Sample records for adequate allocation concealment

  1. Dynamic detection-rate-based bit allocation with genuine interval concealment for binary biometric representation.

    PubMed

    Lim, Meng-Hui; Teoh, Andrew Beng Jin; Toh, Kar-Ann

    2013-06-01

    Biometric discretization is a key component in biometric cryptographic key generation. It converts an extracted biometric feature vector into a binary string via typical steps such as segmentation of each feature element into a number of labeled intervals, mapping of each interval-captured feature element onto a binary space, and concatenation of the resulted binary output of all feature elements into a binary string. Currently, the detection rate optimized bit allocation (DROBA) scheme is one of the most effective biometric discretization schemes in terms of its capability to assign binary bits dynamically to user-specific features with respect to their discriminability. However, we learn that DROBA suffers from potential discriminative feature misdetection and underdiscretization in its bit allocation process. This paper highlights such drawbacks and improves upon DROBA based on a novel two-stage algorithm: 1) a dynamic search method to efficiently recapture such misdetected features and to optimize the bit allocation of underdiscretized features and 2) a genuine interval concealment technique to alleviate crucial information leakage resulted from the dynamic search. Improvements in classification accuracy on two popular face data sets vindicate the feasibility of our approach compared with DROBA.

  2. Concealment of sexual orientation.

    PubMed

    Sylva, David; Rieger, Gerulf; Linsenmeier, Joan A W; Bailey, J Michael

    2010-02-01

    Sex-atypical behaviors may be used to identify a person as homosexual. To shield themselves from prejudice, homosexual people may attempt to conceal these behaviors. It is not clear how effectively they can do so. In Study 1, we asked homosexual participants to conceal their sex-atypical behaviors while talking about the weather. Raters watched videos of the participants and judged the likelihood that each participant was homosexual. Homosexual participants were able to partially conceal signs of their orientation, but they remained distinguishable from heterosexual participants. In Study 2, we tested the ability to conceal signs of one's sexual orientation in a more demanding situation: a mock job interview. In this scenario, homosexual men were even less effective at concealing their orientation. Higher cognitive demands in this new situation may have interfered with their ability to conceal.

  3. Self-Concealment and Suicidal Behaviors

    ERIC Educational Resources Information Center

    Friedlander, Adam; Nazem, Sarra; Fiske, Amy; Nadorff, Michael R.; Smith, Merideth D.

    2012-01-01

    Understanding self-concealment, the tendency to actively conceal distressing personal information from others, may be important in developing effective ways to help individuals with suicidal ideation. No published study has yet assessed the relation between self-concealment and suicidal behaviors. Additionally, most self-concealment research has…

  4. Methodological reporting of randomized clinical trials in respiratory research in 2010.

    PubMed

    Lu, Yi; Yao, Qiuju; Gu, Jie; Shen, Ce

    2013-09-01

    Although randomized controlled trials (RCTs) are considered the highest level of evidence, they are also subject to bias, due to a lack of adequately reported randomization, and therefore the reporting should be as explicit as possible for readers to determine the significance of the contents. We evaluated the methodological quality of RCTs in respiratory research in high ranking clinical journals, published in 2010. We assessed the methodological quality, including generation of the allocation sequence, allocation concealment, double-blinding, sample-size calculation, intention-to-treat analysis, flow diagrams, number of medical centers involved, diseases, funding sources, types of interventions, trial registration, number of times the papers have been cited, journal impact factor, journal type, and journal endorsement of the CONSORT (Consolidated Standards of Reporting Trials) rules, in RCTs published in 12 top ranking clinical respiratory journals and 5 top ranking general medical journals. We included 176 trials, of which 93 (53%) reported adequate generation of the allocation sequence, 66 (38%) reported adequate allocation concealment, 79 (45%) were double-blind, 123 (70%) reported adequate sample-size calculation, 88 (50%) reported intention-to-treat analysis, and 122 (69%) included a flow diagram. Multivariate logistic regression analysis revealed that journal impact factor ≥ 5 was the only variable that significantly influenced adequate allocation sequence generation. Trial registration and journal impact factor ≥ 5 significantly influenced adequate allocation concealment. Medical interventions, trial registration, and journal endorsement of the CONSORT statement influenced adequate double-blinding. Publication in one of the general medical journal influenced adequate sample-size calculation. The methodological quality of RCTs in respiratory research needs improvement. Stricter enforcement of the CONSORT statement should enhance the quality of RCTs.

  5. Concealed wire tracing apparatus

    DOEpatents

    Kronberg, J.W.

    1994-05-31

    An apparatus and method that combines a signal generator and a passive signal receiver to detect and record the path of partially or completely concealed electrical wiring without disturbing the concealing surface is disclosed. The signal generator applies a series of electrical pulses to the selected wiring of interest. The applied pulses create a magnetic field about the wiring that can be detected by a coil contained within the signal receiver. An audible output connected to the receiver and driven by the coil reflects the receivers position with respect to the wiring. The receivers audible signal is strongest when the receiver is directly above the wiring and the long axis of the receivers coil is parallel to the wiring. A marking means is mounted on the receiver to mark the location of the wiring as the receiver is directed over the wiring's concealing surface. Numerous marks made on various locations of the concealing surface will trace the path of the wiring of interest. 4 figs.

  6. Assessment of Registration Information on Methodological Design of Acupuncture RCTs: A Review of 453 Registration Records Retrieved from WHO International Clinical Trials Registry Platform

    PubMed Central

    Gu, Jing; Wang, Qi; Wang, Xiaogang; Li, Hailong; Gu, Mei; Ming, Haixia; Dong, Xiaoli; Yang, Kehu; Wu, Hongyan

    2014-01-01

    Background. This review provides the first methodological information assessment of protocol of acupuncture RCTs registered in WHO International Clinical Trials Registry Platform (ICTRP). Methods. All records of acupuncture RCTs registered in the ICTRP have been collected. The methodological design assessment involved whether the randomization methods, allocation concealment, and blinding were adequate or not based on the information of registration records (protocols of acupuncture RCTs). Results. A total of 453 records, found in 11 registries, were examined. Methodological details were insufficient in registration records; there were 76.4%, 89.0%, and 21.4% records that did not provide information on randomization methods, allocation concealment, and blinding respectively. The proportions of adequate randomization methods, allocation concealment, and blinding were only 107 (23.6%), 48 (10.6%), and 210 (46.4%), respectively. The methodological design improved year by year, especially after 2007. Additionally, methodology of RCTs with ethics approval was clearly superior to those without ethics approval and different among registries. Conclusions. The overall methodological design based on registration records of acupuncture RCTs is not very well but improved year by year. The insufficient information on randomization methods, allocation concealment, and blinding maybe due to the relevant description is not taken seriously in acupuncture RCTs' registration. PMID:24688591

  7. Assessment of Registration Information on Methodological Design of Acupuncture RCTs: A Review of 453 Registration Records Retrieved from WHO International Clinical Trials Registry Platform.

    PubMed

    Gu, Jing; Wang, Qi; Wang, Xiaogang; Li, Hailong; Gu, Mei; Ming, Haixia; Dong, Xiaoli; Yang, Kehu; Wu, Hongyan

    2014-01-01

    Background. This review provides the first methodological information assessment of protocol of acupuncture RCTs registered in WHO International Clinical Trials Registry Platform (ICTRP). Methods. All records of acupuncture RCTs registered in the ICTRP have been collected. The methodological design assessment involved whether the randomization methods, allocation concealment, and blinding were adequate or not based on the information of registration records (protocols of acupuncture RCTs). Results. A total of 453 records, found in 11 registries, were examined. Methodological details were insufficient in registration records; there were 76.4%, 89.0%, and 21.4% records that did not provide information on randomization methods, allocation concealment, and blinding respectively. The proportions of adequate randomization methods, allocation concealment, and blinding were only 107 (23.6%), 48 (10.6%), and 210 (46.4%), respectively. The methodological design improved year by year, especially after 2007. Additionally, methodology of RCTs with ethics approval was clearly superior to those without ethics approval and different among registries. Conclusions. The overall methodological design based on registration records of acupuncture RCTs is not very well but improved year by year. The insufficient information on randomization methods, allocation concealment, and blinding maybe due to the relevant description is not taken seriously in acupuncture RCTs' registration.

  8. Internet-Based Assessment of Oncology Health Care Professional Learning Style and Optimization of Materials for Web-Based Learning: Controlled Trial With Concealed Allocation

    PubMed Central

    Micheel, Christine M; Anderson, Ingrid A; Lee, Patricia; Chen, Sheau-Chiann; Justiss, Katy; Giuse, Nunzia B; Ye, Fei; Kusnoor, Sheila V

    2017-01-01

    Background Precision medicine has resulted in increasing complexity in the treatment of cancer. Web-based educational materials can help address the needs of oncology health care professionals seeking to understand up-to-date treatment strategies. Objective This study aimed to assess learning styles of oncology health care professionals and to determine whether learning style-tailored educational materials lead to enhanced learning. Methods In all, 21,465 oncology health care professionals were invited by email to participate in the fully automated, parallel group study. Enrollment and follow-up occurred between July 13 and September 7, 2015. Self-enrolled participants took a learning style survey and were assigned to the intervention or control arm using concealed alternating allocation. Participants in the intervention group viewed educational materials consistent with their preferences for learning (reading, listening, and/or watching); participants in the control group viewed educational materials typical of the My Cancer Genome website. Educational materials covered the topic of treatment of metastatic estrogen receptor-positive (ER+) breast cancer using cyclin-dependent kinases 4/6 (CDK4/6) inhibitors. Participant knowledge was assessed immediately before (pretest), immediately after (posttest), and 2 weeks after (follow-up test) review of the educational materials. Study statisticians were blinded to group assignment. Results A total of 751 participants enrolled in the study. Of these, 367 (48.9%) were allocated to the intervention arm and 384 (51.1%) were allocated to the control arm. Of those allocated to the intervention arm, 256 (69.8%) completed all assessments. Of those allocated to the control arm, 296 (77.1%) completed all assessments. An additional 12 participants were deemed ineligible and one withdrew. Of the 552 participants, 438 (79.3%) self-identified as multimodal learners. The intervention arm showed greater improvement in posttest score

  9. Method for imaging a concealed object

    DOEpatents

    Davidson, James R [Idaho Falls, ID; Partin, Judy K [Idaho Falls, ID; Sawyers, Robert J [Idaho Falls, ID

    2007-07-03

    A method for imaging a concealed object is described and which includes a step of providing a heat radiating body, and wherein an object to be detected is concealed on the heat radiating body; imaging the heat radiating body to provide a visibly discernible infrared image of the heat radiating body; and determining if the visibly discernible infrared image of the heat radiating body is masked by the presence of the concealed object.

  10. Concealing Concealment: The Mediating Role of Internalized Heterosexism in Psychological Distress Among Lesbian, Gay, and Bisexual Older Adults

    PubMed Central

    Hoy-Ellis, Charles P.

    2016-01-01

    Recent population-based studies indicate that sexual minorities aged 50 and older experience significantly higher rates of psychological distress than their heterosexual age-peers. The minority stress model has been useful in explaining disparately high rates of psychological distress among younger sexual minorities. The purpose of this study is to test a hypothesized structural relationship between two minority stressors—internalized heterosexism and concealment of sexual orientation—and consequent psychological distress among a sample of 2,349 lesbian, gay, and bisexual adults aged 50 to 95 years old. Structural equation modeling indicates that concealment has a nonsignificant direct effect on psychological distress but a significant indirect effect that is mediated through internalized heterosexism; the effect of concealment is itself concealed. This may explain divergent results regarding the role of concealment in psychological distress in other studies, and the implications will be discussed. PMID:26322654

  11. Concealing with structured light.

    PubMed

    Sun, Jingbo; Zeng, Jinwei; Wang, Xi; Cartwright, Alexander N; Litchinitser, Natalia M

    2014-02-13

    While making objects less visible (or invisible) to a human eye or a radar has captured people's imagination for centuries, current attempts towards realization of this long-awaited functionality range from various stealth technologies to recently proposed cloaking devices. A majority of proposed approaches share a number of common deficiencies such as design complexity, polarization effects, bandwidth, losses and the physical size or shape requirement complicating their implementation especially at optical frequencies. Here we demonstrate an alternative way to conceal macroscopic objects by structuring light itself. In our approach, the incident light is transformed into an optical vortex with a dark core that can be used to conceal macroscopic objects. Once such a beam passed around the object it is transformed back into its initial Gaussian shape with minimum amplitude and phase distortions. Therefore, we propose to use that dark core of the vortex beam to conceal an object that is macroscopic yet small enough to fit the dark (negligibly low intensity) region of the beam. The proposed concealing approach is polarization independent, easy to fabricate, lossless, operates at wavelengths ranging from 560 to 700 nm, and can be used to hide macroscopic objects providing they are smaller than vortex core.

  12. 25 CFR 11.444 - Carrying concealed weapons.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 25 Indians 1 2014-04-01 2014-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor unless...

  13. 25 CFR 11.444 - Carrying concealed weapons.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 25 Indians 1 2013-04-01 2013-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor unless...

  14. 25 CFR 11.444 - Carrying concealed weapons.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 25 Indians 1 2011-04-01 2011-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor unless...

  15. 25 CFR 11.444 - Carrying concealed weapons.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor unless...

  16. 25 CFR 11.444 - Carrying concealed weapons.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 25 Indians 1 2012-04-01 2011-04-01 true Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor unless...

  17. Motion compensated shape error concealment.

    PubMed

    Schuster, Guido M; Katsaggelos, Aggelos K

    2006-02-01

    The introduction of Video Objects (VOs) is one of the innovations of MPEG-4. The alpha-plane of a VO defines its shape at a given instance in time and hence determines the boundary of its texture. In packet-based networks, shape, motion, and texture are subject to loss. While there has been considerable attention paid to the concealment of texture and motion errors, little has been done in the field of shape error concealment. In this paper we propose a post-processing shape error concealment technique that uses the motion compensated boundary information of the previously received alpha-plane. The proposed approach is based on matching received boundary segments in the current frame to the boundary in the previous frame. This matching is achieved by finding a maximally smooth motion vector field. After the current boundary segments are matched to the previous boundary, the missing boundary pieces are reconstructed by motion compensation. Experimental results demonstrating the performance of the proposed motion compensated shape error concealment method, and comparing it with the previously proposed weighted side matching method are presented.

  18. Internet-Based Assessment of Oncology Health Care Professional Learning Style and Optimization of Materials for Web-Based Learning: Controlled Trial With Concealed Allocation.

    PubMed

    Micheel, Christine M; Anderson, Ingrid A; Lee, Patricia; Chen, Sheau-Chiann; Justiss, Katy; Giuse, Nunzia B; Ye, Fei; Kusnoor, Sheila V; Levy, Mia A

    2017-07-25

    Precision medicine has resulted in increasing complexity in the treatment of cancer. Web-based educational materials can help address the needs of oncology health care professionals seeking to understand up-to-date treatment strategies. This study aimed to assess learning styles of oncology health care professionals and to determine whether learning style-tailored educational materials lead to enhanced learning. In all, 21,465 oncology health care professionals were invited by email to participate in the fully automated, parallel group study. Enrollment and follow-up occurred between July 13 and September 7, 2015. Self-enrolled participants took a learning style survey and were assigned to the intervention or control arm using concealed alternating allocation. Participants in the intervention group viewed educational materials consistent with their preferences for learning (reading, listening, and/or watching); participants in the control group viewed educational materials typical of the My Cancer Genome website. Educational materials covered the topic of treatment of metastatic estrogen receptor-positive (ER+) breast cancer using cyclin-dependent kinases 4/6 (CDK4/6) inhibitors. Participant knowledge was assessed immediately before (pretest), immediately after (posttest), and 2 weeks after (follow-up test) review of the educational materials. Study statisticians were blinded to group assignment. A total of 751 participants enrolled in the study. Of these, 367 (48.9%) were allocated to the intervention arm and 384 (51.1%) were allocated to the control arm. Of those allocated to the intervention arm, 256 (69.8%) completed all assessments. Of those allocated to the control arm, 296 (77.1%) completed all assessments. An additional 12 participants were deemed ineligible and one withdrew. Of the 552 participants, 438 (79.3%) self-identified as multimodal learners. The intervention arm showed greater improvement in posttest score compared to the control group (0.4 points

  19. Concealment of type 1 diabetes at work in Finland: a mixed-method study

    PubMed Central

    Munir, Fehmidah; Moilanen, Leena; Räsänen, Kimmo; Hänninen, Vilma

    2018-01-01

    and (5) losing privacy. Conclusions A considerable proportion of wage earners with T1D are concealing their diagnosis often because of feelings associated with stigma. Both overemphasis and underestimation of T1D at work by the colleagues or line manager may lead to concealing T1D and may thus be harmful to self-management of T1D. The obstacles in disclosing T1D might be diminished by giving adequate information at the workplace about the condition and its significance. PMID:29331976

  20. Classification-Based Spatial Error Concealment for Visual Communications

    NASA Astrophysics Data System (ADS)

    Chen, Meng; Zheng, Yefeng; Wu, Min

    2006-12-01

    In an error-prone transmission environment, error concealment is an effective technique to reconstruct the damaged visual content. Due to large variations of image characteristics, different concealment approaches are necessary to accommodate the different nature of the lost image content. In this paper, we address this issue and propose using classification to integrate the state-of-the-art error concealment techniques. The proposed approach takes advantage of multiple concealment algorithms and adaptively selects the suitable algorithm for each damaged image area. With growing awareness that the design of sender and receiver systems should be jointly considered for efficient and reliable multimedia communications, we proposed a set of classification-based block concealment schemes, including receiver-side classification, sender-side attachment, and sender-side embedding. Our experimental results provide extensive performance comparisons and demonstrate that the proposed classification-based error concealment approaches outperform the conventional approaches.

  1. [Concealed penis and its surgical correction: a report of 63 cases].

    PubMed

    Cheng, Fan; Zhang, Xiaobin; Liu, Xiuheng; Zhou, Jiangqiao; Xia, Yue; Ge, Minghuan

    2004-02-01

    To evaluate the basic principles of surgical correction of concealed penis. From Jan. 1999 to Dec. 2002, 63 cases of concealed penis, aged from 1 year and 6 months to 19 years with a mean age of 7 years and 2 months, were corrected with two different approaches: 37 cases of group A with obesity were corrected by anchoring micrus tissue onto the pubis at the base of the penis, and 26 cases of group B by fixing the subcutateous tissues at both sides of the penile shaft to the deep tunica albuginea at the penile root. Then prepuce plasty was carried out. Six-month postoperative follow-up found adequate exposure of the penis in all of group A, prepuce oedema in 7 cases, abdomen fat liquidization in 3 cases, unsatisfactory recovery of incision hollow in 3 cases and patchy numbness of the glans in 1 case. The 25 cases of group B had satisfactory exposure of the penis, with no obvious prepuce oedema, 1 case with retraction of the penis 7 days after operation. Various surgical procedures could be adopted for concealed penis, and the key to the satisfactory appearance is the restoration of penile tunicae and the fixation at the base of the penis. Further study is needed to determine the natural history of these disorders as well as which conditions and what age will benefit most from surgical intervention.

  2. Detection of a concealed object

    DOEpatents

    Keller, Paul E [Richland, WA; Hall, Thomas E [Kennewick, WA; McMakin, Douglas L [Richland, WA

    2010-11-16

    Disclosed are systems, methods, devices, and apparatus to determine if a clothed individual is carrying a suspicious, concealed object. This determination includes establishing data corresponding to an image of the individual through interrogation with electromagnetic radiation in the 200 MHz to 1 THz range. In one form, image data corresponding to intensity of reflected radiation and differential depth of the reflecting surface is received and processed to detect the suspicious, concealed object.

  3. Detection of a concealed object

    DOEpatents

    Keller, Paul E [Richland, WA; Hall, Thomas E [Kennewick, WA; McMakin, Douglas L [Richland, WA

    2008-04-29

    Disclosed are systems, methods, devices, and apparatus to determine if a clothed individual is carrying a suspicious, concealed object. This determination includes establishing data corresponding to an image of the individual through interrogation with electromagnetic radiation in the 200 MHz to 1 THz range. In one form, image data corresponding to intensity of reflected radiation and differential depth of the reflecting surface is received and processed to detect the suspicious, concealed object.

  4. Methodological reporting quality of randomized controlled trials: A survey of seven core journals of orthopaedics from Mainland China over 5 years following the CONSORT statement.

    PubMed

    Zhang, J; Chen, X; Zhu, Q; Cui, J; Cao, L; Su, J

    2016-11-01

    In recent years, the number of randomized controlled trials (RCTs) in the field of orthopaedics is increasing in Mainland China. However, randomized controlled trials (RCTs) are inclined to bias if they lack methodological quality. Therefore, we performed a survey of RCT to assess: (1) What about the quality of RCTs in the field of orthopedics in Mainland China? (2) Whether there is difference between the core journals of the Chinese department of orthopedics and Orthopaedics Traumatology Surgery & Research (OTSR). This research aimed to evaluate the methodological reporting quality according to the CONSORT statement of randomized controlled trials (RCTs) in seven key orthopaedic journals published in Mainland China over 5 years from 2010 to 2014. All of the articles were hand researched on Chongqing VIP database between 2010 and 2014. Studies were considered eligible if the words "random", "randomly", "randomization", "randomized" were employed to describe the allocation way. Trials including animals, cadavers, trials published as abstracts and case report, trials dealing with subgroups analysis, or trials without the outcomes were excluded. In addition, eight articles selected from Orthopaedics Traumatology Surgery & Research (OTSR) between 2010 and 2014 were included in this study for comparison. The identified RCTs are analyzed using a modified version of the Consolidated Standards of Reporting Trials (CONSORT), including the sample size calculation, allocation sequence generation, allocation concealment, blinding and handling of dropouts. A total of 222 RCTs were identified in seven core orthopaedic journals. No trials reported adequate sample size calculation, 74 (33.4%) reported adequate allocation generation, 8 (3.7%) trials reported adequate allocation concealment, 18 (8.1%) trials reported adequate blinding and 16 (7.2%) trials reported handling of dropouts. In OTSR, 1 (12.5%) trial reported adequate sample size calculation, 4 (50.0%) reported adequate

  5. The nest-concealment hypothesis: New insights from a comparative analysis

    USGS Publications Warehouse

    Borgmann, Kathi L.; Conway, Courtney J.

    2015-01-01

    Selection of a breeding site is critical for many animals, especially for birds whose offspring are stationary during development. Thus, birds are often assumed to prefer concealed nest sites. However, 74% of studies (n = 106) that have evaluated this relationship for open-cup nesting songbirds in North America failed to support the nest-concealment hypothesis. We conducted a comparative analysis to identify factors that contribute to variation in the ability of researchers to find support for the nest-concealment hypothesis. We found that some of the discrepancy among studies can be explained by interspecific differences in morphological and extrinsic factors that affect nest predation. Moreover, methods that investigators used to estimate concealment affected whether studies found support for the nest-concealment hypothesis; 33% of the studies that used quantitative estimates found support for the nest-concealment hypothesis whereas only 10% of the studies that used qualitative estimates found support. The timing of measurements also explained some of the ambiguity; studies that provided little information regarding the timing of their foliage density estimates were less likely to support the nest-concealment hypothesis. Species with more conspicuous male plumage were less likely to support the nest-concealment hypothesis when we analyzed studies that used visual estimates. Whereas species with more conspicuous female plumage were more likely to support the nest-concealment hypothesis when we analyzed studies that used quantitative measures. Our results demonstrate that support for the nest-concealment hypothesis has been equivocal, but that some of the ambiguity can be explained by morphological traits and methods used to measure concealment.

  6. Concealable Stigmatized Identities and Psychological Well-Being

    PubMed Central

    Quinn, Diane M.; Earnshaw, Valerie A.

    2013-01-01

    Many people have concealable stigmatized identities: Identities that can be hidden from others and that are socially devalued and negatively stereotyped. Understanding how these concealable stigmatized identities affect psychological well-being is critical. We present our model of the components of concealable stigmatized identities including valenced content – internalized stigma, experienced discrimination, anticipated stigma, disclosure reactions, and counter-stereotypic/positive information – and magnitude – centrality and salience. Research has shown that negatively valenced content is related to increased psychological distress. However, smaller identity magnitude may buffer this distress. We review the research available and discuss important areas for future work. PMID:23730326

  7. Student Attitudes Toward Concealed Handguns on Campus at 2 Universities

    PubMed Central

    Bouffard, Jeffrey A.; Wells, William; Nobles, Matt R.

    2012-01-01

    We examined student support for a policy that would allow carrying of concealed handguns on university campuses. Large percentages of students at 2 universities expressed very low levels of comfort with the idea of permitting concealed handgun carrying on campus, suggesting that students may not welcome less restrictive policies. Students held slightly different opinions about concealed handguns on and off campus, suggesting that they view the campus environment as unique with respect to concealed handgun carrying. PMID:22720763

  8. Student attitudes toward concealed handguns on campus at 2 universities.

    PubMed

    Cavanaugh, Michael R; Bouffard, Jeffrey A; Wells, William; Nobles, Matt R

    2012-12-01

    We examined student support for a policy that would allow carrying of concealed handguns on university campuses. Large percentages of students at 2 universities expressed very low levels of comfort with the idea of permitting concealed handgun carrying on campus, suggesting that students may not welcome less restrictive policies. Students held slightly different opinions about concealed handguns on and off campus, suggesting that they view the campus environment as unique with respect to concealed handgun carrying.

  9. Authenticating concealed private data while maintaining concealment

    DOEpatents

    Thomas, Edward V [Albuquerque, NM; Draelos, Timothy J [Albuquerque, NM

    2007-06-26

    A method of and system for authenticating concealed and statistically varying multi-dimensional data comprising: acquiring an initial measurement of an item, wherein the initial measurement is subject to measurement error; applying a transformation to the initial measurement to generate reference template data; acquiring a subsequent measurement of an item, wherein the subsequent measurement is subject to measurement error; applying the transformation to the subsequent measurement; and calculating a Euclidean distance metric between the transformed measurements; wherein the calculated Euclidean distance metric is identical to a Euclidean distance metric between the measurement prior to transformation.

  10. Drug concealment in custody deaths--two cases.

    PubMed

    Busuttil, A

    1994-06-01

    Internal concealment of drugs of abuse is a well established method of transporting such substances to avoid detection while they are being smuggled across international frontier lines.(1,2) The same method has been used by dealers and 'pushers' in between purchases on their selling rounds to avoid detection by the police. These methods of hiding drugs may be used by persons taken into short-term custody, in their belief that potential withdrawal effects would thus be avoided by continued availability of their drugs. Two cases are reported in which such concealment was discovered at autopsy after death had occurred while in police custody. In one case the drug concealed was dihydrocodeine and was directly responsible for the death.

  11. Development and Validation of the Body Concealment Scale for Scleroderma.

    PubMed

    Jewett, Lisa R; Malcarne, Vanessa L; Kwakkenbos, Linda; Harcourt, Diana; Rumsey, Nichola; Körner, Annett; Steele, Russell J; Hudson, Marie; Baron, Murray; Haythornthwaite, Jennifer A; Heinberg, Leslie; Wigley, Fredrick M; Thombs, Brett D

    2016-08-01

    Body concealment is a component of social avoidance among people with visible differences from disfiguring conditions, including systemic sclerosis (SSc). The study objective was to develop a measure of body concealment related to avoidance behaviors in SSc. Initial items for the Body Concealment Scale for Scleroderma (BCSS) were selected using item analysis in a development sample of 93 American SSc patients. The factor structure of the BCSS was evaluated in 742 Canadian patients with single-factor, 2-factor, and bifactor confirmatory factor analysis models. Convergent and divergent validity were assessed by comparing the BCSS total score with the Brief-Satisfaction with Appearance Scale (Brief-SWAP) and measures of depressive symptoms and pain. A 2-factor model (Comparative Fit Index [CFI] 0.99, Tucker-Lewis Index [TLI] 0.98, Root Mean Square Error of Approximation [RMSEA] 0.08) fit substantially better than a 1-factor model (CFI 0.95, TLI 0.94, RMSEA 0.15) for the 9-item BCSS, but the Concealment with Clothing and Concealment of Hands factors were highly correlated (α = 0.79). The bifactor model (CFI 0.99, TLI 0.99, RMSEA 0.08) also fit well. In the bifactor model, the omega coefficient was high for the general factor (ω = 0.80), but low for the Concealment with Clothing (ω = 0.01) and Concealment of Hands (ω = 0.33) factors. The BCSS total score correlated more strongly with the Brief-SWAP Social Discomfort (r = 0.59) and Dissatisfaction with Appearance (r = 0.53) subscales than with measures of depressive symptoms and pain. The BCSS sum score is a valid indicator of body concealment in SSc that extends the concepts of body concealment and avoidance beyond the realms of body shape and weight to concerns of individuals with visible differences from SSc. © 2016, American College of Rheumatology.

  12. Attachment style, self-concealment, and interpersonal distance among Japanese undergraduates.

    PubMed

    Yukawa, Shintaro; Tokuda, Hideji; Sato, Jun

    2007-06-01

    The relationships among attachment style, self-concealment, and interpersonal distance were studied with 71 Japanese undergraduates (33 men and 38 women, ages 18 to 20 years, M = 18.7, SD= .6). Participants completed a questionnaire about Self-concealment and Attachment Styles (Secure, Anxious, and Avoidant). One week later, Interpersonal Distance, which individuals maintain between themselves and others, was measured by the stop-distance paradigm. Analysis showed that scores for more Anxious and Avoidant Attachment Styles were positively correlated with those for greater Self-concealment. Scores for greater Self-concealment and more Anxious Attachment Style were also correlated with longer Interpersonal Distance.

  13. Quantum Image Steganography and Steganalysis Based On LSQu-Blocks Image Information Concealing Algorithm

    NASA Astrophysics Data System (ADS)

    A. AL-Salhi, Yahya E.; Lu, Songfeng

    2016-08-01

    Quantum steganography can solve some problems that are considered inefficient in image information concealing. It researches on Quantum image information concealing to have been widely exploited in recent years. Quantum image information concealing can be categorized into quantum image digital blocking, quantum image stereography, anonymity and other branches. Least significant bit (LSB) information concealing plays vital roles in the classical world because many image information concealing algorithms are designed based on it. Firstly, based on the novel enhanced quantum representation (NEQR), image uniform blocks clustering around the concrete the least significant Qu-block (LSQB) information concealing algorithm for quantum image steganography is presented. Secondly, a clustering algorithm is proposed to optimize the concealment of important data. Finally, we used Con-Steg algorithm to conceal the clustered image blocks. Information concealing located on the Fourier domain of an image can achieve the security of image information, thus we further discuss the Fourier domain LSQu-block information concealing algorithm for quantum image based on Quantum Fourier Transforms. In our algorithms, the corresponding unitary Transformations are designed to realize the aim of concealing the secret information to the least significant Qu-block representing color of the quantum cover image. Finally, the procedures of extracting the secret information are illustrated. Quantum image LSQu-block image information concealing algorithm can be applied in many fields according to different needs.

  14. "Not clinically indicated": patients' interests or resource allocation?

    PubMed Central

    Hope, T; Sprigings, D; Crisp, R

    1993-01-01

    The decision that a particular intervention is not clinically indicated may conceal two quite different ethical assumptions. The first assumption is that the intervention is not of overall benefit to this patient. The second is that limited resources should not be used for this patient. These issues are discussed with reference to cardiac surgery in elderly patients with reference to the main theories of allocation: QALYs, needs theories, the sanctity of life theory, the lottery theory, and market forces. Images p380-a PMID:8461686

  15. Management of concealed penis with modified penoplasty.

    PubMed

    Xu, Jian-Guo; Lv, Chuan; Wang, Yu-Chong; Zhu, Ji; Xue, Chun-Yu

    2015-03-01

    To investigate the effect of penile degloving in combination with penoscrotal angle reconstruction for the correction of concealed penis. A foreskin circumcision incision was made along the coronal sulcus. After a sharp dissection under the superficial layer of tunica albuginea, the penile shaft was degloved to release the fibrous bands of the tunica dartos. Through a longitudinal incision or Z-plasty at the penoscrotal junction, securing of the tunica albuginea to the proximal tunica dartos was performed. The penoscrotal angle was reconstructed. This procedure effectively corrected the concealed penis, while correcting other problems such as phimosis. From August 2008 to August 2013, we performed 41 procedures for concealed penis. Correction was successful in all patients with an improved median length of 2.1 cm in the flaccid state. Follow-up ranged from 6 months to 2 years, and satisfactory cosmetic outcomes were obtained without scars or erectile discomfort. Our technique includes degloving and penoscrotal angle reconstruction, which provides proper visualization for fixation of the penile base. The longitudinal or Z-plasty incision also opened the degloving dead cavity, which was good for drainage. The procedure is straight forward with good functional and cosmetic outcomes and is thus ideal for correction of the concealed penis. Copyright © 2015 Elsevier Inc. All rights reserved.

  16. Concealing Emotions at Work Is Associated with Allergic Rhinitis in Korea.

    PubMed

    Seok, Hongdeok; Yoon, Jin-Ha; Won, Jong-Uk; Lee, Wanhyung; Lee, June-Hee; Jung, Pil Kyun; Roh, Jaehoon

    2016-01-01

    Concealing emotions at work can cause considerable psychological stress. While there is extensive research on the adverse health effects of concealing emotions and the association between allergic diseases and stress, research has not yet investigated whether concealing emotions at work is associated with allergic rhinitis. Allergic rhinitis is a common disease in many industrialized countries, and its prevalence is increasing. Thus, our aim was to determine the strength of this association using data from three years (2007-2009) of the 4th Korean National Health and Nutrition Examination Survey. Participants (aged 20-64) were 8,345 individuals who were economically active and who had completed the questionnaire items on concealing emotions at work. Odds ratio (OR) and 95% confidence intervals (95% CIs) were calculated for allergic rhinitis using logistic regression models. Among all participants, 3,140 subjects (37.6%) reported concealing their emotions at work: 1,661 men and 1,479 women. The OR (95% CIs) for allergic rhinitis among those who concealed emotions at work versus those who did not was 1.318 (1.148-1.512). Stratified by sex, the OR (95% CIs) was 1.307 (1.078-1.585) among men and 1.346 (1.105-1.639) among women. Thus, individuals who concealed their emotions at work were significantly more likely to have a diagnosis of AR in comparison to those who did not. Because concealing emotions at work has adverse health effects, labor policies that aim to reduce this practice are needed.

  17. Methodological Reporting Quality of Randomized Controlled Trials in 3 Leading Diabetes Journals From 2011 to 2013 Following CONSORT Statement: A System Review.

    PubMed

    Zhai, Xiao; Wang, Yiran; Mu, Qingchun; Chen, Xiao; Huang, Qin; Wang, Qijin; Li, Ming

    2015-07-01

    To appraise the current reporting methodological quality of randomized clinical trials (RCTs) in 3 leading diabetes journals.We systematically searched the literature for RCTs in Diabetes Care, Diabetes and Diabetologia from 2011 to 2013.Characteristics were extracted based on Consolidated Standards of Reporting Trials (CONSORT) statement. Generation of allocation, concealment of allocation, intention-to-treat (ITT) analysis and handling of dropouts were defined as primary outcome and "low risk of bias." Sample size calculation, type of intervention, country, number of patients, funding source were also revealed and descriptively reported. Trials were compared among journals, study years, and other characters.A total of 305 RCTs were enrolled in this study. One hundred eight (35.4%) trials reported adequate generation of allocation, 87 (28.5%) trials reported adequate concealment of allocation, 53 (23.8%) trials used ITT analysis, and 130 (58.3%) trials were adequate in handling of dropouts. Only 15 (4.9%) were "low risk of bias" trials. Studies at a large scale (n > 100) or from European presented with more "low risk of bias" trials than those at a small scale (n ≤ 100) or from other regions. No improvements were found in these 3 years.This study shows that methodological reporting quality of RCTs in the major diabetes journals remains suboptimal. It can be further improved to meet and keep up with the standards of the CONSORT statement.

  18. Campaign for Right to Carry Concealed Guns on Campuses Gains Traction

    ERIC Educational Resources Information Center

    Wiseman, Rachel

    2012-01-01

    Five years after the Virginia Tech massacre prompted a student in Texas to start a Facebook page in favor of the right to carry concealed weapons on college campuses, the resulting group, Students for Concealed Carry, has advanced its cause. In more than a dozen states, legislation has been introduced to allow the carrying of concealed firearms on…

  19. Modified penoplasty for concealed penis in children.

    PubMed

    Yang, Tianyou; Zhang, Liyu; Su, Cheng; Li, Zhongmin; Wen, Yingquan

    2013-09-01

    To report a modified penoplasty technique for concealed penis in children. Between January 2006 and June 2012, 201 cases of concealed penis were surgically repaired with modified penoplasty. The modified penoplasty technique consisted of 3 major steps: (1) degloved the penile skin and excised the inner prepuce, (2) advanced penoscrotal skin to cover penile shaft, and (3) fixed the penis base and reconstructed the penoscrotal angle. Two hundred one cases of concealed penis were enrolled in this study over a period of 6 years. Mean age at the time of surgery was 5.3 years (range 1-13 years) and mean operative time was 40 minutes (range 30-65minutes). All patients were routinely followed up at 1, 3, and 6 months after surgery. Most patients developed postoperative edema and were resolved within 1 month, whereas 20 cases developed prolonged postoperative edema, especially at the site of frenulum, which took 3 months to be resolved. Ten cases had retraction after surgery. No erection difficulties were recorded. Patients/parents reported better hygiene and improved visualization and accessibility of penis after surgery and were satisfied with the cosmetic outcome. The result of this study shows that the modified penoplasty technique is a simple, safe, and effective procedure for concealed penis with satisfied cosmetic outcome. Copyright © 2013 Elsevier Inc. All rights reserved.

  20. Management of a concealable stigmatized identity: A qualitative study of concealment, disclosure and role flexing among young, resilient sexual and gender minority individuals

    PubMed Central

    Bry, Laura Jane; Mustanski, Brian; Garofalo, Robert; Burns, Michelle Nicole

    2017-01-01

    Disclosure of a sexual or gender minority status has been associated with both positive and negative effects on wellbeing. Few studies have explored the disclosure and concealment process in young people. Interviews were conducted with 10 sexual and/or gender minority individuals, aged 18–22 years, of male birth sex. Data were analyzed qualitatively, yielding determinants and effects of disclosure and concealment. Determinants of disclosure included holding positive attitudes about one’s identity and an implicit devaluation of acceptance by society. Coming out was shown to have both positive and negative effects on communication and social support, and was associated with both increases and decreases in experiences of stigma. Determinants of concealment included lack of comfort with one’s identity and various motivations to avoid discrimination. Concealment was also related to hypervigilance and unique strategies of accessing social support. Results are discussed in light of their clinical implications. PMID:27633070

  1. Management of a Concealable Stigmatized Identity: A Qualitative Study of Concealment, Disclosure, and Role Flexing Among Young, Resilient Sexual and Gender Minority Individuals.

    PubMed

    Bry, Laura Jane; Mustanski, Brian; Garofalo, Robert; Burns, Michelle Nicole

    2017-01-01

    Disclosure of a sexual or gender minority status has been associated with both positive and negative effects on wellbeing. Few studies have explored the disclosure and concealment process in young people. Interviews were conducted with 10 sexual and/or gender minority individuals, aged 18-22 years, of male birth sex. Data were analyzed qualitatively, yielding determinants and effects of disclosure and concealment. Determinants of disclosure included holding positive attitudes about one's identity and an implicit devaluation of acceptance by society. Coming out was shown to have both positive and negative effects on communication and social support and was associated with both increases and decreases in experiences of stigma. Determinants of concealment included lack of comfort with one's identity and various motivations to avoid discrimination. Concealment was also related to hypervigilance and unique strategies of accessing social support. Results are discussed in light of their clinical implications.

  2. Wavelet Fusion for Concealed Object Detection Using Passive Millimeter Wave Sequence Images

    NASA Astrophysics Data System (ADS)

    Chen, Y.; Pang, L.; Liu, H.; Xu, X.

    2018-04-01

    PMMW imaging system can create interpretable imagery on the objects concealed under clothing, which gives the great advantage to the security check system. Paper addresses wavelet fusion to detect concealed objects using passive millimeter wave (PMMW) sequence images. According to PMMW real-time imager acquired image characteristics and storage methods firstly, using the sum of squared difference (SSD) as the image-related parameters to screen the sequence images. Secondly, the selected images are optimized using wavelet fusion algorithm. Finally, the concealed objects are detected by mean filter, threshold segmentation and edge detection. The experimental results show that this method improves the detection effect of concealed objects by selecting the most relevant images from PMMW sequence images and using wavelet fusion to enhance the information of the concealed objects. The method can be effectively applied to human body concealed object detection in millimeter wave video.

  3. Video error concealment using block matching and frequency selective extrapolation algorithms

    NASA Astrophysics Data System (ADS)

    P. K., Rajani; Khaparde, Arti

    2017-06-01

    Error Concealment (EC) is a technique at the decoder side to hide the transmission errors. It is done by analyzing the spatial or temporal information from available video frames. It is very important to recover distorted video because they are used for various applications such as video-telephone, video-conference, TV, DVD, internet video streaming, video games etc .Retransmission-based and resilient-based methods, are also used for error removal. But these methods add delay and redundant data. So error concealment is the best option for error hiding. In this paper, the error concealment methods such as Block Matching error concealment algorithm is compared with Frequency Selective Extrapolation algorithm. Both the works are based on concealment of manually error video frames as input. The parameter used for objective quality measurement was PSNR (Peak Signal to Noise Ratio) and SSIM(Structural Similarity Index). The original video frames along with error video frames are compared with both the Error concealment algorithms. According to simulation results, Frequency Selective Extrapolation is showing better quality measures such as 48% improved PSNR and 94% increased SSIM than Block Matching Algorithm.

  4. An Exploratory Investigation of Social Stigma and Concealment in Patients with Multiple Sclerosis.

    PubMed

    Cook, Jonathan E; Germano, Adriana L; Stadler, Gertraud

    2016-01-01

    We conducted a preliminary investigation into dimensions of stigma and their relation to disease concealment in a sample of American adults living with multiple sclerosis (MS). Fifty-three adults with MS in the United States completed an online survey assessing anticipated, internalized, and isolation stigma, as well as concealment. Responses to all the scales were relatively low, on average, but above scale minimums (P < .001). Ratings of isolation stigma and concealment were highest. Anticipated stigma strongly predicted concealment. Many adults living with MS may be concerned that they will be the target of social stigma because of their illness. These concerns are associated with disease concealment. More research is needed to investigate how MS stigma and concealment may be independent contributors to health in patients with MS.

  5. Concealed weapons detection using electromagnetic resonances

    NASA Astrophysics Data System (ADS)

    Hunt, Allen R.; Hogg, R. Douglas; Foreman, William

    1998-12-01

    Concealed weapons pose a significant threat to both law enforcement and security agency personnel. The uncontrolled environments associated with peacekeeping and the move toward relaxation of concealed weapons laws here in the U.S. provide a strong motivation for developing weapons detection technologies which are noninvasive and can function noncooperatively. Existing weapons detection systems are primarily oriented to detecting metal and require the cooperation of the person being searched. The new generation of detectors under development that focuses primarily on imaging methods, faces problems associated with privacy issues. There remains a need for a weapons detector which is portable, detects weapons remotely, avoids the issues associated with privacy rights, can tell the difference between car keys and a knife, and is affordable enough that one can be issued to every peacekeeper and law enforcement officer. AKELA is developing a concealed weapons detector that uses wideband radar techniques to excite natural electromagnetic resonances that characterize the size, shape, and material composition of an object. Neural network processing is used to classify the difference between weapons and nuisance objects. We have constructed both time and frequency domain test systems and used them to gather experimental data on a variety of armed and unarmed individuals. These experiments have been performed in an environment similar to the operational environment. Preliminary results from these experiments show that it is possible to detect a weapon being carried by an individual from a distance of 10 to 15 feet, and to detect a weapon being concealed behind the back. The power required is about 100 milliwatts. A breadboard system is being fabricated and will be used by AKELA and our law enforcement partner to gather data in operationally realistic situations. While a laptop computer will control the breadboard system, the wideband radar electronics will fit in a box the

  6. 7 CFR 761.204 - Methods of allocating funds to State Offices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... are allocated to State Offices using one or more of the following allocation methods: (a) Formula allocation, if data, as specified in § 761.205, is available to use the formula for the State. (b) Administrative allocation, if the Agency cannot adequately meet program objectives with a formula allocation. The...

  7. 7 CFR 761.204 - Methods of allocating funds to State Offices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... allocated to State Offices using one or more of the following allocation methods: (a) Formula allocation, if data, as specified in § 761.205, is available to use the formula for the State. (b) Administrative allocation, if the Agency cannot adequately meet program objectives with a formula allocation. The National...

  8. Concealed identification symbols and nondestructive determination of the identification symbols

    DOEpatents

    Nance, Thomas A.; Gibbs, Kenneth M.

    2014-09-16

    The concealing of one or more identification symbols into a target object and the subsequent determination or reading of such symbols through non-destructive testing is described. The symbols can be concealed in a manner so that they are not visible to the human eye and/or cannot be readily revealed to the human eye without damage or destruction of the target object. The identification symbols can be determined after concealment by e.g., the compilation of multiple X-ray images. As such, the present invention can also provide e.g., a deterrent to theft and the recovery of lost or stolen objects.

  9. Fusion of radar and ultrasound sensors for concealed weapons detection

    NASA Astrophysics Data System (ADS)

    Felber, Franklin S.; Davis, Herbert T., III; Mallon, Charles E.; Wild, Norbert C.

    1996-06-01

    An integrated radar and ultrasound sensor, capable of remotely detecting and imaging concealed weapons, is being developed. A modified frequency-agile, mine-detection radar is intended to specify with high probability of detection at ranges of 1 to 10 m which individuals in a moving crowd may be concealing metallic or nonmetallic weapons. Within about 1 to 5 m, the active ultrasound sensor is intended to enable a user to identify a concealed weapon on a moving person with low false-detection rate, achieved through a real-time centimeter-resolution image of the weapon. The goal for sensor fusion is to have the radar acquire concealed weapons at long ranges and seamlessly hand over tracking data to the ultrasound sensor for high-resolution imaging on a video monitor. We have demonstrated centimeter-resolution ultrasound images of metallic and non-metallic weapons concealed on a human at ranges over 1 m. Processing of the ultrasound images includes filters for noise, frequency, brightness, and contrast. A frequency-agile radar has been developed by JAYCOR under the U.S. Army Advanced Mine Detection Radar Program. The signature of an armed person, detected by this radar, differs appreciably from that of the same person unarmed.

  10. Geometry, structure, and concealed lithology of the San Rafael Basin, southeastern Arizona

    USGS Publications Warehouse

    Bultman, Mark W.

    1999-01-01

    The contiguous United States has been well explored for exposed conventional mineral deposits. Therefore, it is likely that many economically viable and strategically significant conventional undiscovered mineral deposits will be found in bedrock concealed beneath basin sediments. Mineral resource assessments must incorporate an understanding of the geometry, structure, and concealed lithology of basins in order to be accurate. This report presents an analysis of the basin geometry and structure of the San Rafael basin in southeastern Arizona. In addition, a new methodology for inferring concealed lithology is presented and applied in the San Rafael basin. Gravity data is used to model the geometry of the basin using recent models of sediment density vs. depth developed in the region. This modeling indicates that the basin has a maximum depth of approximately 1.05 km plus or minus 0.10 km. In the southern portion, the basin can be modeled as an asymmetric graben faulted on the western margin. The northern portion of the basin is structurally more complex and may have high angle faults on the western, northern, and eastern margin. Near-ground closely spaced Earth’s total intensity magnetic field data is used to locate concealed faults within the basin. This data is also used to infer lithology concealed by shallow basin sediments. Airborne Earth’s total intensity magnetic field data is used to help infer concealed lithology in deep portions of the basin. The product of integrating all data and interpretations is a map which presents the geometry of the basin, faults and contacts concealed by basin sediments, and an estimate of the bedrock lithology concealed by basin sediment. Based on basin geometry and concealed lithology, the San Rafael basin has a high potential for concealed mineral deposits on its western and northern margin. In particular, a newly discovered magnetic anomaly in the northern portion of the basin can be modeled as a granitic intrusion with

  11. Cycles of abuse nurtured by concealment: a clinical report.

    PubMed

    Wijma, Barbro; Thapar-Björkert, Suruchi; Hammarström, Nevija Cah; Swahnberg, Katarina

    2007-09-01

    At present, health care staff do not seem to have sufficient knowledge about their patients' abusive experiences. The aim of the present study is to analyze and discuss what the implications might be for the encounter between patients and health care professionals, when experiences of abuse are concealed. The methodology of this article is varied: a personal narrative, medical records, sociological theoretical literature and empirical evidence. From the narrative we learn that concealment of abuse was devastating for the patient. She was "treated" in vain as a correct diagnosis was not made, while abuse by her father continued. Health care staff also violated her, which she told her therapist, but her protests were not acknowledged. Ten years of treatment thus made her even more sick. This case story focuses on the mechanisms which nurture concealment of a patient's history of abuse, such as structural and symbolic violence. We also suggest ways to break "cycles of abuse". Help the patient to stop concealing also means that she/he leaves a victim role, gets in charge of the situation and takes a first step towards empowerment. In this way, health care settings can become enabling and empowering environments.

  12. Concealing their communication: exploring psychosocial predictors of young drivers' intentions and engagement in concealed texting.

    PubMed

    Gauld, Cassandra S; Lewis, Ioni; White, Katherine M

    2014-01-01

    Making a conscious effort to hide the fact that you are texting while driving (i.e., concealed texting) is a deliberate and risky behaviour involving attention diverted away from the road. As the most frequent users of text messaging services and mobile phones while driving, young people appear at heightened risk of crashing from engaging in this behaviour. This study investigated the phenomenon of concealed texting while driving, and utilised an extended Theory of Planned Behaviour (TPB) including the additional predictors of moral norm, mobile phone involvement, and anticipated regret to predict young drivers' intentions and subsequent behaviour. Participants (n=171) were aged 17-25 years, owned a mobile phone, and had a current driver's licence. Participants completed a questionnaire measuring their intention to conceal texting while driving, and a follow-up questionnaire a week later to report their behavioural engagement. The results of hierarchical multiple regression analyses showed overall support for the predictive utility of the TPB with the standard constructs accounting for 69% of variance in drivers' intentions, and the extended predictors contributing an additional 6% of variance in intentions over and above the standard constructs. Attitude, subjective norm, PBC, moral norm, and mobile phone involvement emerged as significant predictors of intentions; and intention was the only significant predictor of drivers' self-reported behaviour. These constructs can provide insight into key focal points for countermeasures including advertising and other public education strategies aimed at influencing young drivers to reconsider their engagement in this risky behaviour. Copyright © 2013 Elsevier Ltd. All rights reserved.

  13. A Concealed Barcode Identification System Using Terahertz Time-domain Spectroscopy

    NASA Astrophysics Data System (ADS)

    Guan, Yu; Yamamoto, Manabu; Kitazawa, Toshiyuki; Tripathi, Saroj R.; Takeya, Kei; Kawase, Kodo

    2015-03-01

    We present a concealed terahertz barcode/chipless tag to achieve remote identification through an obstructing material using terahertz radiation. We show scanned terahertz reflection spectral images of barcodes concealed by a thick obstacle. A concealed and double- side printed terahertz barcode structure is proposed, and we demonstrate that our design has better performance in definition than a single-side printed barcode using terahertz time-domain spectroscopy. This technique combines the benefits of a chipless tag to read encoded information covered by an optically opaque material with low cost and a simple fabrication process. Simulations are also described, along with an explanation of the principle of the terahertz barcode identification system.

  14. Open-area concealed-weapon detection system

    NASA Astrophysics Data System (ADS)

    Pati, P.; Mather, P.

    2011-06-01

    Concealed Weapon Detection (CWD) has become a significant challenge to present day security needs; individuals carrying weapons into airplanes, schools, and secured establishments are threat to public security. Although controlled screening, of people for concealed weapons, has been employed in many establishments, procedures and equipment are designed to work in restricted environments like airport passport control, military checkpoints, hospitals, school and university entrance. Furthermore, screening systems do not effectively decipher between threat and non-threat metal objects, thus leading to high rate of false alarms which can become a liability to daily operational needs of establishments. Therefore, the design and development of a new CWD system to operate in a large open area environment with large numbers of people reduced incidences of false alarms and increased location accuracy is essential.

  15. Regulatory focus moderates the social performance of individuals who conceal a stigmatized identity.

    PubMed

    Newheiser, Anna-Kaisa; Barreto, Manuela; Ellemers, Naomi; Derks, Belle; Scheepers, Daan

    2015-12-01

    People often choose to hide a stigmatized identity to avoid bias. However, hiding stigma can disrupt social interactions. We considered whether regulatory focus qualifies the social effects of hiding stigma by examining interactions in which stigmatized participants concealed a devalued identity from non-stigmatized partners. In the Prevention Focus condition, stigmatized participants were instructed to prevent a negative impression by concealing the identity; in the Promotion Focus condition, they were instructed to promote a positive impression by concealing the identity; in the Control condition, they were simply asked to conceal the identity. Both non-stigmatized partners and independent raters rated the interactions more positively in the Promotion Focus condition. Thus, promotion focus is interpersonally beneficial for individuals who conceal a devalued identity. © 2015 The British Psychological Society.

  16. The effects of sweep numbers per average and protocol type on the accuracy of the p300-based concealed information test.

    PubMed

    Dietrich, Ariana B; Hu, Xiaoqing; Rosenfeld, J Peter

    2014-03-01

    In the first of two experiments, we compared the accuracy of the P300 concealed information test protocol as a function of numbers of trials experienced by subjects and ERP averages analyzed by investigators. Contrary to Farwell et al. (Cogn Neurodyn 6(2):115-154, 2012), we found no evidence that 100 trial based averages are more accurate than 66 or 33 trial based averages (all numbers led to accuracies of 84-94 %). There was actually a trend favoring the lowest trial numbers. The second study compared numbers of irrelevant stimuli recalled and recognized in the 3-stimulus protocol versus the complex trial protocol (Rosenfeld in Memory detection: theory and application of the concealed information test, Cambridge University Press, New York, pp 63-89, 2011). Again, in contrast to expectations from Farwell et al. (Cogn Neurodyn 6(2):115-154, 2012), there were no differences between protocols, although there were more irrelevant stimuli recognized than recalled, and irrelevant 4-digit number group stimuli were neither recalled nor recognized as well as irrelevant city name stimuli. We therefore conclude that stimulus processing in the P300-based complex trial protocol-with no more than 33 sweep averages-is adequate to allow accurate detection of concealed information.

  17. Concealed object segmentation and three-dimensional localization with passive millimeter-wave imaging

    NASA Astrophysics Data System (ADS)

    Yeom, Seokwon

    2013-05-01

    Millimeter waves imaging draws increasing attention in security applications for weapon detection under clothing. In this paper, concealed object segmentation and three-dimensional localization schemes are reviewed. A concealed object is segmented by the k-means algorithm. A feature-based stereo-matching method estimates the longitudinal distance of the concealed object. The distance is estimated by the discrepancy between the corresponding centers of the segmented objects. Experimental results are provided with the analysis of the depth resolution.

  18. Induction detection of concealed bulk banknotes

    NASA Astrophysics Data System (ADS)

    Fuller, Christopher; Chen, Antao

    2012-06-01

    The smuggling of bulk cash across borders is a serious issue that has increased in recent years. In an effort to curb the illegal transport of large numbers of paper bills, a detection scheme has been developed, based on the magnetic characteristics of bank notes. The results show that volumes of paper currency can be detected through common concealing materials such as plastics, cardboard, and fabrics making it a possible potential addition to border security methods. The detection scheme holds the potential of also reducing or eliminating false positives caused by metallic materials found in the vicinity, by observing the stark difference in received signals caused by metal and currency. The detection scheme holds the potential to detect for both the presence and number of concealed bulk notes, while maintaining the ability to reduce false positives caused by metal objects.

  19. Mental Layouts of Concealed Objects as a Function of Bizarre Imagery and Retention Interval.

    ERIC Educational Resources Information Center

    Iaccino, James; And Others

    To determine whether concealed imagery was an effective mnemonic aid in the recall of paired objects, two studies were conducted with explicitly worded instructions to conceal targets and with variable image formation periods. In each study, 40 subjects were presented with counterbalanced verbal descriptions of Concealed, Pictorial, and Separate…

  20. The association between concealing emotions at work and medical utilization in Korea.

    PubMed

    Seok, Hongdeok; Yoon, Jin-Ha; Lee, Wanhyung; Lee, June-Hee; Jung, Pil Kyun; Kim, Inah; Won, Jong-Uk; Roh, Jaehoon

    2014-01-01

    We aimed to investigate the association between concealing emotions at work and medical utilization. Data from the 2007-2009 4th Korea National Health and Nutrition Examination Survey (KNHANES IV) was used, 7,094 participants (3,837 males, 3,257 females) aged between 20 and 54 who were economically active and completed all necessary questionnaire items were included. Odds ratios (ORs) and 95% confidence intervals (95% CI) for differences in hospitalization, outpatient visits, and pharmaceutical drug use between those who concealed their emotions and those who did not were investigated using logistic regression models with and without gender stratification. Among those who concealed their emotions (n = 2,763), 47.4% were females, and 50.1% had chronic disease. In addition, 9.7% of the concealing emotions group had been hospitalized within the last year, 24.8% had been outpatients in the last two weeks, and 28.3% had used pharmaceutical drugs in the last two weeks. All ORs represent the odds of belonging to the concealing emotions group over the non-concealing emotions group. After adjustment for individual, occupational, socioeconomic and disease factors, the adjusted ORs (95% CI) in hospitalization are 1.29 (1.08 ~ 1.53) in the total population, 1.25 (0.98 ~ 1.60) in males and 1.30 (1.02 ~ 1.66) in females, in outpatient visits are 1.15 (1.02 ~ 1.29) in the total population, 1.05 (0.88 ~ 1.24) in males and 1.25 (1.06 ~ 1.47) in females and in pharmaceutical drug use are 1.12 (1.01 ~ 1.25) in the total population, 1.08 (0.92 ~ 1.27) in males and 1.14 (0.98 ~ 1.33) in females. Those who concealed their emotions at work were more likely to use medical services. Moreover, the health effects of concealing emotions at work might be more detrimental in women than in men.

  1. Are reports of randomized controlled trials improving over time? A systematic review of 284 articles published in high-impact general and specialized medical journals.

    PubMed

    To, Matthew J; Jones, Jennifer; Emara, Mohamed; Jadad, Alejandro R

    2013-01-01

    Inadequate reporting undermines findings of randomized controlled trials (RCTs). This study assessed and compared articles published in high-impact general medical and specialized journals. Reports of RCTs published in high-impact general and specialized medical journals were identified through a search of MEDLINE from January to March of 1995, 2000, 2005, and 2010. Articles that provided original data on adult patients diagnosed with chronic conditions were included in the study. Data on trial characteristics, reporting of allocation concealment, quality score, and the presence of a trial flow diagram were extracted independently by two reviewers, and discrepancies were resolved by consensus or independent adjudication. Descriptive statistics were used for quantitative variables. Comparisons between general medical and specialized journals, and trends over time were performed using Chi-square tests. Reports of 284 trials were analyzed. There was a significantly higher proportion of RCTs published with adequate reporting of allocation concealment (p = 0.003), presentation of a trial flow diagram (p<0.0001) and high quality scores (p = 0.038) over time. Trials published in general medical journals had higher quality scores than those in specialized journals (p = 0.001), reported adequate allocation concealment more often (p = 0.013), and presented a trial flow diagram more often (p<0.001). We found significant improvements in reporting quality of RCTs published in high-impact factor journals over the last fifteen years. These improvements are likely attributed to concerted international efforts to improve reporting quality such as CONSORT. There is still much room for improvement, especially among specialized journals.

  2. Passive millimeter-wave concealed weapon detection

    NASA Astrophysics Data System (ADS)

    Sinclair, Gordon N.; Anderton, Rupert N.; Appleby, Roger

    2001-02-01

    A method of detecting weapons concealed under clothing using passive millimeter wave imaging is described. The optical properties of clothing are discussed and examples given of the spectral reflectivity and transmission. The transmission tends to be constant from 60 to 150 GHz above which it decreases for some clothing materials. The transmission of a cotton T-shirt is typically 95% and of a leather jacket up to 85% at lower frequencies. A model is presented for calculating the contrast of a metallic concealed weapon when hidden under clothing and it indicates contrasts as large as 200 K can be realized outdoors. The advantages of real time over static frame imagery are discussed. It is concluded that real time imagery offers considerable advantages as weapons can be very varied in size, position and orientation and movement offers vital clues to the human observer which aid the recognition process.

  3. Medical makeup for concealing facial scars.

    PubMed

    Mee, Donna; Wong, Brian J F

    2012-10-01

    Surgical, laser, and pharmacological therapies are all used to correct scars and surgical incisions, though have limits with respect to how well facial skin can be restored or enhanced. The use of cosmetics has long been a relevant adjunct to all scar treatment modalities. In recent years, technical advancements in the chemistry and composition of cosmetic products have provided the patient with a broader range of products to employ for concealing scars. This review will provide an overview of contemporary methods for concealing facial scars, birthmarks, and pigmentary changes without the use of traditional/dated, heavy appearing camouflage products. Additionally, general guidelines and information will be provided with respect to identifying competent makeup artists for care of the medical patient. The article by no means is meant to be a tutorial, but rather serves as a starting point in this allied field of medicine. Thieme Medical Publishers 333 Seventh Avenue, New York, NY 10001, USA.

  4. Physician Beliefs about Physical and Mental Competency of Patients Applying for Concealed Weapon Permits.

    PubMed

    Goldstein, Adam O; Viera, Anthony J; Pierson, John; Barnhouse, Kathy K; Tulsky, James A; Richman, Barak D

    2015-06-01

    Law enforcement officials have asked health care providers to evaluate patient applications for concealed weapon permits. The current study was designed to examine physician beliefs regarding competency to carry a concealed weapon for patients with specific physical and mental conditions. Among 222 North Carolina physicians who participated in this survey (40% response rate), large variation and uncertainty existed for determining competency. Physicians most frequently chose mild dementia, post-traumatic stress disorder, and recent depression as conditions that would render a patient not competent to carry a concealed weapon. Male physicians and those owning a gun were more likely to deem a patient competent. Almost a third of physicians were unsure about competence for most conditions. Physicians asked to assess competency of patients to carry a concealed weapon have quite disparate views on competency and little confidence in their decisions. If physicians are expected to assess patient competence to carry a concealed weapon, more objective criteria and training are needed. Copyright © 2015 John Wiley & Sons, Ltd.

  5. Effects of modified penoplasty for concealed penis in children.

    PubMed

    Chen, Chao; Li, Ning; Luo, Yi-Ge; Wang, Hong; Tang, Xian-Ming; Chen, Jia-Bo; Dong, Chun-Qiang; Liu, Qiang; Dong, Kun; Su, Cheng; Yang, Ti-Quan

    2016-10-01

    To evaluate the effect of modified penoplasty in the management of concealed penis. We retrospectively reviewed 96 consecutive patients with concealed penis, which had been surgically corrected between July 2013 and July 2015. All patients underwent modified Shiraki phalloplasty. All patients were scheduled for regular follow-up at 1, 3, and 6 months after the surgery. Data on the patients' age, operative time, postoperative complications, and parents' satisfaction grade were collected and analyzed. The mean follow-up period was 17.4 months (range 7-31 months). The mean operative time was 63.2 ± 8.7 min. The mean perpendicular penile length was 1.89 ± 0.77 cm preoperatively and 4.42 ± 0.87 cm postoperatively, with an improved mean length of 2.5 ± 0.68 cm in the flaccid state postoperatively (p < 0.05). The patients' satisfaction grades after the surgery were improved significantly (p < 0.05). Fifty-two patients had penile lymphedema postoperatively; however, it disappeared spontaneously within 3 months. Additionally, postoperative wound infection occurred in two patients. There were no complications such as flap necrosis, penile shaft contracture, voiding difficulty, and erection difficulties. The modified Shiraki phalloplasty for concealed penis can achieve maximum utilization of prepuce to assure coverage of the exposed penile shaft. It has fewer complications, achieving marked asthetics, and functional improvement. It is a relatively ideal means for treating concealed penis.

  6. Concealed Questions. In Search of Answers

    ERIC Educational Resources Information Center

    Frana, Ilaria

    2010-01-01

    This dissertation examines the semantic interpretation of various types of DPs in so-called concealed-question (CQ) constructions, as "Bill's phone number" in the sentence "John knows Bill's phone number". The peculiar characteristic of DP-CQs is that they are interpreted as having the meaning of an embedded question. So, for instance, the…

  7. 'I am doing fine only because I have not told anyone': the necessity of concealment in the lives of people living with HIV in India.

    PubMed

    George, Mathew Sunil; Lambert, Helen

    2015-01-01

    In HIV prevention and care programmes, disclosure of status by HIV-positive individuals is generally encouraged to contain the infection and provide adequate support to the person concerned. Lack of disclosure is generally framed as a barrier to preventive behaviours and accessing support. The assumption that disclosure is beneficial is also reflected in studies that aim to identify determinants of disclosure and recommend individual-level measures to promote disclosure. However, in contexts where HIV infection is stigmatised and there is fear of rejection and discrimination among those living with HIV, concealment of status becomes a way to try and regain as much as possible the life that was disrupted by the discovery of HIV infection. In this study of HIV-positive women and children in India, concealment was considered essential by individuals and families of those living with HIV to re-establish and maintain their normal lives in an environment where stigma and discrimination were prevalent. This paper describes why women and care givers of children felt the need to conceal HIV status, the various ways in which people tried to do so and the implications for treatment of people living with HIV. We found that while women were generally willing to disclose their status to their husband or partner, they were very keen to conceal their status from all others, including family members. Parents and carers with an HIV-positive child were not willing to disclose this status to the child or to others. Understanding the different rationales for concealment would help policy makers and programme managers to develop more appropriate care management strategies and train care providers to assist clients in accessing care and support without disrupting their lives.

  8. Relationship between concealment of emotions at work and musculoskeletal symptoms: results from the third Korean Working Conditions Survey.

    PubMed

    Jung, Kyungyong; Kim, Dae Hwan; Ryu, Ji Young

    2018-05-11

    In this study, we explored the relationship between concealing emotions at work and musculoskeletal symptoms in Korean workers using data from a national, population-based survey. Data were obtained from the third Korean Working Conditions Survey in 2011. We investigated the prevalence of three musculoskeletal symptoms ("back pain", "pain in the upper extremities", and "pain in the lower extremities"). Multiple logistic regression analysis was also performed to determine odds ratios (ORs) for musculoskeletal symptoms according to concealing emotions at work, adjusting for socioeconomic factors. In both sexes, the emotion-concealing group showed a significantly higher prevalence of "pain in the upper extremities" and "pain in the lower extremities" than the non-emotion-concealing group. For back pain, male - but not female - workers who concealed their emotions showed a higher prevalence than their non-emotion-concealing counterparts; the difference was statistically significant. Adjusted ORs for musculoskeletal symptoms (excluding "back pain" for female workers) in the emotion-concealing group were significantly higher. Our study suggests that concealment of emotions is closely associated with musculoskeletal symptoms, and the work environment should operate in consideration not only of the physical health work condition of workers but also of their emotional efforts including concealing emotion at work.

  9. A Concealed Information Test with multimodal measurement.

    PubMed

    Ambach, Wolfgang; Bursch, Stephanie; Stark, Rudolf; Vaitl, Dieter

    2010-03-01

    A Concealed Information Test (CIT) investigates differential physiological responses to deed-related (probe) vs. irrelevant items. The present study focused on the detection of concealed information using simultaneous recordings of autonomic and brain electrical measures. As a secondary issue, verbal and pictorial presentations were compared with respect to their influence on the recorded measures. Thirty-one participants underwent a mock-crime scenario with a combined verbal and pictorial presentation of nine items. The subsequent CIT, designed with respect to event-related potential (ERP) measurement, used a 3-3.5s interstimulus interval. The item presentation modality, i.e. pictures or written words, was varied between subjects; no response was required from the participants. In addition to electroencephalogram (EEG), electrodermal activity (EDA), electrocardiogram (ECG), respiratory activity, and finger plethysmogram were recorded. A significant probe-vs.-irrelevant effect was found for each of the measures. Compared to sole ERP measurement, the combination of ERP and EDA yielded incremental information for detecting concealed information. Although, EDA per se did not reach the predictive value known from studies primarily designed for peripheral physiological measurement. Presentation modality neither influenced the detection accuracy for autonomic measures nor EEG measures; this underpins the equivalence of verbal and pictorial item presentation in a CIT, regardless of the physiological measures recorded. Future studies should further clarify whether the incremental validity observed in the present study reflects a differential sensitivity of ERP and EDA to different sub-processes in a CIT. Copyright 2009 Elsevier B.V. All rights reserved.

  10. [Half-gloving cordectomy: a modified procedure for concealed penis].

    PubMed

    Sun, Wei-Gui; Zheng, Qi-Chuan; Jiang, Kun

    2012-06-01

    To search for a simple surgical procedure for the treatment of concealed penis that may have better effect and less complications. We used a modified surgical method in the treatment of 58 patients with concealed penis aged from 3 to 15 (mean 6.8) years. The operation was simplified and involved the following steps: wholly unveiling the penis glans, half-degloving the foreskins, cutting off all the adhesive fibers up to the penile suspensory ligaments, and liberating the external penis. The operation was successful in all the patients, with the operative time of 15 -45 (mean 33) minutes, hospital stay of 2 - 5 (mean 3.5) days, but no complications except mild foreskin edema in 5 cases. The external penis was prolonged from 0.5 - 2.8 (mean 1.4) cm preoperatively to 3.2 - 8.5 (mean 3.9) cm postoperatively. The patients were followed up for 1 -3 years, all satisfied with the length and appearance of the penis, and their sexual and reproductive functions were normal. The modified surgical procedure for concealed penis is simple and effective, with desirable outcomes, few postoperative complications and no damage to sexual and reproductive functions.

  11. Hiding and finding: the relationship between visual concealment and visual search.

    PubMed

    Smilek, Daniel; Weinheimer, Laura; Kwan, Donna; Reynolds, Mike; Kingstone, Alan

    2009-11-01

    As an initial step toward developing a theory of visual concealment, we assessed whether people would use factors known to influence visual search difficulty when the degree of concealment of objects among distractors was varied. In Experiment 1, participants arranged search objects (shapes, emotional faces, and graphemes) to create displays in which the targets were in plain sight but were either easy or hard to find. Analyses of easy and hard displays created during Experiment 1 revealed that the participants reliably used factors known to influence search difficulty (e.g., eccentricity, target-distractor similarity, presence/absence of a feature) to vary the difficulty of search across displays. In Experiment 2, a new participant group searched for the targets in the displays created by the participants in Experiment 1. Results indicated that search was more difficult in the hard than in the easy condition. In Experiments 3 and 4, participants used presence versus absence of a feature to vary search difficulty with several novel stimulus sets. Taken together, the results reveal a close link between the factors that govern concealment and the factors known to influence search difficulty, suggesting that a visual search theory can be extended to form the basis of a theory of visual concealment.

  12. Detection and identification of concealed weapons using matrix pencil

    NASA Astrophysics Data System (ADS)

    Adve, Raviraj S.; Thayaparan, Thayananthan

    2011-06-01

    The detection and identification of concealed weapons is an extremely hard problem due to the weak signature of the target buried within the much stronger signal from the human body. This paper furthers the automatic detection and identification of concealed weapons by proposing the use of an effective approach to obtain the resonant frequencies in a measurement. The technique, based on Matrix Pencil, a scheme for model based parameter estimation also provides amplitude information, hence providing a level of confidence in the results. Of specific interest is the fact that Matrix Pencil is based on a singular value decomposition, making the scheme robust against noise.

  13. ‘I am doing fine only because I have not told anyone’: the necessity of concealment in the lives of people living with HIV in India

    PubMed Central

    George, Mathew Sunil; Lambert, Helen

    2015-01-01

    In HIV prevention and care programmes, disclosure of status by HIV-positive individuals is generally encouraged to contain the infection and provide adequate support to the person concerned. Lack of disclosure is generally framed as a barrier to preventive behaviours and accessing support. The assumption that disclosure is beneficial is also reflected in studies that aim to identify determinants of disclosure and recommend individual-level measures to promote disclosure. However, in contexts where HIV infection is stigmatised and there is fear of rejection and discrimination among those living with HIV, concealment of status becomes a way to try and regain as much as possible the life that was disrupted by the discovery of HIV infection. In this study of HIV-positive women and children in India, concealment was considered essential by individuals and families of those living with HIV to re-establish and maintain their normal lives in an environment where stigma and discrimination were prevalent. This paper describes why women and care givers of children felt the need to conceal HIV status, the various ways in which people tried to do so and the implications for treatment of people living with HIV. We found that while women were generally willing to disclose their status to their husband or partner, they were very keen to conceal their status from all others, including family members. Parents and carers with an HIV-positive child were not willing to disclose this status to the child or to others. Understanding the different rationales for concealment would help policy makers and programme managers to develop more appropriate care management strategies and train care providers to assist clients in accessing care and support without disrupting their lives. PMID:25706959

  14. Detecting concealed objects at a checkpoint

    DOEpatents

    McMakin, Douglas L [Richland, WA; Hall, Thomas E [Kennewick, WA; Sheen, David M [Richland, WA; Severtsen, Ronald H [Richland, WA

    2008-07-29

    Disclosed are systems, methods, devices, and apparatus to interrogate a clothed individual with electromagnetic radiation to determine if a concealed object is being carried. This determination includes establishing data corresponding to an image of the individual with a pair of opposed, semi-cylindrical array panels each configured to interrogate the individual with electromagnetic radiation in the 200 MHz to 1 THz range.

  15. Self-Concealment Mediates the Relationship Between Perfectionism and Attitudes Toward Seeking Psychological Help Among Adolescents.

    PubMed

    Abdollahi, Abbas; Hosseinian, Simin; Beh-Pajooh, Ahmad; Carlbring, Per

    2017-01-01

    One of the biggest barriers in treating adolescents with mental health problems is their refusing to seek psychological help. This study was designed to examine the relationships between two forms of perfectionism, self-concealment and attitudes toward seeking psychological help and to test the mediating role of self-concealment in the relationship between perfectionism and attitudes toward seeking psychological help among Malaysian high school students. The participants were 475 Malaysian high school students from four high schools in Kuala Lumpur, Malaysia. Structural equation modelling results indicated that high school students with high levels of socially prescribed perfectionism, high levels of self-concealment, and low levels of self-oriented perfectionism reported negative attitudes toward seeking psychological help. Bootstrapping analysis showed that self-concealment emerged as a significant, full mediator in the link between socially prescribed perfectionism and attitudes toward seeking psychological help. Moderated mediation analysis also examined whether the results generalized across men and women. The results revealed that male students with socially prescribed perfectionism are more likely to engage in self-concealment, which in turn, leads to negative attitudes toward seeking psychological help more than their female counterparts. The results suggested that students high in socially prescribed perfectionism were more likely to engage in self-concealment and be less inclined to seek psychological help.

  16. Cancer survivors' concealment or disclosure of diagnosis: Implications for return to work.

    PubMed

    Morrison, T L; Thomas, R L

    2015-01-01

    The ability to return to work (RTW) is a significant quality of life indicator for many working aged cancer survivors. In the void of available support, many are left to independently navigate the RTW process which includes such important considerations as disclosure or concealment of diagnosis with concomitant sequellae. This article reviews participants' variable approaches to concealment, disclosure, or even an open educative stance as well as the associated benefits and limitations. Photovoice methods combined with interviewing. While most participants disclosed their diagnosis and many extolled the benefits of an open, educative stance, there were drawbacks experienced. Similarly, those who concealed their diagnosis also experienced benefits and challenges. In the current void of appropriate cancer rehabilitation supports, cancer survivors must independently negotiate their RTW process. Although most participants openly disclosed their diagnosis and associated limitations, a few concealed or camouflaged. There are benefits and limitations to both approaches of which survivors should be made aware at the outset as such will shape their RTW experience. Multidisciplinary rehabilitation support services would best guide survivors' management of the myriad of factors that will impact their work reintegration.

  17. Road maintenance and rehabilitation : funding and allocation strategies

    DOT National Transportation Integrated Search

    1994-01-24

    With ageing road infrastructure and sustained traffic growth, the maintenance and rehabilitation of road and motorway networks require increased funding. Adequate allocation and distribution of available resources are therefore a key policy issue. Th...

  18. College Students' Reasons for Concealing Suicidal Ideation

    ERIC Educational Resources Information Center

    Burton Denmark, Adryon; Hess, Elaine; Becker, Martin Swanbrow

    2012-01-01

    Self-reported reasons for concealing suicidal ideation were explored using data from a national survey of undergraduate and graduate students: 558 students indicated that they seriously considered attempting suicide during the previous year and did not tell anyone about their suicidal thoughts. Content analysis of students' qualitative responses…

  19. A new surgical technique for concealed penis using an advanced musculocutaneous scrotal flap.

    PubMed

    Han, Dong-Seok; Jang, Hoon; Youn, Chang-Shik; Yuk, Seung-Mo

    2015-06-19

    Until recently, no single, universally accepted surgical method has existed for all types of concealed penis repairs. We describe a new surgical technique for repairing concealed penis by using an advanced musculocutaneous scrotal flap. From January 2010 to June 2014, we evaluated 12 patients (12-40 years old) with concealed penises who were surgically treated with an advanced musculocutaneous scrotal flap technique after degloving through a ventral approach. All the patients were scheduled for regular follow-up at 6, 12, and 24 weeks postoperatively. The satisfaction grade for penile size, morphology, and voiding status were evaluated using a questionnaire preoperatively and at all of the follow-ups. Information regarding complications was obtained during the postoperative hospital stay and at all follow-ups. The patients' satisfaction grades, which included the penile size, morphology, and voiding status, improved postoperatively compared to those preoperatively. All patients had penile lymphedema postoperatively; however, this disappeared within 6 weeks. There were no complications such as skin necrosis and contracture, voiding difficulty, or erectile dysfunction. Our advanced musculocutaneous scrotal flap technique for concealed penis repair is technically easy and safe. In addition, it provides a good cosmetic appearance, functional outcomes and excellent postoperative satisfaction grades. Lastly, it seems applicable in any type of concealed penis, including cases in which the ventral skin defect is difficult to cover.

  20. Artemisinin derivatives for treating severe malaria.

    PubMed

    McIntosh, H M; Olliaro, P

    2000-01-01

    Artemisinin derivatives may have advantages over quinoline drugs for treating severe malaria since they are fast acting and effective against quinine resistant malaria parasites. The objective of this review was to assess the effects of artemisinin drugs for severe and complicated falciparum malaria in adults and children. We searched the Cochrane Infectious Diseases Group trials register, Cochrane Controlled Trials Register, Medline, Embase, Science Citation Index, Lilacs, African Index Medicus, conference abstracts and reference lists of articles. We contacted organisations, researchers in the field and drug companies. Randomised and pseudo-randomised trials comparing artemisinin drugs (rectal, intramuscular or intravenous) with standard treatment, or comparisons between artemisinin derivatives in adults or children with severe or complicated falciparum malaria. Eligibility, trial quality assessment and data extraction were done independently by two reviewers. Study authors were contacted for additional information. Twenty three trials are included, allocation concealment was adequate in nine. Sixteen trials compared artemisinin drugs with quinine in 2653 patients. Artemisinin drugs were associated with better survival (mortality odds ratio 0.61, 95% confidence interval 0.46 to 0.82, random effects model). In trials where concealment of allocation was adequate (2261 patients), this was barely statistically significant (odds ratio 0.72, 95% CI 0.54 to 0.96, random effects model). In 1939 patients with cerebral malaria, mortality was also lower with artemisinin drugs overall (odds ratio 0.63, 95% CI 0.44 to 0.88, random effects model). The difference was not significant however when only trials reporting adequate concealment of allocation were analysed (odds ratio 0.78, 95% CI 0.55 to 1.10, random effects model) based on 1607 patients. No difference in neurological sequelae was shown. Compared with quinine, artemisinin drugs showed faster parasite clearance from

  1. Anxiety and Related Disorders and Concealment in Sexual Minority Young Adults.

    PubMed

    Cohen, Jeffrey M; Blasey, Christine; Barr Taylor, C; Weiss, Brandon J; Newman, Michelle G

    2016-01-01

    Sexual minorities face greater exposure to discrimination and rejection than heterosexuals. Given these threats, sexual minorities may engage in sexual orientation concealment in order to avoid danger. This social stigma and minority stress places sexual minorities at risk for anxiety and related disorders. Given that three fourths of anxiety disorder onset occurs before the age of 24, the current study investigated the symptoms of generalized anxiety disorder, social phobia, panic disorder, posttraumatic stress disorder, and depression in sexual minority young adults relative to their heterosexual peers. Secondarily, the study investigated sexual orientation concealment as a predictor of anxiety and related disorders. A sample of 157 sexual minority and 157 heterosexual young adults matched on age and gender completed self-report measures of the aforementioned disorders, and indicated their level of sexual orientation concealment. Results revealed that sexual minority young adults reported greater symptoms relative to heterosexuals across all outcome measures. There were no interactions between sexual minority status and gender, however, women had higher symptoms across all disorders. Sexual minority young women appeared to be at the most risk for clinical levels of anxiety and related disorders. In addition, concealment of sexual orientation significantly predicted symptoms of social phobia. Implications are offered for the cognitive and behavioral treatment of anxiety and related disorders in this population. Copyright © 2015. Published by Elsevier Ltd.

  2. Automated Human Screening for Detecting Concealed Knowledge

    ERIC Educational Resources Information Center

    Twyman, Nathan W.

    2012-01-01

    Screening individuals for concealed knowledge has traditionally been the purview of professional interrogators investigating a crime. But the ability to detect when a person is hiding important information would be of high value to many other fields and functions. This dissertation proposes design principles for and reports on an implementation…

  3. Microwave Technique for Detecting and Locating Concealed Weapons

    DOT National Transportation Integrated Search

    1971-12-01

    The subject of this report is the evaluation of a microwave technique for detecting and locating weapons concealed under clothing. The principal features of this technique are: persons subjected to search are not exposed to 'objectional' microwave ra...

  4. Disclosure and concealment of sexual orientation and the mental health of non-gay-identified, behaviorally bisexual men.

    PubMed

    Schrimshaw, Eric W; Siegel, Karolynn; Downing, Martin J; Parsons, Jeffrey T

    2013-02-01

    Although bisexual men report lower levels of mental health relative to gay men, few studies have examined the factors that contribute to bisexual men's mental health. Bisexual men are less likely to disclose, and more likely to conceal (i.e., a desire to hide), their sexual orientation than gay men. Theory suggests that this may adversely impact their mental health. This report examined the factors associated with disclosure and with concealment of sexual orientation, the association of disclosure and concealment with mental health, and the potential mediators (i.e., internalized homophobia, social support) of this association with mental health. An ethnically diverse sample of 203 non-gay-identified, behaviorally bisexual men who do not disclose their same-sex behavior to their female partners were recruited in New York City to complete a single set of self-report measures. Concealment was associated with higher income, a heterosexual identification, living with a wife or girlfriend, more frequent sex with women, and less frequent sex with men. Greater concealment, but not disclosure to friends and family, was significantly associated with lower levels of mental health. Multiple mediation analyses revealed that both internalized homophobia and general emotional support significantly mediated the association between concealment and mental health. The findings demonstrate that concealment and disclosure are independent constructs among bisexual men. Further, they suggest that interventions addressing concerns about concealment, emotional support, and internalized homophobia may be more beneficial for increasing the mental health of bisexual men than those focused on promoting disclosure.

  5. Disclosure and Concealment of Sexual Orientation and the Mental Health of Non-Gay-Identified, Behaviorally-Bisexual Men

    PubMed Central

    Schrimshaw, Eric W.; Siegel, Karolynn; Downing, Martin J.; Parsons, Jeffrey T.

    2013-01-01

    Objective Although bisexual men report lower levels of mental health relative to gay men, few studies have examined the factors that contribute to bisexual men’s mental health. Bisexual men are less likely to disclose, and more likely to conceal (i.e., a desire to hide), their sexual orientation than gay men. Theory suggests that this may adversely impact their mental health. This report examined the factors associated with disclosure and with concealment of sexual orientation, the association of disclosure and concealment with mental health, and the potential mediators (i.e., internalized homophobia, social support) of this association with mental health. Method An ethnically-diverse sample of 203 non-gay-identified, behaviorally-bisexual men who do not disclose their same-sex behavior to their female partners were recruited in New York City to complete a single set of self-report measures. Results Concealment was associated with higher income, a heterosexual identification, living with a wife or girlfriend, more frequent sex with women, and less frequent sex with men. Greater concealment, but not disclosure to friends and family, was significantly associated with lower levels of mental health. Multiple mediation analyses revealed that both internalized homophobia and general emotional support significantly mediated the association between concealment and mental health. Conclusions The findings demonstrate that concealment and disclosure are independent constructs among bisexual men. Further, they suggest that interventions addressing concerns about concealment, emotional support, and internalized homophobia may be more beneficial for increasing the mental health of bisexual men than those focused on promoting disclosure. PMID:23276123

  6. A hybrid frame concealment algorithm for H.264/AVC.

    PubMed

    Yan, Bo; Gharavi, Hamid

    2010-01-01

    In packet-based video transmissions, packets loss due to channel errors may result in the loss of the whole video frame. Recently, many error concealment algorithms have been proposed in order to combat channel errors; however, most of the existing algorithms can only deal with the loss of macroblocks and are not able to conceal the whole missing frame. In order to resolve this problem, in this paper, we have proposed a new hybrid motion vector extrapolation (HMVE) algorithm to recover the whole missing frame, and it is able to provide more accurate estimation for the motion vectors of the missing frame than other conventional methods. Simulation results show that it is highly effective and significantly outperforms other existing frame recovery methods.

  7. Non-Linear Acoustic Concealed Weapons Detector

    DTIC Science & Technology

    2006-05-01

    signature analysis 8 the interactions of the beams with concealed objects. The Khokhlov- Zabolotskaya-Kuznetsov ( KZK ) equation is the most widely used...Hamilton developed a finite difference method based on the KZK equation to model pulsed acoustic emissions from axial symmetric sources. Using a...College of William & Mary, we have developed a simulation code using the KZK equation to model non-linear acoustic beams and visualize beam patterns

  8. Image fusion based on millimeter-wave for concealed weapon detection

    NASA Astrophysics Data System (ADS)

    Zhu, Weiwen; Zhao, Yuejin; Deng, Chao; Zhang, Cunlin; Zhang, Yalin; Zhang, Jingshui

    2010-11-01

    This paper describes a novel multi sensors image fusion technology which is presented for concealed weapon detection (CWD). It is known to all, because of the good transparency of the clothes at millimeter wave band, a millimeter wave radiometer can be used to image and distinguish concealed contraband beneath clothes, for example guns, knives, detonator and so on. As a result, we adopt the passive millimeter wave (PMMW) imaging technology for airport security. However, in consideration of the wavelength of millimeter wave and the single channel mechanical scanning, the millimeter wave image has law optical resolution, which can't meet the need of practical application. Therefore, visible image (VI), which has higher resolution, is proposed for the image fusion with the millimeter wave image to enhance the readability. Before the image fusion, a novel image pre-processing which specifics to the fusion of millimeter wave imaging and visible image is adopted. And in the process of image fusion, multi resolution analysis (MRA) based on Wavelet Transform (WT) is adopted. In this way, the experiment result shows that this method has advantages in concealed weapon detection and has practical significance.

  9. Concealment of Child Sexual Abuse in Sports

    ERIC Educational Resources Information Center

    Hartill, Mike

    2013-01-01

    When the sexual abuse of children is revealed, it is often found that other nonabusing adults were aware of the abuse but failed to act. During the past twenty years or so, the concealment of child sexual abuse (CSA) within organizations has emerged as a key challenge for child protection work. Recent events at Pennsylvania State University (PSU)…

  10. Correction of concealed penis with preservation of the prepuce.

    PubMed

    Valioulis, I A; Kallergis, I C; Ioannidou, D C

    2015-10-01

    By definition, congenital concealed penis presents at birth. Children are usually referred to physicians because of parental anxiety caused by their child's penile size. Several surgical procedures have been described to treat this condition, but its correction is still technically challenging. The present study reports a simple surgical approach, which allows preservation of the prepuce. During the last 6 years, 18 children with concealed penis (according to the classification by Maizels et al.) have been treated in the present department (mean age 4.5 years, range 3-12 years). Patients with other conditions that caused buried penis were excluded from the study. The operation was performed through a longitudinal midline ventral incision, which was extended hemi-circumferentially at the penile base. The dysgenetic dartos was identified and its distal part was resected. Dissection of the corpora cavernosa was carried down to the suspensory ligament, which was sectioned. Buck's fascia was fixed to Scarpa's fascia and shaft skin was approximated in the midline. Penoscrotal angle was fashioned by Z-plasty or V-Y plasty. The median follow-up was 24 months (range 8-36). The postoperative edema was mild and resolved within a week. All children had good to excellent outcomes. The median pre-operative to postoperative difference in penile length in the flaccid state was 2.6 cm (range 2.0-3.5). No serious complications or recurrent penile retraction were noted. Recent literature mostly suggests that concealed penis is due to deficient proximal attachments of dysgenetic dartos. Consequences of this include: difficulties in maintaining proper hygiene, balanitis, voiding difficulties with prepuce ballooning and urine spraying, and embarrassment among peers. Surgical treatment for congenital concealed penis is warranted in children aged 3 years or older. The basis of the technique is the perception that in boys with congenital concealed penis, the penile integuments are normal

  11. Predictive value of ADAMTS-13 on concealed chronic renal failure in COPD patients

    PubMed Central

    Zeng, Mian; Chen, Qingui; Liang, Wenjie; He, Wanmei; Zheng, Haichong; Huang, Chunrong

    2017-01-01

    Background Impaired renal function is often neglected in COPD patients. Considering that COPD patients usually have an ongoing prothrombotic state and systemic inflammation status, we investigated the association among them and explored the predictive value of a disintegrin and metalloproteinase with a thrombospondin type 1 motif, member 13 (ADAMTS-13), on concealed chronic renal failure (CRF) in COPD patients. Methods COPD patients were recruited from the First Affiliated Hospital of Sun Yat-Sen University between January 2015 and December 2016. Control was selected from contemporaneous hospitalized patients without COPD and matched by age and gender at a ratio of 1:1. Estimated glomerular filtration rate (eGFR) was calculated by using the Chronic Kidney Disease Epidemiology Collaboration formula, and all subjects were categorized as having normal renal function (eGFR ≥60 mL min−1 1.73 m−2) and having concealed CRF (normal serum creatinine while eGFR <60 mL min−1 1.73 m−2). Independent correlates of concealed CRF were investigated by logistic regression analysis, and receiver operating characteristic (ROC) curves were used to determine the predictive value of ADAMTS-13. Results In total, 106 COPD and 106 non-COPD patients were finally recruited, and the incidences of concealed CRF were 19.81% and 7.55%, respectively. ADAMTS-13 (odds ratio [OR] =0.858, 95% CI =0.795–0.926), D-dimer (OR =1.095, 95% CI =1.027–1.169), and C-reactive protein (OR =1.252, 95% CI =1.058–1.480) were significantly associated with concealed CRF. Sensitivity and specificity at an ADAMTS-13 cutoff of 318.72 ng/mL were 100% and 81.2%, respectively. The area under the ROC curve was 0.959. Conclusion Prothrombotic state and systemic inflammation status might contribute to explaining the high incidence of concealed CRF in COPD, and plasma ADAMTS-13 levels may serve as a strong predictor. PMID:29255356

  12. Direct and indirect links between parenting styles, self-concealment (secrets), impaired control over drinking and alcohol-related outcomes.

    PubMed

    Hartman, Jessica D; Patock-Peckham, Julie A; Corbin, William R; Gates, Jonathan R; Leeman, Robert F; Luk, Jeremy W; King, Kevin M

    2015-01-01

    Self-concealment reflects uncomfortable feelings, thoughts, and information people have about themselves that they avoid telling others (Larson & Chastain, 1990). According to Larson and Chastain (1990) these secrets range from the slightly embarrassing to the very distressing with an individual's most traumatic experiences often concealed. Parental attitudes including those involving self-disclosure are thought to be expressed in their choice of parenting style (Brand, Hatzinger, Beck, & Holsboer-Trachsler, 2009). The specific aim of this investigation was to examine the direct and indirect influences of parenting styles on self-concealment, impaired control over drinking (i.e. the inability to stop drinking when intended), alcohol use (quantity/frequency), and alcohol-related problems. A structural equation model with 419 (223 men, 196 women) university students was examined. Two and three path mediated effects were examined with the bias corrected bootstrap technique in Mplus. Having an authoritarian mother was directly linked to more self-concealment, while having an authoritative father was directly linked to less self-concealment. Higher levels of mother authoritarianism were indirectly linked to both increased alcohol use and alcohol-related problems through more self-concealment and more impaired control over drinking. Moreover, higher levels of father authoritativeness were indirectly linked to less alcohol use and alcohol-related problems through less self-concealment and less impaired control over drinking. These findings suggest that parenting styles influence vulnerabilities such as self-concealment in the impaired control over the drinking pathway to alcohol use and alcohol-related problems. Copyright © 2014 Elsevier Ltd. All rights reserved.

  13. 7 CFR 1493.4 - Criteria for country allocations.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ..., DEPARTMENT OF AGRICULTURE EXPORT PROGRAMS CCC EXPORT CREDIT GUARANTEE PROGRAMS Restrictions and Criteria for... CCC in reviewing proposals for country allocations under the GSM-102 or GSM-103 programs, will include... to adequately service CCC guaranteed debt; (c) Financial status of participating banks in the...

  14. 7 CFR 1493.4 - Criteria for country allocations.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ..., DEPARTMENT OF AGRICULTURE EXPORT PROGRAMS CCC EXPORT CREDIT GUARANTEE PROGRAMS Restrictions and Criteria for... CCC in reviewing proposals for country allocations under the GSM-102 or GSM-103 programs, will include... to adequately service CCC guaranteed debt; (c) Financial status of participating banks in the...

  15. 7 CFR 1493.4 - Criteria for country allocations.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ..., DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS CCC EXPORT CREDIT GUARANTEE PROGRAMS... criteria considered by CCC in reviewing proposals for country allocations under the GSM-102 or GSM-103... importing country to adequately service CCC guaranteed debt; (c) Financial status of participating banks in...

  16. 7 CFR 1493.4 - Criteria for country allocations.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ..., DEPARTMENT OF AGRICULTURE EXPORT PROGRAMS CCC EXPORT CREDIT GUARANTEE PROGRAMS Restrictions and Criteria for... CCC in reviewing proposals for country allocations under the GSM-102 or GSM-103 programs, will include... to adequately service CCC guaranteed debt; (c) Financial status of participating banks in the...

  17. Clothing adjustments for concealed soft body armor during moderate physical exertion.

    PubMed

    Ryan, Greg A; Bishop, Stacy H; Herron, Robert L; Katica, Charles P; Elbon, Bre'anna L; Bosak, Andrew M; Bishop, Phillip

    2015-01-01

    Previous research has studied the impact of Level II concealed soft body armor (SBA) on the augmentation of heat storage in a hot environment simulating a typical summer day in the southeastern United States (wet bulb globe temperature [WBGT] = 30°C) and noted a significant difference between macro- and micro-WBGTs. The purpose of this study was to characterize the microclimate (micro-WBGT) under a concealed Level II SBA during 60 min of moderately intense work at two separate macro-WBGTs (26°C and 30°C), and to establish WBGT corrections to allow prediction of heat strain in an individual wearing a concealed Level II SBA. A single trial was performed with nine volunteers (27 ± 4 years) outfitted with a simulated standard law enforcement uniform and a traditional concealed Level II SBA, in a moderately warm environment (WBGT = 26°C). Each participant performed cycles of 12 min of walking (1.25 L · min(-1)) and 3 min of arm curls (14.3 kg, 0.6 L · min(-1)) with a 5 min rest after every other cycle, for a total of 60 minutes. This trial was compared to an identical previously completed 60-min work bout at 30°C. A two-way repeated measures ANOVA with Post hoc Bonferroni and paired samples t-test analysis was conducted. A greater difference between macro- micro-WBGTs existed at 26°C compared to the 30°C macro-WBGT. Under these conditions, a moderate work in Level II SBA requires a WBGT correction of 8.9°C and 6.2°C at macro-WBGTs of 26°C and 30°C, respectively. A modified simple linear regression prediction model was established for mean Micro-WBGT for each macro-WBGTs after the plateau point at the 30 min mark. The derivation regressions at 26°C (R(2) = 0.99), and 30°C (R(2) = 0.99) indicate that micro-WBGT could be predicted for each 15 minutes time at both macro-WBGTs tested for individuals doing moderate intensity (300 Kcals · hr(-1)) work wearing concealed Level II SBA.

  18. Could plate tectonics on Venus be concealed by volcanic deposits

    NASA Technical Reports Server (NTRS)

    Kaula, W. M.; Muradian, L. M.

    1982-01-01

    The present investigation is supplementary to a study reported by Kaula and Phillips (1981). From an analysis of Pioneer Venus altimetry, Kaula and Phillips had inferred that any heat loss from the planet by plate tectonics must be small compared to that from the earth. However, it has been suggested by others that plate tectonic may exist on Venus, but that the expected 'square root of s' dependence of the topographic drop off is not observed because it is concealed by lava flows. The present investigation has the objective to conduct an examination whether this suggestion of concealment by lava flow is correct. On the basis of the performed analysis, it is concluded that the results obtained by Kaula and Phillips appear to be well justified.

  19. A Qualitative Study Examining Experiences and Dilemmas in Concealment and Disclosure of People Living With Serious Mental Illness.

    PubMed

    Bril-Barniv, Shani; Moran, Galia S; Naaman, Adi; Roe, David; Karnieli-Miller, Orit

    2017-03-01

    People with mental illnesses face the dilemma of whether to disclose or conceal their diagnosis, but this dilemma was scarcely researched. To gain in-depth understanding of this dilemma, we interviewed 29 individuals with mental illnesses: 16 with major depression/bipolar disorders and 13 with schizophrenia. Using a phenomenological design, we analyzed individuals' experiences, decision-making processes, and views of gains and costs regarding concealment and disclosure of mental illness. We found that participants employed both positive and negative disclosure/concealment practices. Positive practices included enhancing personal recovery, community integration, and/or supporting others. Negative practices occurred in forced, uncontrolled situations. We also identified various influencing factors, including familial norms of sharing, accumulated experiences with disclosure, and ascribed meaning to diagnosis. Based on these findings, we deepen the understanding about decision-making processes and the consequences of disclosing or concealing mental illness. We discuss how these finding can help consumers explore potential benefits and disadvantages of mental illness disclosure/concealment occurrences.

  20. Concealed renal failure and adverse drug reactions in older patients with type 2 diabetes mellitus.

    PubMed

    Corsonello, Andrea; Pedone, Claudio; Corica, Francesco; Mazzei, Bruno; Di Iorio, Angelo; Carbonin, Pierugo; Incalzi, Raffaele Antonelli

    2005-09-01

    In elderly patients serum creatinine may be normal despite decreased glomerular filtration rate (GFR). The aim of this study was to evaluate the prevalence of this "concealed" renal failure, i.e., renal failure with normal serum creatinine levels, in elderly diabetic patients, and to verify whether it is a risk factor for adverse drug reactions (ADR) to hydrosoluble drugs. We used data on 2257 hospitalized patients with type 2 diabetes mellitus enrolled in the Gruppo Italiano di Farmacovigilanza nell'Anziano study. On the basis of serum creatinine and calculated GFR, patients were grouped as follows: normal renal function (normal serum creatinine levels and normal GFR), concealed (normal serum creatinine levels and reduced GFR), or overt (increased creatinine levels and reduced GFR) renal failure. GFR was calculated using the Modification of Diet in Renal Disease (MDRD) equation. The outcome of the study was the incidence of ADR to hydrosoluble drugs during the hospital stay. The relationship between renal function and ADR was evaluated using Cox regression analysis including potential confounders. Concealed renal failure was observed in 363 (16.1%) of patients studied. Patients with concealed or overt renal failure were older, had more frequently cognitive impairment and polypharmacy, and had lower serum albumin levels than did those with normal renal function. Both concealed (hazard ratio = 1.90; 95% confidence interval, 1.04-3.48; p =.036) and overt (hazard ratio = 2.23; 95% confidence interval, 1.40-3.55; p =.001) renal failure were significantly associated with ADR to hydrosoluble drugs. The use of more than four drugs also qualified as an independent risk factor for ADRs to hydrosoluble drugs during hospital stay. Older diabetic patients should be systematically screened to ascertain the presence of concealed renal failure in an attempt to optimize the pharmacological treatment and reduce the risk of ADRs.

  1. A non-imaging polarized terahertz passive system for detecting and identifying concealed explosives

    NASA Astrophysics Data System (ADS)

    Karam, Mostafa A.; Meyer, Doug

    2011-06-01

    Existing terahertz THz systems for detecting concealed explosives are not capable of identifying explosive type which leads to higher false alarm rates. Moreover, some of those systems are imaging systems that invade personal privacy, and require more processing and computational resources. Other systems have no polarization preference which makes them incapable of capturing the geometric features of an explosive. In this study a non-imaging polarized THz passive system for detecting and identifying concealed explosives overcoming the forgoing shortcomings is developed. The system employs a polarized passive THz sensor in acquiring emitted data from a scene that may have concealed explosives. The acquired data are decomposed into their natural resonance frequencies, and the number of those frequencies is used as criteria in detecting the explosive presence. If the presence of an explosive is confirmed, a set of physically based retrieval algorithms is used in extracting the explosive dielectric constant/refractive index value from natural resonance frequencies and amplitudes of associated signals. Comparing the refractive index value against a database of refractive indexes of known explosives identifies the explosive type. As an application, a system having a dual polarized radiometer operating within the frequency band of 0.62- 0.82 THz is presented and used in detecting and identifying person borne C-4 explosive concealed under a cotton garment. The system showed higher efficiencies in detecting and identifying the explosive.

  2. Evaluation of nursing manpower allocation in a nursing home.

    PubMed

    Chen, Chun-Hsi; Tsai, Wen-Chen; Chang, Wei-Chieh

    2007-03-01

    The subjects of this study encompassed the nursing staffs (nurses and nursing aids) and residents of a public hospital-based nursing home. By intensive sampling, this study explored the differences in actual times that nurses spent caring for residents. We assessed the functional status of nursing home residents of various illness severities as well as measured the actual nursing manpower needed to meet the residents' care needs using Typology of the Aged with Illustration (TAI). Results showed that current nursing manpower levels in nursing homes was adequate, although some units had excessive manpower allocation. As a result, this study suggests the establishment of a resident classification system for use in long-term care (LTC) facilities to assist with manpower allocation and reasonable utilization of resources within the facility. Adequate nurse staffing will enhance the quality and accessibility of care for the residents with severe illnesses in LTC facilities.

  3. Guilt, censure, and concealment of active smoking status among cancer patients and family members after diagnosis: a nationwide study.

    PubMed

    Shin, Dong Wook; Park, Jong Hyock; Kim, So Young; Park, Eal Whan; Yang, Hyung Kook; Ahn, Eunmi; Park, Seon Mee; Lee, Young Joon; Lim, Myong Cheol; Seo, Hong Gwan

    2014-05-01

    We aimed to identify the prevalence of feelings of guilt, censure, and concealment of smoking status among cancer patients and their family members who continued to smoke after the patient's diagnosis. Among 990 patient-family member dyads, 45 patients and 173 family members who continued to smoke for at least 1 month after the patients' diagnoses were administered questions examining feelings of guilt, censure, and smoking concealment. Most patients who continued to smoke reported experiencing feelings of guilt toward their families (75.6%) and censure from their family members (77.8%), and many concealed their smoking from their family members (44.4%) or healthcare professionals (46.7%). Family members who continued to smoke also reported feelings of guilt with respect to the patient (63.6%) and that the patient was critical of them (68.9%), and many concealed their smoking from the patient (28.5%) or healthcare professionals (9.3%). Patients' feeling of guilt was associated with concealment of smoking from family members (55.9% vs. 10.0%) or health care professionals (55.9% vs. 20.0%). Family members who reported feeling guilty (36.5% vs. 16.3%) or censured (34.5% vs. 16.7%) were more likely to conceal smoking from patients. Many patients and family members continue to smoke following cancer diagnosis, and the majority of them experience feelings of guilt and censure, which can lead to the concealment of smoking status from families or health care professionals. Feelings of guilt, censure, and concealment of smoking should be considered in the development and implementation of smoking cessation programs for cancer patients and family members. Copyright © 2013 John Wiley & Sons, Ltd.

  4. Identifying the location of a concealed object through unintentional eye movements

    PubMed Central

    Neuman, Yair; Assaf, Dan; Israeli, Navot

    2015-01-01

    In some investigative and interrogative contexts, the investigator is seeking to identify the location of an object (e.g., implanted bomb) which is known to a given subject (e.g., a terrorist). In this paper, we present a non-intrusive methodology for uncovering the loci of a concealed object by analyzing the subject's eye movements. Using a combination of eye tracking, psychological manipulation and a search algorithm, we have performed two experiments. In the first experiment, we have gained 58% hit rate in identifying the location of the concealed object and in the second experiment 56% hit rate. The pros and cons of the methodology for forensic investigation are discussed. PMID:25904879

  5. Hard x-ray focusing optics for concealed object detection

    NASA Astrophysics Data System (ADS)

    Jannson, Tomasz; Gertsenshteyn, Michael

    2006-05-01

    In this paper, we discuss hard x-ray optics, in general, and lobster-eye focusing optics, in particular, for concealed object detection, at longer distances. The longer distance (~50m) scenario is important for Improvised Explosives Detection (IED), "seeing through walls," "seeing objects under ground," and related applications.

  6. How Men Manage Bulbar Urethral Stricture by Concealing Urinary Symptoms.

    PubMed

    Whybrow, Paul; Rapley, Tim; Pickard, Robert; Hrisos, Susan

    2015-10-01

    In this article, we present findings from research conducted as part of a multi-center surgical trial. Bulbar urethral stricture, a narrowing of the middle urethra, is a common cause of urinary problems in men that can have a profound impact on their lives. Semi-structured interviews were conducted with a sample of 19 men seeking treatment for urethral stricture. The findings reveal how men tend to develop routines and tactics to adapt to their symptoms and hide them from others rather than seek help. We argue that this concealment becomes an inseparable part of how the disease is managed and is an additional hidden practical and emotional burden for these men. In addition, we suggest that the patients only sought curative treatments once practices of social concealment are no longer viable. © The Author(s) 2015.

  7. Passive millimeter-wave imaging for concealed article detection

    NASA Astrophysics Data System (ADS)

    Lovberg, John A.; Galliano, Joseph A., Jr.; Clark, Stuart E.

    1997-02-01

    Passive-millimeter-wave imaging (PMI) provides a powerful sensing tool for law enforcement, allowing an unobtrusive means for detecting concealed weapons, explosives, or contraband on persons or in baggage. Natural thermal emissions at millimeter wavelengths from bodies, guns, explosives, and other articles pass easily through clothing or other concealment materials, where they can be detected and converted into conventional 2-dimensional images. A new implementation of PMI has demonstrated a large-area, near- real-time staring capability for personnel inspection at standoff ranges of greater than 10 meters. In this form, PMI does not require operator cuing based on subjective 'profiles' of suspicious appearance or behaviors, which may otherwise be construed as violations of civil rights. To the contrary, PMI detects and images heat generated by any object with no predisposition as to its nature or function (e.g. race or gender of humans). As a totally passive imaging tool, it generates no radio-frequency or other radiation which might raise public health concerns. Specifics of the new PMI architecture are presented along with a host of imaging data representing the current state- of-the-art.

  8. Standoff concealed weapon detection using a 350-GHz radar imaging system

    NASA Astrophysics Data System (ADS)

    Sheen, David M.; Hall, Thomas E.; Severtsen, Ronald H.; McMakin, Douglas L.; Hatchell, Brian K.; Valdez, Patrick L. J.

    2010-04-01

    The sub-millimeter (sub-mm) wave frequency band from 300 - 1000 GHz is currently being developed for standoff concealed weapon detection imaging applications. This frequency band is of interest due to the unique combination of high resolution and clothing penetration. The Pacific Northwest National Laboratory (PNNL) is currently developing a 350 GHz, active, wideband, three-dimensional, radar imaging system to evaluate the feasibility of active sub-mm imaging for standoff detection. Standoff concealed weapon and explosive detection is a pressing national and international need for both civilian and military security, as it may allow screening at safer distances than portal screening techniques. PNNL has developed a prototype active wideband 350 GHz radar imaging system based on a wideband, heterodyne, frequency-multiplier-based transceiver system coupled to a quasi-optical focusing system and high-speed rotating conical scanner. This prototype system operates at ranges up to 10+ meters, and can acquire an image in 10 - 20 seconds, which is fast enough to scan cooperative personnel for concealed weapons. The wideband operation of this system provides accurate ranging information, and the images obtained are fully three-dimensional. During the past year, several improvements to the system have been designed and implemented, including increased imaging speed using improved balancing techniques, wider bandwidth, and improved image processing techniques. In this paper, the imaging system is described in detail and numerous imaging results are presented.

  9. Is anterior N2 enhancement a reliable electrophysiological index of concealed information?

    PubMed

    Ganis, Giorgio; Bridges, David; Hsu, Chun-Wei; Schendan, Haline E

    2016-12-01

    Concealed information tests (CITs) are used to determine whether an individual possesses information about an item of interest. Event-related potential (ERP) measures in CITs have focused almost exclusively on the P3b component, showing that this component is larger when lying about the item of interest (probe) than telling the truth about control items (irrelevants). Recent studies have begun to examine other ERP components, such as the anterior N2, with mixed results. A seminal CIT study found that visual probes elicit a larger anterior N2 than irrelevants (Gamer and Berti, 2010) and suggested that this component indexes cognitive control processes engaged when lying about probes. However, this study did not control for potential intrinsic differences among the stimuli: the same probe and irrelevants were used for all participants, and there was no control condition composed of uninformed participants. Here, first we show that the N2 effect found in the study by Gamer and Berti (2010) was in large part due to stimulus differences, as the effect observed in a concealed information condition was comparable to that found in two matched control conditions without any concealed information (Experiments 1 and 2). Next, we addressed the issue of the generality of the N2 findings by counterbalancing a new set of stimuli across participants and by using a control condition with uninformed participants (Experiment 3). Results show that the probe did not elicit a larger anterior N2 than the irrelevants under these controlled conditions. These findings suggest that caution should be taken in using the N2 as an index of concealed information in CITs. Furthermore, they are a reminder that results of CIT studies (not only with ERPs) performed without stimulus counterbalancing and suitable control conditions may be confounded by differential intrinsic properties of the stimuli employed. Copyright © 2016 Elsevier Inc. All rights reserved.

  10. Decision Makers Use Norms, Not Cost-Benefit Analysis, When Choosing to Conceal or Reveal Unfair Rewards

    PubMed Central

    Heimann, Marco; Girotto, Vittorio; Legrenzi, Paolo; Bonnefon, Jean-François

    2013-01-01

    We introduce the Conceal or Reveal Dilemma, in which individuals receive unfair benefits, and must decide whether to conceal or to reveal this unfair advantage. This dilemma has two important characteristics: it does not lend itself easily to cost-benefit analysis, neither to the application of any strong universal norm. As a consequence, it is ideally suited to the study of interindividual and intercultural variations in moral-economic norms. In this paper we focus on interindividual variations, and we report four studies showing that individuals cannot be swayed by financial incentives to conceal or to reveal, and follow instead fixed, idiosyncratic strategies. We discuss how this result can be extended to individual and cultural variations in the tendency to display or to hide unfair rewards. PMID:24066040

  11. Decision makers use norms, not cost-benefit analysis, when choosing to conceal or reveal unfair rewards.

    PubMed

    Heimann, Marco; Girotto, Vittorio; Legrenzi, Paolo; Bonnefon, Jean-François

    2013-01-01

    We introduce the Conceal or Reveal Dilemma, in which individuals receive unfair benefits, and must decide whether to conceal or to reveal this unfair advantage. This dilemma has two important characteristics: it does not lend itself easily to cost-benefit analysis, neither to the application of any strong universal norm. As a consequence, it is ideally suited to the study of interindividual and intercultural variations in moral-economic norms. In this paper we focus on interindividual variations, and we report four studies showing that individuals cannot be swayed by financial incentives to conceal or to reveal, and follow instead fixed, idiosyncratic strategies. We discuss how this result can be extended to individual and cultural variations in the tendency to display or to hide unfair rewards.

  12. Self-stigma among concealable minorities in Hong Kong: conceptualization and unified measurement.

    PubMed

    Mak, Winnie W S; Cheung, Rebecca Y M

    2010-04-01

    Self-stigma refers to the internalized stigma that individuals may have toward themselves as a result of their minority status. Not only can self-stigma dampen the mental health of individuals, it can deter them from seeking professional help lest disclosing their minority status lead to being shunned by service providers. No unified instrument has been developed to measure consistently self-stigma that could be applied to different concealable minority groups. The present study presented findings based on 4 studies on the development and validation of the Self-Stigma Scale, conducted in Hong Kong with community samples of mental health consumers, recent immigrants from Mainland China, and sexual minorities. Upon a series of validation procedures, a 9-item Self-Stigma Scale-Short Form was developed. Initial support on its reliability and construct validity (convergent and criterion validities) were found among 3 stigmatized groups. Utility of this unified measure was to establish an empirical basis upon which self-stigma of different concealable minority groups could be assessed under the same dimensions. Health-care professionals could make use of this short scale to assess potential self-stigmatization among concealable minorities, which may hamper their treatment process as well as their overall well-being.

  13. Decentralization and equity of resource allocation: evidence from Colombia and Chile.

    PubMed Central

    Bossert, Thomas J.; Larrañaga, Osvaldo; Giedion, Ursula; Arbelaez, José Jesus; Bowser, Diana M.

    2003-01-01

    OBJECTIVE: To investigate the relation between decentralization and equity of resource allocation in Colombia and Chile. METHODS: The "decision space" approach and analysis of expenditures and utilization rates were used to provide a comparative analysis of decentralization of the health systems of Colombia and Chile. FINDINGS: Evidence from Colombia and Chile suggests that decentralization, under certain conditions and with some specific policy mechanisms, can improve equity of resource allocation. In these countries, equitable levels of per capita financial allocations at the municipal level were achieved through different forms of decentralization--the use of allocation formulae, adequate local funding choices and horizontal equity funds. Findings on equity of utilization of services were less consistent, but they did show that increased levels of funding were associated with increased utilization. This suggests that improved equity of funding over time might reduce inequities of service utilization. CONCLUSION: Decentralization can contribute to, or at least maintain, equitable allocation of health resources among municipalities of different incomes. PMID:12751417

  14. [Cardioversion for paroxysmal supraventricular tachycardia during lung surgery in a patient with concealed Wolff-Parkinson-White syndrome].

    PubMed

    Sato, Yoshiharu; Nagata, Hirofumi; Inoda, Ayako; Miura, Hiroko; Watanabe, Yoko; Suzuki, Kenji

    2014-10-01

    We report a case of paroxysmal supraventricular tachycardia (PSVT) that occurred during video-assisted thoracoscopic (VATS) lobectomy in a patient with concealed Wolff-Parkinson-White (WPW) syndrome. A 59-year-old man with lung cancer was scheduled for VATS lobectomy under general anesthesia. After inserting a thoracic epidural catheter, general anesthesia was induced with intravenous administration of propofol. Anesthesia was maintained with inhalation of desfurane in an air/oxygen mixture and intravenous infusion of remifentanil. Recurrent PSVT occurred three times, and the last episode of PSVT continued for 50 minutes regardless of administration of antiarrhythmic drugs. Synchronized electric shock via adhesive electrode pads on the patient's chest successfully converted PSVT back to normal sinus rhythm. The remaining course and postoperative period were uneventful. An electrophysiological study performed after hospital discharge detected concealed WPW syndrome, which had contributed to the development of atrioventricular reciprocating tachycardia. Concealed WPW syndrome is a rare, but critical complication that could possibly cause lethal atrial tachyarrhythmias during the perioperative period. In the present case, cardioversion using adhesive electrode pads briefly terminated PSVT in a patient with concealed WPW syndrome.

  15. Detecting persons concealed in a vehicle

    DOEpatents

    Tucker, Jr., Raymond W.

    2005-03-29

    An improved method for detecting the presence of humans or animals concealed within in a vehicle uses a combination of the continuous wavelet transform and a ratio-based energy calculation to determine whether the motion detected using seismic sensors placed on the vehicle is due to the presence of a heartbeat within the vehicle or is the result of motion caused by external factors such as the wind. The method performs well in the presence of light to moderate ambient wind levels, producing far fewer false alarm indications. The new method significantly improves the range of ambient environmental conditions under which human presence detection systems can reliably operate.

  16. Geochemical Data for Samples Collected in 2008 Near the Concealed Pebble Porphyry Cu-Au-Mo Deposit, Southwest Alaska

    USGS Publications Warehouse

    Fey, David L.; Granitto, Matthew; Giles, Stuart A.; Smith, Steven M.; Eppinger, Robert G.; Kelley, Karen D.

    2009-01-01

    In the summer of 2007, the U.S. Geological Survey (USGS) began an exploration geochemical research study over the Pebble porphyry copper-gold-molybdenum deposit. This report presents the analytical data collected in 2008. The Pebble deposit is world class in size, and is almost entirely concealed by tundra, glacial deposits, and post-Cretaceous volcanic rocks. The Pebble deposit was chosen for this study because it is concealed by surficial cover rocks, is relatively undisturbed (except for exploration company drill holes), is a large mineral system, and is fairly well-constrained at depth by the drill hole geology and geochemistry. The goals of this study are to 1) determine whether the concealed deposit can be detected with surface samples, 2) better understand the processes of metal migration from the deposit to the surface, and 3) test and develop methods for assessing mineral resources in similar concealed terrains. The analytical data are presented as an integrated Microsoft Access 2003 database and as separate Excel files.

  17. 27 CFR 447.62 - False statements or concealment of facts.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2011-04-01 2010-04-01 true False statements or concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION IMPORTATION OF ARMS, AMMUNITION AND...

  18. 27 CFR 447.62 - False statements or concealment of facts.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false False statements or concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION IMPORTATION OF ARMS, AMMUNITION AND...

  19. 27 CFR 447.62 - False statements or concealment of facts.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2012-04-01 2010-04-01 true False statements or concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION IMPORTATION OF ARMS, AMMUNITION AND...

  20. 27 CFR 447.62 - False statements or concealment of facts.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2013-04-01 2013-04-01 false False statements or concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION IMPORTATION OF ARMS, AMMUNITION AND...

  1. 27 CFR 447.62 - False statements or concealment of facts.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 3 2014-04-01 2014-04-01 false False statements or concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION IMPORTATION OF ARMS, AMMUNITION AND...

  2. An interfering Go/No-go task does not affect accuracy in a Concealed Information Test.

    PubMed

    Ambach, Wolfgang; Stark, Rudolf; Peper, Martin; Vaitl, Dieter

    2008-04-01

    Following the idea that response inhibition processes play a central role in concealing information, the present study investigated the influence of a Go/No-go task as an interfering mental activity, performed parallel to the Concealed Information Test (CIT), on the detectability of concealed information. 40 undergraduate students participated in a mock-crime experiment and simultaneously performed a CIT and a Go/No-go task. Electrodermal activity (EDA), respiration line length (RLL), heart rate (HR) and finger pulse waveform length (FPWL) were registered. Reaction times were recorded as behavioral measures in the Go/No-go task as well as in the CIT. As a within-subject control condition, the CIT was also applied without an additional task. The parallel task did not influence the mean differences of the physiological measures of the mock-crime-related probe and the irrelevant items. This finding might possibly be due to the fact that the applied parallel task induced a tonic rather than a phasic mental activity, which did not influence differential responding to CIT items. No physiological evidence for an interaction between the parallel task and sub-processes of deception (e.g. inhibition) was found. Subjects' performance in the Go/No-go parallel task did not contribute to the detection of concealed information. Generalizability needs further investigations of different variations of the parallel task.

  3. [Management of moderate to severe pediatric concealed penis in children by Devine's technique via incision between the penis and scrotum].

    PubMed

    Zhang, Xin-Sheng; Liu, Shi-Xiong; Xiang, Xue-Yan; Zhang, Wen-Gang; Tang, Da-Xing

    2014-04-01

    To search for a simple and effective surgical approach to the management of moderate to severe pediatric concealed penis in children. We used Devine's technique via incision between the penis and scrotum in the treatment of 68 cases of moderate to severe pediatric concealed penis. The patients were aged 3 -13 (mean 6.5) years, 30 with moderate and 38 with severe pediatric concealed penis. This strategy achieved good near- and long-term effects and satisfactory appearance of the penis, which was similar to that of circumcision. At 3 months after surgery, the penile length was 3 - 5.2 cm, averaging (2.35 +/- 0.35) cm. Devine's technique via incision between the penis and scrotum is a simple and effective surgical option for moderate to severe pediatric concealed penis in children.

  4. Do Children Understand That People Selectively Conceal or Express Emotion?

    ERIC Educational Resources Information Center

    Hayashi, Hajimu; Shiomi, Yuki

    2015-01-01

    This study examined whether children understand that people selectively conceal or express emotion depending upon the context. We prepared two contexts for a verbal display task for 70 first-graders, 80 third-graders, 64 fifth-graders, and 71 adults. In both contexts, protagonists had negative feelings because of the behavior of the other…

  5. The Cost of Question Concealment: Eye-Tracking and MEG Evidence

    ERIC Educational Resources Information Center

    Harris, Jesse; Pylkkanen, Liina; McElree, Brian; Frisson, Steven

    2008-01-01

    Although natural language appears to be largely compositional, the meanings of certain expressions cannot be straightforwardly recovered from the meanings of their parts. This study examined the online processing of one such class of expressions: "concealed questions", in which the meaning of a complex noun phrase ("the proof of the theorem")…

  6. The Effects of Concealing Academic Achievement Information on Adolescents' Self-Concept

    ERIC Educational Resources Information Center

    Zhang, Baoshan; Wang, Mo; Li, Juan; Yu, Guoliang; Bi, Yan-Ling

    2011-01-01

    Using an experimental design, the effect of concealing academic achievement information on adolescents' self-concept was examined in the current study. Specifically, adolescents with low academic achievement and adolescents with average to high academic achievement (N = 129) were randomly assigned to different interview contexts wherein…

  7. Sensitivity and specificity of CT scanning for determining the number of internally concealed packages in 'body-packers'.

    PubMed

    Asha, Stephen Edward; Higham, Matthew; Child, Peter

    2015-05-01

    If package counts on abdominal CTs of body-packers were known to be accurate, follow-up CTs could be avoided. The objective was to determine the accuracy of CT for the number of concealed packages in body-packers, and the reliability of package counts reported by body-packers who admit to concealing drugs. Suspected body-packers were identified from the emergency departments (ED) database. The medical record and radiology reports were reviewed for package counts determined by CT, patient-reported and physically retrieved. The last method was used as the reference standard. Sensitivity, specificity, positive predictive values (PPV) and negative predictive values (NPV) were calculated for CT package count accuracy. Reliability of patient-reported package counts was assessed using Pearson's correlation coefficient. There were 50 confirmed body-packers on whom 104 CT scans were performed. Data for the index and reference tests were available for 84 scans. The sensitivity, specificity, PPV and NPV for CT package count were 63% (95% CI 46% to 77%), 82% (95% CI 67% to 92%), 76% (95% CI 58% to 89%) and 71% (95% CI 56% to 83%) respectively. For CTs with a package count<15, the sensitivity, specificity, PPV and NPV for CT package count were 96% (95% CI 80% to 99%), 95% (95% CI 82% to 99%), 93% (95% CI 76% to 99%) and 97% (95% CI 86% to 100%), respectively. Correlation between patient-reported package counts and the number of packages retrieved was high (r=0.90, p<0.001, R2=81%). The accuracy of CT for determining the number of concealed packages is poor, although when applied to patients with few concealed packages accuracy is high and is useful as a rule-out test. Among patients who have admitted to drug concealment, the number of packages reported to be concealed is reliable. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  8. Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects' Information

    PubMed Central

    Ho, Peng Foong; Kam, Yvonne Hwei-Syn; Wee, Mee Chin

    2014-01-01

    Traditionally, picture-based password systems employ password objects (pictures/icons/symbols) as input during an authentication session, thus making them vulnerable to “shoulder-surfing” attack because the visual interface by function is easily observed by others. Recent software-based approaches attempt to minimize this threat by requiring users to enter their passwords indirectly by performing certain mental tasks to derive the indirect password, thus concealing the user's actual password. However, weaknesses in the positioning of distracter and password objects introduce usability and security issues. In this paper, a new method, which conceals information about the password objects as much as possible, is proposed. Besides concealing the password objects and the number of password objects, the proposed method allows both password and distracter objects to be used as the challenge set's input. The correctly entered password appears to be random and can only be derived with the knowledge of the full set of password objects. Therefore, it would be difficult for a shoulder-surfing adversary to identify the user's actual password. Simulation results indicate that the correct input object and its location are random for each challenge set, thus preventing frequency of occurrence analysis attack. User study results show that the proposed method is able to prevent shoulder-surfing attack. PMID:24991649

  9. Portable concealed weapon detection using millimeter-wave FMCW radar imaging

    NASA Astrophysics Data System (ADS)

    Johnson, Michael A.; Chang, Yu-Wen

    2001-02-01

    Unobtrusive detection of concealed weapons on persons or in abandoned bags would provide law enforcement a powerful tool to focus resources and increase traffic throughput in high- risk situations. We have developed a fast image scanning 94 GHz radar system that is suitable for portable operation and remote viewing of radar data. This system includes a novel fast image-scanning antenna that allows for the acquisition of medium resolution 3D millimeter wave images of stationary targets with frame times on order of one second. The 3D radar data allows for potential isolation of concealed weapons from body and environmental clutter such as nearby furniture or other people. The radar is an active system so image quality is not affected indoors, emitted power is however very low so there are no health concerns for operator or targets. The low power operation is still sufficient to penetrate heavy clothing or material. Small system size allows for easy transport and rapid deployment of the system as well as an easy migration path to future hand held systems.

  10. Injury reporting rates and injury concealment patterns differ between high-school cirque performers and basketball players.

    PubMed

    Long, Ashley S; Ambegaonkar, Jatin P; Fahringer, Patty M

    2011-12-01

    The performing arts style of cirque has grown in popularity, with high-school participants increasingly practicing this style. Still, little research has examined the injury reporting rates and patterns in this population. Our study aimed to compare injury reporting rates and injury concealment patterns between high-school cirque performers and a peer-group of basketball players. Fifty participants (30 cirque, 20 basketball) completed a 12-item injury history and concealment instrument with chi-squared analyses and Fisher's exact tests comparing groups (p = 0.05). While no group differences (p = 0.36) existed in injuries reported, basketball players were more likely (p = 0.01) to miss participation due to injury than cirque performers. No significant difference existed between participants regarding which healthcare provider they reported to first (p = 0.27), but basketball players reported their injuries to the athletic trainer at higher rates (50%) than cirque performers (20%). A nonsignificant trend (p = 0.08) was noted in promptness to report injury, with more cirque performers (13%) concealing their injuries than basketball players (5%). Several reasons were noted for concealment of injury, with the most common being the belief that the injury would "go away" on its own. Knee injuries were most common in basketball players (23.7%) and back and knee injuries (10.5% each) in cirque performers. Despite similar injury rates, cirque participants concealed injuries more than peer-basketball players. Reasons may include losing performance roles, unfamiliarity and low trust with healthcare providers, ignorance about initially minor-looking injuries, and higher pain tolerance thresholds. Education and communication are essential to allow performing artists to seek healthcare support. Research is needed to appropriately understand and meet the needs of this underserved performing artist population.

  11. Parasitism rate, parasitoid community composition and host specificity on exposed and semi-concealed caterpillars from a tropical rainforest.

    PubMed

    Hrcek, Jan; Miller, Scott E; Whitfield, James B; Shima, Hiroshi; Novotny, Vojtech

    2013-10-01

    The processes maintaining the enormous diversity of herbivore-parasitoid food webs depend on parasitism rate and parasitoid host specificity. The two parameters have to be evaluated in concert to make conclusions about the importance of parasitoids as natural enemies and guide biological control. We document parasitism rate and host specificity in a highly diverse caterpillar-parasitoid food web encompassing 266 species of lepidopteran hosts and 172 species of hymenopteran or dipteran parasitoids from a lowland tropical forest in Papua New Guinea. We found that semi-concealed hosts (leaf rollers and leaf tiers) represented 84% of all caterpillars, suffered a higher parasitism rate than exposed caterpillars (12 vs. 5%) and their parasitoids were also more host specific. Semi-concealed hosts may therefore be generally more amenable to biological control by parasitoids than exposed ones. Parasitoid host specificity was highest in Braconidae, lower in Diptera: Tachinidae, and, unexpectedly, the lowest in Ichneumonidae. This result challenges the long-standing view of low host specificity in caterpillar-attacking Tachinidae and suggests higher suitability of Braconidae and lower suitability of Ichneumonidae for biological control of caterpillars. Semi-concealed hosts and their parasitoids are the largest, yet understudied component of caterpillar-parasitoid food webs. However, they still remain much closer in parasitism patterns to exposed hosts than to what literature reports on fully concealed leaf miners. Specifically, semi-concealed hosts keep an equally low share of idiobionts (2%) as exposed caterpillars.

  12. Out and healthy: Being more "out" about a concealable stigmatized identity may boost the health benefits of social support.

    PubMed

    Weisz, Bradley M; Quinn, Diane M; Williams, Michelle K

    2016-12-01

    This research examined whether the relationship between perceived social support and health would be moderated by level of outness for people living with different concealable stigmatized identities (mental illness, substance abuse, domestic violence, rape, or childhood abuse). A total of 394 people living with a concealable stigmatized identity completed a survey. Consistent with hypotheses, at high levels of outness, social support predicted better health; at low levels of outness, social support was less predictive of health. People concealing a stigmatized identity may only be able to reap the health benefits of social support if they are "out" about the stigmatized identity. © The Author(s) 2015.

  13. The need for randomization in animal trials: an overview of systematic reviews.

    PubMed

    Hirst, Jennifer A; Howick, Jeremy; Aronson, Jeffrey K; Roberts, Nia; Perera, Rafael; Koshiaris, Constantinos; Heneghan, Carl

    2014-01-01

    Randomization, allocation concealment, and blind outcome assessment have been shown to reduce bias in human studies. Authors from the Collaborative Approach to Meta Analysis and Review of Animal Data from Experimental Studies (CAMARADES) collaboration recently found that these features protect against bias in animal stroke studies. We extended the scope the work from CAMARADES to include investigations of treatments for any condition. We conducted an overview of systematic reviews. We searched Medline and Embase for systematic reviews of animal studies testing any intervention (against any control) and we included any disease area and outcome. We included reviews comparing randomized versus not randomized (but otherwise controlled), concealed versus unconcealed treatment allocation, or blinded versus unblinded outcome assessment. Thirty-one systematic reviews met our inclusion criteria: 20 investigated treatments for experimental stroke, 4 reviews investigated treatments for spinal cord diseases, while 1 review each investigated treatments for bone cancer, intracerebral hemorrhage, glioma, multiple sclerosis, Parkinson's disease, and treatments used in emergency medicine. In our sample 29% of studies reported randomization, 15% of studies reported allocation concealment, and 35% of studies reported blinded outcome assessment. We pooled the results in a meta-analysis, and in our primary analysis found that failure to randomize significantly increased effect sizes, whereas allocation concealment and blinding did not. In our secondary analyses we found that randomization, allocation concealment, and blinding reduced effect sizes, especially where outcomes were subjective. Our study demonstrates the need for randomization, allocation concealment, and blind outcome assessment in animal research across a wide range of outcomes and disease areas. Since human studies are often justified based on results from animal studies, our results suggest that unduly biased animal

  14. Mobile TNA system to detect explosives and drugs concealed in cars and trucks

    NASA Astrophysics Data System (ADS)

    Bendahan, Joseph; Gozani, Tsahi

    1998-12-01

    The drug problem in the U.S. is serious and efforts to fight it are constrained by the lack of adequate means to curb the inflow of smuggled narcotics into the country through cargo containers. Also, events such as the disastrous explosion in Oklahoma City, the IRA bombing in London, and the bombing of the U.S. military residence in Dharan make the development of new tools for the detection of explosives and drugs in vehicles imperative. Thermal neutron analysis (TNA) technology, developed for the detection of explosives in suitcases, and detection of landmines and unexploded ordnance is presently being applied to the nonintrusive detection of significant amounts of explosives and drugs concealed in cars, trucks and large cargo containers. TNA technology is based on the analysis of characteristic gamma rays emitted following thermal neutron capture. A TNA system can be used in a variety of operational scenarios, such as inspection before an unloaded cargo container from a spit is moved to temporary storage, inspection of trucks unloaded from a ferry, or inspection of vehicles parked close to Federal building or military bases. This paper will discuss the detection process and operational scenarios, and will present results from recent simulations and measurements.

  15. Color image fusion for concealed weapon detection

    NASA Astrophysics Data System (ADS)

    Toet, Alexander

    2003-09-01

    Recent advances in passive and active imaging sensor technology offer the potential to detect weapons that are concealed underneath a person's clothing or carried along in bags. Although the concealed weapons can sometimes easily be detected, it can be difficult to perceive their context, due to the non-literal nature of these images. Especially for dynamic crowd surveillance purposes it may be impossible to rapidly asses with certainty which individual in the crowd is the one carrying the observed weapon. Sensor fusion is an enabling technology that may be used to solve this problem. Through fusion the signal of the sensor that depicts the weapon can be displayed in the context provided by a sensor of a different modality. We propose an image fusion scheme in which non-literal imagery can be fused with standard color images such that the result clearly displays the observed weapons in the context of the original color image. The procedure is such that the relevant contrast details from the non-literal image are transferred to the color image without altering the original color distribution of this image. The result is a natural looking color image that fluently combines all details from both input sources. When an observer who performs a dynamic crowd surveillance task, detects a weapon in the scene, he will also be able to quickly determine which person in the crowd is actually carrying the observed weapon (e.g. "the man with the red T-shirt and blue jeans"). The method is illustrated by the fusion of thermal 8-12 μm imagery with standard RGB color images.

  16. The Invisible Work of Closeting: A Qualitative Study About Strategies Used by Lesbian and Gay Persons to Conceal Their Sexual Orientation.

    PubMed

    Malterud, Kirsti; Bjorkman, Mari

    2016-10-01

    The last decades have offered substantial improvement regarding human rights for lesbian and gay (LG) persons. Yet LG persons are often in the closet, concealing their sexual orientation. We present a qualitative study based on 182 histories submitted from 161 LG individuals to a Web site. The aim was to explore experiences of closeting among LG persons in Norway. A broad range of strategies was used for closeting, even among individuals who generally considered themselves to be out of the closet. Concealment was enacted by blunt denial, clever avoidance, or subtle vagueness. Other strategies included changing or eliminating the pronoun or name of the partner in ongoing conversations. Context-dependent concealment, differentiating between persons, situations, or arenas, was repeatedly applied for security or convenience. We propose a shift from "being in the closet" to "situated concealment of sexual orientation."

  17. Concealed neuroanatomy in Michelangelo's Separation of Light From Darkness in the Sistine Chapel.

    PubMed

    Suk, Ian; Tamargo, Rafael J

    2010-05-01

    Michelangelo Buonarroti (1475-1564) was a master anatomist as well as an artistic genius. He dissected cadavers numerous times and developed a profound understanding of human anatomy. From 1508 to 1512, Michelangelo painted the ceiling of the Sistine Chapel in Rome. His Sistine Chapel frescoes are considered one of the monumental achievements of Renaissance art. In the winter of 1511, Michelangelo entered the final stages of the Sistine Chapel project and painted 4 frescoes along the longitudinal apex of the vault, which completed a series of 9 central panels depicting scenes from the Book of Genesis. It is reported that Michelangelo concealed an image of the brain in the first of these last 4 panels, namely, the Creation of Adam. Here we present evidence that he concealed another neuronanatomic structure in the final panel of this series, the Separation of Light From Darkness, specifically a ventral view of the brainstem. The Separation of Light From Darkness is an important panel in the Sistine Chapel iconography because it depicts the beginning of Creation and is located directly above the altar. We propose that Michelangelo, a deeply religious man and an accomplished anatomist, intended to enhance the meaning of this iconographically critical panel and possibly document his anatomic accomplishments by concealing this sophisticated neuroanatomic rendering within the image of God.

  18. JPEG2000-coded image error concealment exploiting convex sets projections.

    PubMed

    Atzori, Luigi; Ginesu, Giaime; Raccis, Alessio

    2005-04-01

    Transmission errors in JPEG2000 can be grouped into three main classes, depending on the affected area: LL, high frequencies at the lower decomposition levels, and high frequencies at the higher decomposition levels. The first type of errors are the most annoying but can be concealed exploiting the signal spatial correlation like in a number of techniques proposed in the past; the second are less annoying but more difficult to address; the latter are often imperceptible. In this paper, we address the problem of concealing the second class or errors when high bit-planes are damaged by proposing a new approach based on the theory of projections onto convex sets. Accordingly, the error effects are masked by iteratively applying two procedures: low-pass (LP) filtering in the spatial domain and restoration of the uncorrupted wavelet coefficients in the transform domain. It has been observed that a uniform LP filtering brought to some undesired side effects that negatively compensated the advantages. This problem has been overcome by applying an adaptive solution, which exploits an edge map to choose the optimal filter mask size. Simulation results demonstrated the efficiency of the proposed approach.

  19. Induction detection of concealed bulk banknotes

    NASA Astrophysics Data System (ADS)

    Fuller, Christopher; Chen, Antao

    2011-10-01

    Bulk cash smuggling is a serious issue that has grown in volume in recent years. By building on the magnetic characteristics of paper currency, induction sensing is found to be capable of quickly detecting large masses of banknotes. The results show that this method is effective in detecting bulk cash through concealing materials such as plastics, cardboards, fabrics and aluminum foil. The significant difference in the observed phase between the received signals caused by conducting materials and ferrite compounds, found in banknotes, provides a good indication that this process can overcome the interference by metal objects in a real sensing application. This identification strategy has the potential to not only detect the presence of banknotes, but also the number, while still eliminating false positives caused by metal objects.

  20. Factors influencing resource allocation decisions and equity in the health system of Ghana.

    PubMed

    Asante, A D; Zwi, A B

    2009-05-01

    Allocation of financial resources in the health sector is often seen as a formula-driven activity. However, the decision to allocate a certain amount of resources to a particular health jurisdiction or facility may be based on a broader range of factors, sometimes not reflected in the existing resource allocation formula. This study explores the 'other' factors that influence the equity of resource allocation in the health system of Ghana. The extent to which these factors are, or can be, accounted for in the resource allocation process is analysed. An exploratory design focusing on different levels of the health system and diverse stakeholders. Data were gathered through semi-structured qualitative interviews with health authorities at national, regional and district levels, and with donor representatives and local government officials in 2003 and 2004. The availability of human resources for health, local capacity to utilize funds, donor involvement in the health sector, and commitment to promote equity have considerable influence on resource allocation decisions and affect the equity of funding allocations. However, these factors are not accounted for adequately in the resource allocation process. This study highlights the need for a more transparent resource allocation system in Ghana based on needs, and takes into account key issues such as capacity constraints, the inequitable human resource distribution and donor-earmarked funding.

  1. Concealed semantic and episodic autobiographical memory electrified.

    PubMed

    Ganis, Giorgio; Schendan, Haline E

    2012-01-01

    Electrophysiology-based concealed information tests (CIT) try to determine whether somebody possesses concealed information about a crime-related item (probe) by comparing event-related potentials (ERPs) between this item and comparison items (irrelevants). Although the broader field is sometimes referred to as "memory detection," little attention has been paid to the precise type of underlying memory involved. This study begins addressing this issue by examining the key distinction between semantic and episodic memory in the autobiographical domain within a CIT paradigm. This study also addresses the issue of whether multiple repetitions of the items over the course of the session habituate the brain responses. Participants were tested in a 3-stimulus CIT with semantic autobiographical probes (their own date of birth) and episodic autobiographical probes (a secret date learned just before the study). Results dissociated these two memory conditions on several ERP components. Semantic probes elicited a smaller frontal N2 than episodic probes, consistent with the idea that the frontal N2 decreases with greater pre-existing knowledge about the item. Likewise, semantic probes elicited a smaller central N400 than episodic probes. Semantic probes also elicited a larger P3b than episodic probes because of their richer meaning. In contrast, episodic probes elicited a larger late positive complex (LPC) than semantic probes, because of the recent episodic memory associated with them. All these ERPs showed a difference between probes and irrelevants in both memory conditions, except for the N400, which showed a difference only in the semantic condition. Finally, although repetition affected the ERPs, it did not reduce the difference between probes and irrelevants. These findings show that the type of memory associated with a probe has both theoretical and practical importance for CIT research.

  2. Concealed semantic and episodic autobiographical memory electrified

    PubMed Central

    Ganis, Giorgio; Schendan, Haline E.

    2013-01-01

    Electrophysiology-based concealed information tests (CIT) try to determine whether somebody possesses concealed information about a crime-related item (probe) by comparing event-related potentials (ERPs) between this item and comparison items (irrelevants). Although the broader field is sometimes referred to as “memory detection,” little attention has been paid to the precise type of underlying memory involved. This study begins addressing this issue by examining the key distinction between semantic and episodic memory in the autobiographical domain within a CIT paradigm. This study also addresses the issue of whether multiple repetitions of the items over the course of the session habituate the brain responses. Participants were tested in a 3-stimulus CIT with semantic autobiographical probes (their own date of birth) and episodic autobiographical probes (a secret date learned just before the study). Results dissociated these two memory conditions on several ERP components. Semantic probes elicited a smaller frontal N2 than episodic probes, consistent with the idea that the frontal N2 decreases with greater pre-existing knowledge about the item. Likewise, semantic probes elicited a smaller central N400 than episodic probes. Semantic probes also elicited a larger P3b than episodic probes because of their richer meaning. In contrast, episodic probes elicited a larger late positive complex (LPC) than semantic probes, because of the recent episodic memory associated with them. All these ERPs showed a difference between probes and irrelevants in both memory conditions, except for the N400, which showed a difference only in the semantic condition. Finally, although repetition affected the ERPs, it did not reduce the difference between probes and irrelevants. These findings show that the type of memory associated with a probe has both theoretical and practical importance for CIT research. PMID:23355816

  3. Power allocation and range performance considerations for a dual-frequency EBPSK/MPPSK system

    NASA Astrophysics Data System (ADS)

    Yao, Yu; Wu, Lenan; Zhao, Junhui

    2017-12-01

    Extended binary phase shift keying/M-ary position phase shift keying (EBPSK/MPPSK)-MODEM provides radar and communication functions on a single hardware platform with a single waveform. However, its range estimation accuracy is worse than continuous-wave (CW) radar because of the imbalance of power in two carrier frequencies. In this article, the power allocation method for dual-frequency EBPSK/MPPSK modulated systems is presented. The power of two signal transmitters is adequately allocated to ensure that the power in two carrier frequencies is equal. The power allocation ratios for two types of modulation systems are obtained. Moreover, considerations regarding the range of operation of the dual-frequency system are analysed. In addition to theoretical considerations, computer simulations are provided to illustrate the performance.

  4. Minority Stress and Same-Sex Relationship Satisfaction: The Role of Concealment Motivation.

    PubMed

    Pepping, Christopher A; Cronin, Timothy J; Halford, W Kim; Lyons, Anthony

    2018-04-30

    Most lesbian, gay, and bisexual (LGB) people want a stable, satisfying romantic relationship. Although many of the predictors of relationship outcomes are similar to those of heterosexual couples, same-sex couples face some additional challenges associated with minority stress that also impact upon relationship quality. Here, we investigate the association between minority stressors and relationship quality in a sample of 363 adults (M age = 30.37, SD = 10.78) currently in a same-sex romantic relationship. Internalized homophobia and difficulties accepting one's LGB identity were each negatively associated with relationship satisfaction via heightened concealment motivation. We also examined the protective role of identity affirmation on relationship quality, finding a direct positive relationship between the two variables. Minority stressors were negatively associated with couple relationship satisfaction via heightened concealment motivation. The finding that identity affirmation directly predicted increased couple satisfaction also highlights the important role of protective factors in same-sex couple relationships. © 2018 Family Process Institute.

  5. Concealed Accessory Pathways with a Single Ventricular and Two Discrete Atrial Insertion Sites.

    PubMed

    Kipp, Ryan T; Abu Sham'a, Raed; Hiroyuki, Ito; Han, Frederick T; Refaat, Marwan; Hsu, Jonathan C; Field, Michael E; Kopp, Douglas E; Marcus, Gregory M; Scheinman, Melvin M; Hoffmayer, Kurt S

    2017-03-01

    Atrioventricular reciprocating tachycardia (AVRT) utilizing a concealed accessory pathway is common. It is well appreciated that some patients may have multiple accessory pathways with separate atrial and ventricular insertion sites. We present three cases of AVRT utilizing concealed pathways with evidence that each utilizing a single ventricular insertion and two discrete atrial insertion sites. In case one, two discrete atrial insertion sites were mapped in two separate procedures, and only during the second ablation was the Kent potential identified. Ablation of the Kent potential at this site remote from the two atrial insertion sites resulted in the termination of the retrograde conduction in both pathways. Case two presented with supraventricular tachycardia (SVT) with alternating eccentric atrial activation patterns without alteration in the tachycardia cycle length. The two distinct atrial insertion sites during orthodromic AVRT and ventricular pacing were targeted and each of the two atrial insertion sites were successfully mapped and ablated. In case three, retrograde decremental conduction utilizing both atrial insertion sites was identified prior to ablation. After mapping and ablation of the first discrete atrial insertion site, tachycardia persisted utilizing the second atrial insertion site. Only after ablation of the second atrial insertion site was SVT noninducible, and VA conduction was no longer present. Concealed retrograde accessory pathways with discrete atrial insertion sites may have a common ventricular insertion site. Identification and ablation of the ventricular insertion site or the separate discrete atrial insertion sites result in successful treatment. © 2017 Wiley Periodicals, Inc.

  6. The Psychological Implications of Concealing a Stigma: A Cognitive-Affective-Behavioral Model

    ERIC Educational Resources Information Center

    Pachankis, John E.

    2007-01-01

    Many assume that individuals with a hidden stigma escape the difficulties faced by individuals with a visible stigma. However, recent research has shown that individuals with a concealable stigma also face considerable stressors and psychological challenges. The ambiguity of social situations combined with the threat of potential discovery makes…

  7. Worldwide trends in volume and quality of published protocols of randomized controlled trials

    PubMed Central

    Alldinger, Ingo; Cieslak, Kasia P.; Wennink, Roos; Clarke, Mike; Ali, Usama Ahmed; Besselink, Marc G. H.

    2017-01-01

    Introduction Publishing protocols of randomized controlled trials (RCT) facilitates a more detailed description of study rational, design, and related ethical and safety issues, which should promote transparency. Little is known about how the practice of publishing protocols developed over time. Therefore, this study describes the worldwide trends in volume and methodological quality of published RCT protocols. Methods A systematic search was performed in PubMed and EMBASE, identifying RCT protocols published over a decade from 1 September 2001. Data were extracted on quality characteristics of RCT protocols. The primary outcome, methodological quality, was assessed by individual methodological characteristics (adequate generation of allocation, concealment of allocation and intention-to-treat analysis). A comparison was made by publication period (First, September 2001- December 2004; Second, January 2005-May 2008; Third, June 2008-September 2011), geographical region and medical specialty. Results The number of published RCT protocols increased from 69 in the first, to 390 in the third period (p<0.0001). Internal medicine and paediatrics were the most common specialty topics. Whereas most published RCT protocols in the first period originated from North America (n = 30, 44%), in the second and third period this was Europe (respectively, n = 65, 47% and n = 190, 48%, p = 0.02). Quality of RCT protocols was higher in Europe and Australasia, compared to North America (OR = 0.63, CI = 0.40–0.99, p = 0.04). Adequate generation of allocation improved with time (44%, 58%, 67%, p = 0.001), as did concealment of allocation (38%, 53%, 55%, p = 0.03). Surgical protocols had the highest quality among the three specialty topics used in this study (OR = 1.94, CI = 1.09–3.45, p = 0.02). Conclusion Publishing RCT protocols has become popular, with a five-fold increase in the past decade. The quality of published RCT protocols also improved, although variation between

  8. [Ladder step strategy for surgical repair of congenital concealed penis in children].

    PubMed

    Wang, Fu-Ran; Zhong, Hong-Ji; Chen, Yi; Zhao, Jun-Feng; Li, Yan

    2016-11-01

    To assess the feasibility of the ladder step strategy in surgical repair of congenital concealed penis in children. This study included 52 children with congenital concealed penis treated in the past two years by surgical repair using the ladder step strategy, which consists of five main steps: cutting the narrow ring of the foreskin, degloving the penile skin, fixing the penile skin at the base, covering the penile shaft, and reshaping the prepuce. The perioperative data of the patients were prospectively collected and statistically described. Of the 52 patients, 20 needed remodeling of the frenulum and 27 received longitudinal incision in the penoscrotal junction to expose and deglove the penile shaft. The advanced scrotal flap technique was applied in 8 children to cover the penile shaft without tension, the pedicled foreskin flap technique employed in 11 to repair the penile skin defect, and excision of the webbed skin of the ventral penis performed in another 44 to remodel the penoscrotal angle. The operation time, blood loss, and postoperative hospital stay were 40-100 minutes, 5-30 ml, and 3-6 days, respectively. Wound bleeding and infection occurred in 1 and 5 cases, respectively. Follow-up examinations at 3 and 6 months after surgery showed that all the children had a satisfactory penile appearance except for some minor complications (2 cases of penile retraction, 2 cases of redundant ventral skin, and 1 case of iatrogenic penile curvature). The ladder step strategy for surgical repair of congenital concealed penis in children is a simple procedure with minor injury and satisfactory appearance of the penis.

  9. Electromagnetic induction imaging of concealed metallic objects by means of resonating circuits

    NASA Astrophysics Data System (ADS)

    Guilizzoni, R.; Watson, J. C.; Bartlett, P. A.; Renzoni, F.

    2016-05-01

    An electromagnetic induction system, suitable for 2D imaging of metallic samples of different electrical conductivities, has been developed. The system is based on a parallel LCR circuit comprising a ferrite-cored coil (7.8 mm x 9.5 mm, L=680 μH at 1 KHz), a variable resistor and capacitor. The working principle of the system is based on eddy current induction inside a metallic sample when this is introduced into the AC magnetic field created by the coil. The inductance of the LCR circuit is modified due to the presence of the sample, to an extent that depends on its conductivity. Such modification is known to increase when the system is operated at its resonant frequency. Characterizing different metals based on their values of conductivity is therefore possible by utilizing a suitable system operated at resonance. Both imaging and material characterization were demonstrated by means of the proposed electromagnetic induction technique. Furthermore, the choice of using a system with an adjustable resonant frequency made it possible to select resonances that allow magnetic-field penetration through conductive screens. Investigations on the possibility of imaging concealed metals by penetrating such shields have been carried out. A penetration depth of δ~3 mm through aluminium (Al) was achieved. This allowed concealed metallic samples- having conductivities ranging from 0.54 to 59.77 MSm-1 and hidden behind 1.5-mm-thick Al shields- to be imaged. Our results demonstrate that the presence of the concealed metallic objects can be revealed. The technique was thus shown to be a promising detection tool for security applications.

  10. Systematic evaluation of the methodology of randomized controlled trials of anticoagulation in patients with cancer.

    PubMed

    Rada, Gabriel; Schünemann, Holger J; Labedi, Nawman; El-Hachem, Pierre; Kairouz, Victor F; Akl, Elie A

    2013-02-14

    Randomized controlled trials (RCTs) that are inappropriately designed or executed may provide biased findings and mislead clinical practice. In view of recent interest in the treatment and prevention of thrombotic complications in cancer patients we evaluated the characteristics, risk of bias and their time trends in RCTs of anticoagulation in patients with cancer. We conducted a comprehensive search, including a search of four electronic databases (MEDLINE, EMBASE, ISI the Web of Science, and CENTRAL) up to February 2010. We included RCTs in which the intervention and/or comparison consisted of: vitamin K antagonists, unfractionated heparin (UFH), low molecular weight heparin (LMWH), direct thrombin inhibitors or fondaparinux. We performed descriptive analyses and assessed the association between the variables of interest and the year of publication. We included 67 RCTs with 24,071 participants. In twenty one trials (31%) DVT diagnosis was triggered by clinical suspicion; the remaining trials either screened for DVT or were unclear about their approach. 41 (61%), 22 (33%), and 11 (16%) trials respectively reported on major bleeding, minor bleeding, and thrombocytopenia. The percentages of trials satisfying risk of bias criteria were: adequate sequence generation (85%), adequate allocation concealment (61%), participants' blinding (39%), data collectors' blinding (44%), providers' blinding (41%), outcome assessors' blinding (75%), data analysts' blinding (15%), intention to treat analysis (57%), no selective outcome reporting (12%), no stopping early for benefit (97%). The mean follow-up rate was 96%. Adequate allocation concealment and the reporting of intention to treat analysis were the only two quality criteria that improved over time. Many RCTs of anticoagulation in patients with cancer appear to use insufficiently rigorous outcome assessment methods and to have deficiencies in key methodological features. It is not clear whether this reflects a problem in the

  11. 10-year trend in quantity and quality of pediatric randomized controlled trials published in mainland China: 2002–2011

    PubMed Central

    2013-01-01

    Background Quality assessment of pediatric randomized controlled trials (RCTs) in China is limited. The aim of this study was to evaluate the quantitative trends and quality indicators of RCTs published in mainland China over a recent 10-year period. Methods We individually searched all 17 available pediatric journals published in China from January 1, 2002 to December 30, 2011 to identify RCTs of drug treatment in participants under the age of 18 years. The quality was evaluated according to the Cochrane quality assessment protocol. Results Of 1287 journal issues containing 44398 articles, a total of 2.4% (1077/44398) articles were included in the analysis. The proportion of RCTs increased from 0.28% in 2002 to 0.32% in 2011. Individual sample sizes ranged from 10 to 905 participants (median 81 participants); 2.3% of the RCTs were multiple center trials; 63.9% evaluated Western medicine, 32.5% evaluated traditional Chinese medicine; 15% used an adequate method of random sequence generation; and 10.4% used a quasi-random method for randomization. Only 1% of the RCTs reported adequate allocation concealment and 0.6% reported the method of blinding. The follow-up period was from 7 days to 96 months, with a median of 7.5 months. There was incomplete outcome data reported in 8.3%, of which 4.5% (4/89) used intention-to-treat analysis. Only 0.4% of the included trials used adequate random sequence allocation, concealment and blinding. The articles published from 2007 to 2011 revealed an improvement in the randomization method compared with articles published from 2002 to 2006 (from 2.7% to 23.6%, p = 0.000). Conclusions In mainland China, the quantity of RCTs did not increase in the pediatric population, and the general quality was relatively poor. Quality improvements were suboptimal in the later 5 years. PMID:23914882

  12. The use of far infra-red radiation for the detection of concealed metal objects.

    DOT National Transportation Integrated Search

    1971-11-01

    Abstract The use of infrared radiation for the detection : of concealed metal objects has been investigated both : theoretically and experimentally. The investigation was : divided into two phases, one which considered passive : techniques, and anoth...

  13. The use of far infra-red radiation for the detection of concealed metal objects

    DOT National Transportation Integrated Search

    1971-11-01

    The use of infrared radiation for the detection of concealed metal objects has been investigated both theoretically and experimentally. The investigation was divided into two phases, one which considered passive techniques, and another which involved...

  14. Investigation of the structure and lithology of bedrock concealed by basin fill, using ground-based magnetic-field-profile data acquired in the San Rafael Basin, southeastern Arizona

    USGS Publications Warehouse

    Bultman, Mark W.

    2013-01-01

    Data on the Earth’s total-intensity magnetic field acquired near ground level and at measurement intervals as small as 1 m include information on the spatial distribution of nearsurface magnetic dipoles that in many cases are unique to a specific lithology. Such spatial information is expressed in the texture (physical appearance or characteristics) of the data at scales of hundreds of meters to kilometers. These magnetic textures are characterized by several descriptive statistics, their power spectrum, and their multifractal spectrum. On the basis of a graphical comparison and textural characterization, ground-based magnetic-field profile data can be used to estimate bedrock lithology concealed by as much as 100 m of basin fill in some cases, information that is especially important in assessing and exploring for concealed mineral deposits. I demonstrate that multifractal spectra of ground-based magnetic-field-profile data can be used to differentiate exposed lithologies and that the shape and position of the multifractal spectrum of the ground-based magnetic-field-profile of concealed lithologies can be matched to the upward-continued multifractal spectrum of an exposed lithology to help distinguish the concealed lithology. In addition, ground-based magnetic-field-profile data also detect minute differences in the magnetic susceptibility of rocks over small horizontal and vertical distances and so can be used for precise modeling of bedrock geometry and structure, even when that bedrock is concealed by 100 m or more of nonmagnetic basin fill. Such data contain valuable geologic information on the bedrock concealed by basin fill that may not be so visible in aeromagnetic data, including areas of hydrothermal alteration, faults, and other bedrock structures. Interpretation of these data in the San Rafael Basin, southeastern Arizona, has yielded results for estimating concealed lithologies, concealed structural geology, and a concealed potential mineral

  15. Concealing emotions: nurses' experiences with induced abortion care.

    PubMed

    Yang, Cheng-Fang; Che, Hui-Lian; Hsieh, Hsin-Wan; Wu, Shu-Mei

    2016-05-01

    To explore the experiences of nurses involved with induced abortion care in the delivery room in Taiwan. Induced abortion has emotional, ethical and legal facets. In Taiwan, several studies have addressed the ethical issues, abortion methods and women's experiences with abortion care. Although abortion rates have increased, there has been insufficient attention on the views and experiences of nurses working in the delivery room who are involved with induced abortion care. Qualitative, semistructured interviews. This study used a purposive sampling method. In total, 22 nurses involved with induced abortion care were selected. Semistructured interviews with guidelines were conducted, and the content analysis method was used to analyse the data. Our study identified one main theme and five associated subthemes: concealing emotions, which included the inability to refuse, contradictory emotions, mental unease, respect for life and self-protection. This is the first specific qualitative study performed in Taiwan to explore nurses' experiences, and this study also sought to address the concealing of emotions by nurses when they perform induced abortion care, which causes moral distress and creates ethical dilemmas. The findings of this study showed that social-cultural beliefs profoundly influence nurses' values and that the rights of nurses are neglected. The profession should promote small-group and case-study discussions, the clarification of values and reflective thinking among nurses. Continued professional education that provides stress relief will allow nurses to develop self-healing and self-care behaviours, which will enable them to overcome the fear of death while strengthening pregnancy termination counselling, leading to better quality professional care. © 2016 John Wiley & Sons Ltd.

  16. The relationship between perfectionism and engagement in preventive health behaviours: the mediating role of self-concealment.

    PubMed

    Williams, Charlotte J; Cropley, Mark

    2014-10-01

    If perfectionists avoid engaging in preventive health behaviours, they may be putting their long-term health and well-being at risk. Correlational analyses based on a sample of 370 university students identified maladaptive perfectionism to be associated with decreased levels of engagement in preventive health behaviours, life satisfaction and well-being and increased levels of self-concealment and psychological distress. Adaptive perfectionism was associated with higher levels of engagement in preventive health behaviours. Self-concealment was identified as a partial mediator in the relationship between maladaptive perfectionism and both engagement in preventive health behaviours and psychological distress. Implications of the findings are discussed. © The Author(s) 2013.

  17. The use of far infra-red radiation for the detection of concealed metal objects.

    DOT National Transportation Integrated Search

    1971-11-01

    The use of infra-red radiation for the detection : of conceal ed metal objects has been investiga ted both : theoretically and experimentally. The investigation was : divided into two phases, one which considered passive : techniques, and another whi...

  18. Zinc allocation and re-allocation in rice.

    PubMed

    Stomph, Tjeerd Jan; Jiang, Wen; Van Der Putten, Peter E L; Struik, Paul C

    2014-01-01

    Agronomy and breeding actively search for options to enhance cereal grain Zn density. Quantifying internal (re-)allocation of Zn as affected by soil and crop management or genotype is crucial. We present experiments supporting the development of a conceptual model of whole plant Zn allocation and re-allocation in rice. Two solution culture experiments using (70)Zn applications at different times during crop development and an experiment on within-grain distribution of Zn are reported. In addition, results from two earlier published experiments are re-analyzed and re-interpreted. A budget analysis showed that plant zinc accumulation during grain filling was larger than zinc allocation to the grains. Isotope data showed that zinc taken up during grain filling was only partly transported directly to the grains and partly allocated to the leaves. Zinc taken up during grain filling and allocated to the leaves replaced zinc re-allocated from leaves to grains. Within the grains, no major transport barrier was observed between vascular tissue and endosperm. At low tissue Zn concentrations, rice plants maintained concentrations of about 20 mg Zn kg(-1) dry matter in leaf blades and reproductive tissues, but let Zn concentrations in stems, sheath, and roots drop below this level. When plant zinc concentrations increased, Zn levels in leaf blades and reproductive tissues only showed a moderate increase while Zn levels in stems, roots, and sheaths increased much more and in that order. In rice, the major barrier to enhanced zinc allocation towards grains is between stem and reproductive tissues. Enhancing root to shoot transfer will not contribute proportionally to grain zinc enhancement.

  19. Zinc allocation and re-allocation in rice

    PubMed Central

    Stomph, Tjeerd Jan; Jiang, Wen; Van Der Putten, Peter E. L.; Struik, Paul C.

    2014-01-01

    Aims: Agronomy and breeding actively search for options to enhance cereal grain Zn density. Quantifying internal (re-)allocation of Zn as affected by soil and crop management or genotype is crucial. We present experiments supporting the development of a conceptual model of whole plant Zn allocation and re-allocation in rice. Methods: Two solution culture experiments using 70Zn applications at different times during crop development and an experiment on within-grain distribution of Zn are reported. In addition, results from two earlier published experiments are re-analyzed and re-interpreted. Results: A budget analysis showed that plant zinc accumulation during grain filling was larger than zinc allocation to the grains. Isotope data showed that zinc taken up during grain filling was only partly transported directly to the grains and partly allocated to the leaves. Zinc taken up during grain filling and allocated to the leaves replaced zinc re-allocated from leaves to grains. Within the grains, no major transport barrier was observed between vascular tissue and endosperm. At low tissue Zn concentrations, rice plants maintained concentrations of about 20 mg Zn kg−1 dry matter in leaf blades and reproductive tissues, but let Zn concentrations in stems, sheath, and roots drop below this level. When plant zinc concentrations increased, Zn levels in leaf blades and reproductive tissues only showed a moderate increase while Zn levels in stems, roots, and sheaths increased much more and in that order. Conclusions: In rice, the major barrier to enhanced zinc allocation towards grains is between stem and reproductive tissues. Enhancing root to shoot transfer will not contribute proportionally to grain zinc enhancement. PMID:24478788

  20. Experimental methods of indoor millimeter-wave radiometric imaging for personnel concealed contraband detection

    NASA Astrophysics Data System (ADS)

    Hu, Taiyang; Xiao, Zelong; Li, Hao; Lv, Rongchuan; Lu, Xuan

    2014-11-01

    The increasingly emerging terrorism attacks and violence crimes around the world have posed severe threats to public security, so carrying out relevant research on advanced experimental methods of personnel concealed contraband detection is crucial and meaningful. All of the advantages of imaging covertly, avoidance of interference with other systems, intrinsic property of being safe to persons under screening , and the superior ability of imaging through natural or manmade obscurants, have significantly combined to enable millimeter-wave (MMW) radiometric imaging to offer great potential in personnel concealed contraband detection. Based upon the current research status of MMW radiometric imaging and urgent demands of personnel security screening, this paper mainly focuses on the experimental methods of indoor MMW radiometric imaging. The reverse radiation noise resulting from super-heterodyne receivers seriously affects the image experiments carried out at short range, so both the generation mechanism and reducing methods of this noise are investigated. Then, the benefit of sky illumination no longer exists for the indoor radiometric imaging, and this leads to the decrease in radiometric temperature contrast between target and background. In order to enhance the radiometric temperature contrast for improving indoor imaging performance, the noise illumination technique is adopted in the indoor imaging scenario. In addition, the speed and accuracy of concealed contraband detection from acquired MMW radiometric images are usually restricted to the deficiencies in traditional artificial interpretation by security inspectors, thus an automatic recognition and location algorithm by integrating improved Fuzzy C-means clustering with moment invariants is put forward. A series of original results are also presented to demonstrate the significance and validity of these methods.

  1. Using more different and more familiar targets improves the detection of concealed information.

    PubMed

    Suchotzki, Kristina; De Houwer, Jan; Kleinberg, Bennett; Verschuere, Bruno

    2018-04-01

    When embedded among a number of plausible irrelevant options, the presentation of critical (e.g., crime-related or autobiographical) information is associated with a marked increase in response time (RT). This RT effect crucially depends on the inclusion of a target/non-target discrimination task with targets being a dedicated set of items that require a unique response (press YES; for all other items press NO). Targets may be essential because they share a feature - familiarity - with the critical items. Whereas irrelevant items have not been encountered before, critical items are known from the event or the facts of the investigation. Target items are usually learned before the test, and thereby made familiar to the participants. Hence, familiarity-based responding needs to be inhibited on the critical items and may therefore explain the RT increase on the critical items. This leads to the hypothesis that the more participants rely on familiarity, the more pronounced the RT increase on critical items may be. We explored two ways to increase familiarity-based responding: (1) Increasing the number of different target items, and (2) using familiar targets. In two web-based studies (n = 357 and n = 499), both the number of different targets and the use of familiar targets facilitated concealed information detection. The effect of the number of different targets was small yet consistent across both studies, the effect of target familiarity was large in both studies. Our results support the role of familiarity-based responding in the Concealed Information Test and point to ways on how to improve validity of the Concealed Information Test. Copyright © 2018 Elsevier B.V. All rights reserved.

  2. Self-Concealment, Avoidance of Psychological Services, and Perceived Likelihood of Seeking Professional Help.

    ERIC Educational Resources Information Center

    Cepeda-Benito, Antonio; Short, Paul

    1998-01-01

    New information about the role of self-concealment in the decision to seek psychological services is investigated. Different types of distress selectively predict students' perceived likelihood of seeking help according to the problems for which help would be sought (N=732). Results are discussed in contrast to previous researchers' findings. (EMK)

  3. [Effects of false memories on the Concealed Information Test].

    PubMed

    Zaitsu, Wataru

    2012-10-01

    The effects of false memories on polygraph examinations with the Concealed Information Test (CIT) were investigated by using the Deese-Roediger-McDermott (DRM) paradigm, which allows participants to evoke false memories. Physiological responses to questions consisting of learned, lure, and unlearned items were measured and recorded. The results indicated that responses to lure questions showed critical responses to questions about learned items. These responses included repression of respiration, an increase in electrodermal activity, and a drop in heart rate. These results suggest that critical response patterns are generated in the peripheral nervous system by true and false memories.

  4. Optimum Allocation of Water to the Cultivation Farms Using Genetic Algorithm

    NASA Astrophysics Data System (ADS)

    Saeidian, B.; Saadi Mesgari, M.; Ghodousi, M.

    2015-12-01

    The water scarcity crises in the world and specifically in Iran, requires the proper management of this valuable resource. According to the official reports, around 90 percent of the water in Iran is used for agriculture. Therefore, the adequate management and usage of water in this section can help significantly to overcome the above crises. The most important aspect of agricultural water management is related to the irrigation planning, which is basically an allocation problem. The proper allocation of water to the farms is not a simple and trivial problem, because of the limited amount of available water, the effect of different parameters, nonlinear characteristics of the objective function, and the wideness of the solution space. Usually To solve such complex problems, a meta-heuristic method such as genetic algorithm could be a good candidate. In this paper, Genetic Algorithm (GA) is used for the allocation of different amount of water to a number of farms. In this model, the amount of water transferable using canals of level one, in one period of irrigation is specified. In addition, the amount of water required by each farm is calculated using crop type, stage of crop development, and other parameters. Using these, the water production function of each farm is determined. Then, using the water production function, farm areas, and the revenue and cost of each crop type, the objective function is calculated. This objective function is used by GA for the allocation of water to the farms. The objective function is defined such that the economical profit extracted from all farms is maximized. Moreover, the limitation related to the amount of available water is considered as a constraint. In general, the total amount of allocated water should be less than the finally available water (the water transferred trough the level one canals). Because of the intensive scarcity of water, the deficit irrigation method are considered. In this method, the planning is on the

  5. Keeping up appearances: the role of identity concealment in the workplace among adults with degenerative eye conditions and its relationship with wellbeing and career outcomes.

    PubMed

    Spiegel, Tali; De Bel, Vera; Steverink, Nardi

    2016-01-01

    This study aims to describe the interplay between the work trajectories and the passing patterns of individuals with degenerative eye conditions in different phases of their career, as well as the disease progression and the career and well-being outcomes associated with different works and passing trajectories. Qualitative interviews on the topic of work trajectories were conducted with 36 working or retired individuals with degenerative eye conditions. The "bigger picture" method was used to explore passing and concealment behavioral patterns, and their associations with various work trajectories. Five patterns of passing and concealment behavior in the workplace were identified and were linked with various work trajectories among visually impaired study participants: (1) no career adjustments, concealed condition throughout career; (2) revealed condition after adjusting career plans; (3) increasingly open about their condition over the course of their career; (4) engaged in career planning, always open about their condition; and (5) engaged in limited career planning, always open about their condition. Patterns characterized by less planning and more identity concealment were associated with more stress and lower levels of self-acceptance, while patterns characterized by more planning for vision deterioration and less passing behavior were associated with higher levels self-acceptance and fewer obstacles over the course of an individual's career. The study's findings can serve as a guide for health professionals. Many individuals with degenerative eye conditions try to conceal their identity as visually impaired in the professional setting. Different aspects of career outcomes (e.g. age of retirement) and wellbeing outcomes (e.g. self-acceptance and stress) associate with identity concealment patterns of individuals throughout their careers. Identifying concealment patterns will allow health professionals to tackle particular adverse outcomes and challenges

  6. Research on allocation efficiency of the daisy chain allocation algorithm

    NASA Astrophysics Data System (ADS)

    Shi, Jingping; Zhang, Weiguo

    2013-03-01

    With the improvement of the aircraft performance in reliability, maneuverability and survivability, the number of the control effectors increases a lot. How to distribute the three-axis moments into the control surfaces reasonably becomes an important problem. Daisy chain method is simple and easy to be carried out in the design of the allocation system. But it can not solve the allocation problem for entire attainable moment subset. For the lateral-directional allocation problem, the allocation efficiency of the daisy chain can be directly measured by the area of its subset of attainable moments. Because of the non-linear allocation characteristic, the subset of attainable moments of daisy-chain method is a complex non-convex polygon, and it is difficult to solve directly. By analyzing the two-dimensional allocation problems with a "micro-element" idea, a numerical calculation algorithm is proposed to compute the area of the non-convex polygon. In order to improve the allocation efficiency of the algorithm, a genetic algorithm with the allocation efficiency chosen as the fitness function is proposed to find the best pseudo-inverse matrix.

  7. Randomization in clinical trials in orthodontics: its significance in research design and methods to achieve it.

    PubMed

    Pandis, Nikolaos; Polychronopoulou, Argy; Eliades, Theodore

    2011-12-01

    Randomization is a key step in reducing selection bias during the treatment allocation phase in randomized clinical trials. The process of randomization follows specific steps, which include generation of the randomization list, allocation concealment, and implementation of randomization. The phenomenon in the dental and orthodontic literature of characterizing treatment allocation as random is frequent; however, often the randomization procedures followed are not appropriate. Randomization methods assign, at random, treatment to the trial arms without foreknowledge of allocation by either the participants or the investigators thus reducing selection bias. Randomization entails generation of random allocation, allocation concealment, and the actual methodology of implementing treatment allocation randomly and unpredictably. Most popular randomization methods include some form of restricted and/or stratified randomization. This article introduces the reasons, which make randomization an integral part of solid clinical trial methodology, and presents the main randomization schemes applicable to clinical trials in orthodontics.

  8. Concealment tactics among HIV-positive nurses in Uganda.

    PubMed

    Kyakuwa, Margaret; Hardon, Anita

    2012-01-01

    This paper is based on two-and-a-half years of ethnographic fieldwork in two rural Ugandan health centres during a period of ART scale-up. Around one-third of the nurses in these two sites were themselves HIV-positive but most concealed their status. We describe how a group of HIV-positive nurses set up a secret circle to talk about their predicament as HIV-positive healthcare professionals and how they developed innovative care technologies to overcome the skin rashes caused by ART that threatened to give them away. Together with patients and a traditional healer, the nurses resisted hegemonic biomedical norms denouncing herbal medicines and then devised and advocated for a herbal skin cream treatment to be included in the ART programme.

  9. Evaluation of coping strategies in established rheumatoid arthritis patients: emergence of concealment in an Asian cohort.

    PubMed

    Chew, Elizabeth; Griva, Konstadina; Cheung, Peter P

    2016-11-01

    To evaluate coping strategies of Asian RA patients and their associations with health-related quality of life (HRQoL). A cross-sectional sample of patients with established RA was evaluated using measures of coping (Coping in Rheumatoid Arthritis Questionnaire [C-RAQ]; appraisal of coping effectiveness and helplessness), HRQoL (Mental and Physical Components [MCS/PCS] of the Short Form 12v2; Rheumatoid Arthritis Impact of Disease score [RAID]) and clinical/laboratory assessments. Principal component analysis was conducted to identify coping strategies. Multiple linear regression analyses were performed to evaluate the associations between coping strategies and HRQoL outcomes. The study sample comprised 101 patients, 81% female, 72.3% Chinese, mean age 54.2 ± 12.6 years. Five coping strategies were identified: Active problem solving (E = 5.36), Distancing (E = 2.30), Concealment (E = 1.89), Cognitive reframing (E = 1.55) and Emotional expression (E = 1.26). Concealment was consistently associated with PCS (r s = -0.23, P = 0.049), MCS (r s = -0.24, P = 0.04) and RAID (r s = 0.39, P < 0.001), and was significant in the multivariate model to explain lower disease-specific HRQoL (RAID) even after adjusting for disease activity, coping effectiveness and helplessness (β = 0.20, P = 0.04). Emotional expression was associated with poorer physical HRQoL (PCS), after adjusting for disease severity, body mass index, coping effectiveness, helplessness and Concealment (β = -0.39, P < 0.001). Perceived coping-related helplessness was significant in multivariate correlates for PCS (β = -0.25, P = 0.036), MCS (β = -0.29, P = 0.02) and RAID (β = 0.53, P < 0.001), after adjusting for covariates. Concealment and Emotional expression are associated with lower disease-specific HRQoL and physical HRQoL respectively, with the former coping strategy likely to be culture-specific. Interventions should tailor psychosocial support needs to address not only coping strategies, but

  10. The successively temporal error concealment algorithm using error-adaptive block matching principle

    NASA Astrophysics Data System (ADS)

    Lee, Yu-Hsuan; Wu, Tsai-Hsing; Chen, Chao-Chyun

    2014-09-01

    Generally, the temporal error concealment (TEC) adopts the blocks around the corrupted block (CB) as the search pattern to find the best-match block in previous frame. Once the CB is recovered, it is referred to as the recovered block (RB). Although RB can be the search pattern to find the best-match block of another CB, RB is not the same as its original block (OB). The error between the RB and its OB limits the performance of TEC. The successively temporal error concealment (STEC) algorithm is proposed to alleviate this error. The STEC procedure consists of tier-1 and tier-2. The tier-1 divides a corrupted macroblock into four corrupted 8 × 8 blocks and generates a recovering order for them. The corrupted 8 × 8 block with the first place of recovering order is recovered in tier-1, and remaining 8 × 8 CBs are recovered in tier-2 along the recovering order. In tier-2, the error-adaptive block matching principle (EA-BMP) is proposed for the RB as the search pattern to recover remaining corrupted 8 × 8 blocks. The proposed STEC outperforms sophisticated TEC algorithms on average PSNR by 0.3 dB on the packet error rate of 20% at least.

  11. Association between funding source, methodological quality and research outcomes in randomized controlled trials of synbiotics, probiotics and prebiotics added to infant formula: A Systematic Review

    PubMed Central

    2013-01-01

    Background There is little or no information available on the impact of funding by the food industry on trial outcomes and methodological quality of synbiotics, probiotics and prebiotics research in infants. The objective of this study was to compare the methodological quality, outcomes of food industry sponsored trials versus non industry sponsored trials, with regards to supplementation of synbiotics, probiotics and prebiotics in infant formula. Methods A comprehensive search was conducted to identify published and unpublished randomized clinical trials (RCTs). Cochrane methodology was used to assess the risk of bias of included RCTs in the following domains: 1) sequence generation; 2) allocation concealment; 3) blinding; 4) incomplete outcome data; 5) selective outcome reporting; and 6) other bias. Clinical outcomes and authors’ conclusions were reported in frequencies and percentages. The association between source of funding, risk of bias, clinical outcomes and conclusions were assessed using Pearson’s Chi-square test and the Fisher’s exact test. A p-value < 0.05 was statistically significant. Results Sixty seven completed and 3 on-going RCTs were included. Forty (59.7%) were funded by food industry, 11 (16.4%) by non-industry entities and 16 (23.9%) did not specify source of funding. Several risk of bias domains, especially sequence generation, allocation concealment and blinding, were not adequately reported. There was no significant association between the source of funding and sequence generation, allocation concealment, blinding and selective reporting, majority of reported clinical outcomes or authors’ conclusions. On the other hand, source of funding was significantly associated with the domains of incomplete outcome data, free of other bias domains as well as reported antibiotic use and conclusions on weight gain. Conclusion In RCTs on infants fed infant formula containing probiotics, prebiotics or synbiotics, the source of funding did not

  12. Ultra-wide-band 3D microwave imaging scanner for the detection of concealed weapons

    NASA Astrophysics Data System (ADS)

    Rezgui, Nacer-Ddine; Andrews, David A.; Bowring, Nicholas J.

    2015-10-01

    The threat of concealed weapons, explosives and contraband in footwear, bags and suitcases has led to the development of new devices, which can be deployed for security screening. To address known deficiencies of metal detectors and x-rays, an UWB 3D microwave imaging scanning apparatus using FMCW stepped frequency working in the K and Q bands and with a planar scanning geometry based on an x y stage, has been developed to screen suspicious luggage and footwear. To obtain microwave images of the concealed weapons, the targets are placed above the platform and the single transceiver horn antenna attached to the x y stage is moved mechanically to perform a raster scan to create a 2D synthetic aperture array. The S11 reflection signal of the transmitted sweep frequency from the target is acquired by a VNA in synchronism with each position step. To enhance and filter from clutter and noise the raw data and to obtain the 2D and 3D microwave images of the concealed weapons or explosives, data processing techniques are applied to the acquired signals. These techniques include background subtraction, Inverse Fast Fourier Transform (IFFT), thresholding, filtering by gating and windowing and deconvolving with the transfer function of the system using a reference target. To focus the 3D reconstructed microwave image of the target in range and across the x y aperture without using focusing elements, 3D Synthetic Aperture Radar (SAR) techniques are applied to the post-processed data. The K and Q bands, between 15 to 40 GHz, show good transmission through clothing and dielectric materials found in luggage and footwear. A description of the system, algorithms and some results with replica guns and a comparison of microwave images obtained by IFFT, 2D and 3D SAR techniques are presented.

  13. Subregional resource allocations in the National Health Service.

    PubMed Central

    Snaith, A H

    1978-01-01

    The Resource Allocation Working Party in its report Sharing Resources for Health in England proposes a formula for the identification of both regional and district financial targets (Department of Health and Social Security, 1976). In this paper it is argued that the national formula is not a valid instrument for the latter purpose. Furthermore, research into medical needs and outcomes will not be adequate to bring about real changes in resource distribution at local levels unless it is recognised that the health authorities can meet needs in different ways and that a change in resource management from institutional to service budgeting is required. PMID:262582

  14. 50 CFR 660.323 - Pacific whiting allocations, allocation attainment, and inseason allocation reapportionment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... whiting is allocated among three sectors, as follows:34 percent for the catcher/processor sector; 24 percent for the mothership sector; and 42 percent for the shore-based sector. No more than 5 percent of... primary whiting season north of 42° N. lat.Specific sector allocations for a given calendar year are found...

  15. Combined illumination cylindrical millimeter-wave imaging technique for concealed weapon detection

    NASA Astrophysics Data System (ADS)

    Sheen, David M.; McMakin, Douglas L.; Hall, Thomas E.

    2000-07-01

    A novel millimeter-wave imaging technique has been developed for personnel surveillance applications, including the detection of concealed weapons, explosives, drugs, and other contraband material. Millimeter-waves are high-frequency radio waves in the frequency band of 30 - 300 GHz, and pose no health threat to humans at moderate power levels. These waves readily penetrate common clothing materials, and are reflected by the human body and by concealed items. The combined illumination cylindrical imaging concept consists of a vertical, high-resolution, millimeter-wave array of antennas which is scanned in a cylindrical manner about the person under surveillance. Using a computer, the data from this scan is mathematically reconstructed into a series of focused 3D images of the person. After reconstruction, the images are combined into a single high-resolution 3D image of the person under surveillance. This combined image is then rendered using 3D computer graphics techniques. The combined cylindrical illumination is critical as it allows the display of information from all angles. This is necessary because millimeter-waves do not penetrate the body. Ultimately, the images displayed to the operate will be icon-based to protect the privacy of the person being screened. Novel aspects of this technique include the cylindrical scanning concept and the image reconstruction algorithm, which was developed specifically for this imaging system. An engineering prototype based on this cylindrical imaging technique has been fabricated and tested. This work has been sponsored by the Federal Aviation Administration.

  16. Concealing of facial expressions by a wild Barbary macaque (Macaca sylvanus).

    PubMed

    Thunström, Maria; Kuchenbuch, Paul; Young, Christopher

    2014-07-01

    Behavioural research on non-vocal communication among non-human primates and its possible links to the origin of human language is a long-standing research topic. Because human language is under voluntary control, it is of interest whether this is also true for any communicative signals of other species. It has been argued that the behaviour of hiding a facial expression with one's hand supports the idea that gestures might be under more voluntary control than facial expressions among non-human primates, and it has also been interpreted as a sign of intentionality. So far, the behaviour has only been reported twice, for single gorilla and chimpanzee individuals, both in captivity. Here, we report the first observation of concealing of facial expressions by a monkey, a Barbary macaque (Macaca sylvanus), living in the wild. On eight separate occasions between 2009 and 2011 an adult male was filmed concealing two different facial expressions associated with play and aggression ("play face" and "scream face"), 22 times in total. The videos were analysed in detail, including gaze direction, hand usage, duration, and individuals present. This male was the only individual in his group to manifest this behaviour, which always occurred in the presence of a dominant male. Several possible interpretations of the function of the behaviour are discussed. The observations in this study indicate that the gestural communication and cognitive abilities of monkeys warrant more research attention.

  17. [Hungarian health resource allocation from the viewpoint of the English methodology].

    PubMed

    Fadgyas-Freyler, Petra

    2018-02-01

    This paper describes both the English health resource allocation and the attempt of its Hungarian adaptation. We describe calculations for a Hungarian regression model using the English 'weighted capitation formula'. The model has proven statistically correct. New independent variables and homogenous regional units have to be found for Hungary. The English method can be used with adequate variables. Hungarian patient-level health data can support a much more sophisticated model. Further research activities are needed. Orv Hetil. 2018; 159(5): 183-191.

  18. Kaposi's sarcoma concealed by stasis dermatitis in a patient with psoriasis.

    PubMed

    Erdoğan, Hilal Kaya; Bulur, Işıl; Saraçoğlu, Zeynep Nurhan; Karapınar, Tekden; Arık, Deniz

    2017-09-01

    Kaposi's sarcoma (KS) is a multifocal and angioproliferative neoplasm. KS may be accompanied by psoriasis; however, in most of these cases the main mechanism involves iatrogenic KS associated with the immunosuppressive drugs that are used in psoriasis treatment. In angioproliferative lesions as a result of venous insufficiency and stasis dermatitis, acroangiodermatitis (pseudo-KS) is initially considered. However, the concurrent occurrence of psoriasis, stasis dermatitis, and KS has not been previously reported. We report a case of classic-type KS in an 83-year-old man that was concealed by stasis dermatitis and accompanied by psoriasis.

  19. Prospective effects of social support on internalized homonegativity and sexual identity concealment among middle-aged and older gay men: a longitudinal cohort study.

    PubMed

    Lyons, Anthony; Pepping, Christopher A

    2017-09-01

    Middle-aged and older gay men experience higher rates of depression and anxiety compared to their heterosexual counterparts, with internalized homonegativity and sexual identity concealment known to be major stress-related contributors. This study examined the prospective effect of different types and sources of social support on internalized homonegativity and sexual identity concealment experienced among middle-aged and older gay men. A longitudinal survey involving two waves of data collection separated by 12 months was conducted among a cohort of 186 gay-identified men aged 40 years and older. Two types of social support were found to be important. Greater baseline tangible or practical support independently predicted lower internalized homonegativity at 12-month follow-up, while greater baseline emotional or psychological support independently predicted a lower tendency toward sexual identity concealment at 12-month follow-up. Greater baseline support from community or government agencies, such as health services and support organizations, predicted higher internalized homonegativity at 12-month follow-up. These findings suggest that tangible and emotional support may be beneficial in reducing internalized homonegativity and sexual identity concealment among middle-aged and older gay men. Ensuring that services provide environments that do not compound the stressful impact of stigma also appears to be important.

  20. Remote laser drilling and sampling system for the detection of concealed explosives

    NASA Astrophysics Data System (ADS)

    Wild, D.; Pschyklenk, L.; Theiß, C.; Holl, G.

    2017-05-01

    The detection of hazardous materials like explosives is a central issue in national security in the field of counterterrorism. One major task includes the development of new methods and sensor systems for the detection. Many existing remote or standoff methods like infrared or raman spectroscopy find their limits, if the hazardous material is concealed in an object. Imaging technologies using x-ray or terahertz radiation usually yield no information about the chemical content itself. However, the exact knowledge of the real threat potential of a suspicious object is crucial for disarming the device. A new approach deals with a laser drilling and sampling system for the use as verification detector for suspicious objects. Central part of the system is a miniaturised, diode pumped Nd:YAG laser oscillator-amplifier. The system allows drilling into most materials like metals, synthetics or textiles with bore hole diameters in the micron scale. During the drilling process, the hazardous material can be sampled for further investigation with suitable detection methods. In the reported work, laser induced breakdown spectroscopy (LIBS) is used to monitor the drilling process and to classify the drilled material. Also experiments were carried out to show the system's ability to not ignite even sensitive explosives like triacetone triperoxide (TATP). The detection of concealed hazardous material is shown for different explosives using liquid chromatography and ion mobility spectrometry.

  1. University Presidents' Perceptions and Practice Regarding the Carrying of Concealed Handguns on College Campuses

    ERIC Educational Resources Information Center

    Price, James H.; Thompson, Amy; Khubchandani, Jagdish; Dake, Joseph; Payton, Erica; Teeple, Karen

    2014-01-01

    Objective: To assess the perceptions and practices of a national sample of college and university presidents regarding their support for concealed handguns being carried on college campuses. Participants: The sample for this study consisted of a national random sample of 900 college or university presidents. Methods: In the spring of 2013, a…

  2. Subclinical vitamin D deficiency is increased in adolescent girls who wear concealing clothing.

    PubMed

    Hatun, Sukru; Islam, Omer; Cizmecioglu, Filiz; Kara, Bulent; Babaoglu, Kadir; Berk, Fatma; Gökalp, Ayse Sevim

    2005-02-01

    Vitamin D deficiency continues to be a worldwide problem, especially in developing countries. The aim of this study was to investigate potential risk factors for vitamin D deficiency. Girls (n = 89) aged 13 to 17 y were enrolled in the study. Study subjects were stratified into 3 groups: Group I included girls living in a suburban area; Group II girls lived in an urban area, and Group III girls lived in an urban area and wore concealing clothes for religious reasons. At the end of winter (in April) serum 25-hydroxyvitamin D [25(OH)D] levels were measured and dietary data were collected using questionnaires. Vitamin D deficiency was defined as a serum 25(OH)D concentration < 25 nmol/L, and insufficiency as a 25(OH)D concentration between 25 and 50 nmol/L. The lumbar and femur neck bone mineral densities (BMD) were measured using dual X-ray absorptiometry (DEXA). Overall, 39 girls (43.8%) had vitamin D insufficiency and 19 (21.3%) had vitamin D deficiency. In group III (wearing covered dress) the serum 25(OH)D concentrations (28.13 +/- 12.53 nmol/L) were significantly lower than in the other 2 groups, and within this group, 50% of girls were vitamin D deficient. The lumbar and femur neck BMD of girls with lower 25(OH)D levels did not differ from those with adequate vitamin D levels. We conclude that vitamin D deficiency is an important problem in Turkish adolescent girls, especially in those who follow a religious dress code; therefore, vitamin D supplementation appears to be necessary for adolescent girls.

  3. Specific NIST projects in support of the NIJ Concealed Weapon Detection and Imaging Program

    NASA Astrophysics Data System (ADS)

    Paulter, Nicholas G.

    1998-12-01

    The Electricity Division of the National Institute of Standards and Technology is developing revised performance standards for hand-held (HH) and walk-through (WT) metal weapon detectors, test procedures and systems for these detectors, and a detection/imaging system for finding concealed weapons. The revised standards will replace the existing National Institute of Justice (NIJ) standards for HH and WT devices and will include detection performance specifications as well as system specifications (environmental conditions, mechanical strength and safety, response reproducibility and repeatability, quality assurance, test reporting, etc.). These system requirements were obtained from the Law Enforcement and corrections Technology Advisory Council, an advisory council for the NIJ. Reproducible and repeatable test procedures and appropriate measurement systems will be developed for evaluating HH and WT detection performance. A guide to the technology and application of non- eddy-current-based detection/imaging methods (such as acoustic, passive millimeter-wave and microwave, active millimeter-wave and terahertz-wave, x-ray, etc.) Will be developed. The Electricity Division is also researching the development of a high- frequency/high-speed (300 GH to 1 THz) pulse-illuminated, stand- off, video-rate, concealed weapons/contraband imaging system.

  4. Between Concealing and Revealing Intersexed Bodies: Parental Strategies.

    PubMed

    Danon, Limor Meoded; Krämer, Anike

    2017-08-01

    Parents of intersex children are perceived in many studies as hopeless, highly dependent on the medical system, and as gate keepers of normative gendered bodies. In this article, we challenge these perceptions and argue that parents of intersex children are problematically positioned between their children's needs for care and well-being and the socialmedical forces that aim to "normalize" them. Their in-between position leads them to establish different parental strategies within and outside of traditional sex/gender norms. We focus on three intertwined parental strategy frameworks: bodily dialogue, sex/gender framing, and concealing/revealing practices, and describe how, in each of these strategic frameworks, the parents maneuver, act in accordance with or against, react to, and challenge the medical system, social interactions, and the sex/gender paradigm. This is a comparative study based on narrative interviews with 22 parents of intersex children in Germany and Israel.

  5. Approach trajectory planning system for maximum concealment

    NASA Technical Reports Server (NTRS)

    Warner, David N., Jr.

    1986-01-01

    A computer-simulation study was undertaken to investigate a maximum concealment guidance technique (pop-up maneuver), which military aircraft may use to capture a glide path from masked, low-altitude flight typical of terrain following/terrain avoidance flight enroute. The guidance system applied to this problem is the Fuel Conservative Guidance System. Previous studies using this system have concentrated on the saving of fuel in basically conventional land and ship-based operations. Because this system is based on energy-management concepts, it also has direct application to the pop-up approach which exploits aircraft performance. Although the algorithm was initially designed to reduce fuel consumption, the commanded deceleration is at its upper limit during the pop-up and, therefore, is a good approximation of a minimum-time solution. Using the model of a powered-lift aircraft, the results of the study demonstrated that guidance commands generated by the system are well within the capability of an automatic flight-control system. Results for several initial approach conditions are presented.

  6. Prevention of firearm-related injuries with restrictive licensing and concealed carry laws: An Eastern Association for the Surgery of Trauma systematic review.

    PubMed

    Crandall, Marie; Eastman, Alexander; Violano, Pina; Greene, Wendy; Allen, Steven; Block, Ernest; Christmas, Ashley Britton; Dennis, Andrew; Duncan, Thomas; Foster, Shannon; Goldberg, Stephanie; Hirsh, Michael; Joseph, D'Andrea; Lommel, Karen; Pappas, Peter; Shillinglaw, William

    2016-11-01

    In the past decade, more than 300,000 people in the United States have died from firearm injuries. Our goal was to assess the effectiveness of two particular prevention strategies, restrictive licensing of firearms and concealed carry laws, on firearm-related injuries in the US Restrictive Licensing was defined to include denials of ownership for various offenses, such as performing background checks for domestic violence and felony convictions. Concealed carry laws allow licensed individuals to carry concealed weapons. A comprehensive review of the literature was performed. We used Grading of Recommendations Assessment, Development, and Evaluation methodology to assess the breadth and quality of the data specific to our Population, Intervention, Comparator, Outcomes (PICO) questions. A total of 4673 studies were initially identified, then seven more added after two subsequent, additional literature reviews. Of these, 3,623 remained after removing duplicates; 225 case reports, case series, and reviews were excluded, and 3,379 studies were removed because they did not focus on prevention or did not address our comparators of interest. This left a total of 14 studies which merited inclusion for PICO 1 and 13 studies which merited inclusion for PICO 2. PICO 1: We recommend the use of restrictive licensing to reduce firearm-related injuries.PICO 2: We recommend against the use of concealed carry laws to reduce firearm-related injuries.This committee found an association between more restrictive licensing and lower firearm injury rates. All 14 studies were population-based, longitudinal, used modeling to control for covariates, and 11 of the 14 were multi-state. Twelve of the studies reported reductions in firearm injuries, from 7% to 40%. We found no consistent effect of concealed carry laws. Of note, the varied quality of the available data demonstrates a significant information gap, and this committee recommends that we as a society foster a nurturing and encouraging

  7. Superframe Duration Allocation Schemes to Improve the Throughput of Cluster-Tree Wireless Sensor Networks

    PubMed Central

    Leão, Erico; Montez, Carlos; Moraes, Ricardo; Portugal, Paulo; Vasques, Francisco

    2017-01-01

    The use of Wireless Sensor Network (WSN) technologies is an attractive option to support wide-scale monitoring applications, such as the ones that can be found in precision agriculture, environmental monitoring and industrial automation. The IEEE 802.15.4/ZigBee cluster-tree topology is a suitable topology to build wide-scale WSNs. Despite some of its known advantages, including timing synchronisation and duty-cycle operation, cluster-tree networks may suffer from severe network congestion problems due to the convergecast pattern of its communication traffic. Therefore, the careful adjustment of transmission opportunities (superframe durations) allocated to the cluster-heads is an important research issue. This paper proposes a set of proportional Superframe Duration Allocation (SDA) schemes, based on well-defined protocol and timing models, and on the message load imposed by child nodes (Load-SDA scheme), or by number of descendant nodes (Nodes-SDA scheme) of each cluster-head. The underlying reasoning is to adequately allocate transmission opportunities (superframe durations) and parametrize buffer sizes, in order to improve the network throughput and avoid typical problems, such as: network congestion, high end-to-end communication delays and discarded messages due to buffer overflows. Simulation assessments show how proposed allocation schemes may clearly improve the operation of wide-scale cluster-tree networks. PMID:28134822

  8. 7 CFR 3017.900 - Adequate evidence.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Adequate evidence. 3017.900 Section 3017.900 Agriculture Regulations of the Department of Agriculture (Continued) OFFICE OF THE CHIEF FINANCIAL OFFICER... Adequate evidence. Adequate evidence means information sufficient to support the reasonable belief that a...

  9. Sensitivity and Specificity of Emergency Physicians and Trainees for Identifying Internally Concealed Drug Packages on Abdominal Computed Tomography Scan: Do Lung Windows Improve Accuracy?

    PubMed

    Asha, Stephen Edward; Cooke, Andrew

    2015-09-01

    Suspected body packers may be brought to emergency departments (EDs) close to international airports for abdominal computed tomography (CT) scanning. Senior emergency clinicians may be asked to interpret these CT scans. Missing concealed drug packages have important clinical and forensic implications. The accuracy of emergency clinician interpretation of abdominal CT scans for concealed drugs is not known. Limited evidence suggests that accuracy for identification of concealed packages can be increased by viewing CT images on "lung window" settings. To determine the accuracy of senior emergency clinicians in interpreting abdominal CT scans for concealed drugs, and to determine if this accuracy was improved by viewing scans on both abdominal and lung window settings. Emergency clinicians blinded to all patient identifiers and the radiology report interpreted CT scans of suspected body packers using standard abdominal window settings and then with the addition of lung window settings. The reference standard was the radiologist's report. Fifty-five emergency clinicians reported 235 CT scans. The sensitivity, specificity, and accuracy of interpretation using abdominal windows was 89.9% (95% confidence interval [CI] 83.0-94.7), 81.9% (95% CI 73.7-88.4), and 86.0% (95% CI 81.5-90.4), respectively, and with both window settings was 94.1% (95% CI 88.3-97.6), 76.7% (95% CI 68.0-84.1), 85.5% (95% CI 81.0-90.0), respectively. Diagnostic accuracy was similar regardless of the clinician's experience. Interrater reliability was moderate (kappa 0.46). The accuracy of interpretation of abdominal CT scans performed for the purpose of detecting concealed drug packages by emergency clinicians is not high enough to safely discharge these patients from the ED. The use of lung windows improved sensitivity, but at the expense of specificity. Crown Copyright © 2015. Published by Elsevier Inc. All rights reserved.

  10. 29 CFR 98.900 - Adequate evidence.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 29 Labor 1 2012-07-01 2012-07-01 false Adequate evidence. 98.900 Section 98.900 Labor Office of the Secretary of Labor GOVERNMENTWIDE DEBARMENT AND SUSPENSION (NONPROCUREMENT) Definitions § 98.900 Adequate evidence. Adequate evidence means information sufficient to support the reasonable belief that a...

  11. 29 CFR 98.900 - Adequate evidence.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 1 2011-07-01 2011-07-01 false Adequate evidence. 98.900 Section 98.900 Labor Office of the Secretary of Labor GOVERNMENTWIDE DEBARMENT AND SUSPENSION (NONPROCUREMENT) Definitions § 98.900 Adequate evidence. Adequate evidence means information sufficient to support the reasonable belief that a...

  12. 29 CFR 98.900 - Adequate evidence.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 29 Labor 1 2013-07-01 2013-07-01 false Adequate evidence. 98.900 Section 98.900 Labor Office of the Secretary of Labor GOVERNMENTWIDE DEBARMENT AND SUSPENSION (NONPROCUREMENT) Definitions § 98.900 Adequate evidence. Adequate evidence means information sufficient to support the reasonable belief that a...

  13. 2 CFR 180.900 - Adequate evidence.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 2 Grants and Agreements 1 2013-01-01 2013-01-01 false Adequate evidence. 180.900 Section 180.900 Grants and Agreements Office of Management and Budget Guidance for Grants and Agreements OFFICE OF... Adequate evidence. Adequate evidence means information sufficient to support the reasonable belief that a...

  14. 2 CFR 180.900 - Adequate evidence.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 2 Grants and Agreements 1 2012-01-01 2012-01-01 false Adequate evidence. 180.900 Section 180.900 Grants and Agreements Office of Management and Budget Guidance for Grants and Agreements OFFICE OF... Adequate evidence. Adequate evidence means information sufficient to support the reasonable belief that a...

  15. How Many More Guns?: Estimating the Effect of Allowing Licensed Concealed Handguns on a College Campus

    ERIC Educational Resources Information Center

    Bouffard, Jeffrey A.; Nobles, Matt R.; Wells, William; Cavanaugh, Michael R.

    2012-01-01

    Among other arguments, advocates for lifting bans on carrying concealed handguns on campus propose that this would increase the prevalence of legitimately carried handguns, which might then deter crimes or be used to intervene in campus shooting incidents like the one that took place at Virginia Tech in 2007. Opponents suggest that increased…

  16. Subject-based discriminative sparse representation model for detection of concealed information.

    PubMed

    Akhavan, Amir; Moradi, Mohammad Hassan; Vand, Safa Rafiei

    2017-05-01

    The use of machine learning approaches in concealed information test (CIT) plays a key role in the progress of this neurophysiological field. In this paper, we presented a new machine learning method for CIT in which each subject is considered independent of the others. The main goal of this study is to adapt the discriminative sparse models to be applicable for subject-based concealed information test. In order to provide sufficient discriminability between guilty and innocent subjects, we introduced a novel discriminative sparse representation model and its appropriate learning methods. For evaluation of the method forty-four subjects participated in a mock crime scenario and their EEG data were recorded. As the model input, in this study the recurrence plot features were extracted from single trial data of different stimuli. Then the extracted feature vectors were reduced using statistical dependency method. The reduced feature vector went through the proposed subject-based sparse model in which the discrimination power of sparse code and reconstruction error were applied simultaneously. Experimental results showed that the proposed approach achieved better performance than other competing discriminative sparse models. The classification accuracy, sensitivity and specificity of the presented sparsity-based method were about 93%, 91% and 95% respectively. Using the EEG data of a single subject in response to different stimuli types and with the aid of the proposed discriminative sparse representation model, one can distinguish guilty subjects from innocent ones. Indeed, this property eliminates the necessity of several subject EEG data in model learning and decision making for a specific subject. Copyright © 2017 Elsevier B.V. All rights reserved.

  17. Fear Perceptions in Public Parks: Interactions of Environmental Concealment, the Presence of People Recreating, and Gender

    ERIC Educational Resources Information Center

    Jorgensen, Lisa J.; Ellis, Gary D.; Ruddell, Edward

    2013-01-01

    This research examined the effect of concealment (environmental cues), presence or absence of people recreating (social cues), and gender on individuals' fear of crime in a community park setting. Using a 7-point single-item indicator, 732 participants from two samples (540 park visitors and 192 college students) rated their estimates of fear of…

  18. Photonic generation of polarization-resolved wideband chaos with time-delay concealment in three-cascaded vertical-cavity surface-emitting lasers.

    PubMed

    Liu, Huijie; Li, Nianqiang; Zhao, Qingchun

    2015-05-10

    Optical chaos generated by chaotic lasers has been widely used in several important applications, such as chaos-based communications and high-speed random-number generators. However, these applications are susceptible to degradation by the presence of time-delay (TD) signature identified from the chaotic output. Here we propose to achieve the concealment of TD signature, along with the enhancement of chaos bandwidth, in three-cascaded vertical-cavity surface-emitting lasers (VCSELs). The cascaded system is composed of an external-cavity master VCSEL, a solitary intermediate VCSEL, and a solitary slave VCSEL. Through mapping the evolutions of TD signature and chaos bandwidth in the parameter space of the injection strength and frequency detuning, photonic generation of polarization-resolved wideband chaos with TD concealment is numerically demonstrated for wide regions of the injection parameters.

  19. Are There Limits to Collectivism? Culture and Children's Reasoning About Lying to Conceal a Group Transgression.

    PubMed

    Sweet, Monica A; Heyman, Gail D; Fu, Genyue; Lee, Kang

    2010-07-01

    This study explored the effects of collectivism on lying to conceal a group transgression. Seven-, 9-, and 11-year-old US and Chinese children (N = 374) were asked to evaluate stories in which protagonists either lied or told the truth about their group's transgression and were then asked about either the protagonist's motivations or justification for their own evaluations. Previous research suggests that children in collectivist societies such as China find lying for one's group to be more acceptable than do children from individualistic societies such as the United States. The current study provides evidence that this is not always the case: Chinese children in this study viewed lies told to conceal a group's transgressions less favourably than did US children. An examination of children's reasoning about protagonists' motivations for lying indicated that children in both countries focused on an impact to self when discussing motivations for protagonists to lie for their group. Overall, results suggest that children living in collectivist societies do not always focus on the needs of the group.

  20. Threshold considerations in fair allocation of health resources: justice beyond scarcity.

    PubMed

    Alvarez, Allen Andrew A

    2007-10-01

    Application of egalitarian and prioritarian accounts of health resource allocation in low-income countries have both been criticized for implying distribution outcomes that allow decreasing/undermining health gains and for tolerating unacceptable standards of health care and health status that result from such allocation schemes. Insufficient health care and severe deprivation of health resources are difficult to accept even when justified by aggregative efficiency or legitimized by fair deliberative process in pursuing equality and priority oriented outcomes. I affirm the sufficientarian argument that, given extreme scarcity of public health resources in low-income countries, neither health status equality between populations nor priority for the worse off is normatively adequate. Nevertheless, the threshold norm alone need not be the sole consideration when a country's total health budget is extremely scarce. Threshold considerations are necessary in developing a theory of fair distribution of health resources that is sensitive to the lexically prior norm of sufficiency. Based on the intuition that shares must not be taken away from those who barely achieve a minimal level of health, I argue that assessments based on standards of minimal physical/mental health must be developed to evaluate the sufficiency of the total resources of health systems in low-income countries prior to pursuing equality, priority, and efficiency based resource allocation. I also begin to examine how threshold sensitive health resource assessment could be used in the Philippines.

  1. Task allocation among multiple intelligent robots

    NASA Technical Reports Server (NTRS)

    Gasser, L.; Bekey, G.

    1987-01-01

    Researchers describe the design of a decentralized mechanism for allocating assembly tasks in a multiple robot assembly workstation. Currently, the approach focuses on distributed allocation to explore its feasibility and its potential for adaptability to changing circumstances, rather than for optimizing throughput. Individual greedy robots make their own local allocation decisions using both dynamic allocation policies which propagate through a network of allocation goals, and local static and dynamic constraints describing which robots are elibible for which assembly tasks. Global coherence is achieved by proper weighting of allocation pressures propagating through the assembly plan. Deadlock avoidance and synchronization is achieved using periodic reassessments of local allocation decisions, ageing of allocation goals, and short-term allocation locks on goals.

  2. [EFFECTIVENESS OF ADVANCED SKIN FLAP AND V-SHAPED VENTRAL INCISION ALONG THE ROOT OF PENILE SHAFT FOR CONCEALED PENIS].

    PubMed

    Lin, Junshan; Li, Dumiao; Zhang, Jianxing; Wu, Qiang; Xu, Yali; Lin, Li

    2015-09-01

    To investigate effectiveness of advanced skin flap and V-shaped ventral incision along the root of penile shaft for concealed penis in children. Between July 2007 and January 2015, 121 boys with concealed penis were treated with advanced skin flap and V-shaped ventral incision along the root of penile shaft. The age varied from 18 months to 13 years (mean, 7.2 years). Repair was based on a vertical incision in median raphe, complete degloving of penis and tacking its base to the dermis of the skin. Advanced skin flap and a V-shaped ventral incision along the root of penile shaft were used to cover the penile shaft. The operation time ranged from 60 to 100 minutes (mean, 75 minutes). Disruption of wound occurred in 1 case, and was cured after dressing change; and primary healing of incision was obtained in the others. The follow-up period ranged from 3 months to 7 years (median, 24 months). All patients achieved good to excellent cosmetic results with a low incidence of complications. The results were satisfactory in exposure of penis and prepuce appearance. No obvious scar was observed. The penis had similar appearance to that after prepuce circumcision. A combination of advanced skin flap and V-shaped ventral incision along the root of penile shaft is a simple, safe, and effective procedure for concealed penis with a similar appearance result to the prepuce circumcision.

  3. Evolution of poor reporting and inadequate methods over time in 20 920 randomised controlled trials included in Cochrane reviews: research on research study.

    PubMed

    Dechartres, Agnes; Trinquart, Ludovic; Atal, Ignacio; Moher, David; Dickersin, Kay; Boutron, Isabelle; Perrodeau, Elodie; Altman, Douglas G; Ravaud, Philippe

    2017-06-08

    Objective  To examine how poor reporting and inadequate methods for key methodological features in randomised controlled trials (RCTs) have changed over the past three decades. Design  Mapping of trials included in Cochrane reviews. Data sources  Data from RCTs included in all Cochrane reviews published between March 2011 and September 2014 reporting an evaluation of the Cochrane risk of bias items: sequence generation, allocation concealment, blinding, and incomplete outcome data. Data extraction  For each RCT, we extracted consensus on risk of bias made by the review authors and identified the primary reference to extract publication year and journal. We matched journal names with Journal Citation Reports to get 2014 impact factors. Main outcomes measures  We considered the proportions of trials rated by review authors at unclear and high risk of bias as surrogates for poor reporting and inadequate methods, respectively. Results  We analysed 20 920 RCTs (from 2001 reviews) published in 3136 journals. The proportion of trials with unclear risk of bias was 48.7% for sequence generation and 57.5% for allocation concealment; the proportion of those with high risk of bias was 4.0% and 7.2%, respectively. For blinding and incomplete outcome data, 30.6% and 24.7% of trials were at unclear risk and 33.1% and 17.1% were at high risk, respectively. Higher journal impact factor was associated with a lower proportion of trials at unclear or high risk of bias. The proportion of trials at unclear risk of bias decreased over time, especially for sequence generation, which fell from 69.1% in 1986-1990 to 31.2% in 2011-14 and for allocation concealment (70.1% to 44.6%). After excluding trials at unclear risk of bias, use of inadequate methods also decreased over time: from 14.8% to 4.6% for sequence generation and from 32.7% to 11.6% for allocation concealment. Conclusions  Poor reporting and inadequate methods have decreased over time, especially for sequence generation

  4. Geophysical and geochemical data from the area of the Pebble Cu-Au-Mo porphyry deposit, southwestern Alaska: Contributions to assessment techniques for concealed mineral resources

    USGS Publications Warehouse

    Anderson, E.D.; Smith, S.M.; Giles, S.A.; Granitto, Matthew; Eppinger, R.G.; Bedrosian, P.A.; Shah, A.K.; Kelley, K.D.; Fey, D.L.; Minsley, B.J.; Brown, P.J.

    2011-01-01

    In 2007, the U.S. Geological Survey began a multidisciplinary study in southwest Alaska to investigate the setting and detectability of mineral deposits in concealed volcanic and glacial terranes. The study area hosts the world-class Pebble porphyry Cu-Au-Mo deposit, and through collaboration with the Pebble Limited Partnership, a range of geophysical and geochemical investigations was carried out in proximity to the deposit. The deposit is almost entirely concealed by tundra, glacial deposits, and post-mineralization volcanic rocks. The discovery of mineral resources beneath cover is becoming more important because most of the mineral resources at the surface have already been discovered. Research is needed to identify ways in which to assess for concealed mineral resources. This report presents the uninterpreted geophysical measurements and geochemical and mineralogical analytical data from samples collected during the summer field seasons from 2007 to 2010, and makes the data available in a single Geographic Information System (GIS) database.

  5. Self-Concealment, Social Network Sites Usage, Social Appearance Anxiety, Loneliness of High School Students: A Model Testing

    ERIC Educational Resources Information Center

    Dogan, Ugur; Çolak, Tugba Seda

    2016-01-01

    This study was tested a model for explain to social networks sites (SNS) usage with structural equation modeling (SEM). Using SEM on a sample of 475 high school students (35% male, 65% female) students, model was investigated the relationship between self-concealment, social appearance anxiety, loneliness on SNS such as Twitter and Facebook usage.…

  6. Are There Limits to Collectivism? Culture and Children’s Reasoning About Lying to Conceal a Group Transgression

    PubMed Central

    Sweet, Monica A.; Heyman, Gail D.; Fu, Genyue; Lee, Kang

    2010-01-01

    This study explored the effects of collectivism on lying to conceal a group transgression. Seven-, 9-, and 11-year-old US and Chinese children (N = 374) were asked to evaluate stories in which protagonists either lied or told the truth about their group’s transgression and were then asked about either the protagonist’s motivations or justification for their own evaluations. Previous research suggests that children in collectivist societies such as China find lying for one’s group to be more acceptable than do children from individualistic societies such as the United States. The current study provides evidence that this is not always the case: Chinese children in this study viewed lies told to conceal a group’s transgressions less favourably than did US children. An examination of children’s reasoning about protagonists’ motivations for lying indicated that children in both countries focused on an impact to self when discussing motivations for protagonists to lie for their group. Overall, results suggest that children living in collectivist societies do not always focus on the needs of the group. PMID:20953286

  7. Synaptic Tagging During Memory Allocation

    PubMed Central

    Rogerson, Thomas; Cai, Denise; Frank, Adam; Sano, Yoshitake; Shobe, Justin; Aranda, Manuel L.; Silva, Alcino J.

    2014-01-01

    There is now compelling evidence that the allocation of memory to specific neurons (neuronal allocation) and synapses (synaptic allocation) in a neurocircuit is not random and that instead specific mechanisms, such as increases in neuronal excitability and synaptic tagging and capture, determine the exact sites where memories are stored. We propose an integrated view of these processes, such that neuronal allocation, synaptic tagging and capture, spine clustering and metaplasticity reflect related aspects of memory allocation mechanisms. Importantly, the properties of these mechanisms suggest a set of rules that profoundly affect how memories are stored and recalled. PMID:24496410

  8. Test-treatment RCTs are susceptible to bias: a review of the methodological quality of randomized trials that evaluate diagnostic tests.

    PubMed

    Ferrante di Ruffano, Lavinia; Dinnes, Jacqueline; Sitch, Alice J; Hyde, Chris; Deeks, Jonathan J

    2017-02-24

    There is a growing recognition for the need to expand our evidence base for the clinical effectiveness of diagnostic tests. Many international bodies are calling for diagnostic randomized controlled trials to provide the most rigorous evidence of impact to patient health. Although these so-called test-treatment RCTs are very challenging to undertake due to their methodological complexity, they have not been subjected to a systematic appraisal of their methodological quality. The extent to which these trials may be producing biased results therefore remains unknown. We set out to address this issue by conducting a methodological review of published test-treatment trials to determine how often they implement adequate methods to limit bias and safeguard the validity of results. We ascertained all test-treatment RCTs published 2004-2007, indexed in CENTRAL, including RCTs which randomized patients to diagnostic tests and measured patient outcomes after treatment. Tests used for screening, monitoring or prognosis were excluded. We assessed adequacy of sequence generation, allocation concealment and intention-to-treat, appropriateness of primary analyses, blinding and reporting of power calculations, and extracted study characteristics including the primary outcome. One hundred three trials compared 105 control with 119 experimental interventions, and reported 150 primary outcomes. Randomization and allocation concealment were adequate in 57 and 37% of trials. Blinding was uncommon (patients 5%, clinicians 4%, outcome assessors 21%), as was an adequate intention-to-treat analysis (29%). Overall 101 of 103 trials (98%) were at risk of bias, as judged using standard Cochrane criteria. Test-treatment trials are particularly susceptible to attrition and inadequate primary analyses, lack of blinding and under-powering. These weaknesses pose much greater methodological and practical challenges to conducting reliable RCT evaluations of test-treatment strategies than standard

  9. Divergence in plant and microbial allocation strategies explains continental patterns in microbial allocation and biogeochemical fluxes.

    PubMed

    Averill, Colin

    2014-10-01

    Allocation trade-offs shape ecological and biogeochemical phenomena at local to global scale. Plant allocation strategies drive major changes in ecosystem carbon cycling. Microbial allocation to enzymes that decompose carbon vs. organic nutrients may similarly affect ecosystem carbon cycling. Current solutions to this allocation problem prioritise stoichiometric tradeoffs implemented in plant ecology. These solutions may not maximise microbial growth and fitness under all conditions, because organic nutrients are also a significant carbon resource for microbes. I created multiple allocation frameworks and simulated microbial growth using a microbial explicit biogeochemical model. I demonstrate that prioritising stoichiometric trade-offs does not optimise microbial allocation, while exploiting organic nutrients as carbon resources does. Analysis of continental-scale enzyme data supports the allocation patterns predicted by this framework, and modelling suggests large deviations in soil C loss based on which strategy is implemented. Therefore, understanding microbial allocation strategies will likely improve our understanding of carbon cycling and climate. © 2014 John Wiley & Sons Ltd/CNRS.

  10. Disclosure and Concealment of Sexual Orientation and the Mental Health of Non-Gay-Identified, Behaviorally Bisexual Men

    ERIC Educational Resources Information Center

    Schrimshaw, Eric W.; Siegel, Karolynn; Downing, Martin J., Jr.; Parsons, Jeffrey T.

    2013-01-01

    Objective: Although bisexual men report lower levels of mental health relative to gay men, few studies have examined the factors that contribute to bisexual men's mental health. Bisexual men are less likely to disclose, and more likely to conceal (i.e., a desire to hide), their sexual orientation than gay men. Theory suggests that this may…

  11. [The challenge of adequate reimbursement for the seriously injured patient in the German DRG system].

    PubMed

    Franz, D; Lefering, R; Siebert, H; Windolf, J; Roeder, N; Mahlke, L

    2013-02-01

    ability to obtain adequate case allocations for highly complex and heterogeneous cases. Specific modifications of the G-DRG structures could increase the appropriateness of case allocation of critically injured patients. Additional consideration of the ISS clinical data must be further evaluated. Data-based analysis is an essential prerequisite for a constructive development of the G-DRG system and a necessary tool for the active participation of medical societies in this process. © Georg Thieme Verlag KG Stuttgart · New York.

  12. Liver allocation and distribution: time for a change.

    PubMed

    Deshpande, Ranjit; Hirose, Ryutaro; Mulligan, David

    2017-04-01

    Liver allograft allocation has been a topic of hot debate for over a decade. New redistricting changes have been proposed by the Liver and Intestinal Transplant Committee to the existing United Network for Organ Sharing (UNOS) liver allocation policy. The basis of this new proposal is similar to the old one with an aim to distribute organs in a fair, efficient and equitable fashion. In this review, we plan to look in depth at the redistribution proposals thus far, their merits and how they may help patients who do not have adequate access to livers. Many authors have criticized the proposed changes to organ distribution to reduce geographic disparity in access to liver transplantation. Our focus in this article is to bring forth the most recent literature and proposed changes in the current distribution system. We will also mention two other possible methods that have been proposed to redesign distribution using concentric circles and neighborhoods. In this article, we also look at the economics of the redistricting proposal and its effects on transplant centers. The UNOS Liver and Intestinal Transplant Committee has recommended a proposal using the eight-district model with proximity circles and three additional Model for End-Stage Liver Disease (MELD) points with initial sharing MELD threshold of 25 as a starting point to reduce disparity in patient access to deceased donor livers for transplantation. This proposal has met with significant resistance because of concerns of cost, logistics and impact on existing transplant centers. Other methodologies have also been proposed that have the potential to significantly improve our current disparity of access to life-saving organs. Variation in the supply of donor organs vs. the demand or need for liver transplant by geography and the current defined areas of distribution drive this disparity. Cost benefits to the healthcare system in caring for patients with advanced stages of liver disease may outweigh increased

  13. Parenting beliefs and practices of opiate-addicted parents: concealment and taboo.

    PubMed

    Hogan, Diane M

    2003-07-01

    The lifestyle associated with opiate dependence, including drug taking, the buying and selling of drugs, and contact with other drug users, carries potential risks for the safety and well-being of children of drug-using parents. Based on a qualitative interview study conducted with 50 opiate-dependent parents in Dublin, Ireland, the parenting beliefs and practices in relation to children's exposure to drugs and the associated lifestyle are described. Parents saw their lifestyle as potentially risky for their children and their families. The most common strategy adopted by parents was to conceal their drug-related activities and maintain a strict family taboo about these activities. Intervention programmes should be offered to support effective family communication about parental drug dependence. Copyright 2003 S. Karger AG, Basel

  14. Vitamin D and musculoskeletal status in Nova Scotian women who wear concealing clothing.

    PubMed

    Ojah, Rani C I; Welch, Jo M

    2012-05-01

    Bone and muscle weakness due to vitamin D deficiency is common among Muslim women who reside in sunny, equatorial countries. The purpose of this study was to determine if living in a northern maritime location additionally disadvantages women who wear concealing clothes. A cross-sectional matched pair design was used to compare women who habitually wore concealing clothing with women who dressed according to western norms. Each premenopausal hijab-wearing woman (n = 11) was matched by age, height, weight and skin tone with a western-dressed woman. Subjects were tested by hand grip dynamometry to assess muscular strength and by quantitative ultrasound at the calcaneus to assess bone status. Nutritional intake was obtained by 24 h recall. Serum 25-hydroxyvitamin D (s-25(OH)D) status was determined in seven matched pairs. The hijab group had lower s-25(OH)D than women who wore western clothes (40 ± 28 vs. 81 ± 32 nmol/L, p= 0.01). Grip strength in the right hand was lower in the hijab-wearing women (p = 0.05) but this appeared to be due to less participation in intense exercise. Bone status did not differ between groups (p= 0.9). Dietary intake of vitamin D was lower in the hijab-wearers (316 ± 353 vs. 601 ± 341 IU/day, p= 0.001). This pilot study suggests that women living in a northern maritime location appear to be at risk for vitamin D insufficiency and therefore should consider taking vitamin D supplements.

  15. Vitamin D and Musculoskeletal Status in Nova Scotian Women Who Wear Concealing Clothing

    PubMed Central

    Ojah, Rani C. I.; Welch, Jo M.

    2012-01-01

    Bone and muscle weakness due to vitamin D deficiency is common among Muslim women who reside in sunny, equatorial countries. The purpose of this study was to determine if living in a northern maritime location additionally disadvantages women who wear concealing clothes. A cross-sectional matched pair design was used to compare women who habitually wore concealing clothing with women who dressed according to western norms. Each premenopausal hijab-wearing woman (n = 11) was matched by age, height, weight and skin tone with a western-dressed woman. Subjects were tested by hand grip dynamometry to assess muscular strength and by quantitative ultrasound at the calcaneus to assess bone status. Nutritional intake was obtained by 24 h recall. Serum 25-hydroxyvitamin D (s-25(OH)D) status was determined in seven matched pairs. The hijab group had lower s-25(OH)D than women who wore western clothes (40 ± 28 vs. 81 ± 32 nmol/L, p= 0.01). Grip strength in the right hand was lower in the hijab-wearing women (p = 0.05) but this appeared to be due to less participation in intense exercise. Bone status did not differ between groups (p= 0.9). Dietary intake of vitamin D was lower in the hijab-wearers (316 ± 353 vs. 601 ± 341 IU/day, p= 0.001). This pilot study suggests that women living in a northern maritime location appear to be at risk for vitamin D insufficiency and therefore should consider taking vitamin D supplements. PMID:22690323

  16. Systematic review of non-surgical therapies for osteoarthritis of the hand: an update.

    PubMed

    Lue, S; Koppikar, S; Shaikh, K; Mahendira, D; Towheed, T E

    2017-09-01

    To update our earlier systematic reviews which evaluated all published randomized controlled trials (RCTs) evaluating pharmacological and non-pharmacological therapies in patients with hand osteoarthritis (OA). Surgical therapies were not evaluated. RCTs published between March 2008 and December 2015 were added to the previous systematic reviews. A total of 95 RCTs evaluating various pharmacological and non-pharmacological therapies in hand OA were analyzed in this update. Generally, the methodological quality of these RCTs has improved since the last update, with more studies describing their methods for randomization, blinding, and allocation concealment. However, RCTs continue to be weakened by a lack of consistent case definition and a lack of standardized outcome assessments specific to hand OA. The number and location of evaluated hand joints continues to be underreported, and only 25% of RCTs adequately described the method used to ensure allocation concealment. These remain major weaknesses of published RCTs. A meta-analysis could not be performed because of marked study heterogeneity, insufficient statistical data available in the published RCTs, and a small number of identical comparators. Hand OA is a complex area in which to study the efficacy of therapies. There has been an improvement in the overall design and conduct of RCTs, however, additional large RCTs with a more robust methodological approach specific to hand OA are needed in order to make clinically relevant conclusions about the efficacy of the diverse treatment options available. Copyright © 2017 Osteoarthritis Research Society International. Published by Elsevier Ltd. All rights reserved.

  17. 5 CFR 919.900 - Adequate evidence.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Adequate evidence. 919.900 Section 919.900 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS.... Adequate evidence means information sufficient to support the reasonable belief that a particular act or...

  18. 5 CFR 919.900 - Adequate evidence.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 5 Administrative Personnel 2 2011-01-01 2011-01-01 false Adequate evidence. 919.900 Section 919.900 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS.... Adequate evidence means information sufficient to support the reasonable belief that a particular act or...

  19. 5 CFR 919.900 - Adequate evidence.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 5 Administrative Personnel 2 2014-01-01 2014-01-01 false Adequate evidence. 919.900 Section 919.900 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS.... Adequate evidence means information sufficient to support the reasonable belief that a particular act or...

  20. 5 CFR 919.900 - Adequate evidence.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 5 Administrative Personnel 2 2013-01-01 2013-01-01 false Adequate evidence. 919.900 Section 919.900 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS.... Adequate evidence means information sufficient to support the reasonable belief that a particular act or...

  1. 5 CFR 919.900 - Adequate evidence.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 5 Administrative Personnel 2 2012-01-01 2012-01-01 false Adequate evidence. 919.900 Section 919.900 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT (CONTINUED) CIVIL SERVICE REGULATIONS.... Adequate evidence means information sufficient to support the reasonable belief that a particular act or...

  2. 50 CFR 660.55 - Allocations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... biennial fishing period's open access allocation. (B) [Reserved] (f) Catch accounting. Catch accounting... allocations in a given biennial cycle, catch of those species are counted against the limited entry/open... fisheries—(i) Catch accounting for the trawl allocation. Any groundfish caught by a vessel registered to a...

  3. Controlled Trials in Children: Quantity, Methodological Quality and Descriptive Characteristics of Pediatric Controlled Trials Published 1948-2006

    PubMed Central

    Thomson, Denise; Hartling, Lisa; Cohen, Eyal; Vandermeer, Ben; Tjosvold, Lisa; Klassen, Terry P.

    2010-01-01

    Background The objective of this study was to describe randomized controlled trials (RCTs) and controlled clinical trials (CCTs) in child health published between 1948 and 2006, in terms of quantity, methodological quality, and publication and trial characteristics. We used the Trials Register of the Cochrane Child Health Field for overall trends and a sample from this to explore trial characteristics in more detail. Methodology/Principal Findings We extracted descriptive data on a random sample of 578 trials. Ninety-six percent of the trials were published in English; the percentage of child-only trials was 90.5%. The most frequent diagnostic categories were infectious diseases (13.2%), behavioural and psychiatric disorders (11.6%), neonatal critical care (11.4%), respiratory disorders (8.9%), non-critical neonatology (7.9%), and anaesthesia (6.5%). There were significantly fewer child-only studies (i.e., more mixed child and adult studies) over time (P = 0.0460). The proportion of RCTs to CCTs increased significantly over time (P<0.0001), as did the proportion of multicentre trials (P = 0.002). Significant increases over time were found in methodological quality (Jadad score) (P<0.0001), the proportion of double-blind studies (P<0.0001), and studies with adequate allocation concealment (P<0.0001). Additionally, we found an improvement in reporting over time: adequate description of withdrawals and losses to follow-up (P<0.0001), sample size calculations (P<0.0001), and intention-to-treat analysis (P<0.0001). However, many trials still do not describe their level of blinding, and allocation concealment was inadequately reported in the majority of studies across the entire time period. The proportion of studies with industry funding decreased slightly over time (P = 0.003), and these studies were more likely to report positive conclusions (P = 0.028). Conclusions/Significance The quantity and quality of pediatric controlled trials has increased over

  4. Controlled trials in children: quantity, methodological quality and descriptive characteristics of pediatric controlled trials published 1948-2006.

    PubMed

    Thomson, Denise; Hartling, Lisa; Cohen, Eyal; Vandermeer, Ben; Tjosvold, Lisa; Klassen, Terry P

    2010-09-30

    The objective of this study was to describe randomized controlled trials (RCTs) and controlled clinical trials (CCTs) in child health published between 1948 and 2006, in terms of quantity, methodological quality, and publication and trial characteristics. We used the Trials Register of the Cochrane Child Health Field for overall trends and a sample from this to explore trial characteristics in more detail. We extracted descriptive data on a random sample of 578 trials. Ninety-six percent of the trials were published in English; the percentage of child-only trials was 90.5%. The most frequent diagnostic categories were infectious diseases (13.2%), behavioural and psychiatric disorders (11.6%), neonatal critical care (11.4%), respiratory disorders (8.9%), non-critical neonatology (7.9%), and anaesthesia (6.5%). There were significantly fewer child-only studies (i.e., more mixed child and adult studies) over time (P = 0.0460). The proportion of RCTs to CCTs increased significantly over time (P<0.0001), as did the proportion of multicentre trials (P = 0.002). Significant increases over time were found in methodological quality (Jadad score) (P<0.0001), the proportion of double-blind studies (P<0.0001), and studies with adequate allocation concealment (P<0.0001). Additionally, we found an improvement in reporting over time: adequate description of withdrawals and losses to follow-up (P<0.0001), sample size calculations (P<0.0001), and intention-to-treat analysis (P<0.0001). However, many trials still do not describe their level of blinding, and allocation concealment was inadequately reported in the majority of studies across the entire time period. The proportion of studies with industry funding decreased slightly over time (P = 0.003), and these studies were more likely to report positive conclusions (P = 0.028). The quantity and quality of pediatric controlled trials has increased over time; however, much work remains to be done, particularly in improving

  5. When Interference Helps: Increasing Executive Load to Facilitate Deception Detection in the Concealed Information Test

    PubMed Central

    Visu-Petra, George; Varga, Mihai; Miclea, Mircea; Visu-Petra, Laura

    2013-01-01

    The possibility to enhance the detection efficiency of the Concealed Information Test (CIT) by increasing executive load was investigated, using an interference design. After learning and executing a mock crime scenario, subjects underwent three deception detection tests: an RT-based CIT, an RT-based CIT plus a concurrent memory task (CITMem), and an RT-based CIT plus a concurrent set-shifting task (CITShift). The concealed information effect, consisting in increased RT and lower response accuracy for probe items compared to irrelevant items, was evidenced across all three conditions. The group analyses indicated a larger difference between RTs to probe and irrelevant items in the dual-task conditions, but this difference was not translated in a significantly increased detection efficiency at an individual level. Signal detection parameters based on the comparison with a simulated innocent group showed accurate discrimination for all conditions. Overall response accuracy on the CITMem was highest and the difference between response accuracy to probes and irrelevants was smallest in this condition. Accuracy on the concurrent tasks (Mem and Shift) was high, and responses on these tasks were significantly influenced by CIT stimulus type (probes vs. irrelevants). The findings are interpreted in relation to the cognitive load/dual-task interference literature, generating important insights for research on the involvement of executive functions in deceptive behavior. PMID:23543918

  6. The Disclosure Processes Model: Understanding Disclosure Decision Making and Postdisclosure Outcomes among People Living with a Concealable Stigmatized Identity

    ERIC Educational Resources Information Center

    Chaudoir, Stephenie R.; Fisher, Jeffrey D.

    2010-01-01

    Disclosure is a critical aspect of the experience of people who live with concealable stigmatized identities. This article presents the disclosure processes model (DPM)--a framework with which to examine when and why interpersonal disclosure may be beneficial. The DPM suggests that antecedent goals representing approach and avoidance motivational…

  7. Applicability and Limitations of Reliability Allocation Methods

    NASA Technical Reports Server (NTRS)

    Cruz, Jose A.

    2016-01-01

    Reliability allocation process may be described as the process of assigning reliability requirements to individual components within a system to attain the specified system reliability. For large systems, the allocation process is often performed at different stages of system design. The allocation process often begins at the conceptual stage. As the system design develops, more information about components and the operating environment becomes available, different allocation methods can be considered. Reliability allocation methods are usually divided into two categories: weighting factors and optimal reliability allocation. When properly applied, these methods can produce reasonable approximations. Reliability allocation techniques have limitations and implied assumptions that need to be understood by system engineers. Applying reliability allocation techniques without understanding their limitations and assumptions can produce unrealistic results. This report addresses weighting factors, optimal reliability allocation techniques, and identifies the applicability and limitations of each reliability allocation technique.

  8. 2 CFR 180.900 - Adequate evidence.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 2 Grants and Agreements 1 2014-01-01 2014-01-01 false Adequate evidence. 180.900 Section 180.900 Grants and Agreements Office of Management and Budget Guidance for Grants and Agreements OFFICE OF.... Adequate evidence means information sufficient to support the reasonable belief that a particular act or...

  9. 2 CFR 180.900 - Adequate evidence.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 2 Grants and Agreements 1 2011-01-01 2011-01-01 false Adequate evidence. 180.900 Section 180.900 Grants and Agreements Office of Management and Budget Guidance for Grants and Agreements OFFICE OF.... Adequate evidence means information sufficient to support the reasonable belief that a particular act or...

  10. Understanding Where Americas Public Discussion Takes Place In Todays Society: Case Studies of Concealed Weapons Carry Reform

    DTIC Science & Technology

    2016-06-01

    media sources on the public discourse. This research compares and contrasts the roles and importance of traditional and social media in the public...alternative media , social media 15. NUMBER OF PAGES 73 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY...importance of traditional and social media in the public sphere today, as evidenced by the coverage of concealed-carry laws and related stories. The

  11. Impulse radar imaging system for concealed object detection

    NASA Astrophysics Data System (ADS)

    Podd, F. J. W.; David, M.; Iqbal, G.; Hussain, F.; Morris, D.; Osakue, E.; Yeow, Y.; Zahir, S.; Armitage, D. W.; Peyton, A. J.

    2013-10-01

    Electromagnetic systems for imaging concealed objects at checkpoints typically employ radiation at millimetre and terahertz frequencies. These systems have been shown to be effective and provide a sufficiently high resolution image. However there are difficulties and current electromagnetic systems have limitations particularly in accurately differentiating between threat and innocuous objects based on shape, surface emissivity or reflectivity, which are indicative parameters. In addition, water has a high absorption coefficient at millimetre wavelength and terahertz frequencies, which makes it more difficult for these frequencies to image through thick damp clothing. This paper considers the potential of using ultra wideband (UWB) in the low gigahertz range. The application of this frequency band to security screening appears to be a relatively new field. The business case for implementing the UWB system has been made financially viable by the recent availability of low-cost integrated circuits operating at these frequencies. Although designed for the communication sector, these devices can perform the required UWB radar measurements as well. This paper reports the implementation of a 2 to 5 GHz bandwidth linear array scanner. The paper describes the design and fabrication of transmitter and receiver antenna arrays whose individual elements are a type of antipodal Vivaldi antenna. The antenna's frequency and angular response were simulated in CST Microwave Studio and compared with laboratory measurements. The data pre-processing methods of background subtraction and deconvolution are implemented to improve the image quality. The background subtraction method uses a reference dataset to remove antenna crosstalk and room reflections from the dataset. The deconvolution method uses a Wiener filter to "sharpen" the returned echoes which improves the resolution of the reconstructed image. The filter uses an impulse response reference dataset and a signal

  12. Lead isotopes in iron and manganese oxide coatings and their use as an exploration guide for concealed mineralization

    USGS Publications Warehouse

    Gulson, B.L.; Church, S.E.; Mizon, K.J.; Meier, A.L.

    1992-01-01

    Lead isotopes from Fe and Mn oxides that coat stream pebbles from around the Mount Emmons porphyry molybdenum deposit in Colorado were studied to assess the feasibility of using Pb isotopes to detect concealed mineral deposits. The Fe/Mn oxide coatings were analyzed to determine their elemental concentrations using ICP-AES. The Pb isotope compositions of solutions from a selected suite of samples were measured, using both thermal ionization and ICP mass spectrometry, to compare results determined by the two analytical methods. Heavy mineral concentrates from the same sites were also analyzed to compare the Pb isotope compositions of the Fe/Mn coatings with those found in panned concentrates. The Fe/Mn and 206Pb/204Pb ratios of the oxide coatings are related to the lithology of the host rocks; Fe/Mn oxide coatings on pebbles of black shale have higher Fe/Mn values than do the coatings on either sandstone or igneous rocks. The shale host rocks have a more radiogenic signature (e.g. higher 206Pb/ 204Pb) than the sandstone or igneous host rocks. The Pb isotope data from sandstone and igneous hosts can detect concealed mineralized rock on both a regional and local scale, even though there are contributions from: (1) metals from the main-stage molybdenite ore deposit; (2) metals from the phyllic alteration zone which has a more radiogenic Pb isotope signature reflecting hydrothermal leaching of Pb from the Mancos Shale; (3) Pb-rich base metal veins with a highly variable Pb isotope signature; and (4) sedimentary country rocks which have a more radiogenic Pb isotope signature. An investigation of within-stream variation shows that the Pb isotope signature of the molybdenite ore zone is retained in the Fe/Mn oxide coatings and is not camouflaged by contributions from Pb-rich base-metal veins that crop out upstream. In another traverse, the Pb isotope data from Fe/Mn oxide coatings reflect a complex mixing of Pb from the molybdenite ore zone and its hornfels margin, Pb

  13. 29 CFR 4044.10 - Manner of allocation.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 29 Labor 9 2014-07-01 2014-07-01 false Manner of allocation. 4044.10 Section 4044.10 Labor Regulations Relating to Labor (Continued) PENSION BENEFIT GUARANTY CORPORATION PLAN TERMINATIONS ALLOCATION OF ASSETS IN SINGLE-EMPLOYER PLANS Allocation of Assets Allocation of Assets to Benefit Categories § 4044.10 Manner of allocation. (a) General. The...

  14. 29 CFR 4044.10 - Manner of allocation.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 29 Labor 9 2012-07-01 2012-07-01 false Manner of allocation. 4044.10 Section 4044.10 Labor Regulations Relating to Labor (Continued) PENSION BENEFIT GUARANTY CORPORATION PLAN TERMINATIONS ALLOCATION OF ASSETS IN SINGLE-EMPLOYER PLANS Allocation of Assets Allocation of Assets to Benefit Categories § 4044.10 Manner of allocation. (a) General. The...

  15. 29 CFR 4044.10 - Manner of allocation.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 9 2011-07-01 2011-07-01 false Manner of allocation. 4044.10 Section 4044.10 Labor Regulations Relating to Labor (Continued) PENSION BENEFIT GUARANTY CORPORATION PLAN TERMINATIONS ALLOCATION OF ASSETS IN SINGLE-EMPLOYER PLANS Allocation of Assets Allocation of Assets to Benefit Categories § 4044.10 Manner of allocation. Link to an...

  16. 29 CFR 4044.10 - Manner of allocation.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 29 Labor 9 2013-07-01 2013-07-01 false Manner of allocation. 4044.10 Section 4044.10 Labor Regulations Relating to Labor (Continued) PENSION BENEFIT GUARANTY CORPORATION PLAN TERMINATIONS ALLOCATION OF ASSETS IN SINGLE-EMPLOYER PLANS Allocation of Assets Allocation of Assets to Benefit Categories § 4044.10 Manner of allocation. (a) General. The...

  17. Millimetre wave and terahertz technology for the detection of concealed threats: a review

    NASA Astrophysics Data System (ADS)

    Kemp, Michael C.

    2006-09-01

    There has been intense interest in the use of millimetre wave and terahertz technology for the detection of concealed weapons, explosives and other threats. Electromagnetic waves at these frequencies are safe, penetrate barriers and have short enough wavelengths to allow discrimination between objects. In addition, many solids including explosives have characteristic spectroscopic signatures at terahertz wavelengths which can be used to identify them. This paper reviews the progress which has been made in recent years and identifies the achievements, challenges and prospects for these technologies in checkpoint people screening, stand off detection of improvised explosive devices (IEDs) and suicide bombers as well as more specialized screening tasks.

  18. Courtesy stigma: A concealed consternation among caregivers of people affected by leprosy.

    PubMed

    Dako-Gyeke, Mavis

    2018-01-01

    This study explored experiences of courtesy stigma among caregivers of people affected by leprosy. Using a qualitative research approach, twenty participants were purposively selected and in-depth interviews conducted. The interviews were audio-recorded, transcribed, and analyzed to identify emerging themes that addressed objectives of the study. The findings indicated that caregivers of people affected by leprosy experienced courtesy stigma. Evidence showed that fear of contagion underpinned caregivers' experiences, especially in employment and romantic relationships. In addition, participants adopted different strategies (disregarding, concealment, education, faith-based trust) to handle courtesy stigma. The findings demonstrate that psychosocial support and financial assistance to caregivers are necessary considerations for attainment of effective care for people affected by leprosy. Copyright © 2017 Elsevier Ltd. All rights reserved.

  19. Carbon allocation and accumulation in conifers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gower, S.T.; Isebrands, J.G.; Sheriff, D.W.

    1995-07-01

    Forests cover approximately 33% of the land surface of the earth, yet they are responsible for 65% of the annual carbon (C) accumulated by all terrestrial biomes. In general, total C content and net primary production rates are greater for forests than for other biomes, but C budgets differ greatly among forests. Despite several decades of research on forest C budgets, there is still an incomplete understanding of the factors controlling C allocation. Yet, if we are to understand how changing global events such as land use, climate change, atmospheric N deposition, ozone, and elevated atmospheric CO{sub 2} affect themore » global C budget, a mechanistic understanding of C assimilation, partitioning, and allocation is necessary. The objective of this chapter is to review the major factors that influence C allocation and accumulation in conifer trees and forests. In keeping with the theme of this book, we will focus primarily on evergreen conifers. However, even among evergreen conifers, leaf, canopy, and stand-level C and nutrient allocation patterns differ, often as a function of leaf development and longevity. The terminology related to C allocation literature is often inconsistent, confusing and inadequate for understanding and integrating past and current research. For example, terms often used synonymously to describe C flow or movement include translocation, transport, distribution, allocation, partitioning, apportionment, and biomass allocation. A common terminology is needed because different terms have different meanings to readers. In this paper we use C allocation, partitioning, and accumulation according to the definitions of Dickson and Isebrands (1993). Partitioning is the process of C flow into and among different chemical, storage, and transport pools. Allocation is the distribution of C to different plant parts within the plant (i.e., source to sink). Accumulation is the end product of the process of C allocation.« less

  20. Imaging the concealed section of the Whakatane fault below Whakatane city, New Zealand, with a shear wave land streamer system

    NASA Astrophysics Data System (ADS)

    Polom, Ulrich; Mueller, Christof; Krawczyk, CharLotte M.

    2016-04-01

    The Mw 7.1 Darfield Earthquake in September 2010 ruptured the surface along the Greendale Fault that was not known prior to the earthquake. The subsequent Mw 6.3 Christchurch earthquake in February 2011 demonstrated that concealed active faults have a significant risk potential for urban infrastructure and human life in New Zealand if they are located beneath or close to such areas. Mapping exposures and analysis of active faults incorporated into the National Seismic Hazard Model (NSHM) suggests that several thousands of these active structures are yet to be identified and have the potential to generate moderate to large magnitude earthquakes (i.e. magnitudes >5). Geological mapping suggests that active faults pass beneath, or within many urban areas in New Zealand, including Auckland, Blenheim, Christchurch, Hastings/Napier, Nelson, Rotorua, Taupo, Wellington, and Whakatane. Since no established methodology for routinely locating and assessing the earthquake hazard posed by concealed active faults is available, the principal objective of the presented study was to evaluate the usefulness of high-resolution shear wave seismic reflection profiling using a land streamer to locate buried faults in urban areas of New Zealand. During the survey carried out in the city of Whakatane in February 2015, the method was first tested over a well known surface outcrop of the Edgecumbe Fault 30 km south-west of Whakatane city. This allowed further to investigate the principle shear wave propagation characteristics in the unknown sediments, consisting mainly of effusive rock material of the Taupo volcanic zone mixed with marine transgression units. Subsequently the survey was continued within Whakatane city using night operation time slots to reduce the urban noise. In total, 11 profiles of 5.7 km length in high data quality were acquired, which clearly show concealed rupture structures of obviously different age in the shallow sediments down to 100 m depth. Subject to depth

  1. Enhanced terahertz imaging system performance analysis and design tool for concealed weapon identification

    NASA Astrophysics Data System (ADS)

    Murrill, Steven R.; Franck, Charmaine C.; Espinola, Richard L.; Petkie, Douglas T.; De Lucia, Frank C.; Jacobs, Eddie L.

    2011-11-01

    The U.S. Army Research Laboratory (ARL) and the U.S. Army Night Vision and Electronic Sensors Directorate (NVESD) have developed a terahertz-band imaging system performance model/tool for detection and identification of concealed weaponry. The details of the MATLAB-based model which accounts for the effects of all critical sensor and display components, and for the effects of atmospheric attenuation, concealment material attenuation, and active illumination, were reported on at the 2005 SPIE Europe Security & Defence Symposium (Brugge). An advanced version of the base model that accounts for both the dramatic impact that target and background orientation can have on target observability as related to specular and Lambertian reflections captured by an active-illumination-based imaging system, and for the impact of target and background thermal emission, was reported on at the 2007 SPIE Defense and Security Symposium (Orlando). This paper will provide a comprehensive review of an enhanced, user-friendly, Windows-executable, terahertz-band imaging system performance analysis and design tool that now includes additional features such as a MODTRAN-based atmospheric attenuation calculator and advanced system architecture configuration inputs that allow for straightforward performance analysis of active or passive systems based on scanning (single- or line-array detector element(s)) or staring (focal-plane-array detector elements) imaging architectures. This newly enhanced THz imaging system design tool is an extension of the advanced THz imaging system performance model that was developed under the Defense Advanced Research Project Agency's (DARPA) Terahertz Imaging Focal-Plane Technology (TIFT) program. This paper will also provide example system component (active-illumination source and detector) trade-study analyses using the new features of this user-friendly THz imaging system performance analysis and design tool.

  2. Constant time worker thread allocation via configuration caching

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Eichenberger, Alexandre E; O'Brien, John K. P.

    Mechanisms are provided for allocating threads for execution of a parallel region of code. A request for allocation of worker threads to execute the parallel region of code is received from a master thread. Cached thread allocation information identifying prior thread allocations that have been performed for the master thread are accessed. Worker threads are allocated to the master thread based on the cached thread allocation information. The parallel region of code is executed using the allocated worker threads.

  3. The “Good Cop, Bad Cop” Effect in the RT-Based Concealed Information Test: Exploring the Effect of Emotional Expressions Displayed by a Virtual Investigator

    PubMed Central

    Varga, Mihai; Visu-Petra, George; Miclea, Mircea; Visu-Petra, Laura

    2015-01-01

    Concealing the possession of relevant information represents a complex cognitive process, shaped by contextual demands and individual differences in cognitive and socio-emotional functioning. The Reaction Time-based Concealed Information Test (RT-CIT) is used to detect concealed knowledge based on the difference in RTs between denying recognition of critical (probes) and newly encountered (irrelevant) information. Several research questions were addressed in this scenario implemented after a mock crime. First, we were interested whether the introduction of a social stimulus (facial identity) simulating a virtual investigator would facilitate the process of deception detection. Next, we explored whether his emotional displays (friendly, hostile or neutral) would have a differential impact on speed of responses to probe versus irrelevant items. We also compared the impact of introducing similar stimuli in a working memory (WM) updating context without requirements to conceal information. Finally, we explored the association between deceptive behavior and individual differences in WM updating proficiency or in internalizing problems (state / trait anxiety and depression). Results indicated that the mere presence of a neutral virtual investigator slowed down participants' responses, but not the appended lie-specific time (difference between probes and irrelevants). Emotional expression was shown to differentially affect speed of responses to critical items, with positive displays from the virtual examiner enhancing lie-specific time, compared to negative facial expressions, which had an opposite impact. This valence-specific effect was not visible in the WM updating context. Higher levels of trait / state anxiety were related to faster responses to probes in the negative condition (hostile facial expression) of the RT-CIT. These preliminary findings further emphasize the need to take into account motivational and emotional factors when considering the transfer of

  4. System Resource Allocations | High-Performance Computing | NREL

    Science.gov Websites

    Allocations System Resource Allocations To use NREL's high-performance computing (HPC) resources : Compute hours on NREL HPC Systems including Peregrine and Eagle Storage space (in Terabytes) on Peregrine , Eagle and Gyrfalcon. Allocations are principally done in response to an annual call for allocation

  5. 47 CFR 64.901 - Allocation of costs.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... cost categories) for which a direct assignment or allocation is available. (iii) When neither direct... 47 Telecommunication 3 2010-10-01 2010-10-01 false Allocation of costs. 64.901 Section 64.901... RULES RELATING TO COMMON CARRIERS Allocation of Costs § 64.901 Allocation of costs. (a) Carriers...

  6. An intelligent allocation algorithm for parallel processing

    NASA Technical Reports Server (NTRS)

    Carroll, Chester C.; Homaifar, Abdollah; Ananthram, Kishan G.

    1988-01-01

    The problem of allocating nodes of a program graph to processors in a parallel processing architecture is considered. The algorithm is based on critical path analysis, some allocation heuristics, and the execution granularity of nodes in a program graph. These factors, and the structure of interprocessor communication network, influence the allocation. To achieve realistic estimations of the executive durations of allocations, the algorithm considers the fact that nodes in a program graph have to communicate through varying numbers of tokens. Coarse and fine granularities have been implemented, with interprocessor token-communication duration, varying from zero up to values comparable to the execution durations of individual nodes. The effect on allocation of communication network structures is demonstrated by performing allocations for crossbar (non-blocking) and star (blocking) networks. The algorithm assumes the availability of as many processors as it needs for the optimal allocation of any program graph. Hence, the focus of allocation has been on varying token-communication durations rather than varying the number of processors. The algorithm always utilizes as many processors as necessary for the optimal allocation of any program graph, depending upon granularity and characteristics of the interprocessor communication network.

  7. Collective credit allocation in science

    PubMed Central

    Shen, Hua-Wei; Barabási, Albert-László

    2014-01-01

    Collaboration among researchers is an essential component of the modern scientific enterprise, playing a particularly important role in multidisciplinary research. However, we continue to wrestle with allocating credit to the coauthors of publications with multiple authors, because the relative contribution of each author is difficult to determine. At the same time, the scientific community runs an informal field-dependent credit allocation process that assigns credit in a collective fashion to each work. Here we develop a credit allocation algorithm that captures the coauthors’ contribution to a publication as perceived by the scientific community, reproducing the informal collective credit allocation of science. We validate the method by identifying the authors of Nobel-winning papers that are credited for the discovery, independent of their positions in the author list. The method can also compare the relative impact of researchers working in the same field, even if they did not publish together. The ability to accurately measure the relative credit of researchers could affect many aspects of credit allocation in science, potentially impacting hiring, funding, and promotion decisions. PMID:25114238

  8. Task allocation in a distributed computing system

    NASA Technical Reports Server (NTRS)

    Seward, Walter D.

    1987-01-01

    A conceptual framework is examined for task allocation in distributed systems. Application and computing system parameters critical to task allocation decision processes are discussed. Task allocation techniques are addressed which focus on achieving a balance in the load distribution among the system's processors. Equalization of computing load among the processing elements is the goal. Examples of system performance are presented for specific applications. Both static and dynamic allocation of tasks are considered and system performance is evaluated using different task allocation methodologies.

  9. Analysis of potential dynamic concealed factors in the difficulty of lower third molar extraction.

    PubMed

    Singh, P; Ajmera, D-H; Xiao, S-S; Yang, X-Z; Liu, X; Peng, B

    2016-11-01

    The purpose of this study was to identify potential concealed variables associated with the difficulty of lower third molar (M3) extractions. To address the research purpose, we implemented a prospective study and enrolled a sample of subjects presenting for M3 removal. Predictor variables were categorized into Group-I and Group-II, based on predetermined criteria. The primary outcome variable was the difficulty of extraction, measured as extraction time. Appropriate univariate and multivariate statistics were computed using ordinal logistic regression. The sample comprised of 1235 subjects with a mean age of 29.49 +/- 8.92 years in Group-I and 26.20 +/- 11.55 years in Group-II subjects. The mean operating time per M3 extraction was 21.24 +/- 12.80 and 20.24 +/- 12.50 minutes for Group-I and Group-II subjects respectively. Three linear parameters including B-M2 height (distance between imaginary point B on the inferior border of mandibular body, and M2), lingual cortical thickness, bone density and one angular parameter including Rc-Cs angle (angle between ramus curvature and curve of spee), in addition to patient's age, profile type, facial type, cant of occlusal plane, and decreased overbite, were found to be statistically associated ( p < or = 0.05) with extraction difficulty under regression models. In conclusion, our study indicates that the difficulty of lower M3 extractions is possibly governed by morphological and biomechanical factors with substantial influence of myofunctional factors. Preoperative evaluation of dynamic concealed factors may not only help in envisaging the difficulty and planning of surgical approach but might also help in better time management in clinical practice.

  10. Assessing the Impact of Model Parameter Uncertainty in Simulating Grass Biomass Using a Hybrid Carbon Allocation Strategy

    NASA Astrophysics Data System (ADS)

    Reyes, J. J.; Adam, J. C.; Tague, C.

    2016-12-01

    Grasslands play an important role in agricultural production as forage for livestock; they also provide a diverse set of ecosystem services including soil carbon (C) storage. The partitioning of C between above and belowground plant compartments (i.e. allocation) is influenced by both plant characteristics and environmental conditions. The objectives of this study are to 1) develop and evaluate a hybrid C allocation strategy suitable for grasslands, and 2) apply this strategy to examine the importance of various parameters related to biogeochemical cycling, photosynthesis, allocation, and soil water drainage on above and belowground biomass. We include allocation as an important process in quantifying the model parameter uncertainty, which identifies the most influential parameters and what processes may require further refinement. For this, we use the Regional Hydro-ecologic Simulation System, a mechanistic model that simulates coupled water and biogeochemical processes. A Latin hypercube sampling scheme was used to develop parameter sets for calibration and evaluation of allocation strategies, as well as parameter uncertainty analysis. We developed the hybrid allocation strategy to integrate both growth-based and resource-limited allocation mechanisms. When evaluating the new strategy simultaneously for above and belowground biomass, it produced a larger number of less biased parameter sets: 16% more compared to resource-limited and 9% more compared to growth-based. This also demonstrates its flexible application across diverse plant types and environmental conditions. We found that higher parameter importance corresponded to sub- or supra-optimal resource availability (i.e. water, nutrients) and temperature ranges (i.e. too hot or cold). For example, photosynthesis-related parameters were more important at sites warmer than the theoretical optimal growth temperature. Therefore, larger values of parameter importance indicate greater relative sensitivity in

  11. 41 CFR 105-68.900 - Adequate evidence.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Adequate evidence. 105-68.900 Section 105-68.900 Public Contracts and Property Management Federal Property Management... evidence. Adequate evidence means information sufficient to support the reasonable belief that a particular...

  12. 41 CFR 105-68.900 - Adequate evidence.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 41 Public Contracts and Property Management 3 2011-01-01 2011-01-01 false Adequate evidence. 105-68.900 Section 105-68.900 Public Contracts and Property Management Federal Property Management... evidence. Adequate evidence means information sufficient to support the reasonable belief that a particular...

  13. 41 CFR 105-68.900 - Adequate evidence.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 41 Public Contracts and Property Management 3 2013-07-01 2013-07-01 false Adequate evidence. 105-68.900 Section 105-68.900 Public Contracts and Property Management Federal Property Management... evidence. Adequate evidence means information sufficient to support the reasonable belief that a particular...

  14. 41 CFR 105-68.900 - Adequate evidence.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 41 Public Contracts and Property Management 3 2014-01-01 2014-01-01 false Adequate evidence. 105-68.900 Section 105-68.900 Public Contracts and Property Management Federal Property Management... evidence. Adequate evidence means information sufficient to support the reasonable belief that a particular...

  15. 41 CFR 105-68.900 - Adequate evidence.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 41 Public Contracts and Property Management 3 2012-01-01 2012-01-01 false Adequate evidence. 105-68.900 Section 105-68.900 Public Contracts and Property Management Federal Property Management... evidence. Adequate evidence means information sufficient to support the reasonable belief that a particular...

  16. Severe forms of concealed penis without hypospadias: Surgical strategies

    PubMed Central

    de Jesus, Lisieux Eyer; Dekermacher, Samuel; Anderson, Kleber M.

    2015-01-01

    Introduction: Concealed penis (CP) may vary in severity and includes megaprepuce (MP) as a variant. Many different surgical strategies have been described in order to maximize penile exposure and to deal with skin deficiency. We describe the strategies that we use to overcome technical problems in severe cases of CP. Materials and Methods: Six consecutive cases of severe CP (including 3 with MP) were treated in a 2-year period between January 2011 and April 2013. These patients were treated using extensive degloving, removal of dysplastic dartos, Alexander's preputial flap, scrotal flaps and skin grafts. Three patients had been previously circumcised. Cases associated with hypospadias, obesity, disorders of sexual differentiation and micropenises were excluded. Results: All six patients attained good results, with good exposure of the penis, ability to void standing with a well-directed flow and reasonable esthetic results. A technical algorithm for the treatment of primary or recurring cases of CP is proposed. Conclusion: Alexander’ s distally based ventral preputial flap is a useful technical resource to treat MP cases. Free skin grafts and/or laterally based scrotal flaps may be used to cover the penis after release in severe cases of CP. PMID:26604447

  17. 10 CFR 455.30 - Allocation of funds.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 3 2011-01-01 2011-01-01 false Allocation of funds. 455.30 Section 455.30 Energy... § 455.30 Allocation of funds. (a) DOE will allocate available funds among the States for two purposes... that are eligible pursuant to § 455.91, up to 100 percent of the funds allocated to the State by DOE...

  18. Allocation of substance use disorder patients to appropriate levels of care: feasibility of matching guidelines in routine practice in Dutch treatment centres.

    PubMed

    Merkx, Maarten J M; Schippers, Gerard M; Koeter, Maarten J W; Vuijk, Pieter Jelle; Oudejans, Suzan; de Vries, Carlijn C Q; van den Brink, Wim

    2007-03-01

    To examine the feasibility of implementing evidence-based guidelines for patient-treatment-matching to levels of care in two Dutch substance abuse treatment centres. Multi-centre observational follow-up study. Two large substance abuse treatment centres (SATCs). All 4394 referrals to the two SATCs in 2003. Baseline patient characteristics needed for treatment allocation according to protocol, treatment allocation according to matching protocol, treatment allocation according to actual level of care (LOC) entered. Comparison of recommended and actual LOC entered. Evaluation of reasons for observed differences between recommended and actual LOC entered. Data needed for treatment allocation according to protocol were available for 2269 (51.6%) patients. Data needed for evaluation of actual LOC entered were available for 1765 (40.2%) patients. Of these patients, 1089 (60.8%) were allocated according to protocol: 48.4% based on the guideline algorithm and 12.4% based on clinically justified deviations from this algorithm. The main reason for deviation was a different appraisal of addiction severity, made by the intake counsellor compared to the protocol. The feasibility of guideline-based treatment allocation is seriously limited due to inadequate data collection of patient characteristics and suboptimal guideline-based treatment allocation. As a consequence, only 24.4% of the patients could be evaluated as being matched properly to the treatment planned. The results indicate several barriers which limit the adequate implementation of patient-treatment-matching guidelines: problems in the infrastructure of data collection and storage and the inertia of intake staff who did not adhere to the guidelines for assessment and matching.

  19. Advances in liver transplantation allocation systems.

    PubMed

    Schilsky, Michael L; Moini, Maryam

    2016-03-14

    With the growing number of patients in need of liver transplantation, there is a need for adopting new and modifying existing allocation policies that prioritize patients for liver transplantation. Policy should ensure fair allocation that is reproducible and strongly predictive of best pre and post transplant outcomes while taking into account the natural history of the potential recipients liver disease and its complications. There is wide acceptance for allocation policies based on urgency in which the sickest patients on the waiting list with the highest risk of mortality receive priority. Model for end-stage liver disease and Child-Turcotte-Pugh scoring system, the two most universally applicable systems are used in urgency-based prioritization. However, other factors must be considered to achieve optimal allocation. Factors affecting pre-transplant patient survival and the quality of the donor organ also affect outcome. The optimal system should have allocation prioritization that accounts for both urgency and transplant outcome. We reviewed past and current liver allocation systems with the aim of generating further discussion about improvement of current policies.

  20. An Approach for Transmission Loss and Cost Allocation by Loss Allocation Index and Co-operative Game Theory

    NASA Astrophysics Data System (ADS)

    Khan, Baseem; Agnihotri, Ganga; Mishra, Anuprita S.

    2016-03-01

    In the present work authors proposed a novel method for transmission loss and cost allocation to users (generators and loads). In the developed methodology transmission losses are allocated to users based on their usage of the transmission line. After usage allocation, particular loss allocation indices (PLAI) are evaluated for loads and generators. Also Cooperative game theory approach is applied for comparison of results. The proposed method is simple and easy to implement on the practical power system. Sample 6 bus and IEEE 14 bus system is used for showing the effectiveness of proposed method.

  1. 40 CFR 716.25 - Adequate file search.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 32 2013-07-01 2013-07-01 false Adequate file search. 716.25 Section 716.25 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT HEALTH AND SAFETY DATA REPORTING General Provisions § 716.25 Adequate file search. The scope of a...

  2. 40 CFR 716.25 - Adequate file search.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 30 2010-07-01 2010-07-01 false Adequate file search. 716.25 Section 716.25 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT HEALTH AND SAFETY DATA REPORTING General Provisions § 716.25 Adequate file search. The scope of a...

  3. 40 CFR 716.25 - Adequate file search.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 31 2014-07-01 2014-07-01 false Adequate file search. 716.25 Section 716.25 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT HEALTH AND SAFETY DATA REPORTING General Provisions § 716.25 Adequate file search. The scope of a...

  4. 40 CFR 716.25 - Adequate file search.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 32 2012-07-01 2012-07-01 false Adequate file search. 716.25 Section 716.25 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT HEALTH AND SAFETY DATA REPORTING General Provisions § 716.25 Adequate file search. The scope of a...

  5. 40 CFR 716.25 - Adequate file search.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 31 2011-07-01 2011-07-01 false Adequate file search. 716.25 Section 716.25 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) TOXIC SUBSTANCES CONTROL ACT HEALTH AND SAFETY DATA REPORTING General Provisions § 716.25 Adequate file search. The scope of a...

  6. Accounting for Parcel-Allocation Variability in Practice: Combining Sources of Uncertainty and Choosing the Number of Allocations.

    PubMed

    Sterba, Sonya K; Rights, Jason D

    2016-01-01

    Item parceling remains widely used under conditions that can lead to parcel-allocation variability in results. Hence, researchers may be interested in quantifying and accounting for parcel-allocation variability within sample. To do so in practice, three key issues need to be addressed. First, how can we combine sources of uncertainty arising from sampling variability and parcel-allocation variability when drawing inferences about parameters in structural equation models? Second, on what basis can we choose the number of repeated item-to-parcel allocations within sample? Third, how can we diagnose and report proportions of total variability per estimate arising due to parcel-allocation variability versus sampling variability? This article addresses these three methodological issues. Developments are illustrated using simulated and empirical examples, and software for implementing them is provided.

  7. Adequate supervision for children and adolescents.

    PubMed

    Anderst, James; Moffatt, Mary

    2014-11-01

    Primary care providers (PCPs) have the opportunity to improve child health and well-being by addressing supervision issues before an injury or exposure has occurred and/or after an injury or exposure has occurred. Appropriate anticipatory guidance on supervision at well-child visits can improve supervision of children, and may prevent future harm. Adequate supervision varies based on the child's development and maturity, and the risks in the child's environment. Consideration should be given to issues as wide ranging as swimming pools, falls, dating violence, and social media. By considering the likelihood of harm and the severity of the potential harm, caregivers may provide adequate supervision by minimizing risks to the child while still allowing the child to take "small" risks as needed for healthy development. Caregivers should initially focus on direct (visual, auditory, and proximity) supervision of the young child. Gradually, supervision needs to be adjusted as the child develops, emphasizing a safe environment and safe social interactions, with graduated independence. PCPs may foster adequate supervision by providing concrete guidance to caregivers. In addition to preventing injury, supervision includes fostering a safe, stable, and nurturing relationship with every child. PCPs should be familiar with age/developmentally based supervision risks, adequate supervision based on those risks, characteristics of neglectful supervision based on age/development, and ways to encourage appropriate supervision throughout childhood. Copyright 2014, SLACK Incorporated.

  8. 50 CFR 648.74 - Annual individual allocations.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Measures for the Atlantic Surf Clam and Ocean Quahog Fisheries § 648.74 Annual individual allocations. (a... surfclams and ocean quahogs for the next fishing year for each allocation holder owning an allocation...

  9. 50 CFR 648.74 - Annual individual allocations.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Measures for the Atlantic Surf Clam and Ocean Quahog Fisheries § 648.74 Annual individual allocations. (a... surfclams and ocean quahogs for the next fishing year for each allocation holder owning an allocation...

  10. 50 CFR 648.74 - Annual individual allocations.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Measures for the Atlantic Surf Clam and Ocean Quahog Fisheries § 648.74 Annual individual allocations. (a... surfclams and ocean quahogs for the next fishing year for each allocation holder owning an allocation...

  11. 50 CFR 648.70 - Annual individual allocations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Measures for the Atlantic Surf Clam and Ocean Quahog Fisheries § 648.70 Annual individual allocations. (a... surfclams and ocean quahogs for the next fishing year for each allocation holder owning an allocation...

  12. Mental Health Stigma and Self-Concealment as Predictors of Help-Seeking Attitudes among Latina/o College Students in the United States

    ERIC Educational Resources Information Center

    Mendoza, Hadrian; Masuda, Akihiko; Swartout, Kevin M.

    2015-01-01

    The study examined whether mental health stigma and self-concealment are uniquely related to various dimensions of attitudes toward seeking professional psychological services (i.e., help-seeking attitudes) in Latina/o college students. Data from 129 Latina/o undergraduates (76% female) were used in the analysis. Results revealed that mental…

  13. Allocation Usage Tracking and Management | High-Performance Computing |

    Science.gov Websites

    NREL's high-performance computing (HPC) systems, learn how to track and manage your allocations. The alloc_tracker script (/usr/local/bin/alloc_tracker) may be used to see what allocations you have access to, how much of the allocation has been used, how much remains and how many node hours will be forfeited at the

  14. Current Subcounty Allocation Practices: Volume I of the Title I, ESEA, Subcounty Allocation Study.

    ERIC Educational Resources Information Center

    Paller, Alan T.; Gutmann, Babette

    In this report, subcounty allocation of Title I of the Elementary and Secondary Education Act (ESEA) funds is described in terms of direct allocation, use of the statutory formula emphasizing census data, United States Office of Education (USOE) regulations, participating states, geographic and administrative overlaps, hold harmless adjustments…

  15. An Analysis and Allocation System for Library Collections Budgets: The Comprehensive Allocation Process (CAP)

    ERIC Educational Resources Information Center

    Lyons, Lucy Eleonore; Blosser, John

    2012-01-01

    The "Comprehensive Allocation Process" (CAP) is a reproducible decision-making structure for the allocation of new collections funds, for the reallocation of funds within stagnant budgets, and for budget cuts in the face of reduced funding levels. This system was designed to overcome common shortcomings of current methods. Its philosophical…

  16. Reference allocations and use of a disparity measure to inform the design of allocation funding formulas in public health programs.

    PubMed

    Buehler, James W; Bernet, Patrick M; Ogden, Lydia L

    2012-01-01

    Funding formulas are commonly used by federal agencies to allocate program funds to states. As one approach to evaluating differences in allocations resulting from alternative formula calculations, we propose the use of a measure derived from the Gini index to summarize differences in allocations relative to 2 referent allocations: one based on equal per-capita funding across states and another based on equal funding per person living in poverty, which we define as the "proportionality of allocation" (PA). These referents reflect underlying values that often shape formula-based allocations for public health programs. The size of state populations serves as a general proxy for the amount of funding needed to support programs across states. While the size of state populations living in poverty is correlated with overall population size, allocations based on states' shares of the national population living in poverty reflect variations in funding need shaped by the association between poverty and multiple adverse health outcomes. The PA measure is a summary of the degree of dispersion in state-specific allocations relative to the referent allocations and provides a quick assessment of the impact of selecting alternative funding formula designs. We illustrate the PA values by adjusting a sample allocation, using various measures of the salary costs and in-state wealth, which might modulate states' needs for federal funding.

  17. 50 CFR 600.517 - Allocations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Allocations. 600.517 Section 600.517 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE MAGNUSON-STEVENS ACT PROVISIONS Foreign Fishing § 600.517 Allocations. The Secretary...

  18. 44 CFR 304.4 - Allocations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Allocations. 304.4 Section 304.4 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS CONSOLIDATED GRANTS TO INSULAR AREAS § 304.4 Allocations. For each Federal fiscal...

  19. 10 CFR 1304.114 - Responsibility for maintaining adequate safeguards.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Responsibility for maintaining adequate safeguards. 1304.114 Section 1304.114 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.114 Responsibility for maintaining adequate safeguards. The Board has the responsibility for maintaining adequate...

  20. 10 CFR 1304.114 - Responsibility for maintaining adequate safeguards.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false Responsibility for maintaining adequate safeguards. 1304.114 Section 1304.114 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.114 Responsibility for maintaining adequate safeguards. The Board has the responsibility for maintaining adequate...

  1. 10 CFR 1304.114 - Responsibility for maintaining adequate safeguards.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Responsibility for maintaining adequate safeguards. 1304.114 Section 1304.114 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.114 Responsibility for maintaining adequate safeguards. The Board has the responsibility for maintaining adequate...

  2. 10 CFR 1304.114 - Responsibility for maintaining adequate safeguards.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Responsibility for maintaining adequate safeguards. 1304.114 Section 1304.114 Energy NUCLEAR WASTE TECHNICAL REVIEW BOARD PRIVACY ACT OF 1974 § 1304.114 Responsibility for maintaining adequate safeguards. The Board has the responsibility for maintaining adequate...

  3. 12 CFR 347.303 - Allocated transfer risk reserve.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Allocated transfer risk reserve. 347.303... GENERAL POLICY INTERNATIONAL BANKING International Lending § 347.303 Allocated transfer risk reserve. (a) Establishment of Allocated Transfer Risk Reserve. A banking institution shall establish an allocated transfer...

  4. 24 CFR 791.404 - Field Office allocation planning.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Field Office allocation planning... Allocation of Budget Authority for Housing Assistance § 791.404 Field Office allocation planning. (a) General objective. The allocation planning process should provide for the equitable distribution of available budget...

  5. 50 CFR 660.320 - Allocations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Allocations. (a) General. The commercial portion of the Pacific Coast groundfish fishery, excluding the treaty... may be set aside biennially or annually for tribal fisheries prior to dividing the balance of the... specifically allocated to the recreational fishery, and will be estimated prior to dividing the commercial...

  6. Mental Health Stigma, Self-Concealment, and Help-Seeking Attitudes among Asian American and European American College Students with No Help-Seeking Experience

    ERIC Educational Resources Information Center

    Masuda, Akihiko; Boone, Matthew S.

    2011-01-01

    The present study examined whether mental health stigma (i.e., negative attitudes toward people with a psychological disorder) and self-concealment are unique predictors of help-seeking attitudes in Asian American and European American college students with no history of seeking professional psychological services. The Asian American group had…

  7. An enhanced MMW and SMMW/THz imaging system performance prediction and analysis tool for concealed weapon detection and pilotage obstacle avoidance

    NASA Astrophysics Data System (ADS)

    Murrill, Steven R.; Jacobs, Eddie L.; Franck, Charmaine C.; Petkie, Douglas T.; De Lucia, Frank C.

    2015-10-01

    The U.S. Army Research Laboratory (ARL) has continued to develop and enhance a millimeter-wave (MMW) and submillimeter- wave (SMMW)/terahertz (THz)-band imaging system performance prediction and analysis tool for both the detection and identification of concealed weaponry, and for pilotage obstacle avoidance. The details of the MATLAB-based model which accounts for the effects of all critical sensor and display components, for the effects of atmospheric attenuation, concealment material attenuation, and active illumination, were reported on at the 2005 SPIE Europe Security and Defence Symposium (Brugge). An advanced version of the base model that accounts for both the dramatic impact that target and background orientation can have on target observability as related to specular and Lambertian reflections captured by an active-illumination-based imaging system, and for the impact of target and background thermal emission, was reported on at the 2007 SPIE Defense and Security Symposium (Orlando). Further development of this tool that includes a MODTRAN-based atmospheric attenuation calculator and advanced system architecture configuration inputs that allow for straightforward performance analysis of active or passive systems based on scanning (single- or line-array detector element(s)) or staring (focal-plane-array detector elements) imaging architectures was reported on at the 2011 SPIE Europe Security and Defence Symposium (Prague). This paper provides a comprehensive review of a newly enhanced MMW and SMMW/THz imaging system analysis and design tool that now includes an improved noise sub-model for more accurate and reliable performance predictions, the capability to account for postcapture image contrast enhancement, and the capability to account for concealment material backscatter with active-illumination- based systems. Present plans for additional expansion of the model's predictive capabilities are also outlined.

  8. Obstacle avoidance and concealed target detection using the Army Research Lab ultra-wideband synchronous impulse reconstruction (UWB SIRE) forward imaging radar

    NASA Astrophysics Data System (ADS)

    Nguyen, Lam; Wong, David; Ressler, Marc; Koenig, Francois; Stanton, Brian; Smith, Gregory; Sichina, Jeffrey; Kappra, Karl

    2007-04-01

    The U.S. Army Research Laboratory (ARL), as part of a mission and customer funded exploratory program, has developed a new low-frequency, ultra-wideband (UWB) synthetic aperture radar (SAR) for forward imaging to support the Army's vision of an autonomous navigation system for robotic ground vehicles. These unmanned vehicles, equipped with an array of imaging sensors, will be tasked to help detect man-made obstacles such as concealed targets, enemy minefields, and booby traps, as well as other natural obstacles such as ditches, and bodies of water. The ability of UWB radar technology to help detect concealed objects has been documented in the past and could provide an important obstacle avoidance capability for autonomous navigation systems, which would improve the speed and maneuverability of these vehicles and consequently increase the survivability of the U. S. forces on the battlefield. One of the primary features of the radar is the ability to collect and process data at combat pace in an affordable, compact, and lightweight package. To achieve this, the radar is based on the synchronous impulse reconstruction (SIRE) technique where several relatively slow and inexpensive analog-to-digital (A/D) converters are used to sample the wide bandwidth of the radar signals. We conducted an experiment this winter at Aberdeen Proving Ground (APG) to support the phenomenological studies of the backscatter from positive and negative obstacles for autonomous robotic vehicle navigation, as well as the detection of concealed targets of interest to the Army. In this paper, we briefly describe the UWB SIRE radar and the test setup in the experiment. We will also describe the signal processing and the forward imaging techniques used in the experiment. Finally, we will present imagery of man-made obstacles such as barriers, concertina wires, and mines.

  9. 34 CFR 673.4 - Allocation and reallocation.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... EDUCATION, DEPARTMENT OF EDUCATION GENERAL PROVISIONS FOR THE FEDERAL PERKINS LOAN PROGRAM, FEDERAL WORK... Federal Perkins Loan, FWS, and FSEOG Programs § 673.4 Allocation and reallocation. (a) Allocation and reallocation of Federal Perkins Loan funds. (1) The Secretary allocates Federal capital contributions to...

  10. 42 CFR 121.8 - Allocation of organs.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... allocation. All such experimental policies shall be accompanied by a research design and include data... into a transplant candidate; (5) Shall be designed to avoid wasting organs, to avoid futile transplants... performance goals. Allocation policies shall be designed to achieve equitable allocation of organs among...

  11. 42 CFR 121.8 - Allocation of organs.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... allocation. All such experimental policies shall be accompanied by a research design and include data... into a transplant candidate; (5) Shall be designed to avoid wasting organs, to avoid futile transplants... performance goals. Allocation policies shall be designed to achieve equitable allocation of organs among...

  12. 42 CFR 121.8 - Allocation of organs.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... allocation. All such experimental policies shall be accompanied by a research design and include data... into a transplant candidate; (5) Shall be designed to avoid wasting organs, to avoid futile transplants... performance goals. Allocation policies shall be designed to achieve equitable allocation of organs among...

  13. 42 CFR 121.8 - Allocation of organs.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... allocation. All such experimental policies shall be accompanied by a research design and include data... into a transplant candidate; (5) Shall be designed to avoid wasting organs, to avoid futile transplants... performance goals. Allocation policies shall be designed to achieve equitable allocation of organs among...

  14. 42 CFR 121.8 - Allocation of organs.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... allocation. All such experimental policies shall be accompanied by a research design and include data... into a transplant candidate; (5) Shall be designed to avoid wasting organs, to avoid futile transplants... performance goals. Allocation policies shall be designed to achieve equitable allocation of organs among...

  15. 34 CFR 303.730 - Formula for State allocations.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 34 Education 2 2013-07-01 2013-07-01 false Formula for State allocations. 303.730 Section 303.730...; and Allocation of Funds Allocation of Funds § 303.730 Formula for State allocations. (a) Reservation... year, the Secretary may reserve not more than one percent for payments to American Samoa, the...

  16. 34 CFR 303.730 - Formula for State allocations.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 34 Education 2 2012-07-01 2012-07-01 false Formula for State allocations. 303.730 Section 303.730...; and Allocation of Funds Allocation of Funds § 303.730 Formula for State allocations. (a) Reservation... year, the Secretary may reserve not more than one percent for payments to American Samoa, the...

  17. 34 CFR 303.730 - Formula for State allocations.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 34 Education 2 2014-07-01 2013-07-01 true Formula for State allocations. 303.730 Section 303.730...; and Allocation of Funds Allocation of Funds § 303.730 Formula for State allocations. (a) Reservation... year, the Secretary may reserve not more than one percent for payments to American Samoa, the...

  18. 7 CFR 1940.961 - Allocation of appropriated funds.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 13 2011-01-01 2009-01-01 true Allocation of appropriated funds. 1940.961 Section... Development Programs § 1940.961 Allocation of appropriated funds. (a) Initial allocations. (1) Each FY, from... program, funds will be allocated to designated States in accordance with FmHA Instruction subpart L of...

  19. The human operational sex ratio: effects of marriage, concealed ovulation, and menopause on mate competition.

    PubMed

    Marlowe, Frank W; Berbesque, J Colette

    2012-12-01

    Among mammals, male-male competition for sexual access to females frequently involves fighting. Larger body size gives males an advantage in fighting, which explains why males tend to be larger than females in many species, including anthropoid primates. Mitani et al. derived a formula to measure the operational sex ratio (OSR) to reflect the degree of male-male competition using the number of reproductively available males to females who are cycling and capable of conceiving. The OSR should predict the degree of sexual dimorphism in body mass-at least if male-male competition involves much fighting or threatening. Here, we use hunter-gatherer demographic data and the Mitani et al. formula to calculate the human OSR. We show that humans have a much lower degree of body mass sexual dimorphism than is predicted by our OSR. We suggest this is because human competition rarely involves fighting. In human hunter-gatherer societies, differences in the ages of marriage have an impact on competition in that the age of males at first marriage is younger when there is a lower percentage of married men with two or more wives, and older when there is a higher percentage of married men with two or more wives. We discuss the implications of this for females, along with the effects of two key life history traits that influence the OSR, concealed ovulation and menopause. While menopause decreases the number of reproductively available females to males and thus increases male-male competition, concealed ovulation decreases male-male competition. Finally, we discuss the importance of mostly monogamous mate bonds in human evolution. Copyright © 2012 Elsevier Ltd. All rights reserved.

  20. 24 CFR 982.101 - Allocation of funding.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... housing budget authority. Some budget authority is exempt by law from allocation under section 213(d). Unless exempted by law, budget authority for the tenant-based programs must be allocated in accordance... law; (ii) funding incapable of geographic formula allocation (e.g., for renewal of expiring funding...

  1. 24 CFR 982.101 - Allocation of funding.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... housing budget authority. Some budget authority is exempt by law from allocation under section 213(d). Unless exempted by law, budget authority for the tenant-based programs must be allocated in accordance... law; (ii) funding incapable of geographic formula allocation (e.g., for renewal of expiring funding...

  2. 24 CFR 982.101 - Allocation of funding.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... law; (ii) funding incapable of geographic formula allocation (e.g., for renewal of expiring funding increments); or (iii) funding allocated by an objective fair share formula. Funding allocated by fair share formula is distributed by a competitive process. (c) Competitive process. For budget authority that is...

  3. 24 CFR 982.101 - Allocation of funding.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... law; (ii) funding incapable of geographic formula allocation (e.g., for renewal of expiring funding increments); or (iii) funding allocated by an objective fair share formula. Funding allocated by fair share formula is distributed by a competitive process. (c) Competitive process. For budget authority that is...

  4. 24 CFR 982.101 - Allocation of funding.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... law; (ii) funding incapable of geographic formula allocation (e.g., for renewal of expiring funding increments); or (iii) funding allocated by an objective fair share formula. Funding allocated by fair share formula is distributed by a competitive process. (c) Competitive process. For budget authority that is...

  5. 47 CFR 64.903 - Cost allocation manuals.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Cost allocation manuals. 64.903 Section 64.903... RULES RELATING TO COMMON CARRIERS Allocation of Costs § 64.903 Cost allocation manuals. (a) Each incumbent local exchange carrier having annual revenues from regulated telecommunications operations that...

  6. 42 CFR 24.2 - Allocation.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 42 Public Health 1 2014-10-01 2014-10-01 false Allocation. 24.2 Section 24.2 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES PERSONNEL SENIOR BIOMEDICAL RESEARCH SERVICE § 24.2 Allocation. (a) The Secretary, within the number authorized in the PHS Act, shall determine the...

  7. 42 CFR 24.2 - Allocation.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 42 Public Health 1 2013-10-01 2013-10-01 false Allocation. 24.2 Section 24.2 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES PERSONNEL SENIOR BIOMEDICAL RESEARCH SERVICE § 24.2 Allocation. (a) The Secretary, within the number authorized in the PHS Act, shall determine the...

  8. 42 CFR 24.2 - Allocation.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 42 Public Health 1 2012-10-01 2012-10-01 false Allocation. 24.2 Section 24.2 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES PERSONNEL SENIOR BIOMEDICAL RESEARCH SERVICE § 24.2 Allocation. (a) The Secretary, within the number authorized in the PHS Act, shall determine the...

  9. 42 CFR 24.2 - Allocation.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Allocation. 24.2 Section 24.2 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES PERSONNEL SENIOR BIOMEDICAL RESEARCH SERVICE § 24.2 Allocation. (a) The Secretary, within the number authorized in the PHS Act, shall determine the...

  10. 42 CFR 24.2 - Allocation.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 1 2011-10-01 2011-10-01 false Allocation. 24.2 Section 24.2 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES PERSONNEL SENIOR BIOMEDICAL RESEARCH SERVICE § 24.2 Allocation. (a) The Secretary, within the number authorized in the PHS Act, shall determine the...

  11. 49 CFR 33.54 - Elements of an allocation order.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 1 2014-10-01 2014-10-01 false Elements of an allocation order. 33.54 Section 33.54 Transportation Office of the Secretary of Transportation TRANSPORTATION PRIORITIES AND ALLOCATION SYSTEM Allocation Actions § 33.54 Elements of an allocation order. Each allocation order must include: (a...

  12. 49 CFR 33.54 - Elements of an allocation order.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 1 2012-10-01 2012-10-01 false Elements of an allocation order. 33.54 Section 33.54 Transportation Office of the Secretary of Transportation TRANSPORTATION PRIORITIES AND ALLOCATION SYSTEM Allocation Actions § 33.54 Elements of an allocation order. Each allocation order must include: (a...

  13. 49 CFR 33.54 - Elements of an allocation order.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 1 2013-10-01 2013-10-01 false Elements of an allocation order. 33.54 Section 33.54 Transportation Office of the Secretary of Transportation TRANSPORTATION PRIORITIES AND ALLOCATION SYSTEM Allocation Actions § 33.54 Elements of an allocation order. Each allocation order must include: (a...

  14. The current and future status of the concealed information test for field use.

    PubMed

    Matsuda, Izumi; Nittono, Hiroshi; Allen, John J B

    2012-01-01

    The Concealed Information Test (CIT) is a psychophysiological technique for examining whether a person has knowledge of crime-relevant information. Many laboratory studies have shown that the CIT has good scientific validity. However, the CIT has seldom been used for actual criminal investigations. One successful exception is its use by the Japanese police. In Japan, the CIT has been widely used for criminal investigations, although its probative force in court is not strong. In this paper, we first review the current use of the field CIT in Japan. Then, we discuss two possible approaches to increase its probative force: sophisticated statistical judgment methods and combining new psychophysiological measures with classic autonomic measures. On the basis of these considerations, we propose several suggestions for future practice and research involving the field CIT.

  15. The Current and Future Status of the Concealed Information Test for Field Use

    PubMed Central

    Matsuda, Izumi; Nittono, Hiroshi; Allen, John J. B.

    2012-01-01

    The Concealed Information Test (CIT) is a psychophysiological technique for examining whether a person has knowledge of crime-relevant information. Many laboratory studies have shown that the CIT has good scientific validity. However, the CIT has seldom been used for actual criminal investigations. One successful exception is its use by the Japanese police. In Japan, the CIT has been widely used for criminal investigations, although its probative force in court is not strong. In this paper, we first review the current use of the field CIT in Japan. Then, we discuss two possible approaches to increase its probative force: sophisticated statistical judgment methods and combining new psychophysiological measures with classic autonomic measures. On the basis of these considerations, we propose several suggestions for future practice and research involving the field CIT. PMID:23205018

  16. Makalu: fast recoverable allocation of non-volatile memory

    DOE PAGES

    Bhandari, Kumud; Chakrabarti, Dhruva R.; Boehm, Hans-J.

    2016-10-19

    Byte addressable non-volatile memory (NVRAM) is likely to supplement, and perhaps eventually replace, DRAM. Applications can then persist data structures directly in memory instead of serializing them and storing them onto a durable block device. However, failures during execution can leave data structures in NVRAM unreachable or corrupt. In this paper, we present Makalu, a system that addresses non-volatile memory management. Makalu offers an integrated allocator and recovery-time garbage collector that maintains internal consistency, avoids NVRAM memory leaks, and is efficient, all in the face of failures. We show that a careful allocator design can support a less restrictive andmore » a much more familiar programming model than existing persistent memory allocators. Our allocator significantly reduces the per allocation persistence overhead by lazily persisting non-essential metadata and by employing a post-failure recovery-time garbage collector. Experimental results show that the resulting online speed and scalability of our allocator are comparable to well-known transient allocators, and significantly better than state-of-the-art persistent allocators.« less

  17. Makalu: fast recoverable allocation of non-volatile memory

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bhandari, Kumud; Chakrabarti, Dhruva R.; Boehm, Hans-J.

    Byte addressable non-volatile memory (NVRAM) is likely to supplement, and perhaps eventually replace, DRAM. Applications can then persist data structures directly in memory instead of serializing them and storing them onto a durable block device. However, failures during execution can leave data structures in NVRAM unreachable or corrupt. In this paper, we present Makalu, a system that addresses non-volatile memory management. Makalu offers an integrated allocator and recovery-time garbage collector that maintains internal consistency, avoids NVRAM memory leaks, and is efficient, all in the face of failures. We show that a careful allocator design can support a less restrictive andmore » a much more familiar programming model than existing persistent memory allocators. Our allocator significantly reduces the per allocation persistence overhead by lazily persisting non-essential metadata and by employing a post-failure recovery-time garbage collector. Experimental results show that the resulting online speed and scalability of our allocator are comparable to well-known transient allocators, and significantly better than state-of-the-art persistent allocators.« less

  18. 10 CFR 217.54 - Elements of an allocation order.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 3 2012-01-01 2012-01-01 false Elements of an allocation order. 217.54 Section 217.54 Energy DEPARTMENT OF ENERGY OIL ENERGY PRIORITIES AND ALLOCATIONS SYSTEM Allocation Actions § 217.54 Elements of an allocation order. Each allocation order must include: (a) A detailed description of the...

  19. 10 CFR 217.54 - Elements of an allocation order.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 3 2013-01-01 2013-01-01 false Elements of an allocation order. 217.54 Section 217.54 Energy DEPARTMENT OF ENERGY OIL ENERGY PRIORITIES AND ALLOCATIONS SYSTEM Allocation Actions § 217.54 Elements of an allocation order. Each allocation order must include: (a) A detailed description of the...

  20. 10 CFR 217.54 - Elements of an allocation order.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 3 2014-01-01 2014-01-01 false Elements of an allocation order. 217.54 Section 217.54 Energy DEPARTMENT OF ENERGY OIL ENERGY PRIORITIES AND ALLOCATIONS SYSTEM Allocation Actions § 217.54 Elements of an allocation order. Each allocation order must include: (a) A detailed description of the...

  1. 18 CFR 367.28 - Methods of allocation.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 18 Conservation of Power and Water Resources 1 2012-04-01 2012-04-01 false Methods of allocation... Instructions § 367.28 Methods of allocation. Indirect costs and compensation for use of capital must be allocated to projects in accordance with the service company's applicable and currently effective methods of...

  2. 18 CFR 367.28 - Methods of allocation.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Methods of allocation... Instructions § 367.28 Methods of allocation. Indirect costs and compensation for use of capital must be allocated to projects in accordance with the service company's applicable and currently effective methods of...

  3. 45 CFR 400.319 - Allocation of funds.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Funding and Service Priorities § 400.319 Allocation of funds. (a) A State with more than one qualifying targeted assistance county may allocate its targeted assistance funds differently from the formula... population data in its allocation formula. (b) A State must assure that not less than 95 percent of the total...

  4. 45 CFR 400.319 - Allocation of funds.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Funding and Service Priorities § 400.319 Allocation of funds. (a) A State with more than one qualifying targeted assistance county may allocate its targeted assistance funds differently from the formula... population data in its allocation formula. (b) A State must assure that not less than 95 percent of the total...

  5. 50 CFR 660.55 - Allocations.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... fishery allocations. Prior to the setting of fishery allocations, the TAC, ACL, or ACT when specified, is... in the non-groundfish fishery that is deducted from the ACL or ACT when specified. (2) The commercial... from the TAC, OY, ACL, or ACT when specified. For the catcher/processor and mothership sectors of the...

  6. 50 CFR 660.55 - Allocations.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... fishery allocations. Prior to the setting of fishery allocations, the TAC, ACL, or ACT when specified, is... in the non-groundfish fishery that is deducted from the ACL or ACT when specified. (2) The commercial... from the TAC, OY, ACL, or ACT when specified. For the catcher/processor and mothership sectors of the...

  7. Identifying Memory Allocation Patterns in HEP Software

    NASA Astrophysics Data System (ADS)

    Kama, S.; Rauschmayr, N.

    2017-10-01

    HEP applications perform an excessive amount of allocations/deallocations within short time intervals which results in memory churn, poor locality and performance degradation. These issues are already known for a decade, but due to the complexity of software frameworks and billions of allocations for a single job, up until recently no efficient mechanism has been available to correlate these issues with source code lines. However, with the advent of the Big Data era, many tools and platforms are now available to do large scale memory profiling. This paper presents, a prototype program developed to track and identify each single (de-)allocation. The CERN IT Hadoop cluster is used to compute memory key metrics, like locality, variation, lifetime and density of allocations. The prototype further provides a web based visualization back-end that allows the user to explore the results generated on the Hadoop cluster. Plotting these metrics for every single allocation over time gives a new insight into application’s memory handling. For instance, it shows which algorithms cause which kind of memory allocation patterns, which function flow causes how many short-lived objects, what are the most commonly allocated sizes etc. The paper will give an insight into the prototype and will show profiling examples for the LHC reconstruction, digitization and simulation jobs.

  8. 45 CFR 400.319 - Allocation of funds.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Assistance Funding and Service Priorities § 400.319 Allocation of funds. (a) A State with more than one qualifying targeted assistance county may allocate its targeted assistance funds differently from the formula... population data in its allocation formula. (b) A State must assure that not less than 95 percent of the total...

  9. 45 CFR 400.319 - Allocation of funds.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Assistance Funding and Service Priorities § 400.319 Allocation of funds. (a) A State with more than one qualifying targeted assistance county may allocate its targeted assistance funds differently from the formula... population data in its allocation formula. (b) A State must assure that not less than 95 percent of the total...

  10. 26 CFR 1.642(h)-4 - Allocation.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 26 Internal Revenue 8 2010-04-01 2010-04-01 false Allocation. 1.642(h)-4 Section 1.642(h)-4...) INCOME TAXES Estates, Trusts, and Beneficiaries § 1.642(h)-4 Allocation. The carryovers and excess deductions to which section 642(h) applies are allocated among the beneficiaries succeeding to the property...

  11. Carbon allocation in forest ecosystems

    Treesearch

    Creighton M. Litton; James W. Raich; Michael G. Ryan

    2007-01-01

    Carbon allocation plays a critical role in forest ecosystem carbon cycling. We reviewed existing literature and compiled annual carbon budgets for forest ecosystems to test a series of hypotheses addressing the patterns, plasticity, and limits of three components of allocation: biomass, the amount of material present; flux, the flow of carbon to a component per unit...

  12. The ontogeny of postmaturation resource allocation in turtles.

    PubMed

    Bowden, R M; Paitz, Ryan T; Janzen, Fredric J

    2011-01-01

    Resource-allocation decisions vary with life-history strategy, and growing evidence suggests that long-lived endothermic vertebrates direct resources toward growth and self-maintenance when young, increasing allocation toward reproductive effort over time. Few studies have tracked the ontogeny of resource allocation (energy, steroid hormones, etc.) in long-lived ectothermic vertebrates, limiting our understanding of the generality of life-history strategies among vertebrates. We investigated how reproductively mature female painted turtles (Chrysemys picta) from two distinct age classes allocated resources over a 4-yr period and whether resource-allocation patterns varied with nesting experience. We examined age-related variation in body size, egg mass, reproductive frequency, and yolk steroids and report that younger females were smaller and allocated fewer resources to reproduction than did older females. Testosterone levels were higher in eggs from younger females, whereas eggs from second (seasonal) clutches contained higher concentrations of progesterone and estradiol. These allocation patterns resulted in older, larger females laying larger eggs and producing second clutches more frequently than their younger counterparts. We conclude that resource-allocation patterns do vary with age in a long-lived ectotherm.

  13. Intelligent energy allocation strategy for PHEV charging station using gravitational search algorithm

    NASA Astrophysics Data System (ADS)

    Rahman, Imran; Vasant, Pandian M.; Singh, Balbir Singh Mahinder; Abdullah-Al-Wadud, M.

    2014-10-01

    Recent researches towards the use of green technologies to reduce pollution and increase penetration of renewable energy sources in the transportation sector are gaining popularity. The development of the smart grid environment focusing on PHEVs may also heal some of the prevailing grid problems by enabling the implementation of Vehicle-to-Grid (V2G) concept. Intelligent energy management is an important issue which has already drawn much attention to researchers. Most of these works require formulation of mathematical models which extensively use computational intelligence-based optimization techniques to solve many technical problems. Higher penetration of PHEVs require adequate charging infrastructure as well as smart charging strategies. We used Gravitational Search Algorithm (GSA) to intelligently allocate energy to the PHEVs considering constraints such as energy price, remaining battery capacity, and remaining charging time.

  14. Has the quality of reporting in periodontology changed in 14 years? A systematic review.

    PubMed

    Leow, Natalie M; Hussain, Zahra; Petrie, Aviva; Donos, Nikolaos; Needleman, Ian G

    2016-10-01

    Quality of reporting randomized controlled trials (RCTs) in periodontology has been poor. Consolidated Standards of Reporting Trials guidelines and an extension for non-pharmacologic trials (CONSORT-NPE), were introduced to aid in improving this. The aim of this study was to assess the quality of reporting in periodontology, changes over the last 14 years, and adherence to CONSORT-NPE. Randomized controlled trials in humans, published in three periodontal journals, from 2013 to 2015 were included. Search was conducted through Medline, Embase and hand searching. One hundred and seventy-three full-text articles included. Two reviewers screened for reporting quality (κ = 0.69, 95% CI 0.60-0.76). 84% of studies (n = 145) described randomization methods, 74% (n = 128) highlighted examiner blinding and 87% (n = 151) accounted for patients at study conclusion. Patient and caregiver blinding was addressed in 50% (n = 70) and 50% (n = 27) of studies respectively. 64% (n = 110) described adequate allocation concealment. Compared with Montenegro et al. (2002, Journal of Dental Research, 81, 866), improvements seen in describing randomization (2002, 16.5%; 2016, 84%), allocation concealment (2002, 6.5%; 2016, 64%), caregiver masking (2002, 17%; 2016, 50%). CONSORT-NPE; 62% (n = 107) had detailed explanations of all treatments, 88% (n = 152) lacked protocols for adherence of caregivers' to an intervention. Only 17% (n = 29) described caregivers' expertise and case volume. Substantial improvements have occurred. Attention is required for statistical analysis of patient losses and masking. CONSORT-NPE aspects were poorly reported. © 2016 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  15. Living at Risk: Concealing Risk and Preserving Hope in Huntington Disease

    PubMed Central

    Sims, Sharon L.; Swenson, Melinda M.; Harrison, Joan M.; Moskowitz, Carol; Stepanov, Nonna; Suter, Gregory W.; Westphal, Beryl J.

    2013-01-01

    Much of the qualitative research on Huntington disease has focused on the genetic testing aspects of HD. The overall purpose of this qualitative study was to gather information about the everyday experience of living with the risk of developing Huntington disease in a sample of individuals at risk for HD who have chosen not to pursue genetic testing. Data for this article was obtained from unstructured, open-ended qualitative interviews of a sample of people participating in the PHAROS study. PHAROS, the Prospective Huntington At-Risk Observational Study, is a multi-site study that aims to establish whether experienced clinicians can reliably determine the earliest clinical symptoms of Huntington disease in individuals at 50% risk for HD who have chosen not to undergo genetic testing. Interviews were conducted at six PHAROS research sites across the United States. In this paper, the research team used qualitative description to construct and explore two main themes: (1) careful concealment of risk as an act of self-preservation and (2) preserving hope. PMID:17943424

  16. Detection of contraband concealed on the body using x-ray imaging

    NASA Astrophysics Data System (ADS)

    Smith, Gerald J.

    1997-01-01

    In an effort to avoid detection, smugglers and terrorists are increasingly using the body as a vehicle for transporting illicit drugs, weapons, and explosives. This trend illustrates the natural tendency of traffickers to seek the path of least resistance, as improved interdiction technology and operational effectiveness have been brought to bear on other trafficking avenues such as luggage, cargo, and parcels. In response, improved technology for human inspection is being developed using a variety of techniques. ASE's BodySearch X-ray Inspection Systems uses backscatter x-ray imaging of the human body to quickly, safely, and effectively screen for drugs, weapons, and explosives concealed on the body. This paper reviews the law enforcement and social issues involved in human inspections, and briefly describes the ASE BodySearch systems. Operator training, x-ray image interpretation, and maximizing systems effectiveness are also discussed. Finally, data collected from operation of the BodySearch system in the field is presented, and new law enforcement initiatives which have come about due to recent events are reviewed.

  17. 75 FR 18016 - Notice of Allocation Availability (NOAA) Inviting Applications for the CY 2010 Allocation Round...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-08

    ... Availability (NOAA) Inviting Applications for the CY 2010 Allocation Round of the New Markets Tax Credit Program Funding Opportunity Title: Notice of Allocation Availability (NOAA) Inviting Applications for the... form (see Section IV.D. of this NOAA for more details). Applications must meet all eligibility and...

  18. Brain fingerprinting classification concealed information test detects US Navy military medical information with P300

    PubMed Central

    Farwell, Lawrence A.; Richardson, Drew C.; Richardson, Graham M.; Furedy, John J.

    2014-01-01

    A classification concealed information test (CIT) used the “brain fingerprinting” method of applying P300 event-related potential (ERP) in detecting information that is (1) acquired in real life and (2) unique to US Navy experts in military medicine. Military medicine experts and non-experts were asked to push buttons in response to three types of text stimuli. Targets contain known information relevant to military medicine, are identified to subjects as relevant, and require pushing one button. Subjects are told to push another button to all other stimuli. Probes contain concealed information relevant to military medicine, and are not identified to subjects. Irrelevants contain equally plausible, but incorrect/irrelevant information. Error rate was 0%. Median and mean statistical confidences for individual determinations were 99.9% with no indeterminates (results lacking sufficiently high statistical confidence to be classified). We compared error rate and statistical confidence for determinations of both information present and information absent produced by classification CIT (Is a probe ERP more similar to a target or to an irrelevant ERP?) vs. comparison CIT (Does a probe produce a larger ERP than an irrelevant?) using P300 plus the late negative component (LNP; together, P300-MERMER). Comparison CIT produced a significantly higher error rate (20%) and lower statistical confidences: mean 67%; information-absent mean was 28.9%, less than chance (50%). We compared analysis using P300 alone with the P300 + LNP. P300 alone produced the same 0% error rate but significantly lower statistical confidences. These findings add to the evidence that the brain fingerprinting methods as described here provide sufficient conditions to produce less than 1% error rate and greater than 95% median statistical confidence in a CIT on information obtained in the course of real life that is characteristic of individuals with specific training, expertise, or organizational

  19. 40 CFR 51.354 - Adequate tools and resources.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 2 2014-07-01 2014-07-01 false Adequate tools and resources. 51.354... Requirements § 51.354 Adequate tools and resources. (a) Administrative resources. The program shall maintain... assurance, data analysis and reporting, and the holding of hearings and adjudication of cases. A portion of...

  20. 40 CFR 51.354 - Adequate tools and resources.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 2 2011-07-01 2011-07-01 false Adequate tools and resources. 51.354... Requirements § 51.354 Adequate tools and resources. (a) Administrative resources. The program shall maintain... assurance, data analysis and reporting, and the holding of hearings and adjudication of cases. A portion of...

  1. 40 CFR 51.354 - Adequate tools and resources.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 2 2012-07-01 2012-07-01 false Adequate tools and resources. 51.354... Requirements § 51.354 Adequate tools and resources. (a) Administrative resources. The program shall maintain... assurance, data analysis and reporting, and the holding of hearings and adjudication of cases. A portion of...

  2. 40 CFR 51.354 - Adequate tools and resources.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 2 2013-07-01 2013-07-01 false Adequate tools and resources. 51.354... Requirements § 51.354 Adequate tools and resources. (a) Administrative resources. The program shall maintain... assurance, data analysis and reporting, and the holding of hearings and adjudication of cases. A portion of...

  3. Probabilistic resource allocation system with self-adaptive capability

    NASA Technical Reports Server (NTRS)

    Yufik, Yan M. (Inventor)

    1996-01-01

    A probabilistic resource allocation system is disclosed containing a low capacity computational module (Short Term Memory or STM) and a self-organizing associative network (Long Term Memory or LTM) where nodes represent elementary resources, terminal end nodes represent goals, and directed links represent the order of resource association in different allocation episodes. Goals and their priorities are indicated by the user, and allocation decisions are made in the STM, while candidate associations of resources are supplied by the LTM based on the association strength (reliability). Reliability values are automatically assigned to the network links based on the frequency and relative success of exercising those links in the previous allocation decisions. Accumulation of allocation history in the form of an associative network in the LTM reduces computational demands on subsequent allocations. For this purpose, the network automatically partitions itself into strongly associated high reliability packets, allowing fast approximate computation and display of allocation solutions satisfying the overall reliability and other user-imposed constraints. System performance improves in time due to modification of network parameters and partitioning criteria based on the performance feedback.

  4. Probabilistic resource allocation system with self-adaptive capability

    NASA Technical Reports Server (NTRS)

    Yufik, Yan M. (Inventor)

    1998-01-01

    A probabilistic resource allocation system is disclosed containing a low capacity computational module (Short Term Memory or STM) and a self-organizing associative network (Long Term Memory or LTM) where nodes represent elementary resources, terminal end nodes represent goals, and weighted links represent the order of resource association in different allocation episodes. Goals and their priorities are indicated by the user, and allocation decisions are made in the STM, while candidate associations of resources are supplied by the LTM based on the association strength (reliability). Weights are automatically assigned to the network links based on the frequency and relative success of exercising those links in the previous allocation decisions. Accumulation of allocation history in the form of an associative network in the LTM reduces computational demands on subsequent allocations. For this purpose, the network automatically partitions itself into strongly associated high reliability packets, allowing fast approximate computation and display of allocation solutions satisfying the overall reliability and other user-imposed constraints. System performance improves in time due to modification of network parameters and partitioning criteria based on the performance feedback.

  5. Auto-concealment of supersymmetry in extra dimensions

    DOE PAGES

    Dimopoulos, Savas; Howe, Kiel; March-Russell, John; ...

    2015-06-05

    In supersymmetric (SUSY) theories with extra dimensions the visible energy in sparticle decays can be significantly reduced and its energy distribution broadened, thus significantly weakening the present collider limits on SUSY. The mechanism applies when the lightest supersymmetric particle (LSP) is a bulk state — e.g. a bulk modulino, axino, or gravitino — the size of the extra dimensions ≳ 10 –14 cm, and for a broad variety of visible sparticle spectra. In such cases the lightest ordinary supersymmetric particle (LOSP), necessarily a brane-localised state, decays to the Kaluza-Klein (KK) discretuum of the LSP. This dynamically realises the compression mechanismmore » for hiding SUSY as decays into the more numerous heavier KK LSP states are favored. We find LHC limits on right-handed slepton LOSPs evaporate, while LHC limits on stop LOSPs weaken to ~350 ÷ 410 GeV compared to ~700 GeV for a stop decaying to a massless LSP. Similarly, for the searches we consider, present limits on direct production of degenerate first and second generation squarks drop to ~450 GeV compared to ~800 GeV for a squark decaying to a massless LSP. Auto-concealment typically works for a fundamental gravitational scale of M* ~10 ÷ 100 TeV, a scale sufficiently high that traditional searches for signatures of extra dimensions are mostly avoided. If superpartners are discovered, their prompt, displaced, or stopped decays can also provide new search opportunities for extra dimensions with the potential to reach M* ~10 9 GeV. As a result, this mechanism applies more generally than just SUSY theories, pertaining to any theory where there is a discrete quantum number shared by both brane and bulk sectors.« less

  6. Intentional retrieval suppression can conceal guilty knowledge in ERP memory detection tests☆

    PubMed Central

    Bergström, Zara M.; Anderson, Michael C.; Buda, Marie; Simons, Jon S.; Richardson-Klavehn, Alan

    2013-01-01

    Brain-activity markers of guilty knowledge have been promoted as accurate and reliable measures for establishing criminal culpability. Tests based on these markers interpret the presence or absence of memory-related neural activity as diagnostic of whether or not incriminating information is stored in a suspect's brain. This conclusion critically relies on the untested assumption that reminders of a crime uncontrollably elicit memory-related brain activity. However, recent research indicates that, in some circumstances, humans can control whether they remember a previous experience by intentionally suppressing retrieval. We examined whether people could use retrieval suppression to conceal neural evidence of incriminating memories as indexed by Event-Related Potentials (ERPs). When people were motivated to suppress crime retrieval, their memory-related ERP effects were significantly decreased, allowing guilty individuals to evade detection. Our findings indicate that brain measures of guilty knowledge may be under criminals’ intentional control and place limits on their use in legal settings. PMID:23664804

  7. Hiding true emotions: micro-expressions in eyes retrospectively concealed by mouth movements.

    PubMed

    Iwasaki, Miho; Noguchi, Yasuki

    2016-02-26

    When we encounter someone we dislike, we may momentarily display a reflexive disgust expression, only to follow-up with a forced smile and greeting. Our daily lives are replete with a mixture of true and fake expressions. Nevertheless, are these fake expressions really effective at hiding our true emotions? Here we show that brief emotional changes in the eyes (micro-expressions, thought to reflect true emotions) can be successfully concealed by follow-up mouth movements (e.g. a smile). In the same manner as backward masking, mouth movements of a face inhibited conscious detection of all types of micro-expressions in that face, even when viewers paid full attention to the eye region. This masking works only in a backward direction, however, because no disrupting effect was observed when the mouth change preceded the eye change. These results provide scientific evidence for everyday behaviours like smiling to dissemble, and further clarify a major reason for the difficulty we face in discriminating genuine from fake emotional expressions.

  8. 76 FR 32392 - Notice of Allocation Availability (NOAA) Inviting Applications for the CY 2011 Allocation Round...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-06

    ... Availability (NOAA) Inviting Applications for the CY 2011 Allocation Round of the New Markets Tax Credit... charts) in electronic form (see Section IV.D. of this NOAA for more details). Applications must meet all eligibility and other requirements and deadlines, as applicable, set forth in this NOAA. Allocation applicants...

  9. Using pretest data to screen low-reactivity individuals in the autonomic-based concealed information test.

    PubMed

    Matsuda, Izumi; Ogawa, Tokihiro; Tsuneoka, Michiko; Verschuere, Bruno

    2015-03-01

    The concealed information test (CIT) can be used to assess whether an individual possesses crime-related information. However, its discrimination performance has room for improvement. We examined whether screening out participants who do not respond distinctively on a pretest improves the diagnosticity of a mock-crime CIT. Before conducting the CIT, we gave a pretest to 152 participants, 80 of whom were assigned as guilty. Pretest screening significantly improved the diagnostic value of the mock-crime CIT; however, it also led to a substantial number of undiagnosed participants (33.6%). Pretest screening holds promise, but its application would benefit from dedicated measures for screening out participants. © 2014 Society for Psychophysiological Research.

  10. 7 CFR 761.205 - Computing the formula allocation.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ..., DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS GENERAL PROGRAM ADMINISTRATION Allocation of Farm Loan Programs... held in the National Office reserve and distributed by base and administrative allocation, multiplied... allocation−national reserve−base allocation−administrative allocation) × State Factor (b) To calculate the...

  11. 45 CFR 400.13 - Cost allocation.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Welfare Regulations Relating to Public Welfare OFFICE OF REFUGEE RESETTLEMENT, ADMINISTRATION FOR CHILDREN AND FAMILIES, DEPARTMENT OF HEALTH AND HUMAN SERVICES REFUGEE RESETTLEMENT PROGRAM Grants to States for Refugee Resettlement Award of Grants to States § 400.13 Cost allocation. (a) A State must allocate...

  12. How to Do Random Allocation (Randomization)

    PubMed Central

    Shin, Wonshik

    2014-01-01

    Purpose To explain the concept and procedure of random allocation as used in a randomized controlled study. Methods We explain the general concept of random allocation and demonstrate how to perform the procedure easily and how to report it in a paper. PMID:24605197

  13. 40 CFR 74.26 - Allocation formula.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 16 2010-07-01 2010-07-01 false Allocation formula. 74.26 Section 74.26 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) SULFUR DIOXIDE OPT-INS Allowance Calculations for Combustion Sources § 74.26 Allocation formula. (a) The...

  14. Optimality versus stability in water resource allocation.

    PubMed

    Read, Laura; Madani, Kaveh; Inanloo, Bahareh

    2014-01-15

    Water allocation is a growing concern in a developing world where limited resources like fresh water are in greater demand by more parties. Negotiations over allocations often involve multiple groups with disparate social, economic, and political status and needs, who are seeking a management solution for a wide range of demands. Optimization techniques for identifying the Pareto-optimal (social planner solution) to multi-criteria multi-participant problems are commonly implemented, although often reaching agreement for this solution is difficult. In negotiations with multiple-decision makers, parties who base decisions on individual rationality may find the social planner solution to be unfair, thus creating a need to evaluate the willingness to cooperate and practicality of a cooperative allocation solution, i.e., the solution's stability. This paper suggests seeking solutions for multi-participant resource allocation problems through an economics-based power index allocation method. This method can inform on allocation schemes that quantify a party's willingness to participate in a negotiation rather than opt for no agreement. Through comparison of the suggested method with a range of distance-based multi-criteria decision making rules, namely, least squares, MAXIMIN, MINIMAX, and compromise programming, this paper shows that optimality and stability can produce different allocation solutions. The mismatch between the socially-optimal alternative and the most stable alternative can potentially result in parties leaving the negotiation as they may be too dissatisfied with their resource share. This finding has important policy implications as it justifies why stakeholders may not accept the socially optimal solution in practice, and underlies the necessity of considering stability where it may be more appropriate to give up an unstable Pareto-optimal solution for an inferior stable one. Authors suggest assessing the stability of an allocation solution as an

  15. Stochastic Optimization For Water Resources Allocation

    NASA Astrophysics Data System (ADS)

    Yamout, G.; Hatfield, K.

    2003-12-01

    For more than 40 years, water resources allocation problems have been addressed using deterministic mathematical optimization. When data uncertainties exist, these methods could lead to solutions that are sub-optimal or even infeasible. While optimization models have been proposed for water resources decision-making under uncertainty, no attempts have been made to address the uncertainties in water allocation problems in an integrated approach. This paper presents an Integrated Dynamic, Multi-stage, Feedback-controlled, Linear, Stochastic, and Distributed parameter optimization approach to solve a problem of water resources allocation. It attempts to capture (1) the conflict caused by competing objectives, (2) environmental degradation produced by resource consumption, and finally (3) the uncertainty and risk generated by the inherently random nature of state and decision parameters involved in such a problem. A theoretical system is defined throughout its different elements. These elements consisting mainly of water resource components and end-users are described in terms of quantity, quality, and present and future associated risks and uncertainties. Models are identified, modified, and interfaced together to constitute an integrated water allocation optimization framework. This effort is a novel approach to confront the water allocation optimization problem while accounting for uncertainties associated with all its elements; thus resulting in a solution that correctly reflects the physical problem in hand.

  16. 14 CFR 1260.61 - Allocation of risk/liability.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Allocation of risk/liability. 1260.61 Section 1260.61 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION GRANTS AND COOPERATIVE AGREEMENTS General Special Conditions § 1260.61 Allocation of risk/liability. Allocation of Risk/Liability...

  17. Local Fiscal Allocation for Public Health Departments.

    PubMed

    McCullough, J Mac; Leider, Jonathon P; Riley, William J

    2015-12-01

    We examined the percentage of local government taxes ("fiscal allocation") dedicated to local health departments on a national level, as well as correlates of local investment in public health. Using the most recent data available--the 2008 National Association of City and County Health Officials Profile survey and the 2007 U.S. Census Bureau Census of Local Governments-generalized linear regression models examined associations between fiscal allocation and local health department setting, governance, finance, and service provision. Models were stratified by the extent of long-term debt for the jurisdiction. Analyses were performed in 2014. Average fiscal allocation for public health was 3.31% of total local taxes. In multivariate regressions, per capita expenditures, having a local board of health and public health service provision were associated with higher fiscal allocation. Stratified models showed that local board of health and local health department taxing authority were associated with fiscal allocation in low and high long-term debt areas, respectively. The proportion of all local taxes allocated to local public health is related to local health department expenditures, service provision, and governance. These relationships depend upon the extent of long-term debt in the jurisdiction. Copyright © 2015 American Journal of Preventive Medicine. Published by Elsevier Inc. All rights reserved.

  18. 20 CFR 631.82 - Substate allocation.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Substate allocation. 631.82 Section 631.82 Employees' Benefits EMPLOYMENT AND TRAINING ADMINISTRATION, DEPARTMENT OF LABOR PROGRAMS UNDER TITLE III OF THE JOB TRAINING PARTNERSHIP ACT Disaster Relief Employment Assistance § 631.82 Substate allocation...

  19. Predictors of adequate depression treatment among Medicaid-enrolled adults.

    PubMed

    Teh, Carrie Farmer; Sorbero, Mark J; Mihalyo, Mark J; Kogan, Jane N; Schuster, James; Reynolds, Charles F; Stein, Bradley D

    2010-02-01

    To determine whether Medicaid-enrolled depressed adults receive adequate treatment for depression and to identify the characteristics of those receiving inadequate treatment. Claims data from a Medicaid-enrolled population in a large mid-Atlantic state between July 2006 and January 2008. We examined rates and predictors of minimally adequate psychotherapy and pharmacotherapy among adults with a new depression treatment episode during the study period (N=1,098). Many depressed adults received either minimally adequate psychotherapy or pharmacotherapy. Black individuals and individuals who began their depression treatment episode with an inpatient psychiatric stay for depression were markedly less likely to receive minimally adequate psychotherapy and more likely to receive inadequate treatment. Racial minorities and individuals discharged from inpatient treatment for depression are at risk for receiving inadequate depression treatment.

  20. Control allocation for gimballed/fixed thrusters

    NASA Astrophysics Data System (ADS)

    Servidia, Pablo A.

    2010-02-01

    Some overactuated control systems use a control distribution law between the controller and the set of actuators, usually called control allocator. Beyond the control allocator, the configuration of actuators may be designed to be able to operate after a single point of failure, for system optimization and/or decentralization objectives. For some type of actuators, a control allocation is used even without redundancy, being a good example the design and operation of thruster configurations. In fact, as the thruster mass flow direction and magnitude only can be changed under certain limits, this must be considered in the feedback implementation. In this work, the thruster configuration design is considered in the fixed (F), single-gimbal (SG) and double-gimbal (DG) thruster cases. The minimum number of thrusters for each case is obtained and for the resulting configurations a specific control allocation is proposed using a nonlinear programming algorithm, under nominal and single-point of failure conditions.

  1. Libraries 2000: Allocation Plan for FY1997 LSCA Funds, Library Services and Construction Act. An Annual Outline and Description of Projects in Idaho Eligible under LSCA Titles I, II, and III.

    ERIC Educational Resources Information Center

    Idaho State Library, Boise.

    The Idaho allocation plan for funds from the Library Service and Construction Act (LSCA) continues the emphasis on priorities described in the statewide plan for years 1994-1998. These priorities are: (1) advocate for the creation of library districts with adequate tax support to serve the state's entire population; (2) strengthen cooperation and…

  2. 26 CFR 1.460-5 - Cost allocation rules.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... rules. (a) Overview. This section prescribes methods of allocating costs to long-term contracts... section provides rules concerning consistency in method of allocating costs to long-term contracts. (b... paragraph (b)(2) of this section, a taxpayer must allocate costs to each long-term contract subject to the...

  3. 26 CFR 1.460-5 - Cost allocation rules.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... rules. (a) Overview. This section prescribes methods of allocating costs to long-term contracts... section provides rules concerning consistency in method of allocating costs to long-term contracts. (b... paragraph (b)(2) of this section, a taxpayer must allocate costs to each long-term contract subject to the...

  4. 26 CFR 1.460-5 - Cost allocation rules.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... rules. (a) Overview. This section prescribes methods of allocating costs to long-term contracts... section provides rules concerning consistency in method of allocating costs to long-term contracts. (b... paragraph (b)(2) of this section, a taxpayer must allocate costs to each long-term contract subject to the...

  5. 26 CFR 1.460-5 - Cost allocation rules.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... rules. (a) Overview. This section prescribes methods of allocating costs to long-term contracts... section provides rules concerning consistency in method of allocating costs to long-term contracts. (b... paragraph (b)(2) of this section, a taxpayer must allocate costs to each long-term contract subject to the...

  6. Sex Differences, Sex-Role Orientation, and Reward Allocations.

    ERIC Educational Resources Information Center

    Olejnik, Anthony B.

    1982-01-01

    In separate studies, examined (1) ways that college students allocated rewards to children performing in team and competitive situations, and (2) the relationship between sex role orientation and reward allocations. Found that sex and situational differences in reward allocations are affected by sex role orientation and differential socialization…

  7. 49 CFR 93.1 - Issuance of aircraft allocations.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... orders allocating aircraft to the Department of Defense, identified by FAA registration number, for the... 49 Transportation 1 2014-10-01 2014-10-01 false Issuance of aircraft allocations. 93.1 Section 93.1 Transportation Office of the Secretary of Transportation AIRCRAFT ALLOCATION § 93.1 Issuance of...

  8. 49 CFR 93.1 - Issuance of aircraft allocations.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... orders allocating aircraft to the Department of Defense, identified by FAA registration number, for the... 49 Transportation 1 2013-10-01 2013-10-01 false Issuance of aircraft allocations. 93.1 Section 93.1 Transportation Office of the Secretary of Transportation AIRCRAFT ALLOCATION § 93.1 Issuance of...

  9. 49 CFR 93.1 - Issuance of aircraft allocations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... orders allocating aircraft to the Department of Defense, identified by FAA registration number, for the... 49 Transportation 1 2010-10-01 2010-10-01 false Issuance of aircraft allocations. 93.1 Section 93.1 Transportation Office of the Secretary of Transportation AIRCRAFT ALLOCATION § 93.1 Issuance of...

  10. 49 CFR 93.1 - Issuance of aircraft allocations.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... orders allocating aircraft to the Department of Defense, identified by FAA registration number, for the... 49 Transportation 1 2012-10-01 2012-10-01 false Issuance of aircraft allocations. 93.1 Section 93.1 Transportation Office of the Secretary of Transportation AIRCRAFT ALLOCATION § 93.1 Issuance of...

  11. 49 CFR 93.1 - Issuance of aircraft allocations.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... orders allocating aircraft to the Department of Defense, identified by FAA registration number, for the... 49 Transportation 1 2011-10-01 2011-10-01 false Issuance of aircraft allocations. 93.1 Section 93.1 Transportation Office of the Secretary of Transportation AIRCRAFT ALLOCATION § 93.1 Issuance of...

  12. S4HARA: System for HIV/AIDS resource allocation.

    PubMed

    Lasry, Arielle; Carter, Michael W; Zaric, Gregory S

    2008-03-26

    HIV/AIDS resource allocation decisions are influenced by political, social, ethical and other factors that are difficult to quantify. Consequently, quantitative models of HIV/AIDS resource allocation have had limited impact on actual spending decisions. We propose a decision-support System for HIV/AIDS Resource Allocation (S4HARA) that takes into consideration both principles of efficient resource allocation and the role of non-quantifiable influences on the decision-making process for resource allocation. S4HARA is a four-step spreadsheet-based model. The first step serves to identify the factors currently influencing HIV/AIDS allocation decisions. The second step consists of prioritizing HIV/AIDS interventions. The third step involves allocating the budget to the HIV/AIDS interventions using a rational approach. Decision-makers can select from several rational models of resource allocation depending on availability of data and level of complexity. The last step combines the results of the first and third steps to highlight the influencing factors that act as barriers or facilitators to the results suggested by the rational resource allocation approach. Actionable recommendations are then made to improve the allocation. We illustrate S4HARA in the context of a primary healthcare clinic in South Africa. The clinic offers six types of HIV/AIDS interventions and spends US$750,000 annually on these programs. Current allocation decisions are influenced by donors, NGOs and the government as well as by ethical and religious factors. Without additional funding, an optimal allocation of the total budget suggests that the portion allotted to condom distribution be increased from 1% to 15% and the portion allotted to prevention and treatment of opportunistic infections be increased from 43% to 71%, while allocation to other interventions should decrease. Condom uptake at the clinic should be increased by changing the condom distribution policy from a pull system to a push

  13. Resource Allocation Based on Evaluation of Research.

    ERIC Educational Resources Information Center

    Fransson, Rune

    1985-01-01

    At Sweden's Karolinska Institute, a resource allocation model for medical research in use since 1970 allows the research activity of the different departments to affect resource allocation direclty. (MSE)

  14. 10 CFR 490.503 - Credit allocation.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 3 2012-01-01 2012-01-01 false Credit allocation. 490.503 Section 490.503 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Alternative Fueled Vehicle... described in section 490.507 of this part, DOE shall allocate one credit for each alternative fueled vehicle...

  15. 10 CFR 490.503 - Credit allocation.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 3 2011-01-01 2011-01-01 false Credit allocation. 490.503 Section 490.503 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Alternative Fueled Vehicle... described in section 490.507 of this part, DOE shall allocate one credit for each alternative fueled vehicle...

  16. 10 CFR 490.503 - Credit allocation.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 3 2014-01-01 2014-01-01 false Credit allocation. 490.503 Section 490.503 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Alternative Fueled Vehicle... described in section 490.507 of this part, DOE shall allocate one credit for each alternative fueled vehicle...

  17. 10 CFR 490.503 - Credit allocation.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 3 2013-01-01 2013-01-01 false Credit allocation. 490.503 Section 490.503 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Alternative Fueled Vehicle... described in section 490.507 of this part, DOE shall allocate one credit for each alternative fueled vehicle...

  18. 10 CFR 490.503 - Credit allocation.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 3 2010-01-01 2010-01-01 false Credit allocation. 490.503 Section 490.503 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Alternative Fueled Vehicle... described in section 490.507 of this part, DOE shall allocate one credit for each alternative fueled vehicle...

  19. 45 CFR 205.150 - Cost allocation.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 2 2014-10-01 2012-10-01 true Cost allocation. 205.150 Section 205.150 Public Welfare Regulations Relating to Public Welfare OFFICE OF FAMILY ASSISTANCE (ASSISTANCE PROGRAMS... Social Security Act must provide that the State agency will have an approved cost allocation plan on file...

  20. 45 CFR 304.15 - Cost allocation.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Welfare Regulations Relating to Public Welfare OFFICE OF CHILD SUPPORT ENFORCEMENT (CHILD SUPPORT... FEDERAL FINANCIAL PARTICIPATION § 304.15 Cost allocation. A State agency in support of its claims under title IV-D of the Social Security Act must have an approved cost allocation plan on file with the...

  1. The Act of Answering Questions Elicited Differentiated Responses in a Concealed Information Test.

    PubMed

    Otsuka, Takuro; Mizutani, Mitsuyoshi; Yagi, Akihiro; Katayama, Jun'ichi

    2018-04-17

    The concealed information test (CIT), a psychophysiological detection of deception test, compares physiological responses between crime-related and crime-unrelated items. In previous studies, whether the act of answering questions affected physiological responses was unclear. This study examined effects of both question-related and answer-related processes on physiological responses. Twenty participants received a modified CIT, in which the interval between presentation of questions and answering them was 27 s. Differentiated respiratory movements and cardiovascular responses between items were observed for both questions (items) and answers, while differentiated skin conductance response was observed only for questions. These results suggest that physiological responses to questions reflected orientation to a crime-related item, while physiological responses during answering reflected inhibition of psychological arousal caused by orienting. Regarding the CIT's accuracy, participants' perception of the questions themselves more strongly influenced physiological responses than answering them. © 2018 American Academy of Forensic Sciences.

  2. 7 CFR 3430.311 - Allocation of research funds.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 15 2012-01-01 2012-01-01 false Allocation of research funds. 3430.311 Section 3430... ADMINISTRATIVE PROVISIONS Agriculture and Food Research Initiative § 3430.311 Allocation of research funds. (a) Fundamental research. Of the amount allocated by the Director for research, not less than 60 percent shall be...

  3. 7 CFR 3430.311 - Allocation of research funds.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 15 2013-01-01 2013-01-01 false Allocation of research funds. 3430.311 Section 3430... ADMINISTRATIVE PROVISIONS Agriculture and Food Research Initiative § 3430.311 Allocation of research funds. (a) Fundamental research. Of the amount allocated by the Director for research, not less than 60 percent shall be...

  4. Reciprocal Cost Allocation and Decision Making for Universities.

    ERIC Educational Resources Information Center

    Metzger, Lawrence M.

    1994-01-01

    Examines the use of the reciprocal method as an alternative to more conventional methods of university service department cost allocation. This method can be used with software that is readily available and with already known data. Reciprocal cost allocation will provide appropriate allocation values for financial reporting and data for university…

  5. The allocation of ecosystem net primary productivity in tropical forests

    PubMed Central

    Malhi, Yadvinder; Doughty, Christopher; Galbraith, David

    2011-01-01

    The allocation of the net primary productivity (NPP) of an ecosystem between canopy, woody tissue and fine roots is an important descriptor of the functioning of that ecosystem, and an important feature to correctly represent in terrestrial ecosystem models. Here, we collate and analyse a global dataset of NPP allocation in tropical forests, and compare this with the representation of NPP allocation in 13 terrestrial ecosystem models. On average, the data suggest an equal partitioning of allocation between all three main components (mean 34 ± 6% canopy, 39 ± 10% wood, 27 ± 11% fine roots), but there is substantial site-to-site variation in allocation to woody tissue versus allocation to fine roots. Allocation to canopy (leaves, flowers and fruit) shows much less variance. The mean allocation of the ecosystem models is close to the mean of the data, but the spread is much greater, with several models reporting allocation partitioning outside of the spread of the data. Where all main components of NPP cannot be measured, litterfall is a good predictor of overall NPP (r2 = 0.83 for linear fit forced through origin), stem growth is a moderate predictor and fine root production a poor predictor. Across sites the major component of variation of allocation is a shifting allocation between wood and fine roots, with allocation to the canopy being a relatively invariant component of total NPP. This suggests the dominant allocation trade-off is a ‘fine root versus wood’ trade-off, as opposed to the expected ‘root–shoot’ trade-off; such a trade-off has recently been posited on theoretical grounds for old-growth forest stands. We conclude by discussing the systematic biases in estimates of allocation introduced by missing NPP components, including herbivory, large leaf litter and root exudates production. These biases have a moderate effect on overall carbon allocation estimates, but are smaller than the observed range in allocation values across sites. PMID

  6. Users Manual for FAA Cost Allocation Model.

    DTIC Science & Technology

    1986-12-01

    29 2.10 Ramsey Files................29 2.11 Allocation Tables.............33 2.12 MINSYS....................34 2.13 TAXRAM1...Budget V p. ARTRFUT1~TOWRFUTI " ’T RA RF UT 1 FSSRFUT1 Ramsey Pricing Allocations to User Groups i OPSRFUTI OPS RFUIA V 08RFUTI MINSYS GA Minimum...Splits Aviation Standards--O&M Budget V ARTRFUT 2 TOWRFUT2 TRARFUT2 FSSRFUT2 Ramsey Pricing Allocations to User Groups OPSRFU2 OPSVRFU 2A OPSVFUT2

  7. Comprehensive School Reform: Allocating Federal Funds.

    ERIC Educational Resources Information Center

    Education Commission of the States, Denver, CO.

    This booklet is designed to assist state leaders as they develop their process for allocating funds to schools. It suggests components of a state-allocation process that are based on research and field experience with successfully implemented comprehensive school-reform (CSR) models. The document provides guidelines for defining the eligibility of…

  8. 45 CFR 304.15 - Cost allocation.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 2 2014-10-01 2012-10-01 true Cost allocation. 304.15 Section 304.15 Public Welfare Regulations Relating to Public Welfare OFFICE OF CHILD SUPPORT ENFORCEMENT (CHILD SUPPORT... title IV-D of the Social Security Act must have an approved cost allocation plan on file with the...

  9. 45 CFR 304.15 - Cost allocation.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 2 2011-10-01 2011-10-01 false Cost allocation. 304.15 Section 304.15 Public Welfare Regulations Relating to Public Welfare OFFICE OF CHILD SUPPORT ENFORCEMENT (CHILD SUPPORT... title IV-D of the Social Security Act must have an approved cost allocation plan on file with the...

  10. Cost Allocation Issues in Interlibrary Systems.

    ERIC Educational Resources Information Center

    Alexander, Ernest R.

    1985-01-01

    In comparing methods of allocating service transaction costs among member libraries of interlibrary systems, questions of how costs are to be estimated, and what cost elements are to be included are critical. Different approaches of estimation yield varying results. Actual distribution of units accounts for greatest variance in allocations. (CDD)

  11. 45 CFR 98.55 - Cost allocation.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 1 2013-10-01 2013-10-01 false Cost allocation. 98.55 Section 98.55 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION CHILD CARE AND DEVELOPMENT FUND Use of Child Care and Development Funds § 98.55 Cost allocation. (a) The Lead Agency and subgrantees...

  12. 45 CFR 98.55 - Cost allocation.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 1 2014-10-01 2014-10-01 false Cost allocation. 98.55 Section 98.55 Public Welfare Department of Health and Human Services GENERAL ADMINISTRATION CHILD CARE AND DEVELOPMENT FUND Use of Child Care and Development Funds § 98.55 Cost allocation. (a) The Lead Agency and subgrantees...

  13. 45 CFR 98.55 - Cost allocation.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Cost allocation. 98.55 Section 98.55 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION CHILD CARE AND DEVELOPMENT FUND Use of Child Care and Development Funds § 98.55 Cost allocation. (a) The Lead Agency and subgrantees...

  14. 45 CFR 98.55 - Cost allocation.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 1 2012-10-01 2012-10-01 false Cost allocation. 98.55 Section 98.55 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION CHILD CARE AND DEVELOPMENT FUND Use of Child Care and Development Funds § 98.55 Cost allocation. (a) The Lead Agency and subgrantees...

  15. 45 CFR 98.55 - Cost allocation.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 1 2011-10-01 2011-10-01 false Cost allocation. 98.55 Section 98.55 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION CHILD CARE AND DEVELOPMENT FUND Use of Child Care and Development Funds § 98.55 Cost allocation. (a) The Lead Agency and subgrantees...

  16. Rethinking Reinforcement: Allocation, Induction, and Contingency

    ERIC Educational Resources Information Center

    Baum, William M.

    2012-01-01

    The concept of reinforcement is at least incomplete and almost certainly incorrect. An alternative way of organizing our understanding of behavior may be built around three concepts: "allocation," "induction," and "correlation." Allocation is the measure of behavior and captures the centrality of choice: All behavior entails choice and consists of…

  17. 30 CFR 1206.260 - Allocation of washed coal.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 3 2011-07-01 2011-07-01 false Allocation of washed coal. 1206.260 Section... INTERIOR Natural Resources Revenue PRODUCT VALUATION Federal Coal § 1206.260 Allocation of washed coal. (a) When coal is subjected to washing, the washed coal must be allocated to the leases from which it was...

  18. 30 CFR 1206.459 - Allocation of washed coal.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 3 2011-07-01 2011-07-01 false Allocation of washed coal. 1206.459 Section... INTERIOR Natural Resources Revenue PRODUCT VALUATION Indian Coal § 1206.459 Allocation of washed coal. (a) When coal is subjected to washing, the washed coal must be allocated to the leases from which it was...

  19. Effect of long-term drought on carbon allocation and nitrogen uptake of Pinus sylvestris seedlings

    NASA Astrophysics Data System (ADS)

    Pumpanen, Jukka; Aaltonen, Heidi; Lindén, Aki; Köster, Kajar; Biasi, Christina; Heinonsalo, Jussi

    2015-04-01

    Weather extremes such as drought events are expected to increase in the future as a result of climate change. The drought affects the allocation of carbon assimilated by plants e.g. by modifying the root to shoot ratio, amount of fine roots and the amount of mycorrhizal fungal hyphae. We studied the effect of long term drought on the allocation of carbon in a common garden experiment with 4-year-old Pinus sylvestris seedlings. Half of the seedlings were exposed to long-term drought by setting the soil water content close to wilting point for over two growing seasons whereas the other half was grown in soil close to field capacity. We conducted a pulse labelling with 13CO2 in the end of the study by injecting a known amount of 13C enriched CO2 to the seedlings and measuring the CO2 uptake and distribution of 13C to the biomass of the seedlings and to the root and rhizosphere respiration. In addition, we studied the effect of drought on the decomposition of needle litter and uptake of nitrogen by 15N labelled needles buried in the soil in litter bags. The litterbags were collected and harvested in the end of the experiment and the changes in microbial community in the litterbags were studied from the phospholipid fatty acid (PLFA) composition. We also determined the 15N isotope concentrations from the needles of the seedlings to study the effect of drought on the nitrogen uptake of the seedlings. Our results indicate that the drought had a significant effect both on the biomass allocation of the seedlings and on the microbial species composition. The amount of carbon allocated belowground was much higher in the seedlings exposed to drought compared to the control seedlings. The seedlings seemed to adapt their carbon allocation to long-term drought to sustain adequate needle biomass and water uptake. The seedlings also adapted their osmotic potential and photosynthesis capacity to sustain the long-term drought as was indicated by the measurements of osmotic potential

  20. Geochemical Data for Samples Collected in 2007 Near the Concealed Pebble Porphyry Cu-Au-Mo Deposit, Southwest Alaska

    USGS Publications Warehouse

    Fey, David L.; Granitto, Matthew; Giles, Stuart A.; Smith, Steven M.; Eppinger, Robert G.; Kelley, Karen D.

    2008-01-01

    In the summer of 2007, the U.S. Geological Survey (USGS) began an exploration geochemical research study over the Pebble porphyry copper-gold-molydenum (Cu-Au-Mo) deposit in southwest Alaska. The Pebble deposit is extremely large and is almost entirely concealed by tundra, glacial deposits, and post-Cretaceous volcanic and volcaniclastic rocks. The deposit is presently being explored by Northern Dynasty Minerals, Ltd., and Anglo-American LLC. The USGS undertakes unbiased, broad-scale mineral resource assessments of government lands to provide Congress and citizens with information on national mineral endowment. Research on known deposits is also done to refine and better constrain methods and deposit models for the mineral resource assessments. The Pebble deposit was chosen for this study because it is concealed by surficial cover rocks, it is relatively undisturbed (except for exploration company drill holes), it is a large mineral system, and it is fairly well constrained at depth by the drill hole geology and geochemistry. The goals of the USGS study are (1) to determine whether the concealed deposit can be detected with surface samples, (2) to better understand the processes of metal migration from the deposit to the surface, and (3) to test and develop methods for assessing mineral resources in similar concealed terrains. This report presents analytical results for geochemical samples collected in 2007 from the Pebble deposit and surrounding environs. The analytical data are presented digitally both as an integrated Microsoft 2003 Access? database and as Microsoft 2003 Excel? files. The Pebble deposit is located in southwestern Alaska on state lands about 30 km (18 mi) northwest of the village of Illiamna and 320 km (200 mi) southwest of Anchorage (fig. 1). Elevations in the Pebble area range from 287 m (940 ft) at Frying Pan Lake just south of the deposit to 1146 m (3760 ft) on Kaskanak Mountain about 5 km (5 mi) to the west. The deposit is in an area of

  1. A KCNQ1 mutation contributes to the concealed type 1 long QT phenotype by limiting the Kv7.1 channel conformational changes associated with protein kinase A phosphorylation.

    PubMed

    Bartos, Daniel C; Giudicessi, John R; Tester, David J; Ackerman, Michael J; Ohno, Seiko; Horie, Minoru; Gollob, Michael H; Burgess, Don E; Delisle, Brian P

    2014-03-01

    Type 1 long QT syndrome (LQT1) is caused by loss-of-function mutations in the KCNQ1-encoded Kv7.1 channel that conducts the slowly activating component of the delayed rectifier K(+) current (IKs). Clinically, the diagnosis of LQT1 is complicated by variable phenotypic expressivity, whereby approximately 25% of genotype-positive individuals present with concealed LQT1 (resting corrected QT [QTc] interval ≤460 ms). To determine whether a specific molecular mechanism contributes to concealed LQT1. We identified a multigenerational LQT1 family whereby 79% of the patients genotype-positive for p.Ile235Asn-KCNQ1 (I235N-Kv7.1) have concealed LQT1. We assessed the effect I235N-Kv7.1 has on IKs and the ventricular action potential (AP) by using in vitro analysis and computational simulations. Clinical data showed that all 10 patients with I235N-Kv7.1 have normal resting QTc intervals but abnormal QTc interval prolongation during the recovery phase of an electrocardiographic treadmill stress test. Voltage-clamping HEK293 cells coexpressing wild-type Kv7.1 and I235N-Kv7.1 (to mimic the patients' genotypes) showed that I235N-Kv7.1 generated relatively normal functioning Kv7.1 channels but were insensitive to protein kinase A (PKA) activation. Phosphomimetic and quinidine sensitivity studies suggest that I235N-Kv7.1 limits the conformational changes in Kv7.1 channels, which are necessary to upregulate IKs after PKA phosphorylation. Computational ventricular AP simulations predicted that the PKA insensitivity of I235N-Kv7.1 is primarily responsible for prolonging the AP with β-adrenergic stimulation, especially at slower cycle lengths. KCNQ1 mutations that generate relatively normal Kv7.1 channels, but limit the upregulation of IKs by PKA activation, likely contribute to concealed LQT1. Copyright © 2014 Heart Rhythm Society. Published by Elsevier Inc. All rights reserved.

  2. Allocation of authority in European health policy.

    PubMed

    Adolph, Christopher; Greer, Scott L; Massard da Fonseca, Elize

    2012-11-01

    Although many study the effects of different allocations of health policy authority, few ask why countries assign responsibility over different policies as they do. We test two broad theories: fiscal federalism, which predicts rational governments will concentrate information-intensive operations at lower levels, and redistributive and regulatory functions at higher levels; and "politicized federalism", which suggests a combination of systematic and historically idiosyncratic political variables interfere with efficient allocation of authority. Drawing on the WHO Health in Transition country profiles, we present new data on the allocation of responsibility for key health care policy tasks (implementation, provision, finance, regulation, and framework legislation) and policy areas (primary, secondary and tertiary care, public health and pharmaceuticals) in the 27 EU member states and Switzerland. We use a Bayesian multinomial mixed logit model to analyze how different countries arrive at different allocations of authority over each task and area of health policy, and find the allocation of powers broadly follows fiscal federalism. Responsibility for pharmaceuticals, framework legislation, and most finance lodges at the highest levels of government, acute and primary care in the regions, and provision at the local and regional levels. Where allocation does not follow fiscal federalism, it appears to reflect ethnic divisions, the population of states and regions, the presence of mountainous terrain, and the timing of region creation. Copyright © 2012 Elsevier Ltd. All rights reserved.

  3. Sexual harassment of girls in elementary school: a concealed phenomenon within a heterosexual romantic discourse.

    PubMed

    Gådin, Katja Gillander

    2012-06-01

    The aim of this study was to enhance the understanding of young girls' experiences of peer sexual harassment in elementary school and of normalizing processes of school-related sexualized violence. Six focus group interviews with girls in Grade 1 through 6 were carried out in an elementary school in the northern part of Sweden. A content analyses showed that young girls experienced verbal, nonverbal, and sexual assault behaviors at school. Sexual harassment as a concealed phenomenon and manifest within a romantic discourse were themes found in the analysis. A conclusion is that schools have to acknowledge behaviors related to sexual harassment as a potential problem even in young ages and develop methods to approach the subject also for this age group.

  4. Simulating smoke transport from wildland fires with a regional-scale air quality model: sensitivity to spatiotemporal allocation of fire emissions.

    PubMed

    Garcia-Menendez, Fernando; Hu, Yongtao; Odman, Mehmet T

    2014-09-15

    Air quality forecasts generated with chemical transport models can provide valuable information about the potential impacts of fires on pollutant levels. However, significant uncertainties are associated with fire-related emission estimates as well as their distribution on gridded modeling domains. In this study, we explore the sensitivity of fine particulate matter concentrations predicted by a regional-scale air quality model to the spatial and temporal allocation of fire emissions. The assessment was completed by simulating a fire-related smoke episode in which air quality throughout the Atlanta metropolitan area was affected on February 28, 2007. Sensitivity analyses were carried out to evaluate the significance of emission distribution among the model's vertical layers, along the horizontal plane, and into hourly inputs. Predicted PM2.5 concentrations were highly sensitive to emission injection altitude relative to planetary boundary layer height. Simulations were also responsive to the horizontal allocation of fire emissions and their distribution into single or multiple grid cells. Additionally, modeled concentrations were greatly sensitive to the temporal distribution of fire-related emissions. The analyses demonstrate that, in addition to adequate estimates of emitted mass, successfully modeling the impacts of fires on air quality depends on an accurate spatiotemporal allocation of emissions. Copyright © 2014 Elsevier B.V. All rights reserved.

  5. 30 CFR 1206.459 - Allocation of washed coal.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 30 Mineral Resources 3 2013-07-01 2013-07-01 false Allocation of washed coal. 1206.459 Section... RESOURCES REVENUE PRODUCT VALUATION Indian Coal § 1206.459 Allocation of washed coal. (a) When coal is subjected to washing, the washed coal must be allocated to the leases from which it was extracted. (b) When...

  6. 30 CFR 1206.459 - Allocation of washed coal.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 3 2012-07-01 2012-07-01 false Allocation of washed coal. 1206.459 Section... RESOURCES REVENUE PRODUCT VALUATION Indian Coal § 1206.459 Allocation of washed coal. (a) When coal is subjected to washing, the washed coal must be allocated to the leases from which it was extracted. (b) When...

  7. 30 CFR 1206.260 - Allocation of washed coal.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 30 Mineral Resources 3 2014-07-01 2014-07-01 false Allocation of washed coal. 1206.260 Section... RESOURCES REVENUE PRODUCT VALUATION Federal Coal § 1206.260 Allocation of washed coal. (a) When coal is subjected to washing, the washed coal must be allocated to the leases from which it was extracted. (b) When...

  8. 30 CFR 1206.260 - Allocation of washed coal.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 3 2012-07-01 2012-07-01 false Allocation of washed coal. 1206.260 Section... RESOURCES REVENUE PRODUCT VALUATION Federal Coal § 1206.260 Allocation of washed coal. (a) When coal is subjected to washing, the washed coal must be allocated to the leases from which it was extracted. (b) When...

  9. 30 CFR 1206.459 - Allocation of washed coal.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 30 Mineral Resources 3 2014-07-01 2014-07-01 false Allocation of washed coal. 1206.459 Section... RESOURCES REVENUE PRODUCT VALUATION Indian Coal § 1206.459 Allocation of washed coal. (a) When coal is subjected to washing, the washed coal must be allocated to the leases from which it was extracted. (b) When...

  10. 30 CFR 1206.260 - Allocation of washed coal.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 30 Mineral Resources 3 2013-07-01 2013-07-01 false Allocation of washed coal. 1206.260 Section... RESOURCES REVENUE PRODUCT VALUATION Federal Coal § 1206.260 Allocation of washed coal. (a) When coal is subjected to washing, the washed coal must be allocated to the leases from which it was extracted. (b) When...

  11. 11 CFR 106.4 - Allocation of polling expenses.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 11 Federal Elections 1 2010-01-01 2010-01-01 false Allocation of polling expenses. 106.4 Section... ACTIVITIES § 106.4 Allocation of polling expenses. (a) The purchase of opinion poll results by a candidate or... cost allocation formula of the polling firm from which the results are purchased. Under this method the...

  12. 47 CFR 64.903 - Cost allocation manuals.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    .... Annual cost allocation manual updates shall be filed on or before the last working day of each calendar... update their cost allocation manuals at least annually, except that changes to the cost apportionment...

  13. 47 CFR 64.903 - Cost allocation manuals.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    .... Annual cost allocation manual updates shall be filed on or before the last working day of each calendar... update their cost allocation manuals at least annually, except that changes to the cost apportionment...

  14. 47 CFR 64.903 - Cost allocation manuals.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    .... Annual cost allocation manual updates shall be filed on or before the last working day of each calendar... update their cost allocation manuals at least annually, except that changes to the cost apportionment...

  15. 47 CFR 64.903 - Cost allocation manuals.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    .... Annual cost allocation manual updates shall be filed on or before the last working day of each calendar... update their cost allocation manuals at least annually, except that changes to the cost apportionment...

  16. Optimized maritime emergency resource allocation under dynamic demand.

    PubMed

    Zhang, Wenfen; Yan, Xinping; Yang, Jiaqi

    2017-01-01

    Emergency resource is important for people evacuation and property rescue when accident occurs. The relief efforts could be promoted by a reasonable emergency resource allocation schedule in advance. As the marine environment is complicated and changeful, the place, type, severity of maritime accident is uncertain and stochastic, bringing about dynamic demand of emergency resource. Considering dynamic demand, how to make a reasonable emergency resource allocation schedule is challenging. The key problem is to determine the optimal stock of emergency resource for supplier centers to improve relief efforts. This paper studies the dynamic demand, and which is defined as a set. Then a maritime emergency resource allocation model with uncertain data is presented. Afterwards, a robust approach is developed and used to make sure that the resource allocation schedule performs well with dynamic demand. Finally, a case study shows that the proposed methodology is feasible in maritime emergency resource allocation. The findings could help emergency manager to schedule the emergency resource allocation more flexibly in terms of dynamic demand.

  17. Optimized maritime emergency resource allocation under dynamic demand

    PubMed Central

    Yan, Xinping; Yang, Jiaqi

    2017-01-01

    Emergency resource is important for people evacuation and property rescue when accident occurs. The relief efforts could be promoted by a reasonable emergency resource allocation schedule in advance. As the marine environment is complicated and changeful, the place, type, severity of maritime accident is uncertain and stochastic, bringing about dynamic demand of emergency resource. Considering dynamic demand, how to make a reasonable emergency resource allocation schedule is challenging. The key problem is to determine the optimal stock of emergency resource for supplier centers to improve relief efforts. This paper studies the dynamic demand, and which is defined as a set. Then a maritime emergency resource allocation model with uncertain data is presented. Afterwards, a robust approach is developed and used to make sure that the resource allocation schedule performs well with dynamic demand. Finally, a case study shows that the proposed methodology is feasible in maritime emergency resource allocation. The findings could help emergency manager to schedule the emergency resource allocation more flexibly in terms of dynamic demand. PMID:29240792

  18. 30 CFR 206.459 - Allocation of washed coal.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false Allocation of washed coal. 206.459 Section 206... MANAGEMENT PRODUCT VALUATION Indian Coal § 206.459 Allocation of washed coal. (a) When coal is subjected to washing, the washed coal must be allocated to the leases from which it was extracted. (b) When the net...

  19. 30 CFR 206.260 - Allocation of washed coal.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false Allocation of washed coal. 206.260 Section 206... MANAGEMENT PRODUCT VALUATION Federal Coal § 206.260 Allocation of washed coal. (a) When coal is subjected to washing, the washed coal must be allocated to the leases from which it was extracted. (b) When the net...

  20. Redefining the Australian Army Officer Corps Allocation Process

    DTIC Science & Technology

    2010-03-01

    Allocation Numbers (Model 2) ......................................60 Table 28. 2009 Revised Corps Allocation Overage and Underage (Model 2...characteristics: age, sex , marital status, and length of service. b. organizational characteristics: size of work group, visibility of organization...with minimal alteration to the planned corps allocation numbers. A full list of the corps overages and underages is contained in Table 23. Table

  1. Allocating Study Time Appropriately: Spontaneous and Instructed Performance.

    ERIC Educational Resources Information Center

    Dufresne, Annette; And Others

    Two aspects of allocation of study time were examined among 48 third- and 48 fifth-grade children. Aspects examined were: (1) allocation of more time to more difficult material; and (2) allocation of sufficient time to meet a recall goal. Under a self-terminated procedure, children studied two booklets, one of which consisted of easy or highly…

  2. GILBERT'S SYNDROME - A CONCEALED ADVERSITY FOR PHYSICIANS AND SURGEONS.

    PubMed

    Rasool, Ahsan; Sabir, Sabir; Ashlaq, Muhammad; Farooq, Umer; Khan, Muhammad Zatmar; Khan, Faisal Yousaf

    2015-01-01

    Gilbert's syndrome (often abbreviated as GS) is most common hereditary cause of mild unconjugated (indirect) hyperbilirubinemia. Various studies have been published depicting clinical and pharmacological effects of Gilbert's syndrome (GS). However GS as a sign of precaution for physician and surgeons has not been clearly established. A systematic study of the available literature was done. Key words of Gilbert's syndrome, hyperbilirubinemia and clinical and pharmacological aspects of GS were searched using PubMed as search engine. Considering the study done in last 40 years, 375 articles were obtained and their abstracts were studied. The criterion for selecting the articles for through study was based on their close relevance with the topic. Thus 40 articles and 2 case reports were thoroughly studied. It was concluded that Gilbert's syndrome has immense clinical importance because the mild hyperbilirubinemia can be mistaken for a sign of occult, chronic, or progressive liver disease. GS is associated with lack of detoxification of few drugs. It is related with spherocytosis, cholithiasis, haemolytic anaemia, intra-operative toxicity, irinotecan toxicity, schizophrenia and problems in morphine metabolism. It also has profound phenotypic effect as well. The bilirubin level of a GS individual can rise abnormally high in various conditions in a person having Gilbert's syndrome. This can mislead the physicians and surgeons towards false diagnosis. Therefore proper diagnosis of GS should be ascertained in order to avoid the concealed adversities of this syndrome.

  3. Resource Allocation in Public Research Universities

    ERIC Educational Resources Information Center

    Santos, Jose L.

    2007-01-01

    The purpose of this study was to conduct an econometric analysis of internal resource allocation. Two theories are used for this study of resource allocation in public research universities, and these are: (1) Theory of the Firm; and (2) Resource Dependence Theory. This study used the American Association of Universities Data Exchange (AAUDE)…

  4. 50 CFR Table 2b to Part 660... - 2012, and beyond, Allocations by Species or Species Group (final 2012 allocations for assessed...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... or Species Group (final 2012 allocations for assessed flatfish are contingent upon potential changes to flatfish status determination criteria and the harvest control rule, and, for overfished species... Part 660, Subpart C—2012, and beyond, Allocations by Species or Species Group (final 2012 allocations...

  5. 22 CFR 1006.900 - Adequate evidence.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 22 Foreign Relations 2 2014-04-01 2014-04-01 false Adequate evidence. 1006.900 Section 1006.900 Foreign Relations INTER-AMERICAN FOUNDATION GOVERNMENTWIDE DEBARMENT AND SUSPENSION (NONPROCUREMENT... reasonable belief that a particular act or omission has occurred. ...

  6. 22 CFR 1508.900 - Adequate evidence.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 22 Foreign Relations 2 2014-04-01 2014-04-01 false Adequate evidence. 1508.900 Section 1508.900 Foreign Relations AFRICAN DEVELOPMENT FOUNDATION GOVERNMENTWIDE DEBARMENT AND SUSPENSION (NONPROCUREMENT... reasonable belief that a particular act or omission has occurred. ...

  7. Community-aware task allocation for social networked multiagent systems.

    PubMed

    Wang, Wanyuan; Jiang, Yichuan

    2014-09-01

    In this paper, we propose a novel community-aware task allocation model for social networked multiagent systems (SN-MASs), where the agent' cooperation domain is constrained in community and each agent can negotiate only with its intracommunity member agents. Under such community-aware scenarios, we prove that it remains NP-hard to maximize system overall profit. To solve this problem effectively, we present a heuristic algorithm that is composed of three phases: 1) task selection: select the desirable task to be allocated preferentially; 2) allocation to community: allocate the selected task to communities based on a significant task-first heuristics; and 3) allocation to agent: negotiate resources for the selected task based on a nonoverlap agent-first and breadth-first resource negotiation mechanism. Through the theoretical analyses and experiments, the advantages of our presented heuristic algorithm and community-aware task allocation model are validated. 1) Our presented heuristic algorithm performs very closely to the benchmark exponential brute-force optimal algorithm and the network flow-based greedy algorithm in terms of system overall profit in small-scale applications. Moreover, in the large-scale applications, the presented heuristic algorithm achieves approximately the same overall system profit, but significantly reduces the computational load compared with the greedy algorithm. 2) Our presented community-aware task allocation model reduces the system communication cost compared with the previous global-aware task allocation model and improves the system overall profit greatly compared with the previous local neighbor-aware task allocation model.

  8. Equitable fund allocation, an economical approach for sustainable waste load allocation.

    PubMed

    Ashtiani, Elham Feizi; Niksokhan, Mohammad Hossein; Jamshidi, Shervin

    2015-08-01

    This research aims to study a novel approach for waste load allocation (WLA) to meet environmental, economical, and equity objectives, simultaneously. For this purpose, based on a simulation-optimization model developed for Haraz River in north of Iran, the waste loads are allocated according to discharge permit market. The non-dominated solutions are initially achieved through multiobjective particle swarm optimization (MOPSO). Here, the violation of environmental standards based on dissolved oxygen (DO) versus biochemical oxidation demand (BOD) removal costs is minimized to find economical total maximum daily loads (TMDLs). This can save 41% in total abatement costs in comparison with the conventional command and control policy. The BOD discharge permit market then increases the revenues to 45%. This framework ensures that the environmental limits are fulfilled but the inequity index is rather high (about 4.65). For instance, the discharge permit buyer may not be satisfied about the equity of WLA. Consequently, it is recommended that a third party or institution should be in charge of reallocating the funds. It means that the polluters which gain benefits by unfair discharges should pay taxes (or funds) to compensate the losses of other polluters. This intends to reduce the costs below the required values of the lowest inequity index condition. These compensations of equitable fund allocation (EFA) may help to reduce the dissatisfactions and develop WLA policies. It is concluded that EFA in integration with water quality trading (WQT) is a promising approach to meet the objectives.

  9. The complex interplay of sex allocation and sexual selection.

    PubMed

    Booksmythe, Isobel; Schwanz, Lisa E; Kokko, Hanna

    2013-03-01

    It is well recognized that sex allocation strategies can be influenced by sexual selection, when females adjust offspring sex ratios in response to their mates' attractiveness. Yet the reciprocal influence of strategic sex allocation on processes of sexual selection has only recently been revealed. Recent theoretical work demonstrates that sex allocation weakens selection for female preferences, leading to the decline of male traits. However, these results have been derived assuming that females have perfect knowledge of mate attractiveness and precise control over cost-free allocation. Relaxing these assumptions highlights the importance of another feedback: that adaptive sex allocation must become difficult to maintain as traits and preferences decline. When sex allocation strategies erode not only traits and preferences but also their own selective advantage, predictions can no longer be expressed as a simple linear correlation between ornament exaggeration and adaptive sex allocation. Instead, strongest sex ratio biases may be found at intermediate trait levels. © 2012 The Author(s). Evolution© 2012 The Society for the Study of Evolution.

  10. Hiding true emotions: micro-expressions in eyes retrospectively concealed by mouth movements

    PubMed Central

    Iwasaki, Miho; Noguchi, Yasuki

    2016-01-01

    When we encounter someone we dislike, we may momentarily display a reflexive disgust expression, only to follow-up with a forced smile and greeting. Our daily lives are replete with a mixture of true and fake expressions. Nevertheless, are these fake expressions really effective at hiding our true emotions? Here we show that brief emotional changes in the eyes (micro-expressions, thought to reflect true emotions) can be successfully concealed by follow-up mouth movements (e.g. a smile). In the same manner as backward masking, mouth movements of a face inhibited conscious detection of all types of micro-expressions in that face, even when viewers paid full attention to the eye region. This masking works only in a backward direction, however, because no disrupting effect was observed when the mouth change preceded the eye change. These results provide scientific evidence for everyday behaviours like smiling to dissemble, and further clarify a major reason for the difficulty we face in discriminating genuine from fake emotional expressions. PMID:26915796

  11. Libraries 2000: Allocation Plan for FY1995 LSCA Funds, Library Service and Construction Act. An Annual Outline and Description of Projects in Idaho Eligible under LSCA Titles I, II, and III.

    ERIC Educational Resources Information Center

    Idaho State Library, Boise.

    The Idaho allocation plan for funds from the Library Service and Construction Act continues the emphasis on priorities listed in fiscal year 1994 and those that were described in the statewide plan for the years 1994 through 1998. These priorities are: (1) advocate for the creation of library districts with adequate tax support to serve the…

  12. According to need? Predicting the amount of municipal home help allocated to elderly recipients in an urban area of Sweden.

    PubMed

    Meinow, Bettina; Kåreholt, Ingemar; Lagergren, Mårten

    2005-07-01

    Given the cutbacks which have been carried out in the Swedish welfare state despite the unchanged official policy of allocation of home help services according to needs, it is essential to evaluate the factors which guide the allocation of home help today. Whereas numerous studies have identified factors which predict entry into the home help system, the present paper concentrates on predictors of the amount of home help amongst those allocated assistance. Data were obtained from the population-based care and services section of the 2002 Swedish National Study of Aging and Care-Kungsholmen (SNAC-K). All home help recipients (> or = 65 years of age) living in an inner city district of Stockholm (Kungsholmen) were analysed with ordinary least squares regressions to identify predictors of the number of hours of home help (n = 943). Need indicators, i.e. dependency in activities of daily living (ADLs) and instrumental ADLs (IADLs), and cognitive impairment (Berger scale) were the strongest predictors of more hours of home help. The addition of sociodemographic (i.e. age, gender and income), environmental (i.e. informal care, housing adaptations and housing accessibility) and structural (i.e. variations in allocation decisions between one care manager and another) factors contributed only marginally to the explained variance. Hours of help entitlement increased slightly with greater age. Co-residing individuals were allocated significantly fewer home help hours than those living alone. Income and regular access to informal care were not significant predictors. The fact that services are provided according to need criteria does not necessarily mean that the provided services are adequate to meet needs. On the macro level, social policy decisions and available economic and manpower resources determine the allotment of municipal home help. However, this study in an urban sample suggests that, within the available resources, the amount of home help allocated is guided

  13. Fund allocation using capacitated vehicle routing problem

    NASA Astrophysics Data System (ADS)

    Mamat, Nur Jumaadzan Zaleha; Jaaman, Saiful Hafizah; Ahmad, Rokiah Rozita; Darus, Maslina

    2014-09-01

    In investment fund allocation, it is unwise for an investor to distribute his fund into several assets simultaneously due to economic reasons. One solution is to allocate the fund into a particular asset at a time in a sequence that will either maximize returns or minimize risks depending on the investor's objective. The vehicle routing problem (VRP) provides an avenue to this issue. VRP answers the question on how to efficiently use the available fleet of vehicles to meet a given service demand, subjected to a set of operational requirements. This paper proposes an idea of using capacitated vehicle routing problem (CVRP) to optimize investment fund allocation by employing data of selected stocks in the FTSE Bursa Malaysia. Results suggest that CRVP can be applied to solve the issue of investment fund allocation and increase the investor's profit.

  14. Robust Inversion and Data Compression in Control Allocation

    NASA Technical Reports Server (NTRS)

    Hodel, A. Scottedward

    2000-01-01

    We present an off-line computational method for control allocation design. The control allocation function delta = F(z)tau = delta (sub 0) (z) mapping commanded body-frame torques to actuator commands is implicitly specified by trim condition delta (sub 0) (z) and by a robust pseudo-inverse problem double vertical line I - G(z) F(z) double vertical line less than epsilon (z) where G(z) is a system Jacobian evaluated at operating point z, z circumflex is an estimate of z, and epsilon (z) less than 1 is a specified error tolerance. The allocation function F(z) = sigma (sub i) psi (z) F (sub i) is computed using a heuristic technique for selecting wavelet basis functions psi and a constrained least-squares criterion for selecting the allocation matrices F (sub i). The method is applied to entry trajectory control allocation for a reusable launch vehicle (X-33).

  15. Electron beam injected into ground generates subsoil x-rays that may deactivate concealed electronics used to trigger explosive devices

    NASA Astrophysics Data System (ADS)

    Retsky, Michael

    2008-04-01

    Explosively formed projectiles (EFP) are a major problem in terrorism and asymmetrical warfare. EFPs are often triggered by ordinary infrared motion detectors. A potential weak link is that such electronics are not hardened to ionizing radiation and can latch-up or enter other inoperative states after exposure to a single short event of ionizing radiation. While these can often be repaired with a power restart, they also can produce shorts and permanent damage. A problem of course is that we do not want to add radiation exposure to the long list of war related hazards. Biological systems are highly sensitive to integrated dosage but show no particular sensitivity to short pulses. There may be a way to generate short pulsed subsoil radiation to deactivate concealed electronics without introducing radiation hazards to military personnel and civilian bystanders. Electron beams of 30 MeV that can be produced by portable linear accelerators (linacs) propagate >20 m in air and 10-12 cm in soil. X-radiation is produced by bremsstrahlung and occurs subsoil beneath the point of impact and is mostly forward directed. Linacs 1.5 m long can produce 66 MWatt pulses of subsoil x-radiation 1 microsecond or less in duration. Untested as yet, such a device could be mounted on a robotic vehicle that precedes a military convoy and deactivates any concealed electronics within 10-20 meters on either side of the road.

  16. 22 CFR 208.900 - Adequate evidence.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Adequate evidence. 208.900 Section 208.900 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT GOVERNMENTWIDE DEBARMENT AND SUSPENSION... support the reasonable belief that a particular act or omission has occurred. ...

  17. 22 CFR 208.900 - Adequate evidence.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Adequate evidence. 208.900 Section 208.900 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT GOVERNMENTWIDE DEBARMENT AND SUSPENSION... support the reasonable belief that a particular act or omission has occurred. ...

  18. 5 CFR 319.202 - Allocation of positions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Allocation of positions. 319.202 Section 319.202 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL SERVICE REGULATIONS EMPLOYMENT IN SENIOR-LEVEL AND SCIENTIFIC AND PROFESSIONAL POSITIONS Position Allocations and Establishment...

  19. 10 CFR 503.35 - Inability to obtain adequate capital.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... capital investment, through tariffs, without unreasonably adverse economic effect on its service area... 10 Energy 4 2010-01-01 2010-01-01 false Inability to obtain adequate capital. 503.35 Section 503... New Facilities § 503.35 Inability to obtain adequate capital. (a) Eligibility. Section 212(a)(1)(D) of...

  20. "Something Adequate"? In Memoriam Seamus Heaney, Sister Quinlan, Nirbhaya

    ERIC Educational Resources Information Center

    Parker, Jan

    2014-01-01

    Seamus Heaney talked of poetry's responsibility to represent the "bloody miracle", the "terrible beauty" of atrocity; to create "something adequate". This article asks, what is adequate to the burning and eating of a nun and the murderous gang rape and evisceration of a medical student? It considers Njabulo Ndebele's…

  1. Automatic recognition of postural allocations.

    PubMed

    Sazonov, Edward; Krishnamurthy, Vidya; Makeyev, Oleksandr; Browning, Ray; Schutz, Yves; Hill, James

    2007-01-01

    A significant part of daily energy expenditure may be attributed to non-exercise activity thermogenesis and exercise activity thermogenesis. Automatic recognition of postural allocations such as standing or sitting can be used in behavioral modification programs aimed at minimizing static postures. In this paper we propose a shoe-based device and related pattern recognition methodology for recognition of postural allocations. Inexpensive technology allows implementation of this methodology as a part of footwear. The experimental results suggest high efficiency and reliability of the proposed approach.

  2. Human-Automation Allocations for Current Robotic Space Operations

    NASA Technical Reports Server (NTRS)

    Marquez, Jessica J.; Chang, Mai L.; Beard, Bettina L.; Kim, Yun Kyung; Karasinski, John A.

    2018-01-01

    Within the Human Research Program, one risk delineates the uncertainty surrounding crew working with automation and robotics in spaceflight. The Risk of Inadequate Design of Human and Automation/Robotic Integration (HARI) is concerned with the detrimental effects on crew performance due to ineffective user interfaces, system designs and/or functional task allocation, potentially compromising mission success and safety. Risk arises because we have limited experience with complex automation and robotics. One key gap within HARI, is the gap related to functional allocation. The gap states: We need to evaluate, develop, and validate methods and guidelines for identifying human-automation/robot task information needs, function allocation, and team composition for future long duration, long distance space missions. Allocations determine the human-system performance as it identifies the functions and performance levels required by the automation/robotic system, and in turn, what work the crew is expected to perform and the necessary human performance requirements. Allocations must take into account each of the human, automation, and robotic systems capabilities and limitations. Some functions may be intuitively assigned to the human versus the robot, but to optimize efficiency and effectiveness, purposeful role assignments will be required. The role of automation and robotics will significantly change in future exploration missions, particularly as crew becomes more autonomous from ground controllers. Thus, we must understand the suitability of existing function allocation methods within NASA as well as the existing allocations established by the few robotic systems that are operational in spaceflight. In order to evaluate future methods of robotic allocations, we must first benchmark the allocations and allocation methods that have been used. We will present 1) documentation of human-automation-robotic allocations in existing, operational spaceflight systems; and 2) To

  3. Adaptive Control Allocation in the Presence of Actuator Failures

    NASA Technical Reports Server (NTRS)

    Liu, Yu; Crespo, Luis G.

    2010-01-01

    In this paper, a novel adaptive control allocation framework is proposed. In the adaptive control allocation structure, cooperative actuators are grouped and treated as an equivalent control effector. A state feedback adaptive control signal is designed for the equivalent effector and allocated to the member actuators adaptively. Two adaptive control allocation algorithms are proposed, which guarantee closed-loop stability and asymptotic state tracking in the presence of uncertain loss of effectiveness and constant-magnitude actuator failures. The proposed algorithms can be shown to reduce the controller complexity with proper grouping of the actuators. The proposed adaptive control allocation schemes are applied to two linearized aircraft models, and the simulation results demonstrate the performance of the proposed algorithms.

  4. 2 CFR 180.900 - Adequate evidence.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 2 Grants and Agreements 1 2010-01-01 2010-01-01 false Adequate evidence. 180.900 Section 180.900 Grants and Agreements OFFICE OF MANAGEMENT AND BUDGET GOVERNMENTWIDE GUIDANCE FOR GRANTS AND AGREEMENTS... belief that a particular act or omission has occurred. ...

  5. 7 CFR 761.204 - Methods of allocating funds to State Offices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ..., CL, and OL loan funds are allocated to State Offices using one or more of the following allocation methods: (a) Formula allocation, if data, as specified in § 761.205, is available to use the formula for... a formula allocation. The National Office determines the amount of an administrative allocation on a...

  6. 7 CFR 761.204 - Methods of allocating funds to State Offices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ..., CL, and OL loan funds are allocated to State Offices using one or more of the following allocation methods: (a) Formula allocation, if data, as specified in § 761.205, is available to use the formula for... a formula allocation. The National Office determines the amount of an administrative allocation on a...

  7. 7 CFR 761.204 - Methods of allocating funds to State Offices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ..., CL, and OL loan funds are allocated to State Offices using one or more of the following allocation methods: (a) Formula allocation, if data, as specified in § 761.205, is available to use the formula for... a formula allocation. The National Office determines the amount of an administrative allocation on a...

  8. Simple versus composite indicators of socioeconomic status in resource allocation formulae: the case of the district resource allocation formula in Malawi

    PubMed Central

    2010-01-01

    Background The district resource allocation formula in Malawi was recently reviewed to include stunting as a proxy measure of socioeconomic status. In many countries where the concept of need has been incorporated in resource allocation, composite indicators of socioeconomic status have been used. In the Malawi case, it is important to ascertain whether there are differences between using single variable or composite indicators of socioeconomic status in allocations made to districts, holding all other factors in the resource allocation formula constant. Methods Principal components analysis was used to calculate asset indices for all districts from variables that capture living standards using data from the Malawi Multiple Indicator Cluster Survey 2006. These were normalized and used to weight district populations. District proportions of national population weighted by both the simple and composite indicators were then calculated for all districts and compared. District allocations were also calculated using the two approaches and compared. Results The two types of indicators are highly correlated, with a spearman rank correlation coefficient of 0.97 at the 1% level of significance. For 21 out of the 26 districts included in the study, proportions of national population weighted by the simple indicator are higher by an average of 0.6 percentage points. For the remaining 5 districts, district proportions of national population weighted by the composite indicator are higher by an average of 2 percentage points. Though the average percentage point differences are low and the actual allocations using both approaches highly correlated (ρ of 0.96), differences in actual allocations exceed 10% for 8 districts and have an average of 4.2% for the remaining 17. For 21 districts allocations based on the single variable indicator are higher. Conclusions Variations in district allocations made using either the simple or composite indicators of socioeconomic status are not

  9. Children's Lie-Telling to Conceal a Parent's Transgression: Legal Implications

    PubMed Central

    Talwar, Victoria; Lee, Kang; Bala, Nicholas; Lindsay, R. C. L.

    2008-01-01

    Children's lie-telling behavior to conceal the transgression of a parent was examined in 2 experiments. In Experiment 1 (N = 137), parents broke a puppet and told their children (3–11-year-olds) not to tell anyone. Children answered questions about the event. Children's moral understanding of truth- and lie-telling was assessed by a second interviewer and the children then promised to tell the truth (simulating court competence examination procedures). Children were again questioned about what happened to the puppet. Regardless of whether the interview was conducted with their parent absent or present, most children told the truth about their parents' transgression. When the likelihood of the child being blamed for the transgression was reduced, significantly more children lied. There was a significant, yet limited, relation between children's lie-telling behavior and their moral understanding of lie- or truth-telling. Further, after children were questioned about issues concerning truth- and lie-telling and asked to promise to tell the truth, significantly more children told the truth about their parents' transgression. Experiment 2 (N = 64) replicated these findings, with children who were questioned about lies and who then promised to tell the truth more likely to tell the truth in a second interview than children who did not participate in this procedure before questioning. Implications for the justice system are discussed. PMID:15499823

  10. Digital Stratigraphy: Contextual Analysis of File System Traces in Forensic Science.

    PubMed

    Casey, Eoghan

    2017-12-28

    This work introduces novel methods for conducting forensic analysis of file allocation traces, collectively called digital stratigraphy. These in-depth forensic analysis methods can provide insight into the origin, composition, distribution, and time frame of strata within storage media. Using case examples and empirical studies, this paper illuminates the successes, challenges, and limitations of digital stratigraphy. This study also shows how understanding file allocation methods can provide insight into concealment activities and how real-world computer usage can complicate digital stratigraphy. Furthermore, this work explains how forensic analysts have misinterpreted traces of normal file system behavior as indications of concealment activities. This work raises awareness of the value of taking the overall context into account when analyzing file system traces. This work calls for further research in this area and for forensic tools to provide necessary information for such contextual analysis, such as highlighting mass deletion, mass copying, and potential backdating. © 2017 American Academy of Forensic Sciences.

  11. Prospect theory reflects selective allocation of attention.

    PubMed

    Pachur, Thorsten; Schulte-Mecklenbeck, Michael; Murphy, Ryan O; Hertwig, Ralph

    2018-02-01

    There is a disconnect in the literature between analyses of risky choice based on cumulative prospect theory (CPT) and work on predecisional information processing. One likely reason is that for expectation models (e.g., CPT), it is often assumed that people behaved only as if they conducted the computations leading to the predicted choice and that the models are thus mute regarding information processing. We suggest that key psychological constructs in CPT, such as loss aversion and outcome and probability sensitivity, can be interpreted in terms of attention allocation. In two experiments, we tested hypotheses about specific links between CPT parameters and attentional regularities. Experiment 1 used process tracing to monitor participants' predecisional attention allocation to outcome and probability information. As hypothesized, individual differences in CPT's loss-aversion, outcome-sensitivity, and probability-sensitivity parameters (estimated from participants' choices) were systematically associated with individual differences in attention allocation to outcome and probability information. For instance, loss aversion was associated with the relative attention allocated to loss and gain outcomes, and a more strongly curved weighting function was associated with less attention allocated to probabilities. Experiment 2 manipulated participants' attention to losses or gains, causing systematic differences in CPT's loss-aversion parameter. This result indicates that attention allocation can to some extent cause choice regularities that are captured by CPT. Our findings demonstrate an as-if model's capacity to reflect characteristics of information processing. We suggest that the observed CPT-attention links can be harnessed to inform the development of process models of risky choice. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  12. Alpha-Fair Resource Allocation under Incomplete Information and Presence of a Jammer

    NASA Astrophysics Data System (ADS)

    Altman, Eitan; Avrachenkov, Konstantin; Garnaev, Andrey

    In the present work we deal with the concept of alpha-fair resource allocation in the situation where the decision maker (in our case, the base station) does not have complete information about the environment. Namely, we develop a concept of α-fairness under uncertainty to allocate power resource in the presence of a jammer under two types of uncertainty: (a) the decision maker does not have complete knowledge about the parameters of the environment, but knows only their distribution, (b) the jammer can come into the environment with some probability bringing extra background noise. The goal of the decision maker is to maximize the α-fairness utility function with respect to the SNIR (signal to noise-plus-interference ratio). Here we consider a concept of the expected α-fairness utility function (short-term fairness) as well as fairness of expectation (long-term fairness). In the scenario with the unknown parameters of the environment the most adequate approach is a zero-sum game since it can also be viewed as a minimax problem for the decision maker playing against the nature where the decision maker has to apply the best allocation under the worst circumstances. In the scenario with the uncertainty about jamming being in the system the Nash equilibrium concept is employed since the agents have non-zero sum payoffs: the decision maker would like to maximize either the expected fairness or the fairness of expectation while the jammer would like to minimize the fairness if he comes in on the scene. For all the plots the equilibrium strategies in closed form are found. We have shown that for all the scenarios the equilibrium has to be constructed into two steps. In the first step the equilibrium jamming strategy has to be constructed based on a solution of the corresponding modification of the water-filling equation. In the second step the decision maker equilibrium strategy has to be constructed equalizing the induced by jammer background noise.

  13. 21 CFR 1404.900 - Adequate evidence.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Adequate evidence. 1404.900 Section 1404.900 Food and Drugs OFFICE OF NATIONAL DRUG CONTROL POLICY GOVERNMENTWIDE DEBARMENT AND SUSPENSION... support the reasonable belief that a particular act or omission has occurred. ...

  14. 29 CFR 1471.900 - Adequate evidence.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 4 2011-07-01 2011-07-01 false Adequate evidence. 1471.900 Section 1471.900 Labor Regulations Relating to Labor (Continued) FEDERAL MEDIATION AND CONCILIATION SERVICE GOVERNMENTWIDE DEBARMENT... information sufficient to support the reasonable belief that a particular act or omission has occurred. ...

  15. 21 CFR 1404.900 - Adequate evidence.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 9 2014-04-01 2014-04-01 false Adequate evidence. 1404.900 Section 1404.900 Food and Drugs OFFICE OF NATIONAL DRUG CONTROL POLICY GOVERNMENTWIDE DEBARMENT AND SUSPENSION... support the reasonable belief that a particular act or omission has occurred. ...

  16. 29 CFR 1471.900 - Adequate evidence.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 29 Labor 4 2014-07-01 2014-07-01 false Adequate evidence. 1471.900 Section 1471.900 Labor Regulations Relating to Labor (Continued) FEDERAL MEDIATION AND CONCILIATION SERVICE GOVERNMENTWIDE DEBARMENT... information sufficient to support the reasonable belief that a particular act or omission has occurred. ...

  17. 29 CFR 1471.900 - Adequate evidence.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 29 Labor 4 2012-07-01 2012-07-01 false Adequate evidence. 1471.900 Section 1471.900 Labor Regulations Relating to Labor (Continued) FEDERAL MEDIATION AND CONCILIATION SERVICE GOVERNMENTWIDE DEBARMENT... information sufficient to support the reasonable belief that a particular act or omission has occurred. ...

  18. 21 CFR 1404.900 - Adequate evidence.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 9 2013-04-01 2013-04-01 false Adequate evidence. 1404.900 Section 1404.900 Food and Drugs OFFICE OF NATIONAL DRUG CONTROL POLICY GOVERNMENTWIDE DEBARMENT AND SUSPENSION... support the reasonable belief that a particular act or omission has occurred. ...

  19. 21 CFR 1404.900 - Adequate evidence.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 9 2012-04-01 2012-04-01 false Adequate evidence. 1404.900 Section 1404.900 Food and Drugs OFFICE OF NATIONAL DRUG CONTROL POLICY GOVERNMENTWIDE DEBARMENT AND SUSPENSION... support the reasonable belief that a particular act or omission has occurred. ...

  20. 29 CFR 1471.900 - Adequate evidence.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 4 2010-07-01 2010-07-01 false Adequate evidence. 1471.900 Section 1471.900 Labor Regulations Relating to Labor (Continued) FEDERAL MEDIATION AND CONCILIATION SERVICE GOVERNMENTWIDE DEBARMENT... information sufficient to support the reasonable belief that a particular act or omission has occurred. ...

  1. 21 CFR 1404.900 - Adequate evidence.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Adequate evidence. 1404.900 Section 1404.900 Food and Drugs OFFICE OF NATIONAL DRUG CONTROL POLICY GOVERNMENTWIDE DEBARMENT AND SUSPENSION... support the reasonable belief that a particular act or omission has occurred. ...

  2. 29 CFR 1471.900 - Adequate evidence.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 29 Labor 4 2013-07-01 2013-07-01 false Adequate evidence. 1471.900 Section 1471.900 Labor Regulations Relating to Labor (Continued) FEDERAL MEDIATION AND CONCILIATION SERVICE GOVERNMENTWIDE DEBARMENT... information sufficient to support the reasonable belief that a particular act or omission has occurred. ...

  3. Incentives for Optimal Multi-level Allocation of HIV Prevention Resources

    PubMed Central

    Malvankar, Monali M.; Zaric, Gregory S.

    2013-01-01

    HIV/AIDS prevention funds are often allocated at multiple levels of decision-making. Optimal allocation of HIV prevention funds maximizes the number of HIV infections averted. However, decision makers often allocate using simple heuristics such as proportional allocation. We evaluate the impact of using incentives to encourage optimal allocation in a two-level decision-making process. We model an incentive based decision-making process consisting of an upper-level decision maker allocating funds to a single lower-level decision maker who then distributes funds to local programs. We assume that the lower-level utility function is linear in the amount of the budget received from the upper-level, the fraction of funds reserved for proportional allocation, and the number of infections averted. We assume that the upper level objective is to maximize the number of infections averted. We illustrate with an example using data from California, U.S. PMID:23766551

  4. 40 CFR 45.145 - Allocability and allowability of costs.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... FEDERAL ASSISTANCE TRAINING ASSISTANCE § 45.145 Allocability and allowability of costs. (a) Allocability and allowability of costs will be determined in accordance with 40 CFR 30.410. (b) Costs incurred for... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Allocability and allowability of costs...

  5. Reward Allocation and Academic versus Social Orientation toward School.

    ERIC Educational Resources Information Center

    Peterson, Candida C.; Peterson, James L.

    1978-01-01

    Correlates 138 elementary school children's views about the purposes of school to their styles of reward allocation: academically motivated students allocated rewards equally to two hypothetical performers who had unequally helped a teacher perform a manual chore, while socially motivated children allocated rewards in an equity (performance-based)…

  6. 7 CFR 1435.307 - Transfer of allocation.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS SUGAR PROGRAM Flexible Marketing Allotments For Sugar § 1435.307 Transfer of allocation. (a) If a sugarcane processing facility is sold or transferred... allocation submitted during the month of May. The request must include the grower's sugar production history...

  7. 7 CFR 1435.307 - Transfer of allocation.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS SUGAR PROGRAM Flexible Marketing Allotments For Sugar § 1435.307 Transfer of allocation. (a) If a sugarcane processing facility is sold or transferred... allocation submitted during the month of May. The request must include the grower's sugar production history...

  8. 7 CFR 1435.307 - Transfer of allocation.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS SUGAR PROGRAM Flexible Marketing Allotments For Sugar § 1435.307 Transfer of allocation. (a) If a sugarcane processing facility is sold or transferred... allocation submitted during the month of May. The request must include the grower's sugar production history...

  9. 20 CFR 633.105 - Allocation of funds.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... determined by the Department. The formula used to determine State allocations will be published in the Federal Register for review and comment, along with the rationale for such formula and proposed... adjustment. In situations where the Department determines that the formula allocation will result in severe...

  10. 7 CFR 1435.307 - Transfer of allocation.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS SUGAR PROGRAM Flexible Marketing Allotments For Sugar § 1435.307 Transfer of allocation. (a) If a sugarcane processing facility is sold or transferred... allocation submitted during the month of May. The request must include the grower's sugar production history...

  11. 7 CFR 1435.307 - Transfer of allocation.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS SUGAR PROGRAM Flexible Marketing Allotments For Sugar § 1435.307 Transfer of allocation. (a) If a sugarcane processing facility is sold or transferred... allocation submitted during the month of May. The request must include the grower's sugar production history...

  12. 28 CFR 100.14 - Directly allocable costs.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 28 Judicial Administration 2 2011-07-01 2011-07-01 false Directly allocable costs. 100.14 Section 100.14 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) COST RECOVERY REGULATIONS, COMMUNICATIONS ASSISTANCE FOR LAW ENFORCEMENT ACT OF 1994 § 100.14 Directly allocable costs. (a) A cost is...

  13. 28 CFR 100.14 - Directly allocable costs.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 2 2013-07-01 2013-07-01 false Directly allocable costs. 100.14 Section 100.14 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) COST RECOVERY REGULATIONS, COMMUNICATIONS ASSISTANCE FOR LAW ENFORCEMENT ACT OF 1994 § 100.14 Directly allocable costs. (a) A cost is...

  14. 48 CFR 1631.203-70 - Allocation techniques.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... shall consistently apply the methods and techniques established to classify direct and indirect costs... meant to be exhaustive, but rather are examples of allocation methods that may be acceptable under... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Allocation techniques. 1631...

  15. 10 CFR 490.703 - Biodiesel fuel use credit allocation.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 3 2012-01-01 2012-01-01 false Biodiesel fuel use credit allocation. 490.703 Section 490.703 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Biodiesel Fuel Use Credit § 490.703 Biodiesel fuel use credit allocation. (a) DOE shall allocate to a fleet or...

  16. 10 CFR 490.703 - Biodiesel fuel use credit allocation.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 3 2011-01-01 2011-01-01 false Biodiesel fuel use credit allocation. 490.703 Section 490.703 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Biodiesel Fuel Use Credit § 490.703 Biodiesel fuel use credit allocation. (a) DOE shall allocate to a fleet or...

  17. 10 CFR 490.703 - Biodiesel fuel use credit allocation.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 3 2013-01-01 2013-01-01 false Biodiesel fuel use credit allocation. 490.703 Section 490.703 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Biodiesel Fuel Use Credit § 490.703 Biodiesel fuel use credit allocation. (a) DOE shall allocate to a fleet or...

  18. 10 CFR 490.703 - Biodiesel fuel use credit allocation.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 3 2014-01-01 2014-01-01 false Biodiesel fuel use credit allocation. 490.703 Section 490.703 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Biodiesel Fuel Use Credit § 490.703 Biodiesel fuel use credit allocation. (a) DOE shall allocate to a fleet or...

  19. 10 CFR 490.703 - Biodiesel fuel use credit allocation.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 3 2010-01-01 2010-01-01 false Biodiesel fuel use credit allocation. 490.703 Section 490.703 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Biodiesel Fuel Use Credit § 490.703 Biodiesel fuel use credit allocation. (a) DOE shall allocate to a fleet or...

  20. 29 CFR 2584.8477(e)-5 - Effect of allocation.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Effect of allocation. 2584.8477(e)-5 Section 2584.8477(e)-5 Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF... REGULATIONS FOR THE ALLOCATION OF FIDUCIARY RESPONSIBILITY § 2584.8477(e)-5 Effect of allocation. Where...

  1. A critical assessment on kidney allocation systems.

    PubMed

    Formica, Richard N

    2017-01-01

    The kidney allocation system that took effect on December 4, 2014 represents a significant improvement over the prior approach. It seeks to improve outcomes by longevity matching - pairing kidneys expected to function the longest with recipients expected to live the longest. It addresses the biological barriers faced by highly sensitized patients in an evidence based fashion and it begins to introduce the concept of medical need into kidney allocation by crediting time from the starting dialysis to a patient's waiting time. Additionally, it adds a more granular and continuous approach to classifying deceased donor kidneys through the kidney donor profile index and moves away from the dichotomous and flawed, standard criteria/extended criteria approach to allocating kidneys. Despite these changes, access to kidney transplantation across the age spectrum has remained intact and equitable. However even with these numerous positive improvements the system is not without its flaws. The increased sharing and by extension shipping of kidneys have created logistical challenges for organ procurement organizations and transplant centers. Early results seem to indicate that there have been an increase in cold ischemic time, an increase in delayed graft function and an increase in organ discard rate. There is also a reduced offer rate for children and while not a statistically significant decline in the number of transplants, it is a trend that requires close monitoring. Finally, the new kidney allocation system has done nothing to address the glaring deficiencies in the multi-organ allocation practices, all of which include a kidney, in the United States. Therefore despite the improvements made in kidney allocation, there is work yet to be done to ensure that the allocation of life saving and life prolonging organs for transplantation is done in a fashion consistent with ethical principles, based on science and free from local self interest so that this national resource is

  2. 220GHz wideband 3D imaging radar for concealed object detection technology development and phenomenology studies

    NASA Astrophysics Data System (ADS)

    Robertson, Duncan A.; Macfarlane, David G.; Bryllert, Tomas

    2016-05-01

    We present a 220 GHz 3D imaging `Pathfinder' radar developed within the EU FP7 project CONSORTIS (Concealed Object Stand-Off Real-Time Imaging for Security) which has been built to address two objectives: (i) to de-risk the radar hardware development and (ii) to enable the collection of phenomenology data with ~1 cm3 volumetric resolution. The radar combines a DDS-based chirp generator and self-mixing multiplier technology to achieve a 30 GHz bandwidth chirp with such high linearity that the raw point response is close to ideal and only requires minor nonlinearity compensation. The single transceiver is focused with a 30 cm lens mounted on a gimbal to acquire 3D volumetric images of static test targets and materials.

  3. Concurrent schedules: Effects of time- and response-allocation constraints

    PubMed Central

    Davison, Michael

    1991-01-01

    Five pigeons were trained on concurrent variable-interval schedules arranged on two keys. In Part 1 of the experiment, the subjects responded under no constraints, and the ratios of reinforcers obtainable were varied over five levels. In Part 2, the conditions of the experiment were changed such that the time spent responding on the left key before a subsequent changeover to the right key determined the minimum time that must be spent responding on the right key before a changeover to the left key could occur. When the left key provided a higher reinforcer rate than the right key, this procedure ensured that the time allocated to the two keys was approximately equal. The data showed that such a time-allocation constraint only marginally constrained response allocation. In Part 3, the numbers of responses emitted on the left key before a changeover to the right key determined the minimum number of responses that had to be emitted on the right key before a changeover to the left key could occur. This response constraint completely constrained time allocation. These data are consistent with the view that response allocation is a fundamental process (and time allocation a derivative process), or that response and time allocation are independently controlled, in concurrent-schedule performance. PMID:16812632

  4. Police Allocation Manual User's Guide: Determination of the Number and Allocation of Personnel for Patrol Services for State Police Departments (Special Version - April 1993)

    DOT National Transportation Integrated Search

    1993-04-01

    The Police Allocation Manual User's Guide (herein after referred to as the Guide) : is intended as a companion document to the Police Allocation Manual (PAM), : Special Version, which can be used to determine the number and allocation of : personnel ...

  5. Memory Allocation: Mechanisms and Function.

    PubMed

    Josselyn, Sheena A; Frankland, Paul W

    2018-04-25

    Memories for events are thought to be represented in sparse, distributed neuronal ensembles (or engrams). In this article, we review how neurons are chosen to become part of a particular engram, via a process of neuronal allocation. Experiments in rodents indicate that eligible neurons compete for allocation to a given engram, with more excitable neurons winning this competition. Moreover, fluctuations in neuronal excitability determine how engrams interact, promoting either memory integration (via coallocation to overlapping engrams) or separation (via disallocation to nonoverlapping engrams). In parallel with rodent studies, recent findings in humans verify the importance of this memory integration process for linking memories that occur close in time or share related content. A deeper understanding of allocation promises to provide insights into the logic underlying how knowledge is normally organized in the brain and the disorders in which this process has gone awry. Expected final online publication date for the Annual Review of Neuroscience Volume 41 is July 8, 2018. Please see http://www.annualreviews.org/page/journal/pubdates for revised estimates.

  6. 20 CFR 632.252 - Allocation of funds.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Allocation of funds. 632.252 Section 632.252 Employees' Benefits EMPLOYMENT AND TRAINING ADMINISTRATION, DEPARTMENT OF LABOR INDIAN AND NATIVE AMERICAN EMPLOYMENT AND TRAINING PROGRAMS Summer Youth Employment and Training Programs § 632.252 Allocation of funds...

  7. 20 CFR 632.252 - Allocation of funds.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 20 Employees' Benefits 3 2011-04-01 2011-04-01 false Allocation of funds. 632.252 Section 632.252 Employees' Benefits EMPLOYMENT AND TRAINING ADMINISTRATION, DEPARTMENT OF LABOR INDIAN AND NATIVE AMERICAN EMPLOYMENT AND TRAINING PROGRAMS Summer Youth Employment and Training Programs § 632.252 Allocation of funds...

  8. 20 CFR 632.252 - Allocation of funds.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 3 2012-04-01 2012-04-01 false Allocation of funds. 632.252 Section 632.252 Employees' Benefits EMPLOYMENT AND TRAINING ADMINISTRATION, DEPARTMENT OF LABOR INDIAN AND NATIVE AMERICAN EMPLOYMENT AND TRAINING PROGRAMS Summer Youth Employment and Training Programs § 632.252 Allocation of funds...

  9. 14 CFR 1214.113 - Allocation of risk.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Allocation of risk. 1214.113 Section 1214.113 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION SPACE FLIGHT General....113 Allocation of risk. The U.S. Government will assume no risk for damages to the customer resulting...

  10. 34 CFR 675.42 - Allocation and reallocation.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 34 Education 3 2010-07-01 2010-07-01 false Allocation and reallocation. 675.42 Section 675.42 Education Regulations of the Offices of the Department of Education (Continued) OFFICE OF POSTSECONDARY EDUCATION, DEPARTMENT OF EDUCATION FEDERAL WORK-STUDY PROGRAMS Work-Colleges Program § 675.42 Allocation and...

  11. 10 CFR 216.9 - Violations.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 3 2010-01-01 2010-01-01 false Violations. 216.9 Section 216.9 Energy DEPARTMENT OF ENERGY OIL MATERIALS ALLOCATION AND PRIORITY PERFORMANCE UNDER CONTRACTS OR ORDERS TO MAXIMIZE DOMESTIC ENERGY SUPPLIES § 216.9 Violations. Any person who willfully furnishes false information or conceals any...

  12. Is attention enough? A re-examination of the impact of feature-specific attention allocation on semantic priming effects in the pronunciation task.

    PubMed

    Becker, Manuel; Klauer, Karl Christoph; Spruyt, Adriaan

    2016-02-01

    In a series of articles, Spruyt and colleagues have developed the Feature-Specific Attention Allocation framework, stating that the semantic analysis of task-irrelevant stimuli is critically dependent upon dimension-specific attention allocation. In an adversarial collaboration, we replicate one experiment supporting this theory (Spruyt, de Houwer, & Hermans, 2009; Exp. 3), in which semantic priming effects in the pronunciation task were found to be restricted to stimulus dimensions that were task-relevant on induction trials. Two pilot studies showed the capability of our laboratory to detect priming effects in the pronunciation task, but also suggested that the original effect may be difficult to replicate. In this study, we tried to replicate the original experiment while ensuring adequate statistical power. Results show little evidence for dimension-specific priming effects. The present results provide further insight into the malleability of early semantic encoding processes, but also show the need for further research on this topic.

  13. Dynamic task allocation for a man-machine symbiotic system

    NASA Technical Reports Server (NTRS)

    Parker, L. E.; Pin, F. G.

    1987-01-01

    This report presents a methodological approach to the dynamic allocation of tasks in a man-machine symbiotic system in the context of dexterous manipulation and teleoperation. This report addresses a symbiotic system containing two symbiotic partners which work toward controlling a single manipulator arm for the execution of a series of sequential manipulation tasks. It is proposed that an automated task allocator use knowledge about the constraints/criteria of the problem, the available resources, the tasks to be performed, and the environment to dynamically allocate task recommendations for the man and the machine. The presentation of the methodology includes discussions concerning the interaction of the knowledge areas, the flow of control, the necessary communication links, and the replanning of the task allocation. Examples of task allocation are presented to illustrate the results of this methodolgy.

  14. Evolving Reliability and Maintainability Allocations for NASA Ground Systems

    NASA Technical Reports Server (NTRS)

    Munoz, Gisela; Toon, Jamie; Toon, Troy; Adams, Timothy C.; Miranda, David J.

    2016-01-01

    This paper describes the methodology that was developed to allocate reliability and maintainability requirements for the NASA Ground Systems Development and Operations (GSDO) program's subsystems. As systems progressed through their design life cycle and hardware data became available, it became necessary to reexamine the previously derived allocations. Allocating is an iterative process; as systems moved beyond their conceptual and preliminary design phases this provided an opportunity for the reliability engineering team to reevaluate allocations based on updated designs and maintainability characteristics of the components. Trade-offs in reliability and maintainability were essential to ensuring the integrity of the reliability and maintainability analysis. This paper will discuss the value of modifying reliability and maintainability allocations made for the GSDO subsystems as the program nears the end of its design phase.

  15. Work-family conflict and self-discrepant time allocation at work.

    PubMed

    Dahm, Patricia C; Glomb, Theresa M; Manchester, Colleen Flaherty; Leroy, Sophie

    2015-05-01

    We examine the relationships between work-to-family conflict, time allocation across work activities, and the outcomes of work satisfaction, well-being, and salary in the context of self-regulation and self-discrepancy theories. We posit work-to-family conflict is associated with self-discrepant time allocation such that employees with higher levels of work-to-family conflict are likely to allocate less time than preferred to work activities that require greater self-regulatory resources (e.g., tasks that are complex, or those with longer term goals that delay rewards and closure) and allocate more time than preferred to activities that demand fewer self-regulatory resources or are replenishing (e.g., those that provide closure or are prosocial). We suggest this self-discrepant time allocation (actual vs. preferred time allocation) is one mechanism by which work-to-family conflict leads to negative employee consequences (Allen, Herst, Bruck, & Sutton, 2000; Mesmer-Magnus & Viswesvaran, 2005). Using polynomial regression and response surface methodology, we find that discrepancies between actual and preferred time allocations to work activities negatively relate to work satisfaction, psychological well-being, and physical well-being. Self-discrepant time allocation mediates the relationship between work-to-family conflict and work satisfaction and well-being, while actual time allocation (rather than the discrepancy) mediates the relationship between work-to-family conflict and salary. We find that women are more likely than men to report self-discrepant time allocations as work-to-family conflict increases. (c) 2015 APA, all rights reserved.

  16. 31 CFR 19.900 - Adequate evidence.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance: Treasury 1 2012-07-01 2012-07-01 false Adequate evidence. 19.900 Section 19.900 Money and Finance: Treasury Office of the Secretary of the Treasury GOVERNMENTWIDE DEBARMENT AND... sufficient to support the reasonable belief that a particular act or omission has occurred. ...

  17. 31 CFR 19.900 - Adequate evidence.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance: Treasury 1 2011-07-01 2011-07-01 false Adequate evidence. 19.900 Section 19.900 Money and Finance: Treasury Office of the Secretary of the Treasury GOVERNMENTWIDE DEBARMENT AND... sufficient to support the reasonable belief that a particular act or omission has occurred. ...

  18. 34 CFR 85.900 - Adequate evidence.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 34 Education 1 2011-07-01 2011-07-01 false Adequate evidence. 85.900 Section 85.900 Education Office of the Secretary, Department of Education GOVERNMENTWIDE DEBARMENT AND SUSPENSION (NONPROCUREMENT... reasonable belief that a particular act or omission has occurred. (Authority: E.O. 12549 (3 CFR, 1986 Comp...

  19. 31 CFR 19.900 - Adequate evidence.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance: Treasury 1 2014-07-01 2014-07-01 false Adequate evidence. 19.900 Section 19.900 Money and Finance: Treasury Office of the Secretary of the Treasury GOVERNMENTWIDE DEBARMENT AND... sufficient to support the reasonable belief that a particular act or omission has occurred. ...

  20. 31 CFR 19.900 - Adequate evidence.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Adequate evidence. 19.900 Section 19.900 Money and Finance: Treasury Office of the Secretary of the Treasury GOVERNMENTWIDE DEBARMENT AND... sufficient to support the reasonable belief that a particular act or omission has occurred. ...