity funds. Findings on equity of utilization of services were less consistent, but they did show that increased levels of funding were associated with increased utilization. This suggests that improved equity of funding over time might reduce inequities of service utilization. CONCLUSION: Decentralization can contribute to, or at least maintain, equitable allocation of health resources among municipalities of different incomes. PMID:12751417

  20. Control Allocation with Load Balancing

    NASA Technical Reports Server (NTRS)

    Bodson, Marc; Frost, Susan A.

    2009-01-01

    Next generation aircraft with a large number of actuators will require advanced control allocation methods to compute the actuator commands needed to follow desired trajectories while respecting system constraints. Previously, algorithms were proposed to minimize the l1 or l2 norms of the tracking error and of the actuator deflections. The paper discusses the alternative choice of the l(infinity) norm, or sup norm. Minimization of the control effort translates into the minimization of the maximum actuator deflection (min-max optimization). The paper shows how the problem can be solved effectively by converting it into a linear program and solving it using a simplex algorithm. Properties of the algorithm are also investigated through examples. In particular, the min-max criterion results in a type of load balancing, where the load is th desired command and the algorithm balances this load among various actuators. The solution using the l(infinity) norm also results in better robustness to failures and to lower sensitivity to nonlinearities in illustrative examples.

  1. Time allocation of disabled individuals.

    PubMed

    Pagán, Ricardo

    2013-05-01

    Although some studies have analysed the disability phenomenon and its effect on, for example, labour force participation, wages, job satisfaction, or the use of disability pension, the empirical evidence on how disability steals time (e.g. hours of work) from individuals is very scarce. This article examines how disabled individuals allocate their time to daily activities as compared to their non-disabled counterparts. Using time diary information from the Spanish Time Use Survey (last quarter of 2002 and the first three quarters of 2003), we estimate the determinants of time (minutes per day) spent on four aggregate categories (market work, household production, tertiary activities and leisure) for a sample of 27,687 non-disabled and 5250 disabled individuals and decompose the observed time differential by using the Oaxaca-Blinder methodology. The results show that disabled individuals devote less time to market work (especially females), and more time to household production (e.g. cooking, cleaning, child care), tertiary activities (e.g., sleeping, personal care, medical treatment) and leisure activities. We also find a significant effect of age on the time spent on daily activities and important differences by gender and disability status. The results are consistent with the hypothesis that disability steals time, and reiterate the fact that more public policies are needed to balance working life and health concerns among disabled individuals.

  2. Dynamic Allocation of Sugars in Barley

    NASA Astrophysics Data System (ADS)

    Cumberbatch, L. C.; Crowell, A. S.; Fallin, B. A.; Howell, C. R.; Reid, C. D.; Weisenberger, A. G.; Lee, S. J.; McKisson, J. E.

    2014-03-01

    Allocation of carbon and nitrogen is a key factor for plant productivity. Measurements are carried out by tracing 11C-tagged sugars using positron emission tomography and coincidence counting. We study the mechanisms of carbon allocation and transport from carbohydrate sources (leaves) to sinks (stem, shoot, roots) under various environmental conditions such as soil nutrient levels and atmospheric CO2 concentration. The data are analyzed using a transfer function analysis technique to model transport and allocation in barley plants. The experimental technique will be described and preliminary results presented. This work was supported in part by USDOE Grant No. DE-FG02-97-ER41033 and DE-SC0005057.

  3. A Concealed Intracranial Aneurysm Detected after Recanalization of an Occluded Vessel: A Case Report and Literature Review

    PubMed Central

    Torikoshi, Sadaharu; Akiyama, Yoshinori

    2016-01-01

    Background Based on the results of several randomized controlled trials, acute endovascular thrombectomy is strongly recommended for patients with acute ischemic stroke due to large artery occlusion (LAO). The incidence of an intracranial aneurysm has been reported to be approximately 5% in the general population. Therefore, the possibility of the coincidence of LAO and an intracranial aneurysm at the distal part of an occluded vessel should be considered. Summary A 74-year-old female patient presented with the sudden onset of consciousness disturbance and left-sided weakness. Neuroimages demonstrated an acute infarction due to right middle cerebral artery occlusion. The occlusion was successfully treated, and an aneurysm was incidentally detected at the occluded artery. We reviewed the literature and identified 11 cases in 8 reports, which were similar to our case. Among the 11 cases, aneurysms ruptured during endovascular therapy in 2 cases. In the present report, we discussed the prediction of concealed aneurysms and avoidance of their rupture during endovascular intervention. Key Message The presence of an aneurysm concealed behind an embolus should be carefully assessed on preoperative and intraoperative neuroimages. The important findings for suspecting such an aneurysm are a hyperdense nodular sign on preoperative computed tomography and unusual motion of the microwire during the endovascular intervention. Even if there is no finding indicative of an aneurysm, the catheter and thrombectomy devices should be more carefully advanced than usual, especially at the common sites of aneurysms, and the devices should be appropriately chosen. PMID:27051404

  4. Ultra wide band detection of on body concealed weapons using the out of plane polarized late time response

    NASA Astrophysics Data System (ADS)

    Harmer, Stuart; Andrews, David; Bowring, Nicholas; Rezgui, Nacer; Southgate, Matthew

    2009-09-01

    A method of detecting concealed handguns and knives, both on and off body, has been developed. The method utilizes aspect-independent natural, complex resonances (poles) excited by illuminating the target with frequency swept, ultrawide band microwaves in the range 0.5 - 18 GHz. These natural resonances manifest as a Late Time Response (LTR) that extends significantly (~ 5 ns) beyond the direct reflections from the human body (the Early Time Response) and are of the form of a superposition of exponentially decaying sinusoidal waveforms. Two handguns are examined, both on the human body and in isolation, by the established methodology of applying the Generalised-Pencil-Of-Function to the late time response data of the target. These poles allow the weapon to be effectively classified. Out of plane polarized (cross-polarized) scattered response is used here as this gives improved discrimination between the early and late time responses. Determination of the presence or absence of particular weapons concealed under clothing, on the human body, is demonstrated. A novel bow-tie slot antenna is described which has good pulse and frequency response over the range 0.3-1 GHz and which is suitable for excitation of the fundamental natural resonances.

  5. A functional analysis of deception detection of a mock crime using infrared thermal imaging and the Concealed Information Test

    PubMed Central

    Park, Kevin K.; Suk, Hye Won; Hwang, Heungsun; Lee, Jang-Han

    2013-01-01

    The purpose of this study was to utilize thermal imaging and the Concealed Information Test to detect deception in participants who committed a mock crime. A functional analysis using a functional ANOVA and a functional discriminant analysis was conducted to decrease the variation in the physiological data collected through the thermal imaging camera. Participants chose between a non-crime mission (Innocent Condition: IC), or a mock crime (Guilty Condition: GC) of stealing a wallet in a computer lab. Temperature in the periorbital region of the face was measured while questioning participants regarding mock crime details. Results revealed that the GC showed significantly higher temperatures when responding to crime relevant items compared to irrelevant items, while the IC did not. The functional ANOVA supported the initial results that facial temperatures of the GC elevated when responding to crime relevant items, demonstrating an interaction between group (guilty/innocent) and relevance (relevant/irrelevant). The functional discriminant analysis revealed that answering crime relevant items can be used to discriminate guilty from innocent participants. These results suggest that measuring facial temperatures in the periorbital region while conducting the Concealed Information Test is able to differentiate the GC from the IC. PMID:23470924

  6. Pixel-level Matching Based Multi-hypothesis Error Concealment Modes for Wireless 3D H.264/MVC Communication

    NASA Astrophysics Data System (ADS)

    El-Shafai, Walid

    2015-09-01

    3D multi-view video (MVV) is multiple video streams shot by several cameras around a single scene simultaneously. Therefore it is an urgent task to achieve high 3D MVV compression to meet future bandwidth constraints while maintaining a high reception quality. 3D MVV coded bit-streams that are transmitted over wireless network can suffer from error propagation in the space, time and view domains. Error concealment (EC) algorithms have the advantage of improving the received 3D video quality without any modifications in the transmission rate or in the encoder hardware or software. To improve the quality of reconstructed 3D MVV, we propose an efficient adaptive EC algorithm with multi-hypothesis modes to conceal the erroneous Macro-Blocks (MBs) of intra-coded and inter-coded frames by exploiting the spatial, temporal and inter-view correlations between frames and views. Our proposed algorithm adapts to 3D MVV motion features and to the error locations. The lost MBs are optimally recovered by utilizing motion and disparity matching between frames and views on pixel-by-pixel matching basis. Our simulation results show that the proposed adaptive multi-hypothesis EC algorithm can significantly improve the objective and subjective 3D MVV quality.

  7. Alkylating antitumor drug mechlorethamine conceals a structured PrP domain and inhibits in vitro prion amplification.

    PubMed

    Zhou, Xiaochen; Bi, Hao; Wong, Justin; Shimoji, Miyuki; Wang, Yifan; Yuan, Jue; Xiao, Xiangzhu; Wang, Gong-Xian; Zou, Wen-Quan

    2011-01-01

    Prion diseases are a group of incurable transmissible neurodegenerative disorders. The key molecular event in the pathogenesis of prion diseases is the conversion of the cellular prion protein (PrP(C)) into its pathological isoform (PrP(Sc)), accompanied by a conformational transition of α-helix into β-sheet structure involving the structured α-helix 1 domain from residues 144-154 of the protein (PrP144-154). Blocking the accessibility of PrP144-152 with anti-PrP antibody 6H4 was found to prevent PrP conversion and even to cure prion infection in cell models ( Enari et al. 2001 ). Previously, Yuan et al. (2005 ) demonstrated that the reduction and alkylation of PrP induced concealment of the 6H4 epitope. This study examined the ability of mechlorethamine (MCT), an alkylating antitumor drug, to conceal the 6H4 epitope and block PrP conversion in the presence of a reducing reagent. Mechlorethamine treatment significantly decreased in vitro amplification of PrP(Sc) in the highly efficient protein misfolding cyclic amplification system. Our findings suggest that MCT may serve as a potential therapeutic agent for prion diseases.

  8. Electron beam injected into ground generates subsoil x-rays that may deactivate concealed electronics used to trigger explosive devices

    NASA Astrophysics Data System (ADS)

    Retsky, Michael

    2008-04-01

    Explosively formed projectiles (EFP) are a major problem in terrorism and asymmetrical warfare. EFPs are often triggered by ordinary infrared motion detectors. A potential weak link is that such electronics are not hardened to ionizing radiation and can latch-up or enter other inoperative states after exposure to a single short event of ionizing radiation. While these can often be repaired with a power restart, they also can produce shorts and permanent damage. A problem of course is that we do not want to add radiation exposure to the long list of war related hazards. Biological systems are highly sensitive to integrated dosage but show no particular sensitivity to short pulses. There may be a way to generate short pulsed subsoil radiation to deactivate concealed electronics without introducing radiation hazards to military personnel and civilian bystanders. Electron beams of 30 MeV that can be produced by portable linear accelerators (linacs) propagate >20 m in air and 10-12 cm in soil. X-radiation is produced by bremsstrahlung and occurs subsoil beneath the point of impact and is mostly forward directed. Linacs 1.5 m long can produce 66 MWatt pulses of subsoil x-radiation 1 microsecond or less in duration. Untested as yet, such a device could be mounted on a robotic vehicle that precedes a military convoy and deactivates any concealed electronics within 10-20 meters on either side of the road.

  9. A functional analysis of deception detection of a mock crime using infrared thermal imaging and the Concealed Information Test.

    PubMed

    Park, Kevin K; Suk, Hye Won; Hwang, Heungsun; Lee, Jang-Han

    2013-01-01

    The purpose of this study was to utilize thermal imaging and the Concealed Information Test to detect deception in participants who committed a mock crime. A functional analysis using a functional ANOVA and a functional discriminant analysis was conducted to decrease the variation in the physiological data collected through the thermal imaging camera. Participants chose between a non-crime mission (Innocent Condition: IC), or a mock crime (Guilty Condition: GC) of stealing a wallet in a computer lab. Temperature in the periorbital region of the face was measured while questioning participants regarding mock crime details. Results revealed that the GC showed significantly higher temperatures when responding to crime relevant items compared to irrelevant items, while the IC did not. The functional ANOVA supported the initial results that facial temperatures of the GC elevated when responding to crime relevant items, demonstrating an interaction between group (guilty/innocent) and relevance (relevant/irrelevant). The functional discriminant analysis revealed that answering crime relevant items can be used to discriminate guilty from innocent participants. These results suggest that measuring facial temperatures in the periorbital region while conducting the Concealed Information Test is able to differentiate the GC from the IC.

  10. Joint Adaptive Pre-processing Resilience and Post-processing Concealment Schemes for 3D Video Transmission

    NASA Astrophysics Data System (ADS)

    El-Shafai, Walid

    2015-03-01

    3D video transmission over erroneous networks is still a considerable issue due to restricted resources and the presence of severe channel errors. Efficiently compressing 3D video with low transmission rate, while maintaining a high quality of received 3D video, is very challenging. Since it is not plausible to re-transmit all the corrupted macro-blocks (MBs) due to real time applications and limited resources. Thus it is mandatory to retrieve the lost MBs at the decoder side using sufficient post-processing schemes, such as error concealment (EC). In this paper, we propose an adaptive multi-mode EC (AMMEC) algorithm at the decoder based on utilizing pre-processing flexible macro-block ordering error resilience (FMO-ER) technique at the encoder; to efficiently conceal the erroneous MBs of intra and inter coded frames of 3D video. Experimental simulation results show that the proposed FMO-ER/AMMEC schemes can significantly improve the objective and subjective 3D video quality.

  11. 50 CFR 679.62 - Inshore sector cooperative allocation program.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... pollock cooperative permit. (3) Conversion of quota share percentage to TAC allocations. (Effective April... that subarea. Each cooperative's annual pollock TAC allocation may be published in the proposed...

  12. Intractable paroxysmal tachycardia caused by a concealed retrogradely conducting Kent bundle. Demonstration by epicardial mapping and cure of tachycardias by surgical interruption of the His bundle.

    PubMed Central

    Denes, P; Wyndham, C R; Rosen, K M

    1976-01-01

    Electrophysiological and epicardial mapping studies are described in a patient without pre-excitation who had intractable recurrent paroxysmal supraventricular tachycardia. Electrophysiological studies revealed fixed VA conduction times during both rapid ventricular pacing and coupled ventricular stimulation. Catheter mapping of atrial activation during retrograde conduction and during induced paroxysmal supraventricular tachycardia revealed early distal coronary sinus activation (posterior left atrium) relative to the low septal, low lateral, and high lateral right atrium. These studies suggested the presence of a concealed left-sided bypass tract. The patient underwent surgical interruption of the His bundle for control of paroxysmal supraventricular tachycardia. Epicardial mapping of the atria (during ventricular pacing) confirmed the presence of a concealed left-sided bypass tract. Surgery produced antegrade av block (while retrograde conduction was maintained) and total cure of paroxysmal supraventricular tachycardia. This is the first reported case of a concealed retrograde extranodal pathway documented by epicardial mapping. Images PMID:973901

  13. Geophysical and geochemical data from the area of the Pebble Cu-Au-Mo porphyry deposit, southwestern Alaska: Contributions to assessment techniques for concealed mineral resources

    USGS Publications Warehouse

    Anderson, E.D.; Smith, S.M.; Giles, S.A.; Granitto, Matthew; Eppinger, R.G.; Bedrosian, P.A.; Shah, A.K.; Kelley, K.D.; Fey, D.L.; Minsley, B.J.; Brown, P.J.

    2011-01-01

    In 2007, the U.S. Geological Survey began a multidisciplinary study in southwest Alaska to investigate the setting and detectability of mineral deposits in concealed volcanic and glacial terranes. The study area hosts the world-class Pebble porphyry Cu-Au-Mo deposit, and through collaboration with the Pebble Limited Partnership, a range of geophysical and geochemical investigations was carried out in proximity to the deposit. The deposit is almost entirely concealed by tundra, glacial deposits, and post-mineralization volcanic rocks. The discovery of mineral resources beneath cover is becoming more important because most of the mineral resources at the surface have already been discovered. Research is needed to identify ways in which to assess for concealed mineral resources. This report presents the uninterpreted geophysical measurements and geochemical and mineralogical analytical data from samples collected during the summer field seasons from 2007 to 2010, and makes the data available in a single Geographic Information System (GIS) database.

  14. CDC Allocates $184 Million for Zika Protection

    MedlinePlus

    ... fullstory_162694.html CDC Allocates $184 Million for Zika Protection Funds are earmarked for states, territories, local ... million has been earmarked to protect Americans against Zika virus infection, the U.S. Centers for Disease Control ...

  15. Spatial Allocator for air quality modeling

    EPA Pesticide Factsheets

    The Spatial Allocator is a set of tools that helps users manipulate and generate data files related to emissions and air quality modeling without requiring the use of a commercial Geographic Information System.

  16. Fund allocation using capacitated vehicle routing problem

    NASA Astrophysics Data System (ADS)

    Mamat, Nur Jumaadzan Zaleha; Jaaman, Saiful Hafizah; Ahmad, Rokiah Rozita; Darus, Maslina

    2014-09-01

    In investment fund allocation, it is unwise for an investor to distribute his fund into several assets simultaneously due to economic reasons. One solution is to allocate the fund into a particular asset at a time in a sequence that will either maximize returns or minimize risks depending on the investor's objective. The vehicle routing problem (VRP) provides an avenue to this issue. VRP answers the question on how to efficiently use the available fleet of vehicles to meet a given service demand, subjected to a set of operational requirements. This paper proposes an idea of using capacitated vehicle routing problem (CVRP) to optimize investment fund allocation by employing data of selected stocks in the FTSE Bursa Malaysia. Results suggest that CRVP can be applied to solve the issue of investment fund allocation and increase the investor's profit.

  17. Allocation of Scarce Resources: Some Problems

    PubMed Central

    Secundy, Marian G.

    1981-01-01

    This paper presents an overview of current philosophical perspectives and societal trends in relation to allocation of scarce resources. An analysis and comparative assessment of various positions of current philosophers, theologians, and bioethicists is provided. Currently proposed cost containment measures at the federal level require that black health professionals particularly pay attention to these proposals specifically as related to allocation of resources. The ways in which cost containment and/ or modification of resource allocation will affect health care delivery, specifically for the black community, must be carefully examined. This article may suggest some approaches for individual and group response to the continuing dialogue and to the allocation process itself. The equitable distribution of health care, particularly scarce new technologies, will be one of the greatest problems facing society in the next 20 years. PMID:7265284

  18. Optimal dynamic bandwidth allocation for complex networks

    NASA Astrophysics Data System (ADS)

    Jiang, Zhong-Yuan; Liang, Man-Gui; Li, Qian; Guo, Dong-Chao

    2013-03-01

    Traffic capacity of one network strongly depends on the link’s bandwidth allocation strategy. In previous bandwidth allocation mechanisms, once one link’s bandwidth is allocated, it will be fixed throughout the overall traffic transmission process. However, the traffic load of every link changes from time to time. In this paper, with finite total bandwidth resource of the network, we propose to dynamically allocate the total bandwidth resource in which each link’s bandwidth is proportional to the queue length of the output buffer of the link per time step. With plenty of data packets in the network, the traffic handling ability of all links of the network achieves full utilization. The theoretical analysis and the extensive simulation results on complex networks are consistent. This work is valuable for network service providers to improve network performance or to do reasonable network design efficiently.

  19. 15 CFR 923.110 - Allocation formula.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...) NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE OCEAN AND COASTAL RESOURCE MANAGEMENT COASTAL ZONE MANAGEMENT PROGRAM REGULATIONS Allocation of Section 306 Program Administration... to any coastal state for the purpose of administering that state's management program, if the...

  20. Optimality versus stability in water resource allocation.

    PubMed

    Read, Laura; Madani, Kaveh; Inanloo, Bahareh

    2014-01-15

    Water allocation is a growing concern in a developing world where limited resources like fresh water are in greater demand by more parties. Negotiations over allocations often involve multiple groups with disparate social, economic, and political status and needs, who are seeking a management solution for a wide range of demands. Optimization techniques for identifying the Pareto-optimal (social planner solution) to multi-criteria multi-participant problems are commonly implemented, although often reaching agreement for this solution is difficult. In negotiations with multiple-decision makers, parties who base decisions on individual rationality may find the social planner solution to be unfair, thus creating a need to evaluate the willingness to cooperate and practicality of a cooperative allocation solution, i.e., the solution's stability. This paper suggests seeking solutions for multi-participant resource allocation problems through an economics-based power index allocation method. This method can inform on allocation schemes that quantify a party's willingness to participate in a negotiation rather than opt for no agreement. Through comparison of the suggested method with a range of distance-based multi-criteria decision making rules, namely, least squares, MAXIMIN, MINIMAX, and compromise programming, this paper shows that optimality and stability can produce different allocation solutions. The mismatch between the socially-optimal alternative and the most stable alternative can potentially result in parties leaving the negotiation as they may be too dissatisfied with their resource share. This finding has important policy implications as it justifies why stakeholders may not accept the socially optimal solution in practice, and underlies the necessity of considering stability where it may be more appropriate to give up an unstable Pareto-optimal solution for an inferior stable one. Authors suggest assessing the stability of an allocation solution as an

  1. Allocating petroleum products during oil supply disruptions.

    PubMed

    Bezdek, R H; Taylor, W B

    1981-06-19

    Four options for allocating a long-term, severe shortfall of petroleum imports are analyzed: oil price and allocation controls, coupon gasoline rationing, variable gasoline tax and rebate, and no oil price controls with partial rebates. Each of these options is evaluated in terms of four criteria: microeconomic effects, macroeconomic effects, equity, and practical problems. The implications of this analysis for energy contingency planning are discussed.

  2. Frequency allocations accommodate new commercial applications

    NASA Astrophysics Data System (ADS)

    Stiglitz, Martin R.; Blanchard, Christine

    1992-07-01

    An overview is presented of the 1992 World Administrative Radio Frequency Conference whose principal responsibility is to review and update the International Radio Regulations, including the International Table of Frequency Allocations and the procedures for utilizing the allocations. Consideration is given to the earth exploration-satellite service, the space research space operation, general-satellite service, and wind profiler radar. Attention is given to shortwave or HF broadcasting, mobile and mobile-satellite services and future public land mobile telecommunications systems.

  3. The Human Right to Adequate Housing: A Tool for Promoting and Protecting Individual and Community Health

    PubMed Central

    Thiele, Bret

    2002-01-01

    The human right to adequate housing is enshrined in international law. The right to adequate housing can be traced to the Universal Declaration of Human Rights, which was unanimously adopted by the world community in 1948. Since that time, the right to adequate housing has been reaffirmed on numerous occasions and further defined and elaborated. A key component of this right is habitability of housing, which should comply with health and safety standards. Therefore, the right to adequate housing provides an additional tool for advocates and others interested in promoting healthful housing and living conditions and thereby protecting individual and community health. PMID:11988432

  4. Allocation Games: Addressing the Ill-Posed Nature of Allocation in Life-Cycle Inventories.

    PubMed

    Hanes, Rebecca J; Cruze, Nathan B; Goel, Prem K; Bakshi, Bhavik R

    2015-07-07

    Allocation is required when a life cycle contains multi-functional processes. One approach to allocation is to partition the embodied resources in proportion to a criterion, such as product mass or cost. Many practitioners apply multiple partitioning criteria to avoid choosing one arbitrarily. However, life cycle results from different allocation methods frequently contradict each other, making it difficult or impossible for the practitioner to draw any meaningful conclusions from the study. Using the matrix notation for life-cycle inventory data, we show that an inventory that requires allocation leads to an ill-posed problem: an inventory based on allocation is one of an infinite number of inventories that are highly dependent upon allocation methods. This insight is applied to comparative life-cycle assessment (LCA), in which products with the same function but different life cycles are compared. Recently, there have been several studies that applied multiple allocation methods and found that different products were preferred under different methods. We develop the Comprehensive Allocation Investigation Strategy (CAIS) to examine any given inventory under all possible allocation decisions, enabling us to detect comparisons that are not robust to allocation, even when the comparison appears robust under conventional partitioning methods. While CAIS does not solve the ill-posed problem, it provides a systematic way to parametrize and examine the effects of partitioning allocation. The practical usefulness of this approach is demonstrated with two case studies. The first compares ethanol produced from corn stover hydrolysis, corn stover gasification, and corn grain fermentation. This comparison was not robust to allocation. The second case study compares 1,3-propanediol (PDO) produced from fossil fuels and from biomass, which was found to be a robust comparison.

  5. Advances in liver transplantation allocation systems.

    PubMed

    Schilsky, Michael L; Moini, Maryam

    2016-03-14

    With the growing number of patients in need of liver transplantation, there is a need for adopting new and modifying existing allocation policies that prioritize patients for liver transplantation. Policy should ensure fair allocation that is reproducible and strongly predictive of best pre and post transplant outcomes while taking into account the natural history of the potential recipients liver disease and its complications. There is wide acceptance for allocation policies based on urgency in which the sickest patients on the waiting list with the highest risk of mortality receive priority. Model for end-stage liver disease and Child-Turcotte-Pugh scoring system, the two most universally applicable systems are used in urgency-based prioritization. However, other factors must be considered to achieve optimal allocation. Factors affecting pre-transplant patient survival and the quality of the donor organ also affect outcome. The optimal system should have allocation prioritization that accounts for both urgency and transplant outcome. We reviewed past and current liver allocation systems with the aim of generating further discussion about improvement of current policies.

  6. Advances in liver transplantation allocation systems

    PubMed Central

    Schilsky, Michael L; Moini, Maryam

    2016-01-01

    With the growing number of patients in need of liver transplantation, there is a need for adopting new and modifying existing allocation policies that prioritize patients for liver transplantation. Policy should ensure fair allocation that is reproducible and strongly predictive of best pre and post transplant outcomes while taking into account the natural history of the potential recipients liver disease and its complications. There is wide acceptance for allocation policies based on urgency in which the sickest patients on the waiting list with the highest risk of mortality receive priority. Model for end-stage liver disease and Child-Turcotte-Pugh scoring system, the two most universally applicable systems are used in urgency-based prioritization. However, other factors must be considered to achieve optimal allocation. Factors affecting pre-transplant patient survival and the quality of the donor organ also affect outcome. The optimal system should have allocation prioritization that accounts for both urgency and transplant outcome. We reviewed past and current liver allocation systems with the aim of generating further discussion about improvement of current policies. PMID:26973389

  7. Legume adaptation to sulfur deficiency revealed by comparing nutrient allocation and seed traits in Medicago truncatula.

    PubMed

    Zuber, Hélène; Poignavent, Germain; Le Signor, Christine; Aimé, Delphine; Vieren, Eric; Tadla, Charlène; Lugan, Raphaël; Belghazi, Maya; Labas, Valérie; Santoni, Anne-Lise; Wipf, Daniel; Buitink, Julia; Avice, Jean-Christophe; Salon, Christophe; Gallardo, Karine

    2013-12-01

    Reductions in sulfur dioxide emissions and the use of sulfur-free mineral fertilizers are decreasing soil sulfur levels and threaten the adequate fertilization of most crops. To provide knowledge regarding legume adaptation to sulfur restriction, we subjected Medicago truncatula, a model legume species, to sulfur deficiency at various developmental stages, and compared the yield, nutrient allocation and seed traits. This comparative analysis revealed that sulfur deficiency at the mid-vegetative stage decreased yield and altered the allocation of nitrogen and carbon to seeds, leading to reduced levels of major oligosaccharides in mature seeds, whose germination was dramatically affected. In contrast, during the reproductive period, sulfur deficiency had little influence on yield and nutrient allocation, but the seeds germinated slowly and were characterized by low levels of a biotinylated protein, a putative indicator of germination vigor that has not been previously related to sulfur nutrition. Significantly, plants deprived of sulfur at an intermediary stage (flowering) adapted well by remobilizing nutrients from source organs to seeds, ensuring adequate quantities of carbon and nitrogen in seeds. This efficient remobilization of photosynthates may be explained by vacuolar sulfate efflux to maintain leaf metabolism throughout reproductive growth, as suggested by transcript and metabolite profiling. The seeds from these plants, deprived of sulfur at the floral transition, contained normal levels of major oligosaccharides but their germination was delayed, consistent with low levels of sucrose and the glycolytic enzymes required to restart seed metabolism during imbibition. Overall, our findings provide an integrative view of the legume response to sulfur deficiency.

  8. 9 CFR 2.40 - Attending veterinarian and adequate veterinary care (dealers and exhibitors).

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... veterinary care (dealers and exhibitors). 2.40 Section 2.40 Animals and Animal Products ANIMAL AND PLANT... and Adequate Veterinary Care § 2.40 Attending veterinarian and adequate veterinary care (dealers and... veterinary care to its animals in compliance with this section. (1) Each dealer and exhibitor shall employ...

  9. 9 CFR 2.33 - Attending veterinarian and adequate veterinary care.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... veterinary care. 2.33 Section 2.33 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION SERVICE... adequate veterinary care. (a) Each research facility shall have an attending veterinarian who shall provide adequate veterinary care to its animals in compliance with this section: (1) Each research facility...

  10. 40 CFR 152.20 - Exemptions for pesticides adequately regulated by another Federal agency.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 24 2014-07-01 2014-07-01 false Exemptions for pesticides adequately... PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS PESTICIDE REGISTRATION AND CLASSIFICATION PROCEDURES Exemptions § 152.20 Exemptions for pesticides adequately regulated by another Federal agency. The...

  11. 40 CFR 152.20 - Exemptions for pesticides adequately regulated by another Federal agency.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 25 2013-07-01 2013-07-01 false Exemptions for pesticides adequately... PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS PESTICIDE REGISTRATION AND CLASSIFICATION PROCEDURES Exemptions § 152.20 Exemptions for pesticides adequately regulated by another Federal agency. The...

  12. 40 CFR 152.20 - Exemptions for pesticides adequately regulated by another Federal agency.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 24 2011-07-01 2011-07-01 false Exemptions for pesticides adequately... PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS PESTICIDE REGISTRATION AND CLASSIFICATION PROCEDURES Exemptions § 152.20 Exemptions for pesticides adequately regulated by another Federal agency. The...

  13. 40 CFR 152.20 - Exemptions for pesticides adequately regulated by another Federal agency.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 25 2012-07-01 2012-07-01 false Exemptions for pesticides adequately... PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS PESTICIDE REGISTRATION AND CLASSIFICATION PROCEDURES Exemptions § 152.20 Exemptions for pesticides adequately regulated by another Federal agency. The...

  14. 40 CFR 152.20 - Exemptions for pesticides adequately regulated by another Federal agency.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Exemptions for pesticides adequately... PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS PESTICIDE REGISTRATION AND CLASSIFICATION PROCEDURES Exemptions § 152.20 Exemptions for pesticides adequately regulated by another Federal agency. The...

  15. 42 CFR 417.568 - Adequate financial records, statistical data, and cost finding.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 42 Public Health 3 2013-10-01 2013-10-01 false Adequate financial records, statistical data, and....568 Adequate financial records, statistical data, and cost finding. (a) Maintenance of records. (1) An HMO or CMP must maintain sufficient financial records and statistical data for proper determination...

  16. 42 CFR 417.568 - Adequate financial records, statistical data, and cost finding.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 42 Public Health 3 2014-10-01 2014-10-01 false Adequate financial records, statistical data, and....568 Adequate financial records, statistical data, and cost finding. (a) Maintenance of records. (1) An HMO or CMP must maintain sufficient financial records and statistical data for proper determination...

  17. 42 CFR 417.568 - Adequate financial records, statistical data, and cost finding.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 42 Public Health 3 2012-10-01 2012-10-01 false Adequate financial records, statistical data, and....568 Adequate financial records, statistical data, and cost finding. (a) Maintenance of records. (1) An HMO or CMP must maintain sufficient financial records and statistical data for proper determination...

  18. 42 CFR 438.207 - Assurances of adequate capacity and services.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 42 Public Health 4 2012-10-01 2012-10-01 false Assurances of adequate capacity and services. 438... Improvement Access Standards § 438.207 Assurances of adequate capacity and services. (a) Basic rule. The State... provides supporting documentation that demonstrates that it has the capacity to serve the...

  19. 42 CFR 438.207 - Assurances of adequate capacity and services.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 42 Public Health 4 2014-10-01 2014-10-01 false Assurances of adequate capacity and services. 438... Improvement Access Standards § 438.207 Assurances of adequate capacity and services. (a) Basic rule. The State... provides supporting documentation that demonstrates that it has the capacity to serve the...

  20. 42 CFR 438.207 - Assurances of adequate capacity and services.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 4 2011-10-01 2011-10-01 false Assurances of adequate capacity and services. 438... Improvement Access Standards § 438.207 Assurances of adequate capacity and services. (a) Basic rule. The State... provides supporting documentation that demonstrates that it has the capacity to serve the...

  1. 42 CFR 438.207 - Assurances of adequate capacity and services.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 42 Public Health 4 2013-10-01 2013-10-01 false Assurances of adequate capacity and services. 438... Improvement Access Standards § 438.207 Assurances of adequate capacity and services. (a) Basic rule. The State... provides supporting documentation that demonstrates that it has the capacity to serve the...

  2. 9 CFR 2.33 - Attending veterinarian and adequate veterinary care.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ..., DEPARTMENT OF AGRICULTURE ANIMAL WELFARE REGULATIONS Research Facilities § 2.33 Attending veterinarian and adequate veterinary care. (a) Each research facility shall have an attending veterinarian who shall provide adequate veterinary care to its animals in compliance with this section: (1) Each research facility...

  3. 9 CFR 2.33 - Attending veterinarian and adequate veterinary care.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ..., DEPARTMENT OF AGRICULTURE ANIMAL WELFARE REGULATIONS Research Facilities § 2.33 Attending veterinarian and adequate veterinary care. (a) Each research facility shall have an attending veterinarian who shall provide adequate veterinary care to its animals in compliance with this section: (1) Each research facility...

  4. 24 CFR 982.101 - Allocation of funding.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 4 2013-04-01 2013-04-01 false Allocation of funding. 982.101... DEVELOPMENT SECTION 8 TENANT-BASED ASSISTANCE: HOUSING CHOICE VOUCHER PROGRAM Funding and PHA Application for Funding § 982.101 Allocation of funding. (a) Allocation of funding. HUD allocates available...

  5. 24 CFR 982.101 - Allocation of funding.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 4 2012-04-01 2012-04-01 false Allocation of funding. 982.101... DEVELOPMENT SECTION 8 TENANT BASED ASSISTANCE: HOUSING CHOICE VOUCHER PROGRAM Funding and PHA Application for Funding § 982.101 Allocation of funding. (a) Allocation of funding. HUD allocates available...

  6. 24 CFR 791.404 - Field Office allocation planning.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Field Office allocation planning... Allocation of Budget Authority for Housing Assistance § 791.404 Field Office allocation planning. (a) General objective. The allocation planning process should provide for the equitable distribution of available...

  7. 26 CFR 1.141-6 - Allocation and accounting rules.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 26 Internal Revenue 2 2012-04-01 2012-04-01 false Allocation and accounting rules. 1.141-6 Section... Allocation and accounting rules. (a) Allocation of proceeds to expenditures. For purposes of §§ 1.141-1.... Thus, allocations generally may be made using any reasonable, consistently applied accounting...

  8. 26 CFR 1.141-6 - Allocation and accounting rules.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 26 Internal Revenue 2 2014-04-01 2014-04-01 false Allocation and accounting rules. 1.141-6 Section... Allocation and accounting rules. (a) Allocation of proceeds to expenditures. For purposes of §§ 1.141-1.... Thus, allocations generally may be made using any reasonable, consistently applied accounting...

  9. 26 CFR 1.141-6 - Allocation and accounting rules.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 26 Internal Revenue 2 2013-04-01 2013-04-01 false Allocation and accounting rules. 1.141-6 Section... Allocation and accounting rules. (a) Allocation of proceeds to expenditures. For purposes of §§ 1.141-1.... Thus, allocations generally may be made using any reasonable, consistently applied accounting...

  10. 24 CFR 791.404 - Field Office allocation planning.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 4 2012-04-01 2012-04-01 false Field Office allocation planning... Allocation of Budget Authority for Housing Assistance § 791.404 Field Office allocation planning. (a) General... authority, consistent with the relative housing needs of each allocation area within the field...

  11. 24 CFR 791.404 - Field Office allocation planning.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 24 Housing and Urban Development 4 2014-04-01 2014-04-01 false Field Office allocation planning... Allocation of Budget Authority for Housing Assistance § 791.404 Field Office allocation planning. (a) General... authority, consistent with the relative housing needs of each allocation area within the field...

  12. 24 CFR 791.404 - Field Office allocation planning.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 24 Housing and Urban Development 4 2011-04-01 2011-04-01 false Field Office allocation planning... Allocation of Budget Authority for Housing Assistance § 791.404 Field Office allocation planning. (a) General... authority, consistent with the relative housing needs of each allocation area within the field...

  13. 24 CFR 791.404 - Field Office allocation planning.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 4 2013-04-01 2013-04-01 false Field Office allocation planning... Allocation of Budget Authority for Housing Assistance § 791.404 Field Office allocation planning. (a) General... authority, consistent with the relative housing needs of each allocation area within the field...

  14. 47 CFR 2.106 - Table of Frequency Allocations.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 1 2011-10-01 2011-10-01 false Table of Frequency Allocations. 2.106 Section 2.106 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL FREQUENCY ALLOCATIONS AND RADIO TREATY MATTERS; GENERAL RULES AND REGULATIONS Allocation, Assignment, and Use of Radio Frequencies § 2.106 Table of Frequency Allocations. Editorial...

  15. 47 CFR 2.106 - Table of Frequency Allocations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Table of Frequency Allocations. 2.106 Section 2.106 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL FREQUENCY ALLOCATIONS AND RADIO TREATY MATTERS; GENERAL RULES AND REGULATIONS Allocation, Assignment, and Use of Radio Frequencies § 2.106 Table of Frequency Allocations. Editorial...

  16. 26 CFR 26.2632-1 - Allocation of GST exemption.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... effect on the application of the automatic allocation rules applicable after the transferor's death under... a Form 709 for calendar year 2008). (d) Allocations after the transferor's death—(1) Allocation by... negligible. (2) Automatic allocation after death. A decedent's unused GST exemption is...

  17. 26 CFR 26.2632-1 - Allocation of GST exemption.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... effect on the application of the automatic allocation rules applicable after the transferor's death under... a Form 709 for calendar year 2008). (d) Allocations after the transferor's death—(1) Allocation by... negligible. (2) Automatic allocation after death. A decedent's unused GST exemption is...

  18. 26 CFR 26.2632-1 - Allocation of GST exemption.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... effect on the application of the automatic allocation rules applicable after the transferor's death under... a Form 709 for calendar year 2008). (d) Allocations after the transferor's death—(1) Allocation by... negligible. (2) Automatic allocation after death. A decedent's unused GST exemption is...

  19. 26 CFR 26.2632-1 - Allocation of GST exemption.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... effect on the application of the automatic allocation rules applicable after the transferor's death under... a Form 709 for calendar year 2008). (d) Allocations after the transferor's death—(1) Allocation by... negligible. (2) Automatic allocation after death. A decedent's unused GST exemption is...

  20. 47 CFR 64.903 - Cost allocation manuals.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Cost allocation manuals. 64.903 Section 64.903... RULES RELATING TO COMMON CARRIERS Allocation of Costs § 64.903 Cost allocation manuals. (a) Each... mid-sized incumbent local exchange carriers is required to file a cost allocation manual...

  1. The Use of Different Rules to Allocate Reward and Punishment.

    ERIC Educational Resources Information Center

    Mueller, Charles W.

    Much research has been conducted about how and when individuals allocate rewards, yet little research exists concerning the allocation of punishment. The process of allocating negative outcomes may be different from the decision making process for positive outcomes. To examine the decision making process for allocating rewards and punishment,…

  2. 45 CFR 1159.15 - Who has the responsibility for maintaining adequate technical, physical, and security safeguards...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... adequate technical, physical, and security safeguards to prevent unauthorized disclosure or destruction of... adequate technical, physical, and security safeguards to prevent unauthorized disclosure or destruction of... of maintaining adequate technical, physical, and security safeguards to prevent...

  3. 45 CFR 1159.15 - Who has the responsibility for maintaining adequate technical, physical, and security safeguards...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... adequate technical, physical, and security safeguards to prevent unauthorized disclosure or destruction of... adequate technical, physical, and security safeguards to prevent unauthorized disclosure or destruction of... of maintaining adequate technical, physical, and security safeguards to prevent...

  4. An Analysis and Allocation System for Library Collections Budgets: The Comprehensive Allocation Process (CAP)

    ERIC Educational Resources Information Center

    Lyons, Lucy Eleonore; Blosser, John

    2012-01-01

    The "Comprehensive Allocation Process" (CAP) is a reproducible decision-making structure for the allocation of new collections funds, for the reallocation of funds within stagnant budgets, and for budget cuts in the face of reduced funding levels. This system was designed to overcome common shortcomings of current methods. Its philosophical…

  5. 76 FR 32392 - Notice of Allocation Availability (NOAA) Inviting Applications for the CY 2011 Allocation Round...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-06

    ... Community Development Financial Institutions Fund Notice of Allocation Availability (NOAA) Inviting... (see Section IV.D. of this NOAA for more details). Applications must meet all eligibility and other requirements and deadlines, as applicable, set forth in this NOAA. Allocation applicants that are not...

  6. Lead isotopes in iron and manganese oxide coatings and their use as an exploration guide for concealed mineralization

    USGS Publications Warehouse

    Gulson, B.L.; Church, S.E.; Mizon, K.J.; Meier, A.L.

    1992-01-01

    Lead isotopes from Fe and Mn oxides that coat stream pebbles from around the Mount Emmons porphyry molybdenum deposit in Colorado were studied to assess the feasibility of using Pb isotopes to detect concealed mineral deposits. The Fe/Mn oxide coatings were analyzed to determine their elemental concentrations using ICP-AES. The Pb isotope compositions of solutions from a selected suite of samples were measured, using both thermal ionization and ICP mass spectrometry, to compare results determined by the two analytical methods. Heavy mineral concentrates from the same sites were also analyzed to compare the Pb isotope compositions of the Fe/Mn coatings with those found in panned concentrates. The Fe/Mn and 206Pb/204Pb ratios of the oxide coatings are related to the lithology of the host rocks; Fe/Mn oxide coatings on pebbles of black shale have higher Fe/Mn values than do the coatings on either sandstone or igneous rocks. The shale host rocks have a more radiogenic signature (e.g. higher 206Pb/ 204Pb) than the sandstone or igneous host rocks. The Pb isotope data from sandstone and igneous hosts can detect concealed mineralized rock on both a regional and local scale, even though there are contributions from: (1) metals from the main-stage molybdenite ore deposit; (2) metals from the phyllic alteration zone which has a more radiogenic Pb isotope signature reflecting hydrothermal leaching of Pb from the Mancos Shale; (3) Pb-rich base metal veins with a highly variable Pb isotope signature; and (4) sedimentary country rocks which have a more radiogenic Pb isotope signature. An investigation of within-stream variation shows that the Pb isotope signature of the molybdenite ore zone is retained in the Fe/Mn oxide coatings and is not camouflaged by contributions from Pb-rich base-metal veins that crop out upstream. In another traverse, the Pb isotope data from Fe/Mn oxide coatings reflect a complex mixing of Pb from the molybdenite ore zone and its hornfels margin, Pb

  7. The impact of prior knowledge from participant instructions in a mock crime P300 Concealed Information Test.

    PubMed

    Winograd, Michael R; Rosenfeld, J Peter

    2014-12-01

    In P300-Concealed Information Tests used with mock crime scenarios, the amount of detail revealed to a participant prior to the commission of the mock crime can have a serious impact on a study's validity. We predicted that exposure to crime details through instructions would bias detection rates toward enhanced sensitivity. In a 2 × 2 factorial design, participants were either informed (through mock crime instructions) or naïve as to the identity of a to-be-stolen item, and then either committed (guilty) or did not commit (innocent) the crime. Results showed that prior knowledge of the stolen item was sufficient to cause 69% of innocent-informed participants to be incorrectly classified as guilty. Further, we found a trend toward enhanced detection rate for guilty-informed participants over guilty-naïve participants. Results suggest that revealing details to participants through instructions biases detection rates in the P300-CIT toward enhanced sensitivity.

  8. Discovery of a concealed geothermal resource in the Alturas Basin, and its implications for further exploration in northeastern California

    SciTech Connect

    Bohm, B.; Juncal, R.W.

    1995-12-31

    In 1988 a so far unknown geothermal resource was drilled into under the City of Alturas in northeastern California. A fracture was tapped below 2300 feet, in cemented fine-grained tuffs and mudflows, producing 182{degrees}F water. The well has been used since 1990 to heat the local high school. A second well was drilled in 1991, producing about 250 gpm 182{degrees}F water from a fracture below 1893 ft. Well productivities and artesian pressures are variable, depending on distance from a major fault zone and local hydrologic regime. It appears as if the wells produce from deep reaching fractures in a caprock, that may conceal a 300 to 400{degrees}F resource between 4000 and 6000 feet depth. The results have important implications for geothermal exploration in northeastern California, i.e. just because there are no surface manifestations in a basin, it does not necessarily mean there is no geothermal resource at depth.

  9. Geochemical Data for Samples Collected in 2007 Near the Concealed Pebble Porphyry Cu-Au-Mo Deposit, Southwest Alaska

    USGS Publications Warehouse

    Fey, David L.; Granitto, Matthew; Giles, Stuart A.; Smith, Steven M.; Eppinger, Robert G.; Kelley, Karen D.

    2008-01-01

    In the summer of 2007, the U.S. Geological Survey (USGS) began an exploration geochemical research study over the Pebble porphyry copper-gold-molydenum (Cu-Au-Mo) deposit in southwest Alaska. The Pebble deposit is extremely large and is almost entirely concealed by tundra, glacial deposits, and post-Cretaceous volcanic and volcaniclastic rocks. The deposit is presently being explored by Northern Dynasty Minerals, Ltd., and Anglo-American LLC. The USGS undertakes unbiased, broad-scale mineral resource assessments of government lands to provide Congress and citizens with information on national mineral endowment. Research on known deposits is also done to refine and better constrain methods and deposit models for the mineral resource assessments. The Pebble deposit was chosen for this study because it is concealed by surficial cover rocks, it is relatively undisturbed (except for exploration company drill holes), it is a large mineral system, and it is fairly well constrained at depth by the drill hole geology and geochemistry. The goals of the USGS study are (1) to determine whether the concealed deposit can be detected with surface samples, (2) to better understand the processes of metal migration from the deposit to the surface, and (3) to test and develop methods for assessing mineral resources in similar concealed terrains. This report presents analytical results for geochemical samples collected in 2007 from the Pebble deposit and surrounding environs. The analytical data are presented digitally both as an integrated Microsoft 2003 Access? database and as Microsoft 2003 Excel? files. The Pebble deposit is located in southwestern Alaska on state lands about 30 km (18 mi) northwest of the village of Illiamna and 320 km (200 mi) southwest of Anchorage (fig. 1). Elevations in the Pebble area range from 287 m (940 ft) at Frying Pan Lake just south of the deposit to 1146 m (3760 ft) on Kaskanak Mountain about 5 km (5 mi) to the west. The deposit is in an area of

  10. Healthcare resource allocation decisions affecting uninsured services

    PubMed Central

    Harrison, Krista Lyn; Taylor, Holly A.

    2017-01-01

    Purpose Using the example of community access programs (CAPs), the purpose of this paper is to describe resource allocation and policy decisions related to providing health services for the uninsured in the USA and the organizational values affecting these decisions. Design/methodology/approach The study used comparative case study methodology at two geographically diverse sites. Researchers collected data from program documents, meeting observations, and interviews with program stakeholders. Findings Five resource allocation or policy decisions relevant to providing healthcare services were described at each site across three categories: designing the health plan, reacting to funding changes, and revising policies. Organizational values of access to care and stewardship most frequently affected resource allocation and policy decisions, while economic and political pressures affect the relative prioritization of values. Research limitations/implications Small sample size, the potential for social desirability or recall bias, and the exclusion of provider, member or community perspectives beyond those represented among participating board members. Practical implications Program directors or researchers can use this study to assess the extent to which resource allocation and policy decisions align with organizational values and mission statements. Social implications The description of how healthcare decisions are actually made can be matched with literature that describes how healthcare resource decisions ought to be made, in order to provide a normative grounding for future decisions. Originality/value This study addresses a gap in literature regarding how CAPs actually make resource allocation decisions that affect access to healthcare services. PMID:27934550

  11. Superframe Duration Allocation Schemes to Improve the Throughput of Cluster-Tree Wireless Sensor Networks

    PubMed Central

    Leão, Erico; Montez, Carlos; Moraes, Ricardo; Portugal, Paulo; Vasques, Francisco

    2017-01-01

    The use of Wireless Sensor Network (WSN) technologies is an attractive option to support wide-scale monitoring applications, such as the ones that can be found in precision agriculture, environmental monitoring and industrial automation. The IEEE 802.15.4/ZigBee cluster-tree topology is a suitable topology to build wide-scale WSNs. Despite some of its known advantages, including timing synchronisation and duty-cycle operation, cluster-tree networks may suffer from severe network congestion problems due to the convergecast pattern of its communication traffic. Therefore, the careful adjustment of transmission opportunities (superframe durations) allocated to the cluster-heads is an important research issue. This paper proposes a set of proportional Superframe Duration Allocation (SDA) schemes, based on well-defined protocol and timing models, and on the message load imposed by child nodes (Load-SDA scheme), or by number of descendant nodes (Nodes-SDA scheme) of each cluster-head. The underlying reasoning is to adequately allocate transmission opportunities (superframe durations) and parametrize buffer sizes, in order to improve the network throughput and avoid typical problems, such as: network congestion, high end-to-end communication delays and discarded messages due to buffer overflows. Simulation assessments show how proposed allocation schemes may clearly improve the operation of wide-scale cluster-tree networks. PMID:28134822

  12. Superframe Duration Allocation Schemes to Improve the Throughput of Cluster-Tree Wireless Sensor Networks.

    PubMed

    Leão, Erico; Montez, Carlos; Moraes, Ricardo; Portugal, Paulo; Vasques, Francisco

    2017-01-27

    The use ofWireless Sensor Network (WSN) technologies is an attractive option to support wide-scale monitoring applications, such as the ones that can be found in precision agriculture, environmental monitoring and industrial automation. The IEEE 802.15.4/ZigBee cluster-tree topology is a suitable topology to build wide-scale WSNs. Despite some of its known advantages, including timing synchronisation and duty-cycle operation, cluster-tree networks may suffer from severe network congestion problems due to the convergecast pattern of its communication traffic. Therefore, the careful adjustment of transmission opportunities (superframe durations) allocated to the cluster-heads is an important research issue. This paper proposes a set of proportional Superframe Duration Allocation (SDA) schemes, based on well-defined protocol and timing models, and on the message load imposed by child nodes (Load-SDA scheme), or by number of descendant nodes (Nodes-SDA scheme) of each cluster-head. The underlying reasoning is to adequately allocate transmission opportunities (superframe durations) and parametrize buffer sizes, in order to improve the network throughput and avoid typical problems, such as: network congestion, high end-to-end communication delays and discarded messages due to buffer overflows. Simulation assessments show how proposed allocation schemes may clearly improve the operation of wide-scale cluster-tree networks.

  13. Hidden from health: structural stigma, sexual orientation concealment, and HIV across 38 countries in the European MSM Internet Survey

    PubMed Central

    Pachankis, John E.; Hatzenbuehler, Mark L.; Hickson, Ford; Weatherburn, Peter; Berg, Rigmor C.; Marcus, Ulrich; Schmidt, Axel J.

    2016-01-01

    Objective Substantial country-level variation exists in prejudiced attitudes towards male homosexuality and in the extent to which countries promote the unequal treatment of MSM through discriminatory laws. The impact and underlying mechanisms of country-level stigma on odds of diagnosed HIV, sexual opportunities, and experience of HIV-prevention services, needs and behaviours have rarely been examined, however. Design Data come from the European MSM Internet Survey (EMIS), which was administered between June and August 2010 across 38 European countries (N =174 209). Methods Country-level stigma was assessed using a combination of national laws and policies affecting sexual minorities and a measure of attitudes held by the citizens of each country. We also assessed concealment, HIV status, number of past 12-month male sex partners, and eight HIV-preventive services, knowledge, and behavioural outcomes. Results MSM living in countries with higher levels of stigma had reduced odds of diagnosed HIV and fewer partners but higher odds of sexual risk behaviour, unmet prevention needs, not using testing services, and not discussing their sexuality in testing services. Sexual orientation concealment mediated associations between country-level stigma and these outcomes. Conclusion Country-level stigma may have historically limited HIV transmission opportunities among MSM, but by restricting MSM’s public visibility, it also reduces MSM’s ability to access HIV-preventive services, knowledge and precautionary behaviours. These findings suggest that MSM in European countries with high levels of stigma are vulnerable to HIV infection. Although they have less opportunity to identify and contact other MSM, this might change with emerging technologies. PMID:26035323

  14. Mental Health Stigma, Self-Concealment, and Help-Seeking Attitudes among Asian American and European American College Students with No Help-Seeking Experience

    ERIC Educational Resources Information Center

    Masuda, Akihiko; Boone, Matthew S.

    2011-01-01

    The present study examined whether mental health stigma (i.e., negative attitudes toward people with a psychological disorder) and self-concealment are unique predictors of help-seeking attitudes in Asian American and European American college students with no history of seeking professional psychological services. The Asian American group had…

  15. Mental Health Stigma and Self-Concealment as Predictors of Help-Seeking Attitudes among Latina/o College Students in the United States

    ERIC Educational Resources Information Center

    Mendoza, Hadrian; Masuda, Akihiko; Swartout, Kevin M.

    2015-01-01

    The study examined whether mental health stigma and self-concealment are uniquely related to various dimensions of attitudes toward seeking professional psychological services (i.e., help-seeking attitudes) in Latina/o college students. Data from 129 Latina/o undergraduates (76% female) were used in the analysis. Results revealed that mental…

  16. Attitudes toward Face-to-Face and Online Counseling: Roles of Self-Concealment, Openness to Experience, Loss of Face, Stigma, and Disclosure Expectations among Korean College Students

    ERIC Educational Resources Information Center

    Bathje, Geoff J.; Kim, Eunha; Rau, Ellen; Bassiouny, Muhammad Adam; Kim, Taehoon

    2014-01-01

    This study examined attitudes toward face-to-face (f2f) and online counseling among 228 Korean college students. In addition, it tested a hypothesized model proposing that general propensities (i.e., self-concealment, openness to experience, and loss of face) would influence counseling-specific expectations (i.e., self-stigma and disclosure…

  17. Non-Linear Control Allocation Using Piecewise Linear Functions

    DTIC Science & Technology

    2003-08-01

    A novel method is presented for the solution of the non- linear control allocation problem. Historically, control allocation has been performed by... linear control allocation problem to be cast as a piecewise linear program. The piecewise linear program is ultimately cast as a mixed-integer linear...piecewise linear control allocation method is shown to be markedly improved when compared to the performance of a more traditional control allocation approach that assumes linearity.

  18. Task mapping for non-contiguous allocations.

    SciTech Connect

    Leung, Vitus Joseph; Bunde, David P.; Ebbers, Johnathan; Price, Nicholas W.; Swank, Matthew.; Feer, Stefan P.; Rhodes, Zachary D.

    2013-02-01

    This paper examines task mapping algorithms for non-contiguously allocated parallel jobs. Several studies have shown that task placement affects job running time for both contiguously and non-contiguously allocated jobs. Traditionally, work on task mapping either uses a very general model where the job has an arbitrary communication pattern or assumes that jobs are allocated contiguously, making them completely isolated from each other. A middle ground between these two cases is the mapping problem for non-contiguous jobs having a specific communication pattern. We propose several task mapping algorithms for jobs with a stencil communication pattern and evaluate them using experiments and simulations. Our strategies improve the running time of a MiniApp by as much as 30% over a baseline strategy. Furthermore, this improvement increases markedly with the job size, demonstrating the importance of task mapping as systems grow toward exascale.

  19. Resource allocation for efficient environmental management.

    PubMed

    McCarthy, Michael A; Thompson, Colin J; Hauser, Cindy; Burgman, Mark A; Possingham, Hugh P; Moir, Melinda L; Tiensin, Thanawat; Gilbert, Marius

    2010-10-01

    Environmental managers must decide how to invest available resources. Researchers have previously determined how to allocate conservation resources among regions, design nature reserves, allocate funding to species conservation programs, design biodiversity surveys and monitoring programs, manage species and invest in greenhouse gas mitigation schemes. However, these issues have not been addressed with a unified theory. Furthermore, uncertainty is prevalent in environmental management, and needs to be considered to manage risks. We present a theory for optimal environmental management, synthesizing previous approaches to the topic and incorporating uncertainty. We show that the theory solves a diverse range of important problems of resource allocation, including distributing conservation resources among the world's biodiversity hotspots; surveillance to detect the highly pathogenic avian influenza H5N1 virus in Thailand; and choosing survey methods for the insect order Hemiptera. Environmental management decisions are similar to decisions about financial investments, with trade-offs between risk and reward.

  20. Biomass Resource Allocation among Competing End Uses

    SciTech Connect

    Newes, E.; Bush, B.; Inman, D.; Lin, Y.; Mai, T.; Martinez, A.; Mulcahy, D.; Short, W.; Simpkins, T.; Uriarte, C.; Peck, C.

    2012-05-01

    The Biomass Scenario Model (BSM) is a system dynamics model developed by the U.S. Department of Energy as a tool to better understand the interaction of complex policies and their potential effects on the biofuels industry in the United States. However, it does not currently have the capability to account for allocation of biomass resources among the various end uses, which limits its utilization in analysis of policies that target biomass uses outside the biofuels industry. This report provides a more holistic understanding of the dynamics surrounding the allocation of biomass among uses that include traditional use, wood pellet exports, bio-based products and bioproducts, biopower, and biofuels by (1) highlighting the methods used in existing models' treatments of competition for biomass resources; (2) identifying coverage and gaps in industry data regarding the competing end uses; and (3) exploring options for developing models of biomass allocation that could be integrated with the BSM to actively exchange and incorporate relevant information.

  1. Competing Principles for Allocating Health Care Resources.

    PubMed

    Carter, Drew; Gordon, Jason; Watt, Amber M

    2016-10-01

    We clarify options for conceptualizing equity, or what we refer to as justice, in resource allocation. We do this by systematically differentiating, expounding, and then illustrating eight different substantive principles of justice. In doing this, we compare different meanings that can be attributed to "need" and "the capacity to benefit" (CTB). Our comparison is sharpened by two analytical tools. First, quantification helps to clarify the divergent consequences of allocations commended by competing principles. Second, a diagrammatic approach developed by economists Culyer and Wagstaff offers a visual and conceptual aid. Of the eight principles we illustrate, only two treat as relevant both a person's initial health state and a person's CTB per resource unit expended: (1) allocate resources so as to most closely equalize final health states and (2) allocate resources so as to equally restore health states to population norms. These allocative principles ought to be preferred to the alternatives if one deems relevant both a person's initial health state and a person's CTB per resource unit expended. Finally, we examine some possibilities for conceptualizing benefits as relative to how badly off someone is, extending Parfit's thought on Prioritarianism (a prioritizing of the worst off). Questions arise as to how much intervention effects accruing to the worse off count for more and how this changes with improving health. We explicate some recent efforts to answer these questions, including in Dutch and British government circles. These efforts can be viewed as efforts to operationalize need as an allocative principle. Each effort seeks to maximize in the aggregate quanta of effect that are differentially valued in favor of the worst off. In this respect, each effort constitutes one type of Prioritarianism, which Parfit failed to differentiate from other types.

  2. Inferential Processing among Adequate and Struggling Adolescent Comprehenders and Relations to Reading Comprehension

    PubMed Central

    Barth, Amy E.; Barnes, Marcia; Francis, David J.; Vaughn, Sharon; York, Mary

    2015-01-01

    Separate mixed model analyses of variance (ANOVA) were conducted to examine the effect of textual distance on the accuracy and speed of text consistency judgments among adequate and struggling comprehenders across grades 6–12 (n = 1203). Multiple regressions examined whether accuracy in text consistency judgments uniquely accounted for variance in comprehension. Results suggest that there is considerable growth across the middle and high school years, particularly for adequate comprehenders in those text integration processes that maintain local coherence. Accuracy in text consistency judgments accounted for significant unique variance for passage-level, but not sentence-level comprehension, particularly for adequate comprehenders. PMID:26166946

  3. Using Multitheory Model of Health Behavior Change to Predict Adequate Sleep Behavior.

    PubMed

    Knowlden, Adam P; Sharma, Manoj; Nahar, Vinayak K

    The purpose of this article was to use the multitheory model of health behavior change in predicting adequate sleep behavior in college students. A valid and reliable survey was administered in a cross-sectional design (n = 151). For initiation of adequate sleep behavior, the construct of behavioral confidence (P < .001) was found to be significant and accounted for 24.4% of the variance. For sustenance of adequate sleep behavior, changes in social environment (P < .02), emotional transformation (P < .001), and practice for change (P < .001) were significant and accounted for 34.2% of the variance.

  4. 'These sorts of people don't do very well': race and allocation of health care resources.

    PubMed Central

    Lowe, M; Kerridge, I H; Mitchell, K R

    1995-01-01

    Recent literature has highlighted issues of racial discrimination in medicine. In order to explore the sometimes subtle influence of racial determinants in decisions about resource allocation, we present the case of a 53-year-old Australian Aboriginal woman with end-stage renal failure. The epidemiology of renal failure in the Australian Aboriginal population and amongst other indigenous peoples is discussed. We show that the use of utilitarian outcome criteria for resource allocation may embody subtle racial discrimination where consideration is not given to issues of justice, race, culture and gender. It is only where the processes by which resources are allocated are transparent, clearly defined and based upon consultation with individual patients that issues and justice are likely to be adequately addressed. PMID:8778460

  5. Allocation Rules for Sequential Clinical Trials.

    DTIC Science & Technology

    1982-07-01

    AD-AIN 354 STANFORD UNIV CA DEPT OF STATISTICS F/V 12/1 ALLOCATION RULES FOR SEQUENTIAL CLINICAL TRIALS .(U) JUL 82 D SIEGMUND N00V11577-C-V306...UNCLASSIFIED TR 18 NL ALLOCATION RULES FOR SEQUENTIAL CLINICAL TRIALS BY D. SIEGMUND TECHNICAL REPORT NO. 18 JULY 1982 PREPARED UNDER CONTRACT N00014-77-C...at all. Rere me. discuss (I) and (11) or mes"s 9f a Monte Carlo experiment. The advantages of randomization in clinical trials has been discussed at

  6. The Allocation of Federal Expenditures Among States

    NASA Technical Reports Server (NTRS)

    Lee, Maw Lin

    1967-01-01

    This study explores factors associated with the allocation offederal expenditures by states and examines the implications of theseexpenditures on the state by state distribution of incomes. Theallocation of federal expenditures is functionally oriented toward theobjectives for which various government programs are set up. Thegeographical distribution of federal expenditures, therefore, washistorically considered to be a problem incidental to governmentactivity. Because of this, relatively little attention was given tothe question of why some states receive more federal allocation thanothers. In addition, the implications of this pattern of allocationamong the several states have not been intensively investigated.

  7. Region 8: Colorado Lamar and Steamboat Springs Adequate Letter (11/12/2002)

    EPA Pesticide Factsheets

    This letter from EPA to Colorado Department of Public Health and Environment determined Lamar and Steamboat Springs particulate matter (PM10) maintenance plan for Motor Vehicle Emissions Budgets adequate for transportation conformity purposes

  8. 75 FR 5893 - Suspension of Community Eligibility for Failure To Maintain Adequate Floodplain Management...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-05

    ... To Maintain Adequate Floodplain Management Regulations AGENCY: Federal Emergency Management Agency... floodplain management regulations meeting minimum requirements under the National Flood Insurance Program... they have brought their floodplain management regulations into compliance with the NFIP...

  9. Region 9: California Adequate / Inadequate Letter Attachment (5/30/2008)

    EPA Pesticide Factsheets

    This is a document that states that it has been found adequate for transportation conformitypurposes certain 8-hour ozone and PM2.5 motor vehicleemissions budgets in the 2007 South Coast StateImplementation Plan.

  10. 26 CFR 1.467-2 - Rent accrual for section 467 rental agreements without adequate interest.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... but no prepaid rent, and the sum of the present values (within the meaning of paragraph (d) of this... greater than the sum of the present values of the fixed rent allocated to each rental period; or (iv) The rental agreement provides for prepaid rent but no deferred rent, and the sum of the present values of...

  11. Individual and contextual determinants of adequate maternal health care services in Kenya.

    PubMed

    Achia, Thomas N O; Mageto, Lillian E

    2015-01-01

    This study aimed to examine individual and community level factors associated with adequate use of maternal antenatal health services in Kenya. Individual and community level factors associated with adequate use of maternal health care (MHC) services were obtained from the 2008-09 Kenya Demographic and Health Survey data set. Multilevel partial-proportional odds logit models were fitted using STATA 13.0 to quantify the relations of the selected covariates to adequate MHC use, defined as a three-category ordinal variable. The sample consisted of 3,621 women who had at least one live birth in the five-year period preceding this survey. Only 18 percent of the women had adequate use of MHC services. Greater educational attainment by the woman or her partner, higher socioeconomic status, access to medical insurance coverage, and greater media exposure were the individual-level factors associated with adequate use of MHC services. Greater community ethnic diversity, higher community-level socioeconomic status, and greater community-level health facility deliveries were the contextual-level factors associated with adequate use of MHC. To improve the use of MHC services in Kenya, the government needs to design and implement programs that target underlying individual and community level factors, providing focused and sustained health education to promote the use of antenatal, delivery, and postnatal care.

  12. 24 CFR 945.203 - Allocation plan.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... FAMILIES Application and Approval Procedures § 945.203 Allocation plan. (a) Applicable terminology. (1) As...; (iii) Representative advocacy groups for each of these family types: disabled families, elderly families, and families with children, where such advocacy groups exist; (iv) Representatives of...

  13. 24 CFR 945.203 - Allocation plan.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... time elderly families and non-elderly persons with disabilities currently have to wait for a dwelling... persons with disabilities; (iii) If a project is being designated for elderly families, describe the steps... FAMILIES Application and Approval Procedures § 945.203 Allocation plan. (a) Applicable terminology. (1)...

  14. Status Characteristics, Reward Allocation, and Equity

    ERIC Educational Resources Information Center

    Parcel, Toby L.; Cook, Karen S.

    1977-01-01

    The relationship between a group's power and prestige or status hierarchy and group members' patterns of reward allocation was investigated. The addition of evidence concerning actual task performance results in the alignment of reward and status rankings and encourages the use of distribution rules stressing equity as opposed to equality.…

  15. Resource Allocation Patterns and Student Achievement

    ERIC Educational Resources Information Center

    James, Lori; Pate, James; Leech, Donald; Martin, Ellice; Brockmeier, Lantry; Dees, Elizabeth

    2011-01-01

    This quantitative research study was designed to examine the relationship between system resource allocation patterns and student achievement, as measured by eighth grade Criterion-Referenced Competency Test (CRCT) mathematics, eighth grade CRCT reading, eleventh grade Georgia High School Graduation Test (GHSGT) mathematics, eleventh grade and…

  16. 24 CFR 574.130 - Formula allocations.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... immunodeficiency syndrome reported to and confirmed by the Director of the Centers for Disease Control, and on population data provided by the U.S. Census. The number of cases of acquired immunodeficiency syndrome used... statistical areas with more than 500,000 population. Each qualifying city's allocation reflects its...

  17. Resource Allocation in High Schools. Final Report.

    ERIC Educational Resources Information Center

    Hartman, William T.

    This study investigated the resource allocation process--how school administrators obtain the proper resources to operate their schools, distribute the available resources among the various school programs appropriately, and manage resources for effective educational results--in four high schools during the 1984-85 school year. Information was…

  18. Ground data systems resource allocation process

    NASA Technical Reports Server (NTRS)

    Berner, Carol A.; Durham, Ralph; Reilly, Norman B.

    1989-01-01

    The Ground Data Systems Resource Allocation Process at the Jet Propulsion Laboratory provides medium- and long-range planning for the use of Deep Space Network and Mission Control and Computing Center resources in support of NASA's deep space missions and Earth-based science. Resources consist of radio antenna complexes and associated data processing and control computer networks. A semi-automated system was developed that allows operations personnel to interactively generate, edit, and revise allocation plans spanning periods of up to ten years (as opposed to only two or three weeks under the manual system) based on the relative merit of mission events. It also enhances scientific data return. A software system known as the Resource Allocation and Planning Helper (RALPH) merges the conventional methods of operations research, rule-based knowledge engineering, and advanced data base structures. RALPH employs a generic, highly modular architecture capable of solving a wide variety of scheduling and resource sequencing problems. The rule-based RALPH system has saved significant labor in resource allocation. Its successful use affirms the importance of establishing and applying event priorities based on scientific merit, and the benefit of continuity in planning provided by knowledge-based engineering. The RALPH system exhibits a strong potential for minimizing development cycles of resource and payload planning systems throughout NASA and the private sector.

  19. The Allocation of Resources in a University

    ERIC Educational Resources Information Center

    Koch, James V.

    1974-01-01

    The paper describes a linear programming model which generates explicit quantitative information about (1) the optimal allocation of resources inside the public university (2) the "shadow price" attached to each input used in the academic process; and (3) the optimal mixture of academic outputs produced by the university. (KM)

  20. Rumination and Impaired Resource Allocation in Depression

    PubMed Central

    Levens, Sara M.; Muhtadie, Luma; Gotlib, Ian H.

    2010-01-01

    Depression is characterized by a range of cognitive deficits that theorists posit are due to the resource capturing properties of rumination. The present study was designed to examine the relation between rumination and resource allocation in depression. Twenty-five depressed and 25 nondepressed participants completed a modified dual-task version of the recency-probes task, which assesses the controlled allocation of cognitive resources by comparing performance across low- and high-interference conditions. In low-interference conditions, participants performed either the recency-probes task or a tracking task, which required participants to track specific stimuli across trials (i.e., no dual-task interference). In the high-interference condition, participants performed both the recency-probes task and the tracking task, which required the controlled allocation of resources to resolve dual-task interference. Depressed participants performed significantly worse than did their nondepressed counterparts in only the high-interference condition; performance of the 2 groups was comparable in the low-interference conditions. Furthermore, the degree to which depressed participants were impaired in the high-interference condition was correlated .74 with rumination. These findings suggest that an association between rumination and impairments in resource allocation underlies the cognitive difficulties experienced by depressed individuals. PMID:19899845

  1. 45 CFR 1355.57 - Cost allocation.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Welfare Regulations Relating to Public Welfare (Continued) OFFICE OF HUMAN DEVELOPMENT SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES THE ADMINISTRATION ON CHILDREN, YOUTH AND FAMILIES, FOSTER CARE MAINTENANCE PAYMENTS, ADOPTION ASSISTANCE, AND CHILD AND FAMILY SERVICES GENERAL § 1355.57 Cost allocation....

  2. 45 CFR 1355.57 - Cost allocation.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Welfare Regulations Relating to Public Welfare (Continued) OFFICE OF HUMAN DEVELOPMENT SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES THE ADMINISTRATION ON CHILDREN, YOUTH AND FAMILIES, FOSTER CARE MAINTENANCE PAYMENTS, ADOPTION ASSISTANCE, AND CHILD AND FAMILY SERVICES GENERAL § 1355.57 Cost allocation....

  3. 45 CFR 400.13 - Cost allocation.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Welfare Regulations Relating to Public Welfare OFFICE OF REFUGEE RESETTLEMENT, ADMINISTRATION FOR CHILDREN AND FAMILIES, DEPARTMENT OF HEALTH AND HUMAN SERVICES REFUGEE RESETTLEMENT PROGRAM Grants to States for Refugee Resettlement Award of Grants to States § 400.13 Cost allocation. (a) A State must...

  4. 24 CFR 574.130 - Formula allocations.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... immunodeficiency syndrome reported to and confirmed by the Director of the Centers for Disease Control, and on population data provided by the U.S. Census. The number of cases of acquired immunodeficiency syndrome used... statistical areas with more than 500,000 population. Each qualifying city's allocation reflects its...

  5. 24 CFR 574.130 - Formula allocations.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Control, and on population data provided by the U.S. Census. The number of cases of acquired... the formula is distributed to qualifying cities and eligible States, as described in § 574.100, based...-five percent is allocated among qualifying cities, but not States, where the per capita incidence...

  6. 50 CFR 660.322 - Sablefish allocations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... OY for the area north of 36° N. lat. This allocation represents the total amount available to the... described in § 660.372(c). (e) Ratios between tiers for sablefish-endorsed limited entry permits. The... of the three tiers associated with the sablefish endorsement such that the ratio of limits...

  7. How to Allocate Personnel Costs of Reference.

    ERIC Educational Resources Information Center

    Spencer, Carol

    In July 1974, at the American Library Association Convention, a symposium on reference measurement was held. The basic premise was that work sampling and random time sampling with self-observation were the best methods of allocating personnel costs of reference services at the Library of the College of Physicians of Philadelphia. First, reasons…

  8. 45 CFR 400.13 - Cost allocation.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Welfare Regulations Relating to Public Welfare OFFICE OF REFUGEE RESETTLEMENT, ADMINISTRATION FOR CHILDREN AND FAMILIES, DEPARTMENT OF HEALTH AND HUMAN SERVICES REFUGEE RESETTLEMENT PROGRAM Grants to States for Refugee Resettlement Award of Grants to States § 400.13 Cost allocation. (a) A State must...

  9. 45 CFR 400.13 - Cost allocation.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Welfare Regulations Relating to Public Welfare OFFICE OF REFUGEE RESETTLEMENT, ADMINISTRATION FOR CHILDREN AND FAMILIES, DEPARTMENT OF HEALTH AND HUMAN SERVICES REFUGEE RESETTLEMENT PROGRAM Grants to States for Refugee Resettlement Award of Grants to States § 400.13 Cost allocation. (a) A State must...

  10. 45 CFR 400.13 - Cost allocation.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Welfare Regulations Relating to Public Welfare OFFICE OF REFUGEE RESETTLEMENT, ADMINISTRATION FOR CHILDREN AND FAMILIES, DEPARTMENT OF HEALTH AND HUMAN SERVICES REFUGEE RESETTLEMENT PROGRAM Grants to States for Refugee Resettlement Award of Grants to States § 400.13 Cost allocation. (a) A State must...

  11. 45 CFR 400.13 - Cost allocation.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Welfare Regulations Relating to Public Welfare OFFICE OF REFUGEE RESETTLEMENT, ADMINISTRATION FOR CHILDREN AND FAMILIES, DEPARTMENT OF HEALTH AND HUMAN SERVICES REFUGEE RESETTLEMENT PROGRAM Grants to States for Refugee Resettlement Award of Grants to States § 400.13 Cost allocation. (a) A State must...

  12. 50 CFR 660.55 - Allocations.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 50 Wildlife and Fisheries 13 2014-10-01 2014-10-01 false Allocations. 660.55 Section 660.55 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE (CONTINUED) FISHERIES OFF WEST COAST STATES West Coast Groundfish Fisheries §...

  13. 50 CFR 648.87 - Sector allocation.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Sector allocation. 648.87 Section 648.87 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE FISHERIES OF THE NORTHEASTERN UNITED STATES Management Measures for the NE Multispecies and Monkfish Fisheries §...

  14. 50 CFR 660.55 - Allocations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... gear, open access, and recreational fisheries) will be established biennially or annually using the..., separate allocations for the limited entry and open access fisheries may be established using the... trawl and nontrawl (limited entry fixed gear, open access, and recreational) fisheries. IFQ species...

  15. Optimum Allocation of Water to the Cultivation Farms Using Genetic Algorithm

    NASA Astrophysics Data System (ADS)

    Saeidian, B.; Saadi Mesgari, M.; Ghodousi, M.

    2015-12-01

    The water scarcity crises in the world and specifically in Iran, requires the proper management of this valuable resource. According to the official reports, around 90 percent of the water in Iran is used for agriculture. Therefore, the adequate management and usage of water in this section can help significantly to overcome the above crises. The most important aspect of agricultural water management is related to the irrigation planning, which is basically an allocation problem. The proper allocation of water to the farms is not a simple and trivial problem, because of the limited amount of available water, the effect of different parameters, nonlinear characteristics of the objective function, and the wideness of the solution space. Usually To solve such complex problems, a meta-heuristic method such as genetic algorithm could be a good candidate. In this paper, Genetic Algorithm (GA) is used for the allocation of different amount of water to a number of farms. In this model, the amount of water transferable using canals of level one, in one period of irrigation is specified. In addition, the amount of water required by each farm is calculated using crop type, stage of crop development, and other parameters. Using these, the water production function of each farm is determined. Then, using the water production function, farm areas, and the revenue and cost of each crop type, the objective function is calculated. This objective function is used by GA for the allocation of water to the farms. The objective function is defined such that the economical profit extracted from all farms is maximized. Moreover, the limitation related to the amount of available water is considered as a constraint. In general, the total amount of allocated water should be less than the finally available water (the water transferred trough the level one canals). Because of the intensive scarcity of water, the deficit irrigation method are considered. In this method, the planning is on the

  16. Investigation of the structure and lithology of bedrock concealed by basin fill, using ground-based magnetic-field-profile data acquired in the San Rafael Basin, southeastern Arizona

    USGS Publications Warehouse

    Bultman, Mark W.

    2013-01-01

    Data on the Earth’s total-intensity magnetic field acquired near ground level and at measurement intervals as small as 1 m include information on the spatial distribution of nearsurface magnetic dipoles that in many cases are unique to a specific lithology. Such spatial information is expressed in the texture (physical appearance or characteristics) of the data at scales of hundreds of meters to kilometers. These magnetic textures are characterized by several descriptive statistics, their power spectrum, and their multifractal spectrum. On the basis of a graphical comparison and textural characterization, ground-based magnetic-field profile data can be used to estimate bedrock lithology concealed by as much as 100 m of basin fill in some cases, information that is especially important in assessing and exploring for concealed mineral deposits. I demonstrate that multifractal spectra of ground-based magnetic-field-profile data can be used to differentiate exposed lithologies and that the shape and position of the multifractal spectrum of the ground-based magnetic-field-profile of concealed lithologies can be matched to the upward-continued multifractal spectrum of an exposed lithology to help distinguish the concealed lithology. In addition, ground-based magnetic-field-profile data also detect minute differences in the magnetic susceptibility of rocks over small horizontal and vertical distances and so can be used for precise modeling of bedrock geometry and structure, even when that bedrock is concealed by 100 m or more of nonmagnetic basin fill. Such data contain valuable geologic information on the bedrock concealed by basin fill that may not be so visible in aeromagnetic data, including areas of hydrothermal alteration, faults, and other bedrock structures. Interpretation of these data in the San Rafael Basin, southeastern Arizona, has yielded results for estimating concealed lithologies, concealed structural geology, and a concealed potential mineral

  17. 29 CFR 4044.10 - Manner of allocation.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... ASSETS IN SINGLE-EMPLOYER PLANS Allocation of Assets Allocation of Assets to Benefit Categories § 4044.10... categories. In no event shall a benefit assigned to a priority category be valued at less than zero....

  18. 25 CFR 170.200 - How does BIA allocate IRR Program funds?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... ROADS PROGRAM Indian Reservation Roads Program Funding Tribal Transportation Allocation Methodology... Transportation Allocation Methodology (TTAM) that BIA uses to allocate IRR Program funds. After...

  19. Importance of adequate exercise in the detection of coronary heart disease by radionuclide ventriculography

    SciTech Connect

    Brady, T.J.; Thrall, J.H.; Lo, K.; Pitt, B.

    1980-12-01

    Rest and exercise radionuclide ventriculograms were obtained on 77 symptomatic patients without prior documented coronary artery disease (CAD). Coronary artery disease was present by angiograms in 48. Radionuclide ventriculography (RNV) was abnormal in 41 patients (overall sensitivity 85%). In 29 patients with normal coronary arteries, RNV was normal in 24 (specificity 83%). To determine if the exercise level affects sensitivity, the studies were graded for adequacy of exercise. It was considered adequate if patients developed (a) chest pain, or (b) ST segment depression of at least 1 mm, or (c) if they achieved a pressure rate product greater than 250. Among the 48 patients with coronary artery disease, 35 achieved adequate exercise. Thirty-three had an abnormal RNV (sensitivity 94%). In 13 patients who failed to achieve adequate exercise, RNV was abnormal in eight (sensitivity of only 62%). Some patients with coronary artery disease may have a normal ventricular response at inadequate levels of stress.

  20. [Prevention of ocular complications of herpes zoster ophthalmicus by adequate treatment with acyclovir].

    PubMed

    Borruat, F X; Buechi, E R; Piguet, B; Fitting, P; Zografos, L; Herbort, C P

    1991-05-01

    We compared the frequency of severe ocular complications secondary to Herpes Zoster Ophthalmicus (HZO) in 232 patients. They were divided into three groups: 1) patients without treatment (n = 164); 2) patients treated adequately (n = 48) with acyclovir (ACV; 5 x 800 mg/d orally and ophthalmic ointment 5 x /d for a minimum of 7 days, given within three days after skin eruption); and, 3) patients treated inadequately (n = 20) with ACV (only topical treatment, insufficient doses, interrupted treatment, delayed treatment). Patients with no treatment or with inadequate treatments showed the same frequency of severe ocular complications (21% (34/164) and 25% (5/20), respectively). In contrast, when adequate treatment of ACV was given complications occurred in only 4% (2/48) of cases. This study emphasizes the need for prompt (within three days after skin eruption) and adequate (5 x 800 mg/d for at least 7 days) treatment of ACV to prevent the severe complications of HZO.