Science.gov

Sample records for allocation concealment blinding

  1. What is the influence of randomisation sequence generation and allocation concealment on treatment effects of physical therapy trials? A meta-epidemiological study

    PubMed Central

    Armijo-Olivo, Susan; Saltaji, Humam; da Costa, Bruno R; Fuentes, Jorge; Ha, Christine; Cummings, Greta G

    2015-01-01

    Objective To determine if adequacy of randomisation and allocation concealment is associated with changes in effect sizes (ES) when comparing physical therapy (PT) trials with and without these methodological characteristics. Design Meta-epidemiological study. Participants A random sample of randomised controlled trials (RCTs) included in meta-analyses in the PT discipline were identified. Intervention Data extraction including assessments of random sequence generation and allocation concealment was conducted independently by two reviewers. To determine the association between sequence generation, and allocation concealment and ES, a two-level analysis was conducted using a meta-meta-analytic approach. Primary and secondary outcome measures association between random sequence generation and allocation concealment and ES in PT trials. Results 393 trials included in 43 meta-analyses, analysing 44 622 patients contributed to this study. Adequate random sequence generation and appropriate allocation concealment were accomplished in only 39.7% and 11.5% of PT trials, respectively. Although trials with inappropriate allocation concealment tended to have an overestimate treatment effect when compared with trials with adequate concealment of allocation, the difference was non-statistically significant (ES=0.12; 95% CI −0.06 to 0.30). When pooling our results with those of Nuesch et al, we obtained a pooled statistically significant value (ES=0.14; 95% CI 0.02 to 0.26). There was no difference in ES in trials with appropriate or inappropriate random sequence generation (ES=0.02; 95% CI −0.12 to 0.15). Conclusions Our results suggest that when evaluating risk of bias of primary RCTs in PT area, systematic reviewers and clinicians implementing research into practice should pay attention to these biases since they could exaggerate treatment effects. Systematic reviewers should perform sensitivity analysis including trials with low risk of bias in these domains as primary

  2. Blindness

    MedlinePlus

    ... Prevalent Cases of Blindness (in thousands) by Age, Gender, and Race/Ethnicity Table for 2010 U.S. Prevalent ... Prevalent Cases of Blindness (in thousands) by Age, Gender, and Race/Ethnicity Table for 2000 U.S. Prevalent ...

  3. Concealment of sexual orientation.

    PubMed

    Sylva, David; Rieger, Gerulf; Linsenmeier, Joan A W; Bailey, J Michael

    2010-02-01

    Sex-atypical behaviors may be used to identify a person as homosexual. To shield themselves from prejudice, homosexual people may attempt to conceal these behaviors. It is not clear how effectively they can do so. In Study 1, we asked homosexual participants to conceal their sex-atypical behaviors while talking about the weather. Raters watched videos of the participants and judged the likelihood that each participant was homosexual. Homosexual participants were able to partially conceal signs of their orientation, but they remained distinguishable from heterosexual participants. In Study 2, we tested the ability to conceal signs of one's sexual orientation in a more demanding situation: a mock job interview. In this scenario, homosexual men were even less effective at concealing their orientation. Higher cognitive demands in this new situation may have interfered with their ability to conceal. PMID:19169803

  4. Blindness

    MedlinePlus

    ... The problem may affect one eye or both eyes. When you think of being blind, you might imagine total darkness. But most people who are blind can still see a little light or shadows. They just can't see things clearly. People who have some sight, but still need a lot of help, are ...

  5. Concealed wire tracing apparatus

    DOEpatents

    Kronberg, James W.

    1994-01-01

    An apparatus and method that combines a signal generator and a passive signal receiver to detect and record the path of partially or completely concealed electrical wiring without disturbing the concealing surface. The signal generator applies a series of electrical pulses to the selected wiring of interest. The applied pulses create a magnetic field about the wiring that can be detected by a coil contained within the signal receiver. An audible output connected to the receiver and driven by the coil reflects the receivers position with respect to the wiring. The receivers audible signal is strongest when the receiver is directly above the wiring and the long axis of the receivers coil is parallel to the wiring. A marking means is mounted on the receiver to mark the location of the wiring as the receiver is directed over the wiring's concealing surface. Numerous marks made on various locations of the concealing surface will trace the path of the wiring of interest.

  6. Authenticating concealed private data while maintaining concealment

    DOEpatents

    Thomas, Edward V.; Draelos, Timothy J.

    2007-06-26

    A method of and system for authenticating concealed and statistically varying multi-dimensional data comprising: acquiring an initial measurement of an item, wherein the initial measurement is subject to measurement error; applying a transformation to the initial measurement to generate reference template data; acquiring a subsequent measurement of an item, wherein the subsequent measurement is subject to measurement error; applying the transformation to the subsequent measurement; and calculating a Euclidean distance metric between the transformed measurements; wherein the calculated Euclidean distance metric is identical to a Euclidean distance metric between the measurement prior to transformation.

  7. Concealed wire tracing apparatus

    DOEpatents

    Kronberg, J.W.

    1994-05-31

    An apparatus and method that combines a signal generator and a passive signal receiver to detect and record the path of partially or completely concealed electrical wiring without disturbing the concealing surface is disclosed. The signal generator applies a series of electrical pulses to the selected wiring of interest. The applied pulses create a magnetic field about the wiring that can be detected by a coil contained within the signal receiver. An audible output connected to the receiver and driven by the coil reflects the receivers position with respect to the wiring. The receivers audible signal is strongest when the receiver is directly above the wiring and the long axis of the receivers coil is parallel to the wiring. A marking means is mounted on the receiver to mark the location of the wiring as the receiver is directed over the wiring's concealing surface. Numerous marks made on various locations of the concealing surface will trace the path of the wiring of interest. 4 figs.

  8. Concealing with Structured Light

    PubMed Central

    Sun, Jingbo; Zeng, Jinwei; Wang, Xi; Cartwright, Alexander N.; Litchinitser, Natalia M.

    2014-01-01

    While making objects less visible (or invisible) to a human eye or a radar has captured people's imagination for centuries, current attempts towards realization of this long-awaited functionality range from various stealth technologies to recently proposed cloaking devices. A majority of proposed approaches share a number of common deficiencies such as design complexity, polarization effects, bandwidth, losses and the physical size or shape requirement complicating their implementation especially at optical frequencies. Here we demonstrate an alternative way to conceal macroscopic objects by structuring light itself. In our approach, the incident light is transformed into an optical vortex with a dark core that can be used to conceal macroscopic objects. Once such a beam passed around the object it is transformed back into its initial Gaussian shape with minimum amplitude and phase distortions. Therefore, we propose to use that dark core of the vortex beam to conceal an object that is macroscopic yet small enough to fit the dark (negligibly low intensity) region of the beam. The proposed concealing approach is polarization independent, easy to fabricate, lossless, operates at wavelengths ranging from 560 to 700 nm, and can be used to hide macroscopic objects providing they are smaller than vortex core. PMID:24522638

  9. Concealing with Structured Light

    NASA Astrophysics Data System (ADS)

    Sun, Jingbo; Zeng, Jinwei; Wang, Xi; Cartwright, Alexander N.; Litchinitser, Natalia M.

    2014-02-01

    While making objects less visible (or invisible) to a human eye or a radar has captured people's imagination for centuries, current attempts towards realization of this long-awaited functionality range from various stealth technologies to recently proposed cloaking devices. A majority of proposed approaches share a number of common deficiencies such as design complexity, polarization effects, bandwidth, losses and the physical size or shape requirement complicating their implementation especially at optical frequencies. Here we demonstrate an alternative way to conceal macroscopic objects by structuring light itself. In our approach, the incident light is transformed into an optical vortex with a dark core that can be used to conceal macroscopic objects. Once such a beam passed around the object it is transformed back into its initial Gaussian shape with minimum amplitude and phase distortions. Therefore, we propose to use that dark core of the vortex beam to conceal an object that is macroscopic yet small enough to fit the dark (negligibly low intensity) region of the beam. The proposed concealing approach is polarization independent, easy to fabricate, lossless, operates at wavelengths ranging from 560 to 700 nm, and can be used to hide macroscopic objects providing they are smaller than vortex core.

  10. Standardising and assessing digital images for use in clinical trials: a practical, reproducible method that blinds the assessor to treatment allocation.

    PubMed

    Bowen, Asha C; Burns, Kara; Tong, Steven Y C; Andrews, Ross M; Liddle, Robyn; O'Meara, Irene M; Westphal, Darren W; Carapetis, Jonathan R

    2014-01-01

    With the increasing availability of high quality digital cameras that are easily operated by the non-professional photographer, the utility of using digital images to assess endpoints in clinical research of skin lesions has growing acceptance. However, rigorous protocols and description of experiences for digital image collection and assessment are not readily available, particularly for research conducted in remote settings. We describe the development and evaluation of a protocol for digital image collection by the non-professional photographer in a remote setting research trial, together with a novel methodology for assessment of clinical outcomes by an expert panel blinded to treatment allocation. PMID:25375169

  11. Blinding Techniques in Randomized Controlled Trials of Laser Therapy: An Overview and Possible Solution

    PubMed Central

    Chow, Roberta; Pirotta, Marie

    2008-01-01

    Low-level laser therapy has evidence accumulating about its effectiveness in a variety of medical conditions. We reviewed 51 double blind randomized controlled trials (RCTs) of laser treatment. Analysis revealed 58% of trials showed benefit of laser over placebo. However, less than 5% of the trials had addressed beam disguise or allocation concealment in the laser machines used. Many of the trials used blinding methods that rely on staff cooperation and are therefore open to interference or bias. This indicates significant deficiencies in laser trial methodology. We report the development and preliminary testing of a novel laser machine that can blind both patient and operator to treatment allocation without staff participation. The new laser machine combines sealed preset and non-bypassable randomization codes, decoy lights and sound, and a conical perspex tip to overcome laser diode glow detection. PMID:18955233

  12. New methods in order to determine the extent of temporary blinding from laser and LED light and proposal how to allocate into blinding groups

    NASA Astrophysics Data System (ADS)

    Reidenbach, Hans-Dieter; Ott, Günter; Brose, Martin; Dollinger, Klaus

    2010-02-01

    Indirect effects arising from bright artificial optical sources like temporary blinding might result in serious incidents or even accidents due to accompanying alteration of visual functions like visual acuity, contrast sensitivity and color discrimination. In order to determine the degree and duration of impairment resulting from glare, dazzle, flash-blindness and afterimages, caused by a beam from a laser or lamp product, particularly under low ambient light conditions, an investigation has been performed with the goal to improve the current knowledge as far as especially recovery duration of visual acuity is concerned. For this two different test set-ups were designed and engineered in order to be able to determine the time duration after which visual acuity returns to its previous value after temporary blinding with a laser or an LED and in addition to search for functional relations as far as wavelength, optical power and exposure duration are concerned. Instead of normal visual acuity measurement, which is the standard test done by eye care professionals, and which has been applied in order to determine the recovery time after irradiation with a high brightness LED (HB-LED) with the aid of a modified commercially available binoptometer with Landolt-C rings as optotypes, a special reading test on a computer monitor was developed for the case of laser irradiation. Two different laser were applied, one with a wavelength of 632.8 nm and the other with 532 nm. Red, green, royal blue and white HB-LEDs were used as stimulating light sources. The maximum applied optical power in a 7-mm aperture, which is equivalent to the pupil diameter of a dark adapted eye, was 0.783 mW (laser) and 3 mW (LED). The exposure durations were chosen as 0.25 s, 0.5 s, 1 s, 5 s, and 20 s in the case of laser irradiation and 0.25 s, 1 s, 5 s, and 10 s for LEDs, respecting maximum permissible exposure (MPE) and/or limit exposure levels (ELVs) in all exposure situations. The visual acuity

  13. Self-Concealment and Suicidal Behaviors

    ERIC Educational Resources Information Center

    Friedlander, Adam; Nazem, Sarra; Fiske, Amy; Nadorff, Michael R.; Smith, Merideth D.

    2012-01-01

    Understanding self-concealment, the tendency to actively conceal distressing personal information from others, may be important in developing effective ways to help individuals with suicidal ideation. No published study has yet assessed the relation between self-concealment and suicidal behaviors. Additionally, most self-concealment research has…

  14. Detection of a concealed object

    DOEpatents

    Keller, Paul E.; Hall, Thomas E.; McMakin, Douglas L.

    2008-04-29

    Disclosed are systems, methods, devices, and apparatus to determine if a clothed individual is carrying a suspicious, concealed object. This determination includes establishing data corresponding to an image of the individual through interrogation with electromagnetic radiation in the 200 MHz to 1 THz range. In one form, image data corresponding to intensity of reflected radiation and differential depth of the reflecting surface is received and processed to detect the suspicious, concealed object.

  15. Detection of a concealed object

    DOEpatents

    Keller, Paul E [Richland, WA; Hall, Thomas E [Kennewick, WA; McMakin, Douglas L [Richland, WA

    2010-11-16

    Disclosed are systems, methods, devices, and apparatus to determine if a clothed individual is carrying a suspicious, concealed object. This determination includes establishing data corresponding to an image of the individual through interrogation with electromagnetic radiation in the 200 MHz to 1 THz range. In one form, image data corresponding to intensity of reflected radiation and differential depth of the reflecting surface is received and processed to detect the suspicious, concealed object.

  16. Handheld ultrasonic concealed weapon detector

    NASA Astrophysics Data System (ADS)

    Wild, Norbert C.; Doft, Frank; Breuner, Dennis; Felber, Franklin S.

    2001-02-01

    A handheld, battery-operated prototype of a concealed weapon detector has been built and tested. Designed to detect both metallic and non-metallic weapons, the sensor utilizes focused ultrasound (40 kHz frequency) to remotely detect concealed objects from beyond arm's length out to a range of about 12 feet (4 meters). The detector can be used in prison settings, by officers in the field to allow for stand-off frisking of suspects, and to supplement security at courthouse entrances and other monitored portals. The detector emits an audible alarm (with provision for an earphone jack) as well as a visible light-bar indicator when an object is detected. A high intensity aiming light, with momentary switch, allows the user to accurately determine the location of the concealed object. Current efforts are aimed at increasing the probability of detection, reducing the false-alarm rate, and extending the range of detectability out to 20 feet. Plans for accomplishing these tasks will be presented together with data showing the effective range and probability of detection for the present system.

  17. Standoff detection of concealed handguns

    NASA Astrophysics Data System (ADS)

    Rezgui, Nacer; Andrews, David; Bowring, Nicholas; Harmer, Stuart; Southgate, Matthew

    2008-04-01

    An active technique for the standoff detection and identification of concealed conducting items such as handguns and knives is presented. This technique entails illuminating an object with wide range stepped millimetre wave radiation and inducing a local electromagnetic field comprised of a superposition of modes. The coupling to these modes from the illuminating and scattered fields is, in general, frequency dependent and this forms the basis for the detection and identification of conducting items. The object needs to be fully illuminated if a full spectrum of modes and therefore a full frequency response are to be excited and collected. The scattered EM power is measured at "stand off" distance of several metres as the illuminating field is frequency swept and patterns in frequency response characteristic to the target item being sought are looked for. This system relies on contributions from the aspect independent late time responses employed by Baum1 together with aspect independent information derived specifically from gun barrels and polarisation from scattering effects. This technique is suitable for a deployable gun and concealed weapons detection system and does not rely on imaging techniques for determining the presence of a gun. Experimental sets of responses from typical metal or partially conducting objects such as keys, mobile phones and concealed handguns are presented at a range of frequencies.

  18. Method for imaging a concealed object

    DOEpatents

    Davidson, James R [Idaho Falls, ID; Partin, Judy K [Idaho Falls, ID; Sawyers, Robert J [Idaho Falls, ID

    2007-07-03

    A method for imaging a concealed object is described and which includes a step of providing a heat radiating body, and wherein an object to be detected is concealed on the heat radiating body; imaging the heat radiating body to provide a visibly discernible infrared image of the heat radiating body; and determining if the visibly discernible infrared image of the heat radiating body is masked by the presence of the concealed object.

  19. ISAR for concealed objects imaging

    NASA Astrophysics Data System (ADS)

    Zhuravlev, A.; Razevig, V.; Vasiliev, I.; Ivashov, S.; Voronin, V.

    2015-03-01

    A new promising architecture of microwave personnel screening system is analyzed in this paper with numerical simulations. This architecture is based on the concept of inverse aperture synthesis applied to a naturally moving person. The extent of the synthetic aperture is formed by a stationary vertical linear antenna array and by a length of subject's trajectory as he moves in the vicinity of this antenna array. The coherent radar signal processing is achieved by a synchronous 3D video-sensor whose data are used to track the subject. The advantages of the proposed system architecture over currently existing systems are analyzed. Synthesized radar images are obtained by numerical simulations with a human torso model with concealed objects. Various aspects of the system architecture are considered, including: advantages of using sparse antenna arrays to decrease the number of antenna elements, the influence of positioning errors of body surface due to outer clothing. It was shown that detailed radar images of concealed objects can be obtained with a narrow-band signal due to the depth information available from the 3D video sensor. The considered ISAR architecture is considered perspective to be used on infrastructure objects owing to its superior qualities: highest throughput, small footprint, simple design of the radar sub-system, non-required co-operation of the subject.

  20. Extracting concealed information from groups.

    PubMed

    Meijer, Ewout H; Smulders, Fren T Y; Merckelbach, Harald L G J

    2010-11-01

    Lie detection procedures are typically aimed at determining guilt or innocence of a single suspect. Serious security threats, however, often involve groups, such as terrorist networks or criminal organizations. In this report, we describe a variant of the skin conductance-based Concealed Information Test (CIT) that allows for the extraction of critical information from such groups. Twelve participants were given information about an upcoming (mock) terrorist attack, with specific instructions not to reveal this information to anyone. Next, each subject was subjected to a CIT, with questions pertaining to the details of the attack. Results showed that for every question, the average skin conductance response to the correct answer option differed significantly (p < 0.05) from those to all other options. These results show that the information about the upcoming attack could be extracted from the group of terror suspects as a whole. PMID:20533975

  1. Terahertz interferometric imaging of a concealed object

    NASA Astrophysics Data System (ADS)

    Sinyukov, Alexander M.; Bandyopadhyay, Aparajita; Sengupta, Amartya; Barat, Robert B.; Gary, Dale E.; Michalopoulou, Zoi-Heleni; Zimdars, David; Federici, John F.

    2006-10-01

    Experimental results of two-dimensional homodyne terahertz interferometric imaging are presented. The performance of an N element detector array is imitated by only one detector placed at N positions. Continuous waves at 0.25-0.3 THz are used to detect concealed objects: a metal object and an RDX sample. The terahertz interferometric imaging method can be used in defense and security applications to detect concealed weapons, explosives as well as chemical and biological agents.

  2. Blindness - resources

    MedlinePlus

    Resources - blindness ... The following organizations are good resources for information on blindness : American Foundation for the Blind -- www.afb.org Foundation Fighting Blindness -- www.blindness.org National Eye Institute -- ...

  3. Detecting concealed objects at a checkpoint

    DOEpatents

    McMakin, Douglas L.; Hall, Thomas E.; Sheen, David M.; Severtsen, Ronald H.

    2008-07-29

    Disclosed are systems, methods, devices, and apparatus to interrogate a clothed individual with electromagnetic radiation to determine if a concealed object is being carried. This determination includes establishing data corresponding to an image of the individual with a pair of opposed, semi-cylindrical array panels each configured to interrogate the individual with electromagnetic radiation in the 200 MHz to 1 THz range.

  4. Concealment of Child Sexual Abuse in Sports

    ERIC Educational Resources Information Center

    Hartill, Mike

    2013-01-01

    When the sexual abuse of children is revealed, it is often found that other nonabusing adults were aware of the abuse but failed to act. During the past twenty years or so, the concealment of child sexual abuse (CSA) within organizations has emerged as a key challenge for child protection work. Recent events at Pennsylvania State University (PSU)…

  5. Manifest and concealed correlations in quantum mechanics

    NASA Astrophysics Data System (ADS)

    de la Torre, A. C.; Iguain, J. L.

    1998-11-01

    The quantum covariance function is used to study correlations in quantum systems. Besides the obvious correlations due to the conservation of some quantity, the appearance of concealed quantum correlations like non-locality or non-separability is studied. The choice of an appropriate basis allows a complete analysis relating correlations with conservation laws and factorizability.

  6. Automated Human Screening for Detecting Concealed Knowledge

    ERIC Educational Resources Information Center

    Twyman, Nathan W.

    2012-01-01

    Screening individuals for concealed knowledge has traditionally been the purview of professional interrogators investigating a crime. But the ability to detect when a person is hiding important information would be of high value to many other fields and functions. This dissertation proposes design principles for and reports on an implementation…

  7. College Students' Reasons for Concealing Suicidal Ideation

    ERIC Educational Resources Information Center

    Burton Denmark, Adryon; Hess, Elaine; Becker, Martin Swanbrow

    2012-01-01

    Self-reported reasons for concealing suicidal ideation were explored using data from a national survey of undergraduate and graduate students: 558 students indicated that they seriously considered attempting suicide during the previous year and did not tell anyone about their suicidal thoughts. Content analysis of students' qualitative responses…

  8. Concealed Questions. In Search of Answers

    ERIC Educational Resources Information Center

    Frana, Ilaria

    2010-01-01

    This dissertation examines the semantic interpretation of various types of DPs in so-called concealed-question (CQ) constructions, as "Bill's phone number" in the sentence "John knows Bill's phone number". The peculiar characteristic of DP-CQs is that they are interpreted as having the meaning of an embedded question. So, for instance, the…

  9. Student Attitudes Toward Concealed Handguns on Campus at 2 Universities

    PubMed Central

    Bouffard, Jeffrey A.; Wells, William; Nobles, Matt R.

    2012-01-01

    We examined student support for a policy that would allow carrying of concealed handguns on university campuses. Large percentages of students at 2 universities expressed very low levels of comfort with the idea of permitting concealed handgun carrying on campus, suggesting that students may not welcome less restrictive policies. Students held slightly different opinions about concealed handguns on and off campus, suggesting that they view the campus environment as unique with respect to concealed handgun carrying. PMID:22720763

  10. 25 CFR 11.444 - Carrying concealed weapons.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 25 Indians 1 2012-04-01 2011-04-01 true Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor...

  11. 25 CFR 11.444 - Carrying concealed weapons.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 25 Indians 1 2013-04-01 2013-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor...

  12. 25 CFR 11.444 - Carrying concealed weapons.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 25 Indians 1 2014-04-01 2014-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor...

  13. 25 CFR 11.444 - Carrying concealed weapons.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 25 Indians 1 2011-04-01 2011-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor...

  14. 25 CFR 11.444 - Carrying concealed weapons.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor...

  15. Direct recording of concealed ventricular extrasystoles producing pacer inhibition.

    PubMed

    Bowers, Mark; Berger, Marcie

    2013-10-01

    We report a case of concealed extrasystoles recorded from a pacing lead. The concealed extrasystoles were observed with right ventricular pacing, biventricular unipolar, and biventricular bipolar pacing. The simultaneous surface EKG did not show manifest ventricular extrasystoles with the concealed intracardiac potentials. This case highlights a cause of oversensing that has been theoretically reported in the literature but never directly observed. PMID:23600888

  16. Induction detection of concealed bulk banknotes

    NASA Astrophysics Data System (ADS)

    Fuller, Christopher; Chen, Antao

    2012-06-01

    The smuggling of bulk cash across borders is a serious issue that has increased in recent years. In an effort to curb the illegal transport of large numbers of paper bills, a detection scheme has been developed, based on the magnetic characteristics of bank notes. The results show that volumes of paper currency can be detected through common concealing materials such as plastics, cardboard, and fabrics making it a possible potential addition to border security methods. The detection scheme holds the potential of also reducing or eliminating false positives caused by metallic materials found in the vicinity, by observing the stark difference in received signals caused by metal and currency. The detection scheme holds the potential to detect for both the presence and number of concealed bulk notes, while maintaining the ability to reduce false positives caused by metal objects.

  17. Concealed weapons detection using electromagnetic resonances

    NASA Astrophysics Data System (ADS)

    Hunt, Allen R.; Hogg, R. Douglas; Foreman, William

    1998-12-01

    Concealed weapons pose a significant threat to both law enforcement and security agency personnel. The uncontrolled environments associated with peacekeeping and the move toward relaxation of concealed weapons laws here in the U.S. provide a strong motivation for developing weapons detection technologies which are noninvasive and can function noncooperatively. Existing weapons detection systems are primarily oriented to detecting metal and require the cooperation of the person being searched. The new generation of detectors under development that focuses primarily on imaging methods, faces problems associated with privacy issues. There remains a need for a weapons detector which is portable, detects weapons remotely, avoids the issues associated with privacy rights, can tell the difference between car keys and a knife, and is affordable enough that one can be issued to every peacekeeper and law enforcement officer. AKELA is developing a concealed weapons detector that uses wideband radar techniques to excite natural electromagnetic resonances that characterize the size, shape, and material composition of an object. Neural network processing is used to classify the difference between weapons and nuisance objects. We have constructed both time and frequency domain test systems and used them to gather experimental data on a variety of armed and unarmed individuals. These experiments have been performed in an environment similar to the operational environment. Preliminary results from these experiments show that it is possible to detect a weapon being carried by an individual from a distance of 10 to 15 feet, and to detect a weapon being concealed behind the back. The power required is about 100 milliwatts. A breadboard system is being fabricated and will be used by AKELA and our law enforcement partner to gather data in operationally realistic situations. While a laptop computer will control the breadboard system, the wideband radar electronics will fit in a box the

  18. A modified surgical procedure for concealed penis

    PubMed Central

    Cheng, Gong; Liu, Bianjiang; Guan, Zhaolong; Huang, Yuan; Qin, Chao; Song, Ninghong; Wang, Zengjun

    2015-01-01

    Introduction: We described a modified surgical procedure for repairing a concealed penis and compared the efficacy and feasibility of modified repair with traditional repair. Methods: From March 2003 to December 2012, 96 patients with a concealed penis were recruited to undergo penile repair at our centre. Modified repair and traditional repair were performed respectively on 46 and 50 cases. We compared operative time, intraoperative blood loss, cosmetic result of operative scars, postoperative penile retraction, and complications. Results: All operations were completed successfully without serious complications. The mean operative time, intraoperative blood loss, and cosmetic result of the operative scar between the two surgical methods were similar. However, the postoperative penile retraction rate in patients undergoing modified repair decreased significantly than in the traditional repair. Conclusions: Our modified surgical procedure is effective and feasible for a concealed penis. Although extra procedures were needed for the modified repair, the operative time, intraoperative blood loss and cosmetic result of operative scar between the two procedures were similar. Compared with traditional repair, modified repair has better clinical outcomes. PMID:26664507

  19. Internally concealed cocaine: analytical and diagnostic aspects.

    PubMed

    Bogusz, M J; Althoff, H; Erkens, M; Maier, R D; Hofmann, R

    1995-09-01

    Thirty persons arrested at Frankfurt airport for smuggling internally concealed cocaine in 1993/1994 were investigated. An X-ray examination (in all 30 cases), immunochemical examination of urine (in 27 cases) and of saliva (in 20 cases) was performed in parallel. An X-ray examination gave positive results in all examined persons. EMIT cocaine metabolite assay (cut off 300 ng benzoylecgonine (BE)/mL) was positive in eight urine samples. After reducing the cut off to 150 ng BE/mL urine, eleven samples were classified as positive. The results were confirmed by means of chromatographic determinations. These findings showed limited role of immunological examination of urine as a screening test in suspected smuggling of internally concealed drugs. All saliva samples showed negative immunochemical results. The number of concealed containers ranged from 44 to 135 per person. The amount of cocaine hydrochloride found in particular cases ranged from 242 to 1050 g net weight, divided into containers weighing from 5.7 to 13.8 g. Drug packages were obviously machine-made. The packages smuggled by a particular person were uniform. However, a distinct interpersonal variability in drug packages was observed, in regard to the number of protective layers (4-7), size, weight, and cocaine purity. This may be helpful for the identification of production site. The leaching of cocaine from selected containers was investigated in a stirring bath and was independent of the conditions applied. PMID:7595327

  20. Imaging sensor fusion for concealed weapon detection

    NASA Astrophysics Data System (ADS)

    Currie, Nicholas C.; Demma, Fred J.; Ferris, David D., Jr.; McMillan, Robert W.; Wicks, Michael C.; Zyga, Kathleen

    1997-02-01

    Sensors are needed for concealed weapon detection which perform better with regard to weapon classification, identification, probability of detection and false alarm rate than the magnetic sensors commonly used in airports. We have concluded that no single sensor will meet the requirements for a reliable concealed weapon detector and thus that sensor fusion is required to optimize detection probability and false alarm rate by combining sensor outputs in a synergistic fashion. This paper describes microwave, millimeter wave, far infrared, infrared, x-ray, acoustic, and magnetic sensors which have some promise in the field of concealed weapon detection. The strengths and weaknesses of these devices are discussed, and examples of the outputs of most of them are given. Various approaches to fusion of these sensors are also described, from simple cuing of one sensor by another to improvement of image quality by using multiple systems. It is further concluded that none of the sensors described herein will ever replace entirely the airport metal detector, but that many of them meet needs imposed by applications requiring a higher detection probability and lower false alarm rate.

  1. Detecting persons concealed in a vehicle

    DOEpatents

    Tucker, Jr., Raymond W.

    2005-03-29

    An improved method for detecting the presence of humans or animals concealed within in a vehicle uses a combination of the continuous wavelet transform and a ratio-based energy calculation to determine whether the motion detected using seismic sensors placed on the vehicle is due to the presence of a heartbeat within the vehicle or is the result of motion caused by external factors such as the wind. The method performs well in the presence of light to moderate ambient wind levels, producing far fewer false alarm indications. The new method significantly improves the range of ambient environmental conditions under which human presence detection systems can reliably operate.

  2. Video Error Concealment Using Fidelity Tracking

    NASA Astrophysics Data System (ADS)

    Yoneyama, Akio; Takishima, Yasuhiro; Nakajima, Yasuyuki; Hatori, Yoshinori

    We propose a method to prevent the degradation of decoded MPEG pictures caused by video transmission over error-prone networks. In this paper, we focus on the error concealment that is processed at the decoder without using any backchannels. Though there have been various approaches to this problem, they generally focus on minimizing the degradation measured frame by frame. Although this frame-level approach is effective in evaluating individual frame quality, in the sense of human perception, the most noticeable feature is the spatio-temporal discontinuity of the image feature in the decoded video image. We propose a novel error concealment algorithm comprising the combination of i) A spatio-temporal error recovery function with low processing cost, ii) A MB-based image fidelity tracking scheme, and iii) An adaptive post-filter using the fidelity information. It is demonstrated by experimental results that the proposed algorithm can significantly reduce the subjective degradation of corrupted MPEG video quality with about 30% of additional decoding processing power.

  3. Color blindness

    MedlinePlus

    ... have trouble telling the difference between red and green. This is the most common type of color ... color blindness often have problems seeing reds and greens, too. The most severe form of color blindness ...

  4. Blind Astronomers

    NASA Astrophysics Data System (ADS)

    Hockey, Thomas A.

    2011-01-01

    The phrase "blind astronomer” is used as an allegorical oxymoron. However, there were and are blind astronomers. What of famous blind astronomers? First, it must be stated that these astronomers were not martyrs to their craft. It is a myth that astronomers blind themselves by observing the Sun. As early as France's William of Saint-Cloud (circa 1290) astronomers knew that staring at the Sun was ill-advised and avoided it. Galileo Galilei did not invent the astronomical telescope and then proceed to blind himself with one. Galileo observed the Sun near sunrise and sunset or through projection. More than two decades later he became blind, as many septuagenarians do, unrelated to their profession. Even Isaac Newton temporarily blinded himself, staring at the reflection of the Sun when he was a twentysomething. But permanent Sun-induced blindness? No, it did not happen. For instance, it was a stroke that left Scotland's James Gregory (1638-1675) blind. (You will remember the Gregorian telescope.) However, he died days later. Thus, blindness little interfered with his occupation. English Abbot Richard of Wallingford (circa 1291 - circa 1335) wrote astronomical works and designed astronomical instruments. He was also blind in one eye. Yet as he further suffered from leprosy, his blindness seems the lesser of Richard's maladies. Perhaps the most famous professionally active, blind astronomer (or almost blind astronomer) is Dominique-Francois Arago (1786-1853), director until his death of the powerful nineteenth-century Paris Observatory. I will share other _ some poignant _ examples such as: William Campbell, whose blindness drove him to suicide; Leonhard Euler, astronomy's Beethoven, who did nearly half of his life's work while almost totally blind; and Edwin Frost, who "observed” a total solar eclipse while completely sightless.

  5. New Hybrid Error Concealment for Digital Compressed Video

    NASA Astrophysics Data System (ADS)

    Hadar, Ofer; Huber, Merav; Huber, Revital; Greenberg, Shlomo

    2005-12-01

    Transmission of a compressed video signal over a lossy communication network exposes the information to losses and errors, which leads to significant visible errors in the reconstructed frames at the decoder side. In this paper we present a new hybrid error concealment algorithm for compressed video sequences, based on temporal and spatial concealment methods. We describe spatial and temporal techniques for the recovery of lost blocks. In particular, we develop postprocessing techniques for the reconstruction of missing or damaged macroblocks. A new decision support tree is developed to efficiently choose the best appropriate error concealment method, according to the spatial and temporal characteristics of the sequence. The proposed algorithm is compared to three error concealment methods: spatial, temporal, and a previous hybrid approach using different noise levels. The results are evaluated using four quality measures. We show that our error concealment scheme outperforms all the other three methods for all the tested video sequences.

  6. Induction detection of concealed bulk banknotes

    NASA Astrophysics Data System (ADS)

    Fuller, Christopher; Chen, Antao

    2011-10-01

    Bulk cash smuggling is a serious issue that has grown in volume in recent years. By building on the magnetic characteristics of paper currency, induction sensing is found to be capable of quickly detecting large masses of banknotes. The results show that this method is effective in detecting bulk cash through concealing materials such as plastics, cardboards, fabrics and aluminum foil. The significant difference in the observed phase between the received signals caused by conducting materials and ferrite compounds, found in banknotes, provides a good indication that this process can overcome the interference by metal objects in a real sensing application. This identification strategy has the potential to not only detect the presence of banknotes, but also the number, while still eliminating false positives caused by metal objects.

  7. Millimeter-wave concealed weapon detection

    NASA Astrophysics Data System (ADS)

    Chang, Yu-Wen; Juhola, Markku; Grainger, William; Wang, Beining; Manahan, Brian

    1997-02-01

    Millimeter-wave concealed weapon detection, based on the use of a fast scan short-range FMCW 94 GHz radar, was evaluated in a small business innovative research phase I under the Technology Reinvestment Project (TRP) program. The feasibility of a fast circular scan technique invented by Chang Industry has been firmly established, with handgun images recorded. This fast scan technique is essential both for remote sensing and full-body fixed site scanner applications. Although only raw image data was obtained in Phase I, we propose to apply super-resolution image enhancements and target recognition software algorithms to provide more reliable detection. Endorsement from the Los Angeles County Sheriff's Department, to provide operational input and testing and evaluation, and the hiring of a consultant to plan for future program financing (including venture capital investment) make the project very attractive for commercialization.

  8. Prime number variant of concealed trigeminy.

    PubMed

    Medeiros, C M; Medeiros, N P; de Nonohay, N C; Rodrigues, R

    1985-10-01

    A 53-year-old man with myocardial infarction was found to have frequent premature ventricular beats. The predominant pattern was classical concealed trigeminy; i.e., the number of conducted sinus beats, S, between extrasystoles satisfied the equation S = 3n + 2, where "n" is zero or any positive integer. Two other transient patterns also occurred. The first one was characterized by exceptional values of S, which satisfied the equation S = 3n + 3. In the second transient pattern, all values of S fitted the classical equation, but there were singularly absent values; i.e., the "n" in the equation was exclusively an odd number, giving rise to only prime numbers of interectopic conducted sinus beats. It is proposed in this last form that there are two sites of fixed block proximal to a variable distal block in a re-entry loop responsible for the ventricular extrasystoles. PMID:2415650

  9. Color image fusion for concealed weapon detection

    NASA Astrophysics Data System (ADS)

    Toet, Alexander

    2003-09-01

    Recent advances in passive and active imaging sensor technology offer the potential to detect weapons that are concealed underneath a person's clothing or carried along in bags. Although the concealed weapons can sometimes easily be detected, it can be difficult to perceive their context, due to the non-literal nature of these images. Especially for dynamic crowd surveillance purposes it may be impossible to rapidly asses with certainty which individual in the crowd is the one carrying the observed weapon. Sensor fusion is an enabling technology that may be used to solve this problem. Through fusion the signal of the sensor that depicts the weapon can be displayed in the context provided by a sensor of a different modality. We propose an image fusion scheme in which non-literal imagery can be fused with standard color images such that the result clearly displays the observed weapons in the context of the original color image. The procedure is such that the relevant contrast details from the non-literal image are transferred to the color image without altering the original color distribution of this image. The result is a natural looking color image that fluently combines all details from both input sources. When an observer who performs a dynamic crowd surveillance task, detects a weapon in the scene, he will also be able to quickly determine which person in the crowd is actually carrying the observed weapon (e.g. "the man with the red T-shirt and blue jeans"). The method is illustrated by the fusion of thermal 8-12 μm imagery with standard RGB color images.

  10. Concealed semantic and episodic autobiographical memory electrified

    PubMed Central

    Ganis, Giorgio; Schendan, Haline E.

    2013-01-01

    Electrophysiology-based concealed information tests (CIT) try to determine whether somebody possesses concealed information about a crime-related item (probe) by comparing event-related potentials (ERPs) between this item and comparison items (irrelevants). Although the broader field is sometimes referred to as “memory detection,” little attention has been paid to the precise type of underlying memory involved. This study begins addressing this issue by examining the key distinction between semantic and episodic memory in the autobiographical domain within a CIT paradigm. This study also addresses the issue of whether multiple repetitions of the items over the course of the session habituate the brain responses. Participants were tested in a 3-stimulus CIT with semantic autobiographical probes (their own date of birth) and episodic autobiographical probes (a secret date learned just before the study). Results dissociated these two memory conditions on several ERP components. Semantic probes elicited a smaller frontal N2 than episodic probes, consistent with the idea that the frontal N2 decreases with greater pre-existing knowledge about the item. Likewise, semantic probes elicited a smaller central N400 than episodic probes. Semantic probes also elicited a larger P3b than episodic probes because of their richer meaning. In contrast, episodic probes elicited a larger late positive complex (LPC) than semantic probes, because of the recent episodic memory associated with them. All these ERPs showed a difference between probes and irrelevants in both memory conditions, except for the N400, which showed a difference only in the semantic condition. Finally, although repetition affected the ERPs, it did not reduce the difference between probes and irrelevants. These findings show that the type of memory associated with a probe has both theoretical and practical importance for CIT research. PMID:23355816

  11. Concealing their communication: exploring psychosocial predictors of young drivers' intentions and engagement in concealed texting.

    PubMed

    Gauld, Cassandra S; Lewis, Ioni; White, Katherine M

    2014-01-01

    Making a conscious effort to hide the fact that you are texting while driving (i.e., concealed texting) is a deliberate and risky behaviour involving attention diverted away from the road. As the most frequent users of text messaging services and mobile phones while driving, young people appear at heightened risk of crashing from engaging in this behaviour. This study investigated the phenomenon of concealed texting while driving, and utilised an extended Theory of Planned Behaviour (TPB) including the additional predictors of moral norm, mobile phone involvement, and anticipated regret to predict young drivers' intentions and subsequent behaviour. Participants (n=171) were aged 17-25 years, owned a mobile phone, and had a current driver's licence. Participants completed a questionnaire measuring their intention to conceal texting while driving, and a follow-up questionnaire a week later to report their behavioural engagement. The results of hierarchical multiple regression analyses showed overall support for the predictive utility of the TPB with the standard constructs accounting for 69% of variance in drivers' intentions, and the extended predictors contributing an additional 6% of variance in intentions over and above the standard constructs. Attitude, subjective norm, PBC, moral norm, and mobile phone involvement emerged as significant predictors of intentions; and intention was the only significant predictor of drivers' self-reported behaviour. These constructs can provide insight into key focal points for countermeasures including advertising and other public education strategies aimed at influencing young drivers to reconsider their engagement in this risky behaviour. PMID:24211560

  12. Concealing Concealment: The Mediating Role of Internalized Heterosexism in Psychological Distress Among Lesbian, Gay, and Bisexual Older Adults

    PubMed Central

    Hoy-Ellis, Charles P.

    2016-01-01

    Recent population-based studies indicate that sexual minorities aged 50 and older experience significantly higher rates of psychological distress than their heterosexual age-peers. The minority stress model has been useful in explaining disparately high rates of psychological distress among younger sexual minorities. The purpose of this study is to test a hypothesized structural relationship between two minority stressors—internalized heterosexism and concealment of sexual orientation—and consequent psychological distress among a sample of 2,349 lesbian, gay, and bisexual adults aged 50 to 95 years old. Structural equation modeling indicates that concealment has a nonsignificant direct effect on psychological distress but a significant indirect effect that is mediated through internalized heterosexism; the effect of concealment is itself concealed. This may explain divergent results regarding the role of concealment in psychological distress in other studies, and the implications will be discussed. PMID:26322654

  13. Concealable Stigmatized Identities and Psychological Well-Being

    PubMed Central

    Quinn, Diane M.; Earnshaw, Valerie A.

    2013-01-01

    Many people have concealable stigmatized identities: Identities that can be hidden from others and that are socially devalued and negatively stereotyped. Understanding how these concealable stigmatized identities affect psychological well-being is critical. We present our model of the components of concealable stigmatized identities including valenced content – internalized stigma, experienced discrimination, anticipated stigma, disclosure reactions, and counter-stereotypic/positive information – and magnitude – centrality and salience. Research has shown that negatively valenced content is related to increased psychological distress. However, smaller identity magnitude may buffer this distress. We review the research available and discuss important areas for future work. PMID:23730326

  14. Concealed identification symbols and nondestructive determination of the identification symbols

    DOEpatents

    Nance, Thomas A.; Gibbs, Kenneth M.

    2014-09-16

    The concealing of one or more identification symbols into a target object and the subsequent determination or reading of such symbols through non-destructive testing is described. The symbols can be concealed in a manner so that they are not visible to the human eye and/or cannot be readily revealed to the human eye without damage or destruction of the target object. The identification symbols can be determined after concealment by e.g., the compilation of multiple X-ray images. As such, the present invention can also provide e.g., a deterrent to theft and the recovery of lost or stolen objects.

  15. Covert respiration measures for the detection of concealed information.

    PubMed

    Elaad, Eitan; Ben-Shakhar, Gershon

    2008-03-01

    A mock-theft experiment was designed to assess the efficiency of two covert respiration measures in detection of concealed information. The covert measures were further compared with three standard measures typically used for the detection of concealed knowledge (electrodermal, respiration and finger pulse measures). Results revealed that the covert respiration measures produced good discrimination between "guilty" (participants possessing concealed knowledge) and "innocent" participants. One of the covert measures produced detection efficiency that was similar to that of the standard respiration and finger pulse measures, but less than the electrodermal measure. PMID:18093718

  16. Approach trajectory planning system for maximum concealment

    NASA Technical Reports Server (NTRS)

    Warner, David N., Jr.

    1986-01-01

    A computer-simulation study was undertaken to investigate a maximum concealment guidance technique (pop-up maneuver), which military aircraft may use to capture a glide path from masked, low-altitude flight typical of terrain following/terrain avoidance flight enroute. The guidance system applied to this problem is the Fuel Conservative Guidance System. Previous studies using this system have concentrated on the saving of fuel in basically conventional land and ship-based operations. Because this system is based on energy-management concepts, it also has direct application to the pop-up approach which exploits aircraft performance. Although the algorithm was initially designed to reduce fuel consumption, the commanded deceleration is at its upper limit during the pop-up and, therefore, is a good approximation of a minimum-time solution. Using the model of a powered-lift aircraft, the results of the study demonstrated that guidance commands generated by the system are well within the capability of an automatic flight-control system. Results for several initial approach conditions are presented.

  17. TDCS Guided using fMRI Significantly Accelerates Learning to Identify Concealed Objects

    PubMed Central

    Clark, Vincent P.; Coffman, Brian A.; Mayer, Andy R.; Weisend, Michael P.; Lane, Terran D.R.; Calhoun, Vince D.; Raybourn, Elaine M.; Garcia, Christopher M.; Wassermann, Eric M.

    2011-01-01

    The accurate identification of obscured and concealed objects in complex environments was an important skill required for survival during human evolution, and is required today for many forms of expertise. Here we used transcranial direct current stimulation (tDCS) guided using neuroimaging to increase learning rate in a novel, minimally guided discovery-learning paradigm. Ninety-six subjects identified threat-related objects concealed in naturalistic virtual surroundings used in real-world training. A variety of brain networks were found using fMRI data collected at different stages of learning, with two of these networks focused in right inferior frontal and right parietal cortex. Anodal 2.0 mA tDCS performed for 30 minutes over these regions in a series of single-blind, randomized studies resulted in significant improvements in learning and performance compared with 0.1 mA tDCS. This difference in performance increased to a factor of two after a one-hour delay. A dose-response effect of current strength on learning was also found. Taken together, these brain imaging and stimulation studies suggest that right frontal and parietal cortex are involved in learning to identify concealed objects in naturalistic surroundings. Furthermore, they suggest that the application of anodal tDCS over these regions can greatly increase learning, resulting in one of the largest effects on learning yet reported. The methods developed here may be useful to decrease the time required to attain expertise in a variety of settings. PMID:21094258

  18. TDCS guided using fMRI significantly accelerates learning to identify concealed objects.

    PubMed

    Clark, Vincent P; Coffman, Brian A; Mayer, Andy R; Weisend, Michael P; Lane, Terran D R; Calhoun, Vince D; Raybourn, Elaine M; Garcia, Christopher M; Wassermann, Eric M

    2012-01-01

    The accurate identification of obscured and concealed objects in complex environments was an important skill required for survival during human evolution, and is required today for many forms of expertise. Here we used transcranial direct current stimulation (tDCS) guided using neuroimaging to increase learning rate in a novel, minimally guided discovery-learning paradigm. Ninety-six subjects identified threat-related objects concealed in naturalistic virtual surroundings used in real-world training. A variety of brain networks were found using functional magnetic resonance imaging (fMRI) data collected at different stages of learning, with two of these networks focused in right inferior frontal and right parietal cortex. Anodal 2.0 mA tDCS performed for 30 min over these regions in a series of single-blind, randomized studies resulted in significant improvements in learning and performance compared with 0.1 mA tDCS. This difference in performance increased to a factor of two after a one-hour delay. A dose-response effect of current strength on learning was also found. Taken together, these brain imaging and stimulation studies suggest that right frontal and parietal cortex are involved in learning to identify concealed objects in naturalistic surroundings. Furthermore, they suggest that the application of anodal tDCS over these regions can greatly increase learning, resulting in one of the largest effects on learning yet reported. The methods developed here may be useful to decrease the time required to attain expertise in a variety of settings. PMID:21094258

  19. Temporal spying and concealing process in fibre-optic data transmission systems through polarization bypass

    PubMed Central

    Bony, P.Y.; Guasoni, M.; Morin, P.; Sugny, D.; Picozzi, A.; Jauslin, H.R.; Pitois, S.; Fatome, J.

    2014-01-01

    Recent research has been focused on the ability to manipulate a light beam in such a way to hide, namely to cloak, an event over a finite time or localization in space. The main idea is to create a hole or a gap in the spatial or time domain so as to allow for an object or data to be kept hidden for a while and then to be restored. By enlarging the field of applications of this concept to telecommunications, researchers have recently reported the possibility to hide transmitted data in an optical fibre. Here we report the first experimental demonstration of perpetual temporal spying and blinding process of optical data in fibre-optic transmission line based on polarization bypass. We successfully characterize the performance of our system by alternatively copying and then concealing 100% of a 10-Gb s−1 transmitted signal. PMID:25135759

  20. Color Blindness

    MedlinePlus

    ... three color cone cells to determine our color perception. Color blindness can occur when one or more ... Anyone who experiences a significant change in color perception should see an ophthalmologist (Eye M.D.). Next ...

  1. Color blindness

    MedlinePlus

    ... care provider or eye specialist can check your color vision in several ways. Testing for color blindness is ... Adams AJ, Verdon WA, Spivey BE. Color vision. In: Tasman W, Jaeger EA, eds. ... PA: Lippincott Williams & Wilkins; 2013:vol. 2, chap ...

  2. 48 CFR 8.705-3 - Allocation process.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Allocation process. 8.705-3 Section 8.705-3 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION ACQUISITION... Are Blind or Severely Disabled 8.705-3 Allocation process. (a) When the direct order process has...

  3. 48 CFR 8.705-3 - Allocation process.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Allocation process. 8.705-3 Section 8.705-3 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION ACQUISITION... Are Blind or Severely Disabled 8.705-3 Allocation process. (a) When the direct order process has...

  4. 48 CFR 408.705-3 - Allocation process.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false Allocation process. 408.705-3 Section 408.705-3 Federal Acquisition Regulations System DEPARTMENT OF AGRICULTURE COMPETITION... Employing People Who Are Blind or Severely Disabled 408.705-3 Allocation process. (a) The chief of...

  5. 48 CFR 8.705-3 - Allocation process.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Allocation process. 8.705-3 Section 8.705-3 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION ACQUISITION... Are Blind or Severely Disabled 8.705-3 Allocation process. (a) When the direct order process has...

  6. 48 CFR 8.705-3 - Allocation process.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Allocation process. 8.705-3 Section 8.705-3 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION ACQUISITION... Are Blind or Severely Disabled 8.705-3 Allocation process. (a) When the direct order process has...

  7. Millimeter-wave imaging for concealed weapon detection

    NASA Astrophysics Data System (ADS)

    McMakin, Douglas L.; Sheen, David M.; Hall, Thomas E.

    2003-07-01

    Full body, real-time, millimeter-wave imaging systems have been developed at the Pacific Northwest National Laboratory for the detection of body-worn, concealed weapons and contraband at security checkpoints. These security systems employ methods derived from microwave holography techniques that utilize phase and amplitude information recorded over a two-dimensional aperture to reconstruct a focused image of the target. Millimeter-wave imaging is well suited for the detection of concealed weapons or other contraband carried on personnel, since millimeter waves are non-ionizing, readily penetrate common clothing material, and are reflected from the human body and any concealed items. In this paper, wide-bandwidth, three-dimensional, holographic microwave imaging techniques and a full-body, planar, millimeter-wave imaging system are described.

  8. Millimeter-wave imaging for concealed weapon detection

    SciTech Connect

    McMakin, Douglas L.; Sheen, David M.; Hall, Thomas E.

    2003-07-16

    Full-body, real-time, millimeter-wave imaging systems have been developed at the Pacific Northwest National Laboratory for the detection of body-worn, concealed weapons and contraband at security checkpoints. These security systems employ methods derived from microwave holography techniques that utilize phase and amplitude information recorded over a two-dimensional aperture to reconstruct a focused image of the target. Millimeter-wave imaging is well suited for the detection of concealed weapons or other contraband carried on personnel, since millimeter waves are non-ionizing, readily penetrate common clothing material, and are reflected from the human body and any concealed items. In this paper, wide-bandwidth, three-dimensional, holographic microwave imaging techniques and a full-body, planar, millimeter-wave imaging system are described.

  9. Pigmented concealing powders for the hair loss patient.

    PubMed

    Cossman, Jack P; Ladizinski, Barry; Lee, Kachiu C

    2013-12-01

    Patients suffering from alopecia may experience low self-esteem, low self-image, and other psychological consequences. While medical and surgical options for treating hair loss exist, these may be prohibitively expensive or have an unpredictable outcome. In lieu of or in addition to therapeutic approaches, cosmetic options have long been an approach to hair loss. However, patients and clinicians alike often regard cosmetic options to be limited to hairstyling and hairpieces, unaware that newer options, namely pigmented concealing powders, may offer a more practical and seemingly natural camouflage. This article introduces the clinician to concealing powders as a viable option for the hair loss patient. PMID:24305431

  10. Cylindrical millimeter-wave imaging technique for concealed weapon detection

    NASA Astrophysics Data System (ADS)

    Sheen, David M.; McMakin, Douglas L.; Hall, Thomas E.

    1998-03-01

    A novel cylindrical millimeter-wave imaging technique has been developed at the Pacific Northwest National Laboratory for the detection of metallic and non-metallic concealed weapons. This technique uses a vertical array of millimeter- wave antennas which is mechanically swept around a person in a cylindrical fashion. The wideband millimeter-wave data is mathematically reconstructed into a series of high- resolution images of the person being screened. Clothing is relatively transparent to millimeter-wave illumination,whereas the human body and concealed items are reflective at millimeter wavelengths. Differences in shape and reflectivity are revealed in the images and allow a human operator to detect and identify concealed weapons. A full 360 degree scan is necessary to fully inspect a person for concealed items. The millimeter-wave images can be formed into a video animation sequence in which the person appears to rotate in front of a fixed illumination source.This is s convenient method for presenting the 3D image data for analysis. This work has been fully sponsored by the FAA. An engineering prototype based on the cylindrical imaging technique is presently under development. The FAA is currently opposed to presenting the image data directly to the operator due to personal privacy concerns. A computer automated system is desired to address this problem by eliminating operator viewing of the imagery.

  11. Cycles of abuse nurtured by concealment: a clinical report.

    PubMed

    Wijma, Barbro; Thapar-Björkert, Suruchi; Hammarström, Nevija Cah; Swahnberg, Katarina

    2007-09-01

    At present, health care staff do not seem to have sufficient knowledge about their patients' abusive experiences. The aim of the present study is to analyze and discuss what the implications might be for the encounter between patients and health care professionals, when experiences of abuse are concealed. The methodology of this article is varied: a personal narrative, medical records, sociological theoretical literature and empirical evidence. From the narrative we learn that concealment of abuse was devastating for the patient. She was "treated" in vain as a correct diagnosis was not made, while abuse by her father continued. Health care staff also violated her, which she told her therapist, but her protests were not acknowledged. Ten years of treatment thus made her even more sick. This case story focuses on the mechanisms which nurture concealment of a patient's history of abuse, such as structural and symbolic violence. We also suggest ways to break "cycles of abuse". Help the patient to stop concealing also means that she/he leaves a victim role, gets in charge of the situation and takes a first step towards empowerment. In this way, health care settings can become enabling and empowering environments. PMID:17577758

  12. Do Children Understand That People Selectively Conceal or Express Emotion?

    ERIC Educational Resources Information Center

    Hayashi, Hajimu; Shiomi, Yuki

    2015-01-01

    This study examined whether children understand that people selectively conceal or express emotion depending upon the context. We prepared two contexts for a verbal display task for 70 first-graders, 80 third-graders, 64 fifth-graders, and 71 adults. In both contexts, protagonists had negative feelings because of the behavior of the other…

  13. Detection of concealed and buried chemicals by using multifrequency excitations

    SciTech Connect

    Gao Yaohui; Chen, Meng-Ku; Yang, Chia-En; Chang, Yun-Ching; Yao, Jim; Cheng Jiping; Yin, Stuart; Hui Rongqing; Ruffin, Paul; Brantley, Christina; Edwards, Eugene; Luo, Claire

    2010-08-15

    In this paper, we present a new type of concealed and buried chemical detection system by stimulating and enhancing spectroscopic signatures with multifrequency excitations, which includes a low frequency gradient dc electric field, a high frequency microwave field, and higher frequency infrared (IR) radiations. Each excitation frequency plays a unique role. The microwave, which can penetrate into the underground and/or pass through the dielectric covers with low attenuation, could effectively transform its energy into the concealed and buried chemicals and increases its evaporation rate from the sample source. Subsequently, a gradient dc electric field, generated by a Van De Graaff generator, not only serves as a vapor accelerator for efficiently expediting the transportation process of the vapor release from the concealed and buried chemicals but also acts as a vapor concentrator for increasing the chemical concentrations in the detection area, which enables the trace level chemical detection. Finally, the stimulated and enhanced vapors on the surface are detected by the IR spectroscopic fingerprints. Our theoretical and experimental results demonstrate that more than sixfold increase in detection signal can be achieved by using this proposed technology. The proposed technology can also be used for standoff detection of concealed and buried chemicals by adding the remote IR and/or thermal spectroscopic and imaging detection systems.

  14. Adolescent disclosure and concealment: longitudinal and concurrent associations with aggression.

    PubMed

    Leavitt, Chelom E; Nelson, David A; Coyne, Sarah M; Hart, Craig H

    2013-01-01

    This longitudinal study assessed the association between prior (preschool) and concurrent physical and relational aggression as they relate to Russian adolescents' disclosure and concealment patterns with their parents. In the initial preschool study, there were 106 boys and 106 girls (mean age = 60.24 months, SD = 7.81). Both peer nominations and teacher ratings of aggression were obtained for these children. Ten years later, the majority of these children (72.2%; n = 153) completed a longitudinal follow-up battery of assessments. Included in these measures was a self-reported measure of aggression as well as an assessment of the extent to which these adolescents disclosed to and concealed information from their parents. Separate models were estimated by gender of child for the 153 children who participated in both Time 1 and Time 2 data collections. Preschool physical aggression proved an important longitudinal predictor of adolescent disclosure and concealment for girls. Concurrently, self-rated relational aggression was also significantly associated with concealment for both boys and girls. PMID:23720152

  15. Detecting concealed information using functional near-infrared spectroscopy.

    PubMed

    Sai, Liyang; Zhou, Xiaomei; Ding, Xiao Pan; Fu, Genyue; Sang, Biao

    2014-09-01

    The present study focused on the potential application of fNIRS in the detection of concealed information. Participants either committed a mock crime or not and then were presented with a randomized series of probes (crime-related information) and irrelevants (crime-irrelevant information) in a standard concealed information test (CIT). Participants in the guilty group were instructed to conceal crime-related information they obtained from the mock crime, thus making deceptive response to the probes. Meanwhile, their brain activity to probes and irrelevants was recorded by functional near-infrared spectroscopy (fNIRS). At the group level, we found that probe items were associated with longer reaction times and greater activity in bilateral dorsolateral prefrontal cortex and supplementary motor cortex than irrelevant items in the guilty group, but not in the innocent group. These findings provided evidence on neural correlates of recognition during a CIT. Finally, on the basis of the activity in bilateral dorsolateral prefrontal cortex and supplementary motor cortex, the correct classification of guilty versus innocent participants was approximately 75 % and the combination of fNIRS and reaction time measures yielded a better classification rate of 83.3 %. These findings illustrate the feasibility and promise of using fNIRS to detect concealed information. PMID:24514911

  16. Blindness Clues

    ERIC Educational Resources Information Center

    Science Teacher, 2005

    2005-01-01

    Age-related macular degeneration is the leading cause of blindness in older adults, yet researchers are still in the dark about many of the factors that cause this incurable disease. But new insight from University of Florida (UF) and German researchers about a genetic link between rhesus monkeys with macular degeneration and humans could unlock…

  17. Quantum Image Steganography and Steganalysis Based On LSQu-Blocks Image Information Concealing Algorithm

    NASA Astrophysics Data System (ADS)

    A. AL-Salhi, Yahya E.; Lu, Songfeng

    2016-04-01

    Quantum steganography can solve some problems that are considered inefficient in image information concealing. It researches on Quantum image information concealing to have been widely exploited in recent years. Quantum image information concealing can be categorized into quantum image digital blocking, quantum image stereography, anonymity and other branches. Least significant bit (LSB) information concealing plays vital roles in the classical world because many image information concealing algorithms are designed based on it. Firstly, based on the novel enhanced quantum representation (NEQR), image uniform blocks clustering around the concrete the least significant Qu-block (LSQB) information concealing algorithm for quantum image steganography is presented. Secondly, a clustering algorithm is proposed to optimize the concealment of important data. Finally, we used Con-Steg algorithm to conceal the clustered image blocks. Information concealing located on the Fourier domain of an image can achieve the security of image information, thus we further discuss the Fourier domain LSQu-block information concealing algorithm for quantum image based on Quantum Fourier Transforms. In our algorithms, the corresponding unitary Transformations are designed to realize the aim of concealing the secret information to the least significant Qu-block representing color of the quantum cover image. Finally, the procedures of extracting the secret information are illustrated. Quantum image LSQu-block image information concealing algorithm can be applied in many fields according to different needs.

  18. Quantum Image Steganography and Steganalysis Based On LSQu-Blocks Image Information Concealing Algorithm

    NASA Astrophysics Data System (ADS)

    A. AL-Salhi, Yahya E.; Lu, Songfeng

    2016-08-01

    Quantum steganography can solve some problems that are considered inefficient in image information concealing. It researches on Quantum image information concealing to have been widely exploited in recent years. Quantum image information concealing can be categorized into quantum image digital blocking, quantum image stereography, anonymity and other branches. Least significant bit (LSB) information concealing plays vital roles in the classical world because many image information concealing algorithms are designed based on it. Firstly, based on the novel enhanced quantum representation (NEQR), image uniform blocks clustering around the concrete the least significant Qu-block (LSQB) information concealing algorithm for quantum image steganography is presented. Secondly, a clustering algorithm is proposed to optimize the concealment of important data. Finally, we used Con-Steg algorithm to conceal the clustered image blocks. Information concealing located on the Fourier domain of an image can achieve the security of image information, thus we further discuss the Fourier domain LSQu-block information concealing algorithm for quantum image based on Quantum Fourier Transforms. In our algorithms, the corresponding unitary Transformations are designed to realize the aim of concealing the secret information to the least significant Qu-block representing color of the quantum cover image. Finally, the procedures of extracting the secret information are illustrated. Quantum image LSQu-block image information concealing algorithm can be applied in many fields according to different needs.

  19. Campaign for Right to Carry Concealed Guns on Campuses Gains Traction

    ERIC Educational Resources Information Center

    Wiseman, Rachel

    2012-01-01

    Five years after the Virginia Tech massacre prompted a student in Texas to start a Facebook page in favor of the right to carry concealed weapons on college campuses, the resulting group, Students for Concealed Carry, has advanced its cause. In more than a dozen states, legislation has been introduced to allow the carrying of concealed firearms on…

  20. Could plate tectonics on Venus be concealed by volcanic deposits

    NASA Technical Reports Server (NTRS)

    Kaula, W. M.; Muradian, L. M.

    1982-01-01

    The present investigation is supplementary to a study reported by Kaula and Phillips (1981). From an analysis of Pioneer Venus altimetry, Kaula and Phillips had inferred that any heat loss from the planet by plate tectonics must be small compared to that from the earth. However, it has been suggested by others that plate tectonic may exist on Venus, but that the expected 'square root of s' dependence of the topographic drop off is not observed because it is concealed by lava flows. The present investigation has the objective to conduct an examination whether this suggestion of concealment by lava flow is correct. On the basis of the performed analysis, it is concluded that the results obtained by Kaula and Phillips appear to be well justified.

  1. ID-Check: Online Concealed Information Test Reveals True Identity.

    PubMed

    Verschuere, Bruno; Kleinberg, Bennett

    2016-01-01

    The Internet has already changed people's lives considerably and is likely to drastically change forensic research. We developed a web-based test to reveal concealed autobiographical information. Initial studies identified a number of conditions that affect diagnostic efficiency. By combining these moderators, this study investigated the full potential of the online ID-check. Participants (n = 101) tried to hide their identity and claimed a false identity in a reaction time-based Concealed Information Test. Half of the participants were presented with personal details (e.g., first name, last name, birthday), whereas the others only saw irrelevant details. Results showed that participants' true identity could be detected with high accuracy (AUC = 0.98; overall accuracy: 86-94%). Online memory detection can reliably and validly detect whether someone is hiding their true identity. This suggests that online memory detection might become a valuable tool for forensic applications. PMID:26390033

  2. Content-based retransmission with error concealment for astronomical images

    NASA Astrophysics Data System (ADS)

    Thienphrapa, Paul; Boussalis, Helen; Liu, Charles; Rad, Khosrow; Dong, Jane

    2005-10-01

    The James Webb Space Telescope (JWST) is expected to produce a vast amount of images that are valuable for astronomical research and education. To support research activities related to JWST mission, NASA has provided funds to establish the Structures Pointing and Control Engineering (SPACE) Laboratory at the California State University, Los Angeles (CSULA). One of the research activities in SPACE lab is to design an effective and efficient transmission system to disseminate JWST images across the Internet. This paper presents a prioritized transmission method to provide the best quality of the transferred image based on the joint-optimization of content-based retransmission and error concealment. First, the astronomical image is compressed using a scalable wavelet-based approach, then packetized into independently decodable packets. To facilitate the joint-optimization of two mutually dependent error control methods, a novel content index is declared to represent the significance of the packet content as well as its importance in error concealment. Based on the defined content index, the optimal retransmission schedule is determined to maximize the quality of the received image under delay constraint with the given error concealment method. Experimental results demonstrate that the proposed approach is very effective to combat the packet loss during transmission to achieve a desirable quality of the received astronomical images.

  3. Biomedical psychiatry and its concealed metaphors: an anthropological perspective.

    PubMed

    Martínez-Hernáez, Angel

    2013-09-01

    The idea that power relations structure social life is self-evident to most anthropologists. Western medical knowledge or biomedicine, and by extension science or scientific knowledge, however, has until relatively recently been exempt from anthropological scrutiny in political terms. An understanding of biomedicine as a system of knowledge that is not a copy of facts but a representation of them has entailed a break with the traditional separation of folk knowledge and scientific knowledge in anthropology, making it possible to include biomedicine in the repertoire of ethnographic objects. The peculiarity of biomedicine as a cultural system, seen from this perspective, lies in a paradox: its self-characterization as a set of non-ideological discourses and practices is a representation that conceals its ideological and power-saturated nature. Through an analysis of DSM-IV-TR, this article explores some of the representational strategies through which this concealment takes place in biomedical psychiatry: the asocial and universal character of mental illness categories; the neutrality of clinical practice; and the non-moral nature of clinical criteria and judgment. These are concealed metaphors in the true sense, for not only do they speak of something without naming it but they also deny their own existence as metaphors. PMID:24308254

  4. Computer Processor Allocator

    2004-03-01

    The Compute Processor Allocator (CPA) provides an efficient and reliable mechanism for managing and allotting processors in a massively parallel (MP) computer. It maintains information in a database on the health. configuration and allocation of each processor. This persistent information is factored in to each allocation decision. The CPA runs in a distributed fashion to avoid a single point of failure.

  5. Concealed weapons detection using low-frequency magnetic imaging

    NASA Astrophysics Data System (ADS)

    Zollars, Byron G.; Sallee, Bradley; Durrett, Michael G.; Cruce, Clay; Hallidy, William

    1997-02-01

    Military personnel, law-enforcement officers, and civilians face ever-increasing dangers from persons carrying concealed handguns and other weapons. In direct correspondence with this danger is a need for more sophisticated means of detecting concealed weapons. We have developed a novel concealed-weapons detector based on the principle of low- frequency magnetic imaging. The detector is configured as a portal, and constructs an image of electrically conductive objects transported through it with a potential spatial resolution of approximately 1 inch. Measurements on a breadboard version of the weapons detector have, to date, yielded a resolution of 2 inches. In operation, magnetic dipole radiation, emitted by transmitting antennas in the perimeter of the portal, is scattered from conductive objects and is picked up by receive antennas, also positioned around the portal. With sufficient measurements, each with a different geometry, a solution to the inverse scattering problem can be found. The result is an image of conductive objects in the detector. The detector is sensitive to all metals, semiconductors, and conductive composites. The measured conductivity image formed by the detector is combined with the video signal from a visible CCD camera to form a composite image of persons transiting the detector portal and the conductive objects they are carrying. Accompanying image recognition software could be used to determine the threat level of objects based upon shape, conductivity, and placement on the person of the carrier, and provide cueing, logging, or alarm functions to the operator if suspect weapons are identified. The low- power, low-frequency emissions from the detector are at levels considered safe to humans and medical implants..

  6. [Effects of false memories on the Concealed Information Test].

    PubMed

    Zaitsu, Wataru

    2012-10-01

    The effects of false memories on polygraph examinations with the Concealed Information Test (CIT) were investigated by using the Deese-Roediger-McDermott (DRM) paradigm, which allows participants to evoke false memories. Physiological responses to questions consisting of learned, lure, and unlearned items were measured and recorded. The results indicated that responses to lure questions showed critical responses to questions about learned items. These responses included repression of respiration, an increase in electrodermal activity, and a drop in heart rate. These results suggest that critical response patterns are generated in the peripheral nervous system by true and false memories. PMID:23214081

  7. Advanced terahertz imaging system performance model for concealed weapon identification

    NASA Astrophysics Data System (ADS)

    Murrill, Steven R.; Redman, Brian; Espinola, Richard L.; Franck, Charmaine C.; Petkie, Douglas T.; De Lucia, Frank C.; Jacobs, Eddie L.; Griffin, Steven T.; Halford, Carl E.; Reynolds, Joe

    2007-04-01

    The U.S. Army Night Vision and Electronic Sensors Directorate (NVESD) and the U.S. Army Research Laboratory (ARL) have developed a terahertz-band imaging system performance model for detection and identification of concealed weaponry. The details of this MATLAB-based model which accounts for the effects of all critical sensor and display components, and for the effects of atmospheric attenuation, concealment material attenuation, and active illumination, were reported on at the 2005 SPIE Europe Security and Defence Symposium. The focus of this paper is to report on recent advances to the base model which have been designed to more realistically account for the dramatic impact that target and background orientation can have on target observability as related to specular and Lambertian reflections captured by an active-illumination-based imaging system. The advanced terahertz-band imaging system performance model now also accounts for target and background thermal emission, and has been recast into a user-friendly, Windows-executable tool. This advanced THz model has been developed in support of the Defense Advanced Research Project Agency's (DARPA) Terahertz Imaging Focal-Plane Technology (TIFT) program. This paper will describe the advanced THz model and its new radiometric sub-model in detail, and provide modeling and experimental results on target observability as a function of target and background orientation.

  8. Terahertz imaging system performance model for concealed-weapon identification

    NASA Astrophysics Data System (ADS)

    Murrill, Steven R.; Jacobs, Eddie L.; Moyer, Steven K.; Halford, Carl E.; Griffin, Steven T.; De Lucia, Frank C.; Petkie, Douglas T.; Franck, Charmaine C.

    2008-03-01

    The U.S. Army Night Vision and Electronic Sensors Directorate (NVESD) and the U.S. Army Research Laboratory have developed a terahertz (THz) -band imaging system performance model for detection and identification of concealed weaponry. The MATLAB-based model accounts for the effects of all critical sensor and display components and for the effects of atmospheric attenuation, concealment material attenuation, and active illumination. The model is based on recent U.S. Army NVESD sensor performance modeling technology that couples system design parameters to observer-sensor field performance by using the acquire methodology for weapon identification performance predictions. This THz model has been developed in support of the Defense Advanced Research Project Agencies' Terahertz Imaging Focal-Plane Technology (TIFT) program and is currently being used to guide the design and development of a 0.650 THz active-passive imaging system. This paper will describe the THz model in detail, provide and discuss initial modeling results for a prototype THz imaging system, and outline plans to calibrate and validate the model through human perception testing.

  9. Terahertz imaging system performance model for concealed-weapon identification.

    PubMed

    Murrill, Steven R; Jacobs, Eddie L; Moyer, Steven K; Halford, Carl E; Griffin, Steven T; De Lucia, Frank C; Petkie, Douglas T; Franck, Charmaine C

    2008-03-20

    The U.S. Army Night Vision and Electronic Sensors Directorate (NVESD) and the U.S. Army Research Laboratory have developed a terahertz (THz) -band imaging system performance model for detection and identification of concealed weaponry. The MATLAB-based model accounts for the effects of all critical sensor and display components and for the effects of atmospheric attenuation, concealment material attenuation, and active illumination. The model is based on recent U.S. Army NVESD sensor performance modeling technology that couples system design parameters to observer-sensor field performance by using the acquire methodology for weapon identification performance predictions. This THz model has been developed in support of the Defense Advanced Research Project Agencies' Terahertz Imaging Focal-Plane Technology (TIFT) program and is currently being used to guide the design and development of a 0.650 THz active-passive imaging system. This paper will describe the THz model in detail, provide and discuss initial modeling results for a prototype THz imaging system, and outline plans to calibrate and validate the model through human perception testing. PMID:18709076

  10. Separating deceptive and orienting components in a Concealed Information Test.

    PubMed

    Ambach, Wolfgang; Stark, Rudolf; Peper, Martin; Vaitl, Dieter

    2008-11-01

    The Concealed Information Test (CIT) requires the examinee to deceptively deny recognition of known stimuli and to truthfully deny recognition of unknown stimuli. Because deception and orienting are typically coupled, it is unclear how exactly these sub-processes affect the physiological responses measured in the CIT. The present study aimed at separating the effects of deception from those of orienting. In a mock-crime study, using a modified CIT, thirty-six of seventy-two subjects answered truthfully ('truth group'), whereas the other thirty-six concealed their knowledge ('lie group'). Answering was delayed for 4 s after item presentation. Electrodermal activity (EDA), respiration (RLL), and phasic heart rate (HR) were recorded. A decomposition of EDA responses revealed two response components; the response in the first interval was expected to indicate orienting, stimulus evaluation, and answer preparation, whereas the response in the second interval was assumed to reflect answer-related processes. Inconclusively, both EDA components differentiated between 'probe' and 'irrelevant' items in both groups. Phasic HR and RLL differed between item classes only in the 'lie' group, thus reflecting answer-related processes, possibly deception, rather than merely orienting responses. The findings further support the notion that psychophysiological measures elicited by a modified CIT may reflect different mental processes involved in orienting and deception. PMID:18674573

  11. Skin conductance as an indicator of anticipated concealed knowledge.

    PubMed

    Hu, Senqi; Huang, Hsin-Yu; McGovern, Jamie L; Jacobs, David A

    2008-06-01

    The present study investigated the effects of anticipation on skin conductance while participants were answering a set of questions which included one of concealed knowledge. Two experiments were conducted. In Exp. 1, 26 participants completed one experimental session. Each participant was asked to choose one two-digit number from 10 to 99 and was presented 19 other randomly generated two-digit numbers. The list of numbers was then presented to the participant on a computer screen, with a 60-sec. interval occurring every two questions. The participant-selected number was defined as the target question which was randomly placed within the 4th to 17th item of 20 questions stated as follows: "Is your selected number?" The participant was asked to answer "No" to all questions. The skin-conductance response to each question was measured. In Exp. 2, the experimental procedure was the same as that in Exp. 1 except each participant first answered 10 nontarget questions, then answered a target question with the participant's selected number, and then answered another 10 nontarget questions. There were a total of 21 questions. Analysis indicated participants in both experiments generated the highest mean skin conductance while answering the target questions, followed by lower amplitudes to questions prior to and after the target question. The skin-conductance response pattern can be used to identify the psychological process of anticipation of concealed information. PMID:18763466

  12. Concealed target detection using augmented reality with SIRE radar

    NASA Astrophysics Data System (ADS)

    Saponaro, Philip; Kambhamettu, Chandra; Ranney, Kenneth; Sullivan, Anders

    2013-05-01

    The Synchronous Impulse Reconstruction (SIRE) forward-looking radar, developed by the U.S. Army Research Laboratory (ARL), can detect concealed targets using ultra-wideband synthetic aperture technology. The SIRE radar has been mounted on a Ford Expedition and combined with other sensors, including a pan/tilt/zoom camera, to test its capabilities of concealed target detection in a realistic environment. Augmented Reality (AR) can be used to combine the SIRE radar image with the live camera stream into one view, which provides the user with information that is quicker to assess and easier to understand than each separated. In this paper we present an AR system which utilizes a global positioning system (GPS) and inertial measurement unit (IMU) to overlay a SIRE radar image onto a live video stream. We describe a method for transforming 3D world points in the UTM coordinate system onto the video stream by calibrating for the intrinsic parameters of the camera. This calibration is performed offline to save computation time and achieve real time performance. Since the intrinsic parameters are affected by the zoom of the camera, we calibrate at eleven different zooms and interpolate. We show the results of a real time transformation of the SAR imagery onto the video stream. Finally, we quantify both the 2D error and 3D residue associated with our transformation and show that the amount of error is reasonable for our application.

  13. Target Speaker Detection with Concealed EEG Around the Ear

    PubMed Central

    Mirkovic, Bojana; Bleichner, Martin G.; De Vos, Maarten; Debener, Stefan

    2016-01-01

    Target speaker identification is essential for speech enhancement algorithms in assistive devices aimed toward helping the hearing impaired. Several recent studies have reported that target speaker identification is possible through electroencephalography (EEG) recordings. If the EEG system could be reduced to acceptable size while retaining the signal quality, hearing aids could benefit from the integration with concealed EEG. To compare the performance of a multichannel around-the-ear EEG system with high-density cap EEG recordings an envelope tracking algorithm was applied in a competitive speaker paradigm. The data from 20 normal hearing listeners were concurrently collected from the traditional state-of-the-art laboratory wired EEG system and a wireless mobile EEG system with two bilaterally-placed around-the-ear electrode arrays (cEEGrids). The results show that the cEEGrid ear-EEG technology captured neural signals that allowed the identification of the attended speaker above chance-level, with 69.3% accuracy, while cap-EEG signals resulted in the accuracy of 84.8%. Further analyses investigated the influence of ear-EEG signal quality and revealed that the envelope tracking procedure was unaffected by variability in channel impedances. We conclude that the quality of concealed ear-EEG recordings as acquired with the cEEGrid array has potential to be used in the brain-computer interface steering of hearing aids. PMID:27512364

  14. Active millimeter wave detection of concealed layers of dielectric material

    NASA Astrophysics Data System (ADS)

    Bowring, N. J.; Baker, J. G.; Rezgui, N. D.; Southgate, M.; Alder, J. F.

    2007-04-01

    Extensive work has been published on millimetre wave active and passive detection and imaging of metallic objects concealed under clothing. We propose and demonstrate a technique for revealing the depth as well as the outline of partially transparent objects, which is especially suited to imaging layer materials such as explosives and drugs. The technique uses a focussed and scanned FMCW source, swept through many GHz to reveal this structure. The principle involved is that a parallel sided dielectric slab produces reflections at both its upper and lower surfaces, acting as a Fabry-Perot interferometer. This produces a pattern of alternating reflected peaks and troughs in frequency space. Fourier or Burg transforming this pattern into z-space generates a peak at the thickness of the irradiated sample. It could be argued that though such a technique may work for single uniform slabs of dielectric material, it will give results of little or no significance when the sample both scatters the incident radiation and gives erratic reflectivities due to its non-uniform thickness and permittivity . We show results for a variety of materials such as explosive simulants, powder and drugs, both alone and concealed under clothing or in a rucksack, which display strongly directional reflectivities at millimeter wavelengths, and whose location is well displayed by a varying thickness parameter as the millimetre beam is scanned across the target. With this system we find that samples can easily be detected at standoff distances of at least 4.6m.

  15. Terahertz imaging system performance model for concealed weapon identification

    NASA Astrophysics Data System (ADS)

    Murrill, Steven R.; Jacobs, Eddie L.; Moyer, Steven K.; Halford, Carl E.; Griffin, Steven T.; De Lucia, Frank C.; Petkie, Douglas T.; Franck, Charmaine C.

    2005-11-01

    The U.S. Army Night Vision and Electronic Sensors Directorate and the U.S. Army Research Laboratory have developed a terahertz-band imaging system performance model for detection and identification of concealed weaponry. The MATLAB-based model accounts for the effects of all critical sensor and display components, and for the effects of atmospheric attenuation, concealment material attenuation, and active illumination. The model is based on recent U.S. Army NVESD sensor performance models that couple system design parameters to observer-sensor field performance using the acquire methodology for weapon identification performance predictions. This THz model has been developed in support of the Defense Advanced Research Project Agencies' Terahertz Imaging Focal-Plane-Array Technology (TIFT) program and is presently being used to guide the design and development of a 0.650 THz active/passive imaging system. This paper will describe the THz model in detail, provide and discuss initial modeling results for a prototype THz imaging system, and outline plans to validate and calibrate the model through human perception testing.

  16. JPEG2000-coded image error concealment exploiting convex sets projections.

    PubMed

    Atzori, Luigi; Ginesu, Giaime; Raccis, Alessio

    2005-04-01

    Transmission errors in JPEG2000 can be grouped into three main classes, depending on the affected area: LL, high frequencies at the lower decomposition levels, and high frequencies at the higher decomposition levels. The first type of errors are the most annoying but can be concealed exploiting the signal spatial correlation like in a number of techniques proposed in the past; the second are less annoying but more difficult to address; the latter are often imperceptible. In this paper, we address the problem of concealing the second class or errors when high bit-planes are damaged by proposing a new approach based on the theory of projections onto convex sets. Accordingly, the error effects are masked by iteratively applying two procedures: low-pass (LP) filtering in the spatial domain and restoration of the uncorrupted wavelet coefficients in the transform domain. It has been observed that a uniform LP filtering brought to some undesired side effects that negatively compensated the advantages. This problem has been overcome by applying an adaptive solution, which exploits an edge map to choose the optimal filter mask size. Simulation results demonstrated the efficiency of the proposed approach. PMID:15825483

  17. Pulsed neutron interrogation for detection of concealed special nuclear materials

    NASA Astrophysics Data System (ADS)

    Ruddy, Frank; Seidel, John; Flammang, Robert; Petrović, Bojan; Dulloo, Abdul; Congedo, Thomas

    2006-05-01

    A new neutron interrogation technique for detection of concealed Special Nuclear Material (SNM) is described. This technique is a combination of timing techniques from pulsed prompt gamma neutron activation analysis with silicon carbide (SiC) semiconductor fast neutron detector technology. SiC detectors are a new class of radiation detectors that are ultra-fast and capable of processing high count rates. SiC detectors can operate during and within nanoseconds of the end of an intense neutron pulse, providing the ability to detect the prompt neutron emissions from fission events produced by the neutrons in concealed SNM on a much faster pulsing time scale than has been achieved by other techniques. Neutron-induced fission neutrons in 235U have been observed in the time intervals between pulses of 14-MeV neutrons from a deuterium-tritium electronic neutron generator. Initial measurements have emphasized the detection of SNM using thermal-neutron induced fission. Neutron pulsing and time-sequenced neutron counts were carried out on a hundreds of microseconds time scale, enabling the observation of prompt fission neutrons induced by the die-away of thermal neutrons following the 14-MeV pulse. A discussion of pulsed prompt-neutron measurements and of SiC detectors as well as initial measurement results will be presented.

  18. 3D laser imaging for concealed object identification

    NASA Astrophysics Data System (ADS)

    Berechet, Ion; Berginc, Gérard; Berechet, Stefan

    2014-09-01

    This paper deals with new optical non-conventional 3D laser imaging. Optical non-conventional imaging explores the advantages of laser imaging to form a three-dimensional image of the scene. 3D laser imaging can be used for threedimensional medical imaging, topography, surveillance, robotic vision because of ability to detect and recognize objects. In this paper, we present a 3D laser imaging for concealed object identification. The objective of this new 3D laser imaging is to provide the user a complete 3D reconstruction of the concealed object from available 2D data limited in number and with low representativeness. The 2D laser data used in this paper come from simulations that are based on the calculation of the laser interactions with the different interfaces of the scene of interest and from experimental results. We show the global 3D reconstruction procedures capable to separate objects from foliage and reconstruct a threedimensional image of the considered object. In this paper, we present examples of reconstruction and completion of three-dimensional images and we analyse the different parameters of the identification process such as resolution, the scenario of camouflage, noise impact and lacunarity degree.

  19. Target Speaker Detection with Concealed EEG Around the Ear.

    PubMed

    Mirkovic, Bojana; Bleichner, Martin G; De Vos, Maarten; Debener, Stefan

    2016-01-01

    Target speaker identification is essential for speech enhancement algorithms in assistive devices aimed toward helping the hearing impaired. Several recent studies have reported that target speaker identification is possible through electroencephalography (EEG) recordings. If the EEG system could be reduced to acceptable size while retaining the signal quality, hearing aids could benefit from the integration with concealed EEG. To compare the performance of a multichannel around-the-ear EEG system with high-density cap EEG recordings an envelope tracking algorithm was applied in a competitive speaker paradigm. The data from 20 normal hearing listeners were concurrently collected from the traditional state-of-the-art laboratory wired EEG system and a wireless mobile EEG system with two bilaterally-placed around-the-ear electrode arrays (cEEGrids). The results show that the cEEGrid ear-EEG technology captured neural signals that allowed the identification of the attended speaker above chance-level, with 69.3% accuracy, while cap-EEG signals resulted in the accuracy of 84.8%. Further analyses investigated the influence of ear-EEG signal quality and revealed that the envelope tracking procedure was unaffected by variability in channel impedances. We conclude that the quality of concealed ear-EEG recordings as acquired with the cEEGrid array has potential to be used in the brain-computer interface steering of hearing aids. PMID:27512364

  20. Passive millimeter-wave imaging for concealed article detection

    NASA Astrophysics Data System (ADS)

    Lovberg, John A.; Galliano, Joseph A., Jr.; Clark, Stuart E.

    1997-02-01

    Passive-millimeter-wave imaging (PMI) provides a powerful sensing tool for law enforcement, allowing an unobtrusive means for detecting concealed weapons, explosives, or contraband on persons or in baggage. Natural thermal emissions at millimeter wavelengths from bodies, guns, explosives, and other articles pass easily through clothing or other concealment materials, where they can be detected and converted into conventional 2-dimensional images. A new implementation of PMI has demonstrated a large-area, near- real-time staring capability for personnel inspection at standoff ranges of greater than 10 meters. In this form, PMI does not require operator cuing based on subjective 'profiles' of suspicious appearance or behaviors, which may otherwise be construed as violations of civil rights. To the contrary, PMI detects and images heat generated by any object with no predisposition as to its nature or function (e.g. race or gender of humans). As a totally passive imaging tool, it generates no radio-frequency or other radiation which might raise public health concerns. Specifics of the new PMI architecture are presented along with a host of imaging data representing the current state- of-the-art.

  1. Concealed Threat Detection at Multiple Frames-per-second

    SciTech Connect

    Chang, J T

    2005-11-08

    In this LDRD project, our research purpose is to investigate the science and technology necessary to enable real-time array imaging as a rapid way to detect hidden threats through obscurants such as smoke, fog, walls, doors, and clothing. The goal of this research is to augment the capabilities of protective forces in concealed threat detection. In the current context, threats include people as well as weapons. In most cases, security personnel must make very fast assessments of a threat based upon limited amount of data. Among other attributes, UWB has been shown and quantified to penetrate and propagate through many materials (wood, some concretes, non-metallic building materials, some soils, etc.) while maintaining high range resolution. We have build collaborations with university partners and government agencies. We have considered the impact of psychometrics on target recognition and identification. Specifically we have formulated images in real-time that will engage the user's vision system in a more active way to enhance image interpretation capabilities. In this project, we are researching the use of real time (field programmable gate arrays) integrated with high resolution (cm scale), ultra wide band (UWB) electromagnetic signals for imaging personnel through smoke and walls. We evaluated the ability of real-time UWB imaging for detecting smaller objects, such as concealed weapons that are carried by the obscured personnel. We also examined the cognitive interpretation process of real time UWB electromagnetic images.

  2. When Concealed Handgun Licensees Break Bad: Criminal Convictions of Concealed Handgun Licensees in Texas, 2001–2009

    PubMed Central

    Nwaiwu, Obioma; McMaughan Moudouni, Darcy K.; Edwards, Rachel; Lin, Szu-hsuan

    2013-01-01

    Objectives. We explored differences in criminal convictions between holders and nonholders of a concealed handgun license (CHL) in Texas. Methods. The Texas Department of Public Safety (DPS) provides annual data on criminal convictions of holders and nonholders of CHLs. We used 2001 to 2009 DPS data to investigate the differences in the distribution of convictions for these 2 groups across 9 types of criminal offenses. We calculated z scores for the differences in the types of crimes for which CHL holders and nonholders were convicted. Results. CHL holders were much less likely than nonlicensees to be convicted of crimes. Most nonholder convictions involved higher-prevalence crimes (burglary, robbery, or simple assault). CHL holders’ convictions were more likely to involve lower-prevalence crimes, such as sexual offenses, gun offenses, or offenses involving a death. Conclusions. Our results imply that expanding the settings in which concealed carry is permitted may increase the risk of specific types of crimes, some quite serious in those settings. These increased risks may be relatively small. Nonetheless, policymakers should consider these risks when contemplating reducing the scope of gun-free zones. PMID:23153139

  3. 27 CFR 447.62 - False statements or concealment of facts.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO... IMPLEMENTS OF WAR Penalties, Seizures and Forfeitures § 447.62 False statements or concealment of facts. Any... fact or fails to state a material fact required to be stated therein or necessary to make...

  4. 27 CFR 447.62 - False statements or concealment of facts.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO... IMPLEMENTS OF WAR Penalties, Seizures and Forfeitures § 447.62 False statements or concealment of facts. Any... fact or fails to state a material fact required to be stated therein or necessary to make...

  5. 27 CFR 447.62 - False statements or concealment of facts.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO... IMPLEMENTS OF WAR Penalties, Seizures and Forfeitures § 447.62 False statements or concealment of facts. Any... fact or fails to state a material fact required to be stated therein or necessary to make...

  6. 27 CFR 447.62 - False statements or concealment of facts.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO... IMPLEMENTS OF WAR Penalties, Seizures and Forfeitures § 447.62 False statements or concealment of facts. Any... fact or fails to state a material fact required to be stated therein or necessary to make...

  7. 27 CFR 447.62 - False statements or concealment of facts.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO... IMPLEMENTS OF WAR Penalties, Seizures and Forfeitures § 447.62 False statements or concealment of facts. Any... fact or fails to state a material fact required to be stated therein or necessary to make...

  8. Can Acupuncture Treatment Be Double-Blinded? An Evaluation of Double-Blind Acupuncture Treatment of Postoperative Pain

    PubMed Central

    Vase, Lene; Baram, Sara; Takakura, Nobuari; Takayama, Miho; Yajima, Hiroyoshi; Kawase, Akiko; Schuster, Lars; Kaptchuk, Ted J.; Schou, Søren; Jensen, Troels Staehelin; Zachariae, Robert; Svensson, Peter

    2015-01-01

    Blinding protects against bias but the success of blinding is seldom assessed and reported in clinical trials including studies of acupuncture where blinding represents a major challenge. Recently, needles with the potential for double-blinding were developed, so we tested if acupuncture can be double-blinded in a randomized study of sixty-seven patients with acute pain ≥ 3 (0-10 scale following third molar removal) who received active acupuncture with a penetrating needle or placebo acupuncture with a non-penetrating needle. To test if acupuncture was administered double-blind, patients and acupuncturists were asked about perceived treatment allocation at the end of the study. To test if there were clues which led to identification of the treatment, deep dull pain associated with needle application and rotation (termed “de qi” in East Asian medicine), and patients’ pain levels were assessed. Perceived treatment allocation depended on actual group allocation (p < 0.015) for both patients and acupuncturists, indicating that the needles were not successful in double-blinding. Up to 68% of patients and 83% of acupuncturists correctly identified the treatment, but for patients the distribution was not far from 50/50. Also, there was a significant interaction between actual or perceived treatment and the experience of de qi (p = 0.027), suggesting that the experience of de qi and possible non-verbal clues contributed to correct identification of the treatment. Yet, of the patients who perceived the treatment as active or placebo, 50% and 23%, respectively, reported de qi. Patients’ acute pain levels did not influence the perceived treatment. In conclusion, acupuncture treatment was not fully double-blinded which is similar to observations in pharmacological studies. Still, the non-penetrating needle is the only needle that allows some degree of practitioner blinding. The study raises questions about alternatives to double-blind randomized clinical trials in

  9. Regulatory focus moderates the social performance of individuals who conceal a stigmatized identity.

    PubMed

    Newheiser, Anna-Kaisa; Barreto, Manuela; Ellemers, Naomi; Derks, Belle; Scheepers, Daan

    2015-12-01

    People often choose to hide a stigmatized identity to avoid bias. However, hiding stigma can disrupt social interactions. We considered whether regulatory focus qualifies the social effects of hiding stigma by examining interactions in which stigmatized participants concealed a devalued identity from non-stigmatized partners. In the Prevention Focus condition, stigmatized participants were instructed to prevent a negative impression by concealing the identity; in the Promotion Focus condition, they were instructed to promote a positive impression by concealing the identity; in the Control condition, they were simply asked to conceal the identity. Both non-stigmatized partners and independent raters rated the interactions more positively in the Promotion Focus condition. Thus, promotion focus is interpersonally beneficial for individuals who conceal a devalued identity. PMID:25780853

  10. Multi-channel millimeter wave image registration and segmentation for concealed object detection

    NASA Astrophysics Data System (ADS)

    Lee, Dong-Su; Yeom, Seokwon; Son, Jung-Young; Kim, Shin-Hwan

    2010-04-01

    We address an image registration and segmentation method to detect concealed objects captured by passive millimeter wave (MMW) imaging. Passive MMW imaging can create interpretable imagery on the objects concealed under clothing. Due to the penetrating property of the MMW imaging, the MMW imaging system is often employed for the security and defense system. In this paper, we utilize a multi-channel PMMW imaging system operating at the 8 mm regime with linear polarization. Image registration and segmentation are performed to detect concealed objects under clothing. The registration is preceded to align different channel images by means of geometric feature extraction and a matching process. The Linde-Buzo-Gray (LBG) vector quantization with multi-channel information is adopted to segment the concealed object from the body area. In the experiment, the automated image registration and segmentation are performed with various concealed objects including a metal axe and a liquid container.

  11. Selection of food patches by sympatric herbivores in response to concealment and distance from a refuge.

    PubMed

    Crowell, Miranda M; Shipley, Lisa A; Camp, Meghan J; Rachlow, Janet L; Forbey, Jennifer S; Johnson, Timothy R

    2016-05-01

    Small herbivores face risks of predation while foraging and are often forced to trade off food quality for safety. Life history, behaviour, and habitat of predator and prey can influence these trade-offs. We compared how two sympatric rabbits (pygmy rabbit, Brachylagus idahoensis; mountain cottontail, Sylvilagus nuttallii) that differ in size, use of burrows, and habitat specialization in the sagebrush-steppe of western North America respond to amount and orientation of concealment cover and proximity to burrow refuges when selecting food patches. We predicted that both rabbit species would prefer food patches that offered greater concealment and food patches that were closer to burrow refuges. However, because pygmy rabbits are small, obligate burrowers that are restricted to sagebrush habitats, we predicted that they would show stronger preferences for greater cover, orientation of concealment, and patches closer to burrow refuges. We offered two food patches to individuals of each species during three experiments that either varied in the amount of concealment cover, orientation of concealment cover, or distance from a burrow refuge. Both species preferred food patches that offered greater concealment, but pygmy rabbits generally preferred terrestrial and mountain cottontails preferred aerial concealment. Only pygmy rabbits preferred food patches closer to their burrow refuge. Different responses to concealment and proximity to burrow refuges by the two species likely reflect differences in perceived predation risks. Because terrestrial predators are able to dig for prey in burrows, animals like pygmy rabbits that rely on burrow refuges might select food patches based more on terrestrial concealment. In contrast, larger habitat generalists that do not rely on burrow refuges, like mountain cottontails, might trade off terrestrial concealment for visibility to detect approaching terrestrial predators. This study suggests that body size and evolutionary adaptations

  12. A Randomised Single-Blinded Controlled Trial on the Effectiveness of Brief Advice on Smoking Cessation among Tertiary Students in Malaysia

    PubMed Central

    De Silva, WDAS; Awang, R; Samsudeen, S; Hanna, F

    2016-01-01

    Introduction Tobacco smoking, a habitual behavior, is addictive and detrimental to health. Quitting requires personal abilities and environmental opportunities and therefore, improving these abilities and opportunities will undoubtedly act on smokers’ motivation to quit. Methods A prospective single-blinded randomized controlled interventional study was conducted among first year undergraduate students in Malaysia. A total of eighty smokers were randomly allocated to a control or intervention groups (40/40). Randomization remained concealed from research personnel. All participants were followed up for six months to evaluate abstinence. Results Quit line enrolment rate of the intervention group was 55% (22) compared to 7.5% (3) in the control (P < 0.001 95% CI 30.1 - 64.9). In the intervention group 27% (6) sustained quitting for six months compared to none in the control group. Conclusion This study has shown that brief advice for smoking cessation is more effective than an information leaflet alone to promote quitting and that to maintain abstinence quit line follow up is necessary. Larger samples size and longer follow up studies are needed to further confirm these findings. PMID:27081575

  13. Incidental radiographic finding of the concealed art of susuk.

    PubMed

    Devang Divakar, Darshan; Mavinapalla, Seema; Al Kheraif, Abdulaziz Abdullah; Ramakrishnaiah, Ravikumar; Abd Rahim, Muhammad Furqon Bin; Khan, Aftab Ahmed

    2016-07-01

    Susuk, or charm needles, are small, metallic needles inserted under the skin, considered to enhance beauty, health and luck. This hidden secret of inserting susuk is a traditional superstitious ritual, widely practiced among women of Southeast Asia. Here, we present an interesting case of incidental radiographic finding of the concealed art of susuk, which was exposed on a panoramic radiograph taken on a routine basis as a part of diagnostic work up at our centre. An orthopantomogram revealed bilateral metallic foreign bodies in the maxillo-facial region. Anamnestic data affirmed the practice of the body art of susuk. The charm needles were present in the orofacial region without the patient experiencing any pathological signs or symptoms. PMID:26271077

  14. Pathways Between Concealable Stigmatized Identities and Substance Misuse

    PubMed Central

    Talley, Amelia E.; Littlefield, Andrew K.

    2015-01-01

    Individuals with concealable stigmatized identities often possess no obviously devalued attributes, yet are at greater risk for problematic substance use compared to their privileged counterparts. We present a conceptual model, which proposes that identity-relevant content and characteristics have important implications for cognitive, affective, and behavioral consequences of stigma-related stress. In doing so, we synthesize stigma-related models from the extant literature and attempt to integrate these concepts with previous work detailing potential contributors to substance use behaviors specifically. Finally, we ask readers to consider the various ways in which the content and characteristics of an individual’s stigmatized identity might combine with situational and additional individual difference factors to influence the likelihood of substance misuse. PMID:26379766

  15. Temperature effects on polygraph detection of concealed information.

    PubMed

    MacNeill, A Luke; Bradley, M T

    2016-02-01

    Thermoregulatory influences on electrodermal and cardiovascular activity may interfere with the detection of concealed information using a polygraph. This possibility was assessed by means of a mock terrorism scenario. Seventy-two participants were assigned to either a guilty or an innocent role. They were given a polygraph test at one of three ambient temperatures: 10°C, 22°C, or 34°C. Among guilty participants, electrodermal and cardiovascular measures were least effective at 10°C. Electrodermal results were optimal at 22°C, whereas cardiovascular results were optimal at 34°C. Among innocent participants, the effectiveness of these same measures was not affected by ambient temperature. Temperature had no significant impact on respiration results within the guilty or the innocent groups. Taken together, these findings have implications for those who use polygraphs in uncontrolled testing environments. PMID:26435532

  16. Digital key for chaos communication performing time delay concealment.

    PubMed

    Nguimdo, Romain Modeste; Colet, Pere; Larger, Laurent; Pesquera, Luís

    2011-07-15

    We introduce a scheme that integrates a digital key in a phase-chaos electro-optical delay system for optical chaos communications. A pseudorandom binary sequence (PRBS) is mixed within the chaotic dynamics in a way that a mutual concealment is performed; e.g., the time delay is hidden by the binary sequence, and the PRBS is also masked by the chaos. In addition to bridging the gap between algorithmic symmetric key cryptography and chaos-based analog encoding, the proposed approach is intended to benefit from the complex algebra mixing between a (pseudorandom) Boolean variable, and another continuous time (chaotic) variable. The scheme also provides a large flexibility allowing for easy reconfigurations to communicate securely at a high bit rate between different systems. PMID:21838363

  17. Digital Key for Chaos Communication Performing Time Delay Concealment

    NASA Astrophysics Data System (ADS)

    Nguimdo, Romain Modeste; Colet, Pere; Larger, Laurent; Pesquera, Luís

    2011-07-01

    We introduce a scheme that integrates a digital key in a phase-chaos electro-optical delay system for optical chaos communications. A pseudorandom binary sequence (PRBS) is mixed within the chaotic dynamics in a way that a mutual concealment is performed; e.g., the time delay is hidden by the binary sequence, and the PRBS is also masked by the chaos. In addition to bridging the gap between algorithmic symmetric key cryptography and chaos-based analog encoding, the proposed approach is intended to benefit from the complex algebra mixing between a (pseudorandom) Boolean variable, and another continuous time (chaotic) variable. The scheme also provides a large flexibility allowing for easy reconfigurations to communicate securely at a high bit rate between different systems.

  18. Microwave-Spectral Signatures Would Reveal Concealed Objects

    NASA Technical Reports Server (NTRS)

    Arndt, G.; Ngo, P.; Carl, J. R.; Byerly, K.; Stolarcyzk, L.

    2004-01-01

    A proposed technique for locating concealed objects (especially small antipersonnel land mines) involves the acquisition and processing of spectral signatures over broad microwave frequency bands. This technique was conceived to overcome the weaknesses of older narrow- band electromagnetic techniques like ground-probing radar and low-frequency electromagnetic induction. Ground-probing radar is susceptible to false detections and/or interference caused by rocks, roots, air pockets, soil inhomogeneities, ice, liquid water, and miscellaneous buried objects other than those sought. Moreover, if the radar frequency happens to be one for which the permittivity of a sought object matches the permittivity of the surrounding soil or there is an unfavorable complex-amplitude addition of the radar reflection at the receiver, then the object is not detected. Low-frequency electromagnetic induction works well for detecting metallic objects, but the amounts of metal in plastic mines are often too small to be detectable. The potential advantage of the proposed technique arises from the fact that wideband spectral signatures generally contain more relevant information than do narrow-band signals. Consequently, spectral signatures could be used to make better decisions regarding whether concealed objects are present and whether they are the ones sought. In some cases, spectral signatures could provide information on the depths, sizes, shapes, and compositions of objects. An apparatus to implement the proposed technique (see Figure 1) could be assembled from equipment already in common use. Typically, such an apparatus would include a radio-frequency (RF) transmitter/receiver, a broad-band microwave antenna, and a fast personal computer loaded with appropriate software. In operation, the counter would be turned on, the antenna would be aimed at the ground or other mass suspected to contain a mine or other sought object, and the operating frequency would be swept over the band of

  19. Allocation without locking

    SciTech Connect

    Appel, A.W.

    1988-01-01

    In a programming environment with both concurrency and automatic garbage collection, the allocation and initialization of a new record is a sensitive matter: if it is interrupted halfway through, the allocating process may be in a state that the garbage collector can't understand. In particular, the collector won't know which words of the new record have been initialized and which are meaningless (and unsafe to transverse). For this reason, parallel implementations usually use a locking or semaphore mechanism to ensure that allocation is an atomic operation. The locking significantly adds to the cost of allocation. This paper shows that allocation can run extremely quickly even in a multi-thread environment: open-coded, without locking.

  20. Blind loop syndrome

    MedlinePlus

    Blind loop syndrome occurs when digested food slows or stops moving through part of the intestines. This ... The name of this condition refers to the "blind loop" formed by part of the intestine that ...

  1. Color Blindness Simulations

    MedlinePlus

    ... many disables? The fastest growing segment? Myths of disability The Law The Rules Accessibility Resources Page Updates, additions Contact Us For assistance contact your NOAA Line Office Section 508 Coordinator Color blindness Simulations Normal Color Vision Deuteranopia Color blindness marked ...

  2. Decomposition of Concealed and Exposed Porcine Remains in the North Carolina Piedmont.

    PubMed

    Cammack, J A; Cohen, A C; Kreitlow, K L; Roe, R M; Watson, D W

    2016-01-01

    We examined the decomposition and subsequent insect colonization of small pig carrion (Sus scrofa (L.)) placed in concealed and open environments during spring, summer, and fall in Raleigh, North Carolina, as a model for juvenile human remains. Remains were concealed in simulated attics in three manners, ranging from minimal to well-concealed. Concealment had a significant effect on the insect community colonizing the remains across all three seasons; the beetles Necrobia rufipes (DeGeer) (Cleridae) and Dermestes maculatus (DeGeer) (Coleoptera: Dermestidae) were the only species indicative of remains located indoors, whereas numerous fly (Diptera: Calliphoridae, Muscidae, Sepsidae, and Piophilidae) and beetle (Coleoptera: Silphidae, Staphylinidae, and Histeridae) species and an ant species (Hymenoptera: Formicidae, Prenolepis sp.) were indicative of remains located outdoors. Season also significantly affected the insect species, particularly the blow flies (Diptera: Calliphoridae) colonizing remains: Lucilia illustris (Meigen) was indicative of the spring, Cochliomyia macellaria (F.) and Chrysomya megacephala (F.) were indicative of the summer, and Calliphora vicina Robineau-Desvoidy and Calliphora vomitoria (L.) were indicative of the fall. In addition, across all seasons, colonization was delayed by 35–768 h, depending on the degree of concealment. These differences among the insect communities across seasons and concealment treatments, and the effects of concealment on colonization indicate that such information is important and should to be considered when analyzing entomological evidence for criminal investigations. PMID:26590193

  3. A Concealed Barcode Identification System Using Terahertz Time-domain Spectroscopy

    NASA Astrophysics Data System (ADS)

    Guan, Yu; Yamamoto, Manabu; Kitazawa, Toshiyuki; Tripathi, Saroj R.; Takeya, Kei; Kawase, Kodo

    2015-03-01

    We present a concealed terahertz barcode/chipless tag to achieve remote identification through an obstructing material using terahertz radiation. We show scanned terahertz reflection spectral images of barcodes concealed by a thick obstacle. A concealed and double- side printed terahertz barcode structure is proposed, and we demonstrate that our design has better performance in definition than a single-side printed barcode using terahertz time-domain spectroscopy. This technique combines the benefits of a chipless tag to read encoded information covered by an optically opaque material with low cost and a simple fabrication process. Simulations are also described, along with an explanation of the principle of the terahertz barcode identification system.

  4. Giving Eyesight to the Blind: Towards Attention-Aware AIED

    ERIC Educational Resources Information Center

    D'Mello, Sidney K.

    2016-01-01

    There is an inextricable link between attention and learning, yet AIED systems in 2015 are largely blind to learners' attentional states. We argue that next-generation AIED systems should have the ability to monitor and dynamically (re)direct attention in order to optimize allocation of sparse attentional resources. We present some initial ideas…

  5. The Unobtrusive Memory Allocator

    2003-03-31

    This library implements a memory allocator/manager which ask its host program or library for memory refions to manage rather than requesting them from the operating system. This allocator supports multiple distinct heaps within a single executable, each of which may grow either upward or downward in memory. The GNU mmalloc library has been modified in such a way that its allocation algorithms have been preserved, but the manner in which it obtains regions to managemore » has been changed to request memory from the host program or library. Additional modifications allow the allocator to manage each heap as either upward or downward-growing. By allowing the hosting program or library to determine what memory is managed, this package allows a greater degree of control than other memory allocation/management libraries. Additional distinguishing features include the ability to manage multiple distinct heaps with in a single executable, each of which may grow either upward or downward in memory. The most common use of this library is in conjunction with the Berkeley Unified Parallel C (UPC) Runtime Library. This package is a modified version of the LGPL-licensed "mmalloc" allocator from release 5.2 of the "gdb" debugger's source code.« less

  6. CW THz scanning transmission imaging for concealed object detection

    NASA Astrophysics Data System (ADS)

    Li, Qi; Yao, Rui; Yin, Qiguo; Ding, Shenghui; Wang, Qi

    2009-07-01

    In the paper, the two-dimensional THz imaging methods are described. The SIFIR-50 FPL Far-Infrared Laser is used as the THz source. The output frequency is 2.5THz in the experiment, because the THz laser operates steadily at this frequency. The P4-42 detector works at room temperature and offers relatively high sensitivity. The software of THz imaging system is self-designed, and it plays a crucial role in this imaging system because it controls nearly all the operations of this system, including the two-dimensional scanning, image data collection, image data storage, image display and image processing. Utilizing this setup, THz transmission images of concealed objects are obtained. In the experiment, a bottle cap and a plastic board covered by reflective materials are chosen as the imaging objects; paper and Teflon are placed before the object to test the transmission imaging effect. The experimental results show that this imaging system can generate clear images.

  7. Concealed Utility Route Planning: Guidelines for Indian Residential Buildings

    NASA Astrophysics Data System (ADS)

    Gupta, Sumana

    2015-09-01

    Utility lines, particularly in Indian residential buildings, are networked in a haphazard manner to economize and expedite the process of laying conduits. They remain concealed behind the wall finish exposing problems later. The conventional method adopted while laying the routes does not economize the process rather it damages the newly constructed building. After an investigation of the practiced methods through reconnaissance, a construction vocabulary in form of guidelines is recommended for brick residential construction. Taking advantage of the versatility of a brick and considering it as an indigenous construction material of the Indian plains, a judicious way of brick laying can create horizontal and vertical chase at specified heights to receive the utility conduits. The method will simplify, expedite, and organize the utility routes and provide a seamless connection of major utility lines in a residential building. It will aid in future augmentation, easy maintenance, cost reduction and time involved in construction. Practical training of masons and awareness of relevant contractors at site is required through trained site supervisors. The proposed method merits further investigation for inclusion in academic curriculums of the trade.

  8. Countermeasure mechanisms in a P300-based concealed information test.

    PubMed

    Meixner, John B; Rosenfeld, J Peter

    2010-01-01

    We recently introduced an accurate and countermeasure (CM)-resistant P300-based deception detection test (J.P. Rosenfeld et al., 2008). When subjects use CMs to all irrelevant items in the test, the probe P300 is increased rather than reduced, as in previous P300-based deception protocols, allowing detection of CM users. Evidence herein suggests this is partly due to an omit effect; the probe was the only uncountered item. Three groups were tested: a guilty omit probe group performed an explicit response to each irrelevant item but not to the probe, an innocent omit irrelevant group saw only irrelevant items and omitted a response to one item, and a guilty no omit group had a concealed information item as probe and performed an explicit response to each. We found a greater P300 amplitude to probes in the guilty omit probe condition as compared with the other two conditions, indicating a P300 enhancing effect of omitting a response to a single stimulus. PMID:19761523

  9. Severe forms of concealed penis without hypospadias: Surgical strategies

    PubMed Central

    de Jesus, Lisieux Eyer; Dekermacher, Samuel; Anderson, Kleber M.

    2015-01-01

    Introduction: Concealed penis (CP) may vary in severity and includes megaprepuce (MP) as a variant. Many different surgical strategies have been described in order to maximize penile exposure and to deal with skin deficiency. We describe the strategies that we use to overcome technical problems in severe cases of CP. Materials and Methods: Six consecutive cases of severe CP (including 3 with MP) were treated in a 2-year period between January 2011 and April 2013. These patients were treated using extensive degloving, removal of dysplastic dartos, Alexander's preputial flap, scrotal flaps and skin grafts. Three patients had been previously circumcised. Cases associated with hypospadias, obesity, disorders of sexual differentiation and micropenises were excluded. Results: All six patients attained good results, with good exposure of the penis, ability to void standing with a well-directed flow and reasonable esthetic results. A technical algorithm for the treatment of primary or recurring cases of CP is proposed. Conclusion: Alexander’ s distally based ventral preputial flap is a useful technical resource to treat MP cases. Free skin grafts and/or laterally based scrotal flaps may be used to cover the penis after release in severe cases of CP. PMID:26604447

  10. The neural correlates of identity faking and concealment: an FMRI study.

    PubMed

    Ding, Xiao Pan; Du, Xiaoxia; Lei, Du; Hu, Chao Super; Fu, Genyue; Chen, Guopeng

    2012-01-01

    The neural basis of self and identity has received extensive research. However, most of these existing studies have focused on situations where the internal representation of the self is consistent with the external one. The present study used fMRI methodology to examine the neural correlates of two different types of identity conflict: identity faking and concealment. Participants were presented with a sequence of names and asked to either conceal their own identity or fake another one. The results revealed that the right insular cortex and bilaterally inferior frontal gyrus were more active for identity concealment compared to the control condition, whereas identity faking elicited a significantly larger percentage signal increase than the control condition in the right superior frontal gyrus, left calcarine, and right caudate. These results suggest that different neural systems associated with both identity processing and deception were involved in identity concealment and faking. PMID:23144915

  11. Concealed pregnancy and newborn abandonment: a contemporary 21st century issue. Part 1.

    PubMed

    Tighe, Sylvia Murphy; Lalor, Joan

    2016-06-01

    This two-part series explores the phenomenon of concealed pregnancy and the association with newborn abandonment, with reference to recent cases of public interest. In Part 1 we focus on defining concealed pregnancy as a complex process which involves hiding a pregnancy, that can lead to tragic consequences such as maternal or neonatal morbidity or mortality (Murphy Tighe and Lalor 2016; Chen et al 2007).The psychosocial issues involved will also be presented (Murphy Tighe and Lalor 2016). PMID:27451485

  12. Use of visual cover by domestic fowl: a Venetian blind effect?

    PubMed

    Newberry; Shackleton

    1997-08-01

    Cover is a structural feature of the environment that animals can use to conceal themselves from predators or conspecifics or to gain shelter from inclement weather. Cover may also form a physical barrier limiting movement. It was hypothesized that domestic fowl, Gallus gallus domesticuswould use visual cover for concealment. Use of cover was examined in two strains of domestic fowl kept indoors in four groups of 110-112 birds each. In each pen, cover was provided by four rigid vertical panels, one in each of four quadrants. Four similar quadrants were without cover. To investigate use of cover for concealment, the four cover structures varied in continuity of visual cover: (1) transparent (0% cover), (2) transparent with four equidistant vertical green stripes (33% cover), (3) transparent with eight such stripes (67% cover) and (4) solid green (100% cover). Scan samples of quadrant use were made weekly when the birds were 24-52 days of age. Both strains of domestic fowl (1) used areas with cover more than areas without cover, (2) showed increased resting and preening behaviour in areas with cover and (3) showed increased use of cover as continuity increased from 0 to 67%. These results could not be explained by thermoregulatory or physical barrier effects of the cover structures. The results are consistent with the hypothesis that a preference for concealment motivates the use of visual cover by domestic fowl, and suggest a 'Venetian blind' effect for visually discontinuous security cover. PMID:9268471

  13. Childhood blindness in India: causes in 1318 blind school students in nine states.

    PubMed

    Rahi, J S; Sripathi, S; Gilbert, C E; Foster, A

    1995-01-01

    It is estimated that at least 200,000 children in India have severe visual impairment or blindness and approximately 15,000 are in schools for the blind. Although this represents a small percentage of the estimated 5 million blind in India, it is significant in terms of 'blind-years'. Strategies to combat childhood blindness require accurate data on the causes to allocate resources to appropriate preventive and curative services. Since socio-economic factors vary in different areas of this industrializing country data should be representative of the country as a whole. This is the first multi-state study to be undertaken in India using the Record for Children with Blindness and Low Vision from the World Health Organization/PBL Programme. A total of 1411 children in 22 schools from nine states in different geographical zones were examined by an ophthalmologist and optometrist. Of these, 1318 children were severely visually impaired or blind (SVI/BL). The major causes of SVI/BL in this study were: (1) corneal staphyloma, scar and phthisis bulbi (mainly attributable to vitamin A deficiency) in 26.4%; (2) microphthalmos, anophthalmos and coloboma in 20.7%; (3) retinal dystrophies and albinism in 19.3%; and (4) cataract, uncorrected aphakia and amblyopia in 12.3%. This mixed pattern of causes lies in an intermediate position between the patterns seen in developing countries and those seen in industrialised countries. The causes identified indicate the importance both of preventive public health strategies and of specialist paediatric ophthalmic and optical services in the management of childhood blindness in India. PMID:8543070

  14. Impulse radar imaging system for concealed object detection

    NASA Astrophysics Data System (ADS)

    Podd, F. J. W.; David, M.; Iqbal, G.; Hussain, F.; Morris, D.; Osakue, E.; Yeow, Y.; Zahir, S.; Armitage, D. W.; Peyton, A. J.

    2013-10-01

    Electromagnetic systems for imaging concealed objects at checkpoints typically employ radiation at millimetre and terahertz frequencies. These systems have been shown to be effective and provide a sufficiently high resolution image. However there are difficulties and current electromagnetic systems have limitations particularly in accurately differentiating between threat and innocuous objects based on shape, surface emissivity or reflectivity, which are indicative parameters. In addition, water has a high absorption coefficient at millimetre wavelength and terahertz frequencies, which makes it more difficult for these frequencies to image through thick damp clothing. This paper considers the potential of using ultra wideband (UWB) in the low gigahertz range. The application of this frequency band to security screening appears to be a relatively new field. The business case for implementing the UWB system has been made financially viable by the recent availability of low-cost integrated circuits operating at these frequencies. Although designed for the communication sector, these devices can perform the required UWB radar measurements as well. This paper reports the implementation of a 2 to 5 GHz bandwidth linear array scanner. The paper describes the design and fabrication of transmitter and receiver antenna arrays whose individual elements are a type of antipodal Vivaldi antenna. The antenna's frequency and angular response were simulated in CST Microwave Studio and compared with laboratory measurements. The data pre-processing methods of background subtraction and deconvolution are implemented to improve the image quality. The background subtraction method uses a reference dataset to remove antenna crosstalk and room reflections from the dataset. The deconvolution method uses a Wiener filter to "sharpen" the returned echoes which improves the resolution of the reconstructed image. The filter uses an impulse response reference dataset and a signal

  15. Robust identification of concealed dangerous substances using THz imaging spectroscopy

    NASA Astrophysics Data System (ADS)

    Nystad, Helle E.; Haakestad, Magnus W.; van Rheenen, Arthur D.

    2015-05-01

    False alarm rates must be kept sufficiently low if a method to detect and identify objects or substances is to be implemented in real life applications. This is also true when trying to detect and identify dangerous substances such as explosives and drugs that are concealed in packaging materials. THz technology may be suited to detect these substances, especially when imaging and spectroscopy are combined. To achieve reasonable throughput, the detection and identification process must be automated and this implies reliance on algorithms to perform this task, rather than human beings. The identification part of the algorithm must compare spectral features of the unknown substance with those in a library of features and determining the distance, in some sense, between these features. If the distance is less than some defined threshold a match is declared. In this paper we consider two types of spectral characteristic that are derived from measured time-domain signals measured in the THz regime: the absorbance and its derivative. Also, we consider two schemes to measure the distance between the unknown and library characteristics: Spectral Angle Mapping (SAM) and Principal Component Analysis (PCA). Finally, the effect of windowing of the measured time-domain signal on the performance of the algorithms is studied, by varying the Blackman-Harris (B-H) window width. Algorithm performance is quantified by studying the receiver-operating characteristics (ROC). For the data considered in this study we conclude that the best performance is obtained when the derivative of the absorbance is used in combination with a narrow B-H window and SAM. SAM is a more straight-forward method and requires no large training data sets and tweaking.

  16. Truth concealed behind "Zero Increase of Total Water Use" and coordination approach of socio-economic and eco-environmental water uses in the Weihe River Basin, China

    NASA Astrophysics Data System (ADS)

    Jia, Y.; Wei, N.; Hao, C.; You, J.; Niu, C.; Qiu, Y.

    2014-09-01

    The water resources situation in the water-stressed Weihe River Basin, China, is more serious now than ever before because of a decrease in water resources and socio-economic development. A "Zero increase of socio-economic water use" in recent years gives people a wrong understanding and conceals the water crisis in the basin because the socio-economic water consumption has actually increased. Water use for the hydro-ecological system has been greatly reduced by a decrease in water resources and socio-economic water consumption increase. New concepts of hierarchical water uses for every sector and water consumption control are suggested for coordinating water uses of the socio-economy and ecosystems in the water-stressed basin. The traditional water resources allocation and regulation in China usually set up a priority sequence for water use sectors. Generally speaking, domestic water use has the highest priority and a highest guarantee rate, followed by industrial water use, irrigation and lastly ecological water use. The concept of hierarchical water use for every sector is to distinguish the water use of every sector into minimum part, appropriate part, and expected extra part with different guarantee rates, and the minimum parts of all sectors should be first guaranteed. By applying a water allocation model, we compared the water allocation results of the traditional approach and the newly suggested approach. Although further study is desired, the results are believed to be of an important referential value to sustainable development in the basin.

  17. Blind Analysis in Particle Physics

    SciTech Connect

    Roodman, A

    2003-12-16

    A review of the blind analysis technique, as used in particle physics measurements, is presented. The history of blind analyses in physics is briefly discussed. Next the dangers of and the advantages of a blind analysis are described. Three distinct kinds of blind analysis in particle physics are presented in detail. Finally, the BABAR collaboration's experience with the blind analysis technique is discussed.

  18. Drug Use and Spatial Dynamics of Household Allocation

    PubMed Central

    Dunlap, Eloise; Brown, Emma J

    2016-01-01

    Household space allocation by women who consume drugs in New York and North Florida is depicted to demonstrate the complex character of household space and social relations. Some parents attempt to hide their drug consumption through the allocation space in the household for drug use. Women allocation of space for drug use within their households and the impact of this on the household are relevant issues with implications for therapy and prevention. Objective The use of household space has not been a focus of social scientists. Middle class households have been used by decoration literature to specify space utilization. Modest literature pay attention to the utilization of household space among drug focused households. Analysis herein looks at the lived social relations of drug users to their children through controlling household space. Methods Data presented comes from two studies, New York and Florida. The studies involved a total of 158 participants in 72 families from New York and 26 participants in 23 families in North Florida. Both researches used an ethnographic methodology focusing on a variety of behavior patterns and conduct norms occurring within drug abusing households. Repeated interviews and observations took place in households which were visited at different times and days of the week. Florida study was conducted over a 2-year period; New York study took place over a 5-year period. Results Data suggest parents attempted to conceal their drug use from their offspring by using various strategies. Mental, social, and physical were tied together in space allocation. Household space acquired a different meaning and arose from use practice. Conclusion In urban and rural settings a pattern of household allocation space and drug consumption is emerging. Although drug consumption is still prominent, it is not all consuming or the primary focus in the lives of women who use drugs. These women may have learned to integrate their consumption into their daily

  19. "Color-Blind" Racism.

    ERIC Educational Resources Information Center

    Carr, Leslie G.

    Examining race relations in the United States from a historical perspective, this book explains how the constitution is racist and how color blindness is actually a racist ideology. It is argued that Justice Harlan, in his dissenting opinion in Plessy v. Ferguson, meant that the constitution and the law must remain blind to the existence of race…

  20. Blindness and Yoga

    ERIC Educational Resources Information Center

    Heyes, Anthony David

    1974-01-01

    Evidence is presented to support the claims that, among many blind persons, physical inactivity leads to poor physical fitness; that a state of anxiety is often a concomitant of unguided blind mobility; and that Yogic practices offer a solution to both difficulties. (GW)

  1. Blind Pre-School.

    ERIC Educational Resources Information Center

    Taylor, Billie, Comp.

    Articles pertinent to aiding the pre-school blind child are collected in this publication. Topics include discussion of attitudes and emotional reactions important for parents and teachers of blind children, and optimal development in regard to early motor behavior and emotional and social needs. Common areas of parental concern such as discipline…

  2. Change blindness images.

    PubMed

    Ma, Li-Qian; Xu, Kun; Wong, Tien-Tsin; Jiang, Bi-Ye; Hu, Shi-Min

    2013-11-01

    Change blindness refers to human inability to recognize large visual changes between images. In this paper, we present the first computational model of change blindness to quantify the degree of blindness between an image pair. It comprises a novel context-dependent saliency model and a measure of change, the former dependent on the site of the change, and the latter describing the amount of change. This saliency model in particular addresses the influence of background complexity, which plays an important role in the phenomenon of change blindness. Using the proposed computational model, we are able to synthesize changed images with desired degrees of blindness. User studies and comparisons to state-of-the-art saliency models demonstrate the effectiveness of our model. PMID:24029902

  3. How many more guns?: Estimating the effect of allowing licensed concealed handguns on a college campus.

    PubMed

    Bouffard, Jeffrey A; Nobles, Matt R; Wells, William; Cavanaugh, Michael R

    2012-01-01

    Among other arguments, advocates for lifting bans on carrying concealed handguns on campus propose that this would increase the prevalence of legitimately carried handguns, which might then deter crimes or be used to intervene in campus shooting incidents like the one that took place at Virginia Tech in 2007. Opponents suggest that increased prevalence of concealed handguns would lead to increases in other negative consequences, such as accidental shootings. Little empirical research has examined the potential outcomes of such a policy change, nor has existing research examined the prerequisite issue of whether lifting these bans would result in substantial increases in the prevalence of concealed handguns among students. Using a sample of undergraduate classrooms selected from five academic buildings at a public university in Texas, this study examines the potential impact of lifting the concealed handgun ban on the likelihood that a given classroom would contain at least one legally carried handgun. Results reveal that the impact of potential policy changes in this area vary based on the building under consideration and the measure of potential handgun prevalence. Limitations of the study and implications for future research on the issue of concealed handgun carrying on college campuses are discussed. PMID:21810786

  4. Biomimetic Concealing of PLGA Microspheres in a 3D Scaffold to Prevent Macrophage Uptake.

    PubMed

    Minardi, Silvia; Corradetti, Bruna; Taraballi, Francesca; Sandri, Monica; Martinez, Jonathan O; Powell, Sebastian T; Tampieri, Anna; Weiner, Bradley K; Tasciotti, Ennio

    2016-03-01

    Scaffolds functionalized with delivery systems for the release of growth factors is a robust strategy to enhance tissue regeneration. However, after implantation, macrophages infiltrate the scaffold, eventually initiating the degradation and clearance of the delivery systems. Herein, it is hypothesized that fully embedding the poly(d,l-lactide-co-glycolide acid) microspheres (MS) in a highly structured collagen-based scaffold (concealing) can prevent their detection, preserving the integrity of the payload. Confocal laser microscopy reveals that non-embedded MS are easily internalized; when concealed, J774 and bone marrow-derived macrophages (BMDM) cannot detect them. This is further demonstrated by flow cytometry, as a tenfold decrease is found in the number of MS engulfed by the cells, suggesting that collagen can cloak the MS. This correlates with the amount of nitric oxide and tumor necrosis factor-α produced by J774 and BMDM in response to the concealed MS, comparable to that found for non-functionalized collagen scaffolds. Finally, the release kinetics of a reporter protein is preserved in the presence of macrophages, only when MS are concealed. The data provide detailed strategies for fabricating three dimensional (3D) biomimetic scaffolds able to conceal delivery systems and preserve the therapeutic molecules for release. PMID:26797709

  5. Exploring the characteristics of the attentional blink paradigm when used to discover concealed knowledge.

    PubMed

    Niziurski, Julie; Andre, Jeffrey

    2015-12-01

    Ganis and Patnaik (Appl Psychophysiol Biofeedback 34:189-196, 2009) reported that the attentional blink paradigm using faces could be used to detect the presence of concealed knowledge. The attentional blink is defined as the inability to successfully detect the second of two target items presented within a short inter-stimulus interval. The present study tested the use of the attentional blink paradigm in a concealed knowledge test by investigating the effect that familiar faces may have on the attentional blink. Participants completed 200 trials where they were told to look for the same familiar target (Target 2; actor Brad Pitt) that was intermixed with neutral face stimuli and one other familiar face (Target 1; actor George Clooney). Target 1 was to act as the concealed knowledge as participants familiar with Target 1 would be distracted by his unannounced presence and report not seeing Target 2 thereby showing an attentional blink. Despite all participants being familiar with Target 2, an attentional blink still occurred, but with higher than normal Target 2 accuracy rates. Overall, we found support for using the AB paradigm with the concealed knowledge test; however, a possible countermeasure to the attentional blink is familiarity with Target 2 as eight of 21 participants who recognized Target 1 (the concealed knowledge) were also able to detect Target 2 on 100 % of the trials where Target 1's presence should have created an attentional blink. PMID:26162299

  6. A multifaceted active swept millimetre-wave approach to the detection of concealed weapons

    NASA Astrophysics Data System (ADS)

    Andrews, David A.; Bowring, Nicholas; Rezgui, Nacer D.; Southgate, Matthew; Guest, Elizabeth; Harmer, Stuart; Atiah, Ali

    2008-10-01

    The effective detection of concealed handguns and knives in open spaces is a major challenge for police and security services round the world. Here an automated technique for the detection of concealed handguns that relies on active swept illumination of the target to induce both scattered fields and aspect independent responses from the concealed object is presented. The broad frequency sweep permits information about the object's size to be deduced from transformations into the time/distance domain. In our experiments we collect multiple sweeps across the frequency range at very high speed, which produces a time evolved response from the target, from both normal and cross polarized detectors. From this we extract characteristic signatures from the responses that allow those from innocent objects (e.g. mobile phones, keys etc) to be distinguished from handguns. Information about the optical depth separation of the scattering corners and the degree and shape of cross polarization allows a neural network to successfully concealed handguns. Finally this system utilizes a range of signal processing techniques ranging from correlation between cross and normally polarized scattering through to a neural network classifier to deduce whether a concealed weapon is present.

  7. How "Blind" Are Double-Blind Studies?

    ERIC Educational Resources Information Center

    Margraf, Jurgen; And Others

    1991-01-01

    Compared alprazolam, imipramine, and placebo in the treatment of panic disorder patients (n=59) to investigate concerns about the internal validity of the double-blind design. Found that the great majority of patients and physicians were able to rate accurately whether active drug or placebo had been given and physicians could distinguish between…

  8. Blinded by Irrelevance: Pure Irrelevance Induced "Blindness"

    ERIC Educational Resources Information Center

    Eitam, Baruch; Yeshurun, Yaffa; Hassan, Kinneret

    2013-01-01

    To what degree does our representation of the immediate world depend solely on its relevance to what we are currently doing? We examined whether relevance per se can cause "blindness," even when there is no resource limitation. In a novel paradigm, people looked at a colored circle surrounded by a differently colored ring--the task relevance of…

  9. A Dynamic Tap Allocation for Concurrent CMA-DD Equalizers

    NASA Astrophysics Data System (ADS)

    Trindade, Diego von B. M.; Halmenschlager, Vitor; Ortolan, Leonardo; De Castro, Maria C. F.; De Castro, Fernando C. C.; Ourique, Fabrício

    2010-12-01

    This paper proposes a dynamic tap allocation for the concurrent CMA-DD equalizer as a low complexity solution for the blind channel deconvolution problem. The number of taps is a crucial factor which affects the performance and the complexity of most adaptive equalizers. Generally an equalizer requires a large number of taps in order to cope with long delays in the channel multipath profile. Simulations show that the proposed new blind equalizer is able to solve the blind channel deconvolution problem with a specified and reduced number of active taps. As a result, it minimizes the output excess mean square error due to inactive taps during and after the equalizer convergence and the hardware complexity as well.

  10. Efficacy and cost-effectiveness of a physiotherapy program for chronic rotator cuff pathology: A protocol for a randomised, double-blind, placebo-controlled trial

    PubMed Central

    Bennell, Kim; Coburn, Sally; Wee, Elin; Green, Sally; Harris, Anthony; Forbes, Andrew; Buchbinder, Rachelle

    2007-01-01

    Background Chronic rotator cuff pathology (CRCP) is a common shoulder condition causing pain and disability. Physiotherapy is often the first line of management for CRCP yet there is little conclusive evidence to support or refute its effectiveness and no formal evaluation of its cost-effectiveness. Methods/Design This randomised, double-blind, placebo-controlled trial will involve 200 participants with CRCP recruited from medical practices, outpatient departments and the community via print and radio media. Participants will be randomly allocated to a physiotherapy or placebo group using concealed allocation stratified by treating physiotherapist. Both groups will receive 10 sessions of individual standardised treatment over 10 weeks from one of 10 project physiotherapists. For the following 12 weeks, the physiotherapy group will continue a home exercise program and the placebo group will receive no treatment. The physiotherapy program will comprise shoulder joint and spinal mobilisation, soft tissue massage, postural taping, and home exercises for scapular control, posture and rotator cuff strengthening. The placebo group will receive inactive ultrasound and gentle application of an inert gel over the shoulder region. Blinded assessment will be conducted at baseline and at 10 weeks and 22 weeks after randomisation. The primary outcome measures are self reported questionnaires including the shoulder pain and disability index (SPADI), average pain on an 11-point numeric rating scale and participant perceived global rating of change. Secondary measures include Medical Outcomes Study 36-item short form (SF-36), Assessment of Quality of Life index, numeric rating scales for shoulder pain and stiffness, participant perceived rating of change for pain, strength and stiffness, and manual muscle testing for shoulder strength using a handheld dynamometer. To evaluate cost-effectiveness, participants will record the use of all health-related treatments in a log

  11. Spectrum allocations above 40 GHz

    NASA Technical Reports Server (NTRS)

    Katzenstein, W. E.; Moore, R. P.; Kimball, H. G.

    1981-01-01

    The 1979 World Administrative Radio Conference (WARC-79) revised the International Table of Frequency Allocations to reflect increased interest and activity in the region of the EM spectrum above 40 GHz. The total width of the spectrum allocated (235 GHz) in the region above 40 GHz indicates the extent of this new spectrum resource, made accessible by advances in the state-of-the-art of telecommunications equipment. There are some striking differences between the approach to allocation above and below 40 GHz. For example, there are not bands allocated exclusively. This reflects the characteristics of propagation and the small antenna beamwidths achievable at these frequencies. Attention is given to atmospheric window and absorption band limits, allocations to satellite services, allocations to scientific services, allocations to terrestrial services, the future refinement of the radio regulations above 40 GHz, and allocations of WARC-79 and frequency management.

  12. The role of psychological flexibility in the relationship between self-concealment and disordered eating symptoms.

    PubMed

    Masuda, Akihiko; Boone, Matthew S; Timko, C Alix

    2011-04-01

    The present cross-sectional study investigated whether psychological flexibility mediates the association between self-concealment and disordered eating (DE) symptoms among non-clinical college students. Data of 209 male and female participants (nfemale =165), aged 18-22 years old, were used for analyses. Self-concealment was found to be positively associated with DE symptoms (i.e., general eating disorder symptoms and eating disorder-related cognitions) and negatively associated with psychological flexibility. Psychological flexibility was inversely associated with DE symptoms. Finally, psychological flexibility was found to mediate the association between self-concealment and DE symptoms after accounting for gender, ethnic background, and body mass index (BMI). PMID:21385643

  13. Real-time computational processing and implementation for concealed object detection

    NASA Astrophysics Data System (ADS)

    Lee, Dong-Su; Yeom, Seokwon; Chang, YuShin; Lee, Mun-Kyo; Jung, Sang-Won

    2012-07-01

    Millimeter wave (MMW) readily penetrates fabrics, thus it can be used to detect objects concealed under clothing. A passive MMW imaging system can operate as a stand-off type sensor that scans people both indoors and outdoors. However, because of the diffraction limit and low signal level, the imaging system often suffers from low image quality. Therefore, suitable computational processing would be required for automatic analysis of the images. The authors present statistical and computational algorithms and their implementations for real-time concealed object detection. The histogram of the image is modeled as a Gaussian mixture distribution, and hidden object areas are segmented by a multilevel scheme involving the expectation-maximization algorithm. The complete algorithm has been implemented in both MATLAB and C++. Experimental and simulation results confirm that the implemented system can achieve real-time detection of concealed objects.

  14. Real-time detection of concealed chemical hazards under ambient light conditions using Raman spectroscopy.

    PubMed

    Cletus, Biju; Olds, William; Fredericks, Peter M; Jaatinen, Esa; Izake, Emad L

    2013-07-01

    Current concerns regarding terrorism and international crime highlight the need for new techniques for detecting unknown and hazardous substances. A novel Raman spectroscopy-based technique, spatially offset Raman spectroscopy (SORS), was recently devised for noninvasively probing the contents of diffusely scattering and opaque containers. Here, we demonstrate a modified portable SORS sensor for detecting concealed substances in-field under different background lighting conditions. Samples including explosive precursors, drugs, and an organophosphate insecticide (chemical warfare agent surrogate) were concealed inside diffusely scattering packaging including plastic, paper, and cloth. Measurements were carried out under incandescent and fluorescent light as well as under daylight to assess the suitability of the probe for different real-life conditions. In each case, it was possible to identify the substances against their reference Raman spectra in less than 1 min. The developed sensor has potential for rapid detection of concealed hazardous substances in airports, mail distribution centers, and customs checkpoints. PMID:23692353

  15. Economics of spectrum allocation

    NASA Astrophysics Data System (ADS)

    Melody, W. H.

    The effective and efficient allocation and use of the spectrum can be ensured only by a set of sharing rules that will reflect the interests, values, and power of all affected parties. What is now happening is that the new interests and different values of the developing countries are pressing to change the international sharing rules established by a small group of high-technology nations. It is noted that the latter have established a massive telecommunications infrastructure on the basis of inherited sharing rules that reflect only their interests and a much simplified scarcity problem. Once long-term goals and underlying principles of allocation are established, communication technologies and markets can be directed, through a series of adjustment policies, to achieve them. A crucial first step in the creation of an international information environment in which 'free' flows will be balanced flows is the establishment of a balanced and equitable set of sharing rules for the radio spectrum.

  16. Combining the P300-complex trial-based concealed information test and the reaction time-based autobiographical implicit association test in concealed memory detection.

    PubMed

    Hu, Xiaoqing; Rosenfeld, J Peter

    2012-08-01

    Despite the P300-concealed information test's validity in detecting concealed memory when it is conducted immediately after the mock crime, whether the P300-CIT's detection efficiency is moderated by time delay remains unknown. Here, we conducted a mock crime study in which guilty participants were tested immediately after the mock crime or 1 month later. An innocent group was also tested. Assuming that the autobiographical Implicit Association Test (aIAT) and the P300-CIT rely on nonoverlapping mechanisms for memory detection, participants were tested using both the P300-CIT and the reaction time (RT)-based aIAT. Results suggested that the sensitivity of both tests remains even after the 1-month delay. The indicators from the RT-aIAT and P300-CIT were uncorrelated, thus combining P300-CIT and aIAT data further increased the efficiency of memory detection. PMID:22681260

  17. Myrmics Memory Allocator

    2011-09-23

    MMA is a stand-alone memory management system for MPI clusters. It implements a shared Partitioned Global Address Space, where multiple MPI processes request objects from the allocator and the latter provides them with system-wide unique memory addresses for each object. It provides applications with an intuitive way of managing the memory system in a unified way, thus enabling easier writing of irregular application code.

  18. Attention allocation before antisaccades.

    PubMed

    Klapetek, Anna; Jonikaitis, Donatas; Deubel, Heiner

    2016-01-01

    In the present study, we investigated the distribution of attention before antisaccades. We used a dual task paradigm, in which participants made prosaccades or antisaccades and discriminated the orientation of a visual probe shown at the saccade goal, the visual cue location (antisaccade condition), or a neutral location. Moreover, participants indicated whether they had made a correct antisaccade or an erroneous prosaccade. We observed that, while spatial attention in the prosaccade task was allocated only to the saccade goal, attention in the antisaccade task was allocated both to the cued location and to the antisaccade goal. This suggests parallel attentional selection of the cued and antisaccade locations. We further observed that in error trials--in which participants made an incorrect prosaccade instead of an antisaccade--spatial attention was biased towards the prosaccade goal. These erroneous prosaccades were mostly unnoticed and were often followed by corrective antisaccades with very short latencies (<100 ms). Data from error trials therefore provide further evidence for the parallel programming of the reflexive prosaccade to the cue and the antisaccade to the intended location. Taken together, our results suggest that attention allocation and saccade goal selection in the antisaccade task are mediated by a common competitive process. PMID:26790843

  19. The association between concealing emotions at work and medical utilization in Korea

    PubMed Central

    2014-01-01

    Objectives We aimed to investigate the association between concealing emotions at work and medical utilization. Methods Data from the 2007–2009 4th Korea National Health and Nutrition Examination Survey (KNHANES IV) was used, 7,094 participants (3,837 males, 3,257 females) aged between 20 and 54 who were economically active and completed all necessary questionnaire items were included. Odds ratios (ORs) and 95% confidence intervals (95% CI) for differences in hospitalization, outpatient visits, and pharmaceutical drug use between those who concealed their emotions and those who did not were investigated using logistic regression models with and without gender stratification. Results Among those who concealed their emotions (n = 2,763), 47.4% were females, and 50.1% had chronic disease. In addition, 9.7% of the concealing emotions group had been hospitalized within the last year, 24.8% had been outpatients in the last two weeks, and 28.3% had used pharmaceutical drugs in the last two weeks. All ORs represent the odds of belonging to the concealing emotions group over the non-concealing emotions group. After adjustment for individual, occupational, socioeconomic and disease factors, the adjusted ORs (95% CI) in hospitalization are 1.29 (1.08 ~ 1.53) in the total population, 1.25 (0.98 ~ 1.60) in males and 1.30 (1.02 ~ 1.66) in females, in outpatient visits are 1.15 (1.02 ~ 1.29) in the total population, 1.05 (0.88 ~ 1.24) in males and 1.25 (1.06 ~ 1.47) in females and in pharmaceutical drug use are 1.12 (1.01 ~ 1.25) in the total population, 1.08 (0.92 ~ 1.27) in males and 1.14 (0.98 ~ 1.33) in females. Conclusions Those who concealed their emotions at work were more likely to use medical services. Moreover, the health effects of concealing emotions at work might be more detrimental in women than in men. PMID:25852941

  20. Leading Causes of Blindness

    MedlinePlus

    ... of this page please turn Javascript on. Feature: Vision Leading Causes of Blindness Past Issues / Winter 2012 ... of the lenses in your eyes. They affect vision and are very common in older people. More ...

  1. Vision Impairment and Blindness

    MedlinePlus

    ... blindness in the United States are age-related eye diseases: macular degeneration, cataract and glaucoma. Other eye disorders, ... and braille books. The sooner vision loss or eye disease is found and treated, the greater your chances ...

  2. Leading Causes of Blindness

    MedlinePlus

    ... Navigation Bar Home Current Issue Past Issues Feature: Vision Leading Causes of Blindness Past Issues / Summer 2008 ... of the lenses in your eyes. They affect vision and are very common in older people. More ...

  3. Prevent Blindness America

    MedlinePlus

    ... to eNews Close Donate A Lifetime of Healthy Vision See well to learn, work, play, and live ... the sight-saving work of
 Prevent Blindness. Donate Vision Problems in the U.S. Prevalence of Adult Vision ...

  4. Synaptic Tagging During Memory Allocation

    PubMed Central

    Rogerson, Thomas; Cai, Denise; Frank, Adam; Sano, Yoshitake; Shobe, Justin; Aranda, Manuel L.; Silva, Alcino J.

    2014-01-01

    There is now compelling evidence that the allocation of memory to specific neurons (neuronal allocation) and synapses (synaptic allocation) in a neurocircuit is not random and that instead specific mechanisms, such as increases in neuronal excitability and synaptic tagging and capture, determine the exact sites where memories are stored. We propose an integrated view of these processes, such that neuronal allocation, synaptic tagging and capture, spine clustering and metaplasticity reflect related aspects of memory allocation mechanisms. Importantly, the properties of these mechanisms suggest a set of rules that profoundly affect how memories are stored and recalled. PMID:24496410

  5. 50 CFR 660.323 - Pacific whiting allocations, allocation attainment, and inseason allocation reapportionment.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 50 Wildlife and Fisheries 9 2010-10-01 2010-10-01 false Pacific whiting allocations, allocation...) FISHERIES OFF WEST COAST STATES West Coast Groundfish Fisheries § 660.323 Pacific whiting allocations... amounts that will be harvested, or a combination of the two. Estimates of the amount of Pacific...

  6. The Role of Stigma Concealment in the Retrospective High School Experiences of Gay, Lesbian, and Bisexual Individuals

    ERIC Educational Resources Information Center

    Frost, David M.; Bastone, Linda M.

    2008-01-01

    High school is a time when most gay, lesbian, and bisexual (GLB) youths experience a great deal of distress related to the stigma attached to being gay. Many try to avoid stigmatization by concealing the fact that they are GLB. This brief report presents a descriptive, multidimensional approach to understanding GLB stigma concealment as a…

  7. Productive and Inclusive? How Documentation Concealed Racialising Practices in a Diversity Project

    ERIC Educational Resources Information Center

    Miller, Melinda G.

    2014-01-01

    This article examines how documentation concealed racialising practices in a diversity project that was seen to be productive and inclusive. Documentation examples are taken from a doctoral study about embedding Indigenous perspectives in early childhood education curricula in two Australian urban childcare centres. In place of reporting examples…

  8. University Presidents' Perceptions and Practice Regarding the Carrying of Concealed Handguns on College Campuses

    ERIC Educational Resources Information Center

    Price, James H.; Thompson, Amy; Khubchandani, Jagdish; Dake, Joseph; Payton, Erica; Teeple, Karen

    2014-01-01

    Objective: To assess the perceptions and practices of a national sample of college and university presidents regarding their support for concealed handguns being carried on college campuses. Participants: The sample for this study consisted of a national random sample of 900 college or university presidents. Methods: In the spring of 2013, a…

  9. Digital image processing in the SECURE concealed-object detection system

    NASA Astrophysics Data System (ADS)

    Smith, Steven W.

    1993-04-01

    A new technology has been developed for detecting explosives and other dangerous objects concealed under persons' clothing. The 'Subambient Exposure, Computer Utilized Reflected Energy' (SECURE) method uses a very low level of back-scattered x-rays in conjunction with digital image processing to produce an image of the person and any concealed objects. Image processing algorithms, used in the system are directed at presenting information to a human operator in the best possible manner for foreign object detection. These algorithms are viewed as being near optimum, and additional development is probably not justified. Algorithm development is needed in the area of automatic threat detection. This has the potential of reducing the invasion of privacy associated with having a security operator view each image. It also has the potential of reducing the serious problem of operator complacency. In one approach, the new algorithm must (1) recognize and isolate objects in the image, (2) discriminate between concealed objects and human anatomy, and (3) discriminate between dangerous and benign concealed objects. The images produced with the SECURE technology are extremely noisy due to the low levels of radiation used. Any algorithm developed must perform well in this noisy environment. Execution of the algorithm must be accomplished in less than a few seconds. Hardware to implement the algorithm must be of a complexity and cost compatible with the commercial SECURE system.

  10. Orienting versus inhibition in the Concealed Information Test: Different cognitive processes drive different physiological measures.

    PubMed

    Selle, Nathalie Klein; Verschuere, Bruno; Kindt, Merel; Meijer, Ewout; Ben-Shakhar, Gershon

    2016-04-01

    The Concealed Information Test (CIT) provides a valid tool for psychophysiological detection of concealed knowledge. However, its precise theoretical underpinnings remain a matter of debate. The differential physiological responses elicited by concealed, relevant items, relative to control items, were traditionally explained as reflecting an orienting response (OR). According to an alternative account, these responses reflect attempts to inhibit arousal. The present study examined whether and to what extent CIT detection efficiency is affected by instructions aimed at manipulating arousal inhibition (AI). One hundred and forty-eight undergraduate students completed a CIT, while electrodermal, cardiac, and respiratory measures were recorded. Half of the participants were requested to imagine that they are suspected of committing a crime and were motivated to avoid detection (presumably eliciting both OR and AI), while the other half were requested to imagine that they are witnesses of a crime and were motivated to be detected (presumably eliciting OR only). All participants were further requested to remain silent throughout the test. In both conditions, concealed items led to a similar increase in skin conductance as compared to the control items. However, the typically observed heart rate deceleration and respiratory suppression were found in suspects, but not in witnesses. These data imply that different mechanisms drive the responding of different psychophysiological measures used in the CIT, with skin conductance reflecting OR, and heart rate and respiration primarily reflecting AI. PMID:26615984

  11. Ego Identity, Social Anxiety, Social Support, and Self-Concealment in Lesbian, Gay, and Bisexual Individuals

    ERIC Educational Resources Information Center

    Potoczniak, Daniel J.; Aldea, Mirela A.; DeBlaere, Cirleen

    2007-01-01

    This study examined a model in which the relationship between social anxiety and two dimensions of ego identity (commitment and exploration) was expected to be mediated by social support and self-concealment for a sample of lesbian, gay, and bisexual individuals (N=347). Statistically significant paths were found from social anxiety to social…

  12. Anxiety and Related Disorders and Concealment in Sexual Minority Young Adults.

    PubMed

    Cohen, Jeffrey M; Blasey, Christine; Barr Taylor, C; Weiss, Brandon J; Newman, Michelle G

    2016-01-01

    Sexual minorities face greater exposure to discrimination and rejection than heterosexuals. Given these threats, sexual minorities may engage in sexual orientation concealment in order to avoid danger. This social stigma and minority stress places sexual minorities at risk for anxiety and related disorders. Given that three fourths of anxiety disorder onset occurs before the age of 24, the current study investigated the symptoms of generalized anxiety disorder, social phobia, panic disorder, posttraumatic stress disorder, and depression in sexual minority young adults relative to their heterosexual peers. Secondarily, the study investigated sexual orientation concealment as a predictor of anxiety and related disorders. A sample of 157 sexual minority and 157 heterosexual young adults matched on age and gender completed self-report measures of the aforementioned disorders, and indicated their level of sexual orientation concealment. Results revealed that sexual minority young adults reported greater symptoms relative to heterosexuals across all outcome measures. There were no interactions between sexual minority status and gender, however, women had higher symptoms across all disorders. Sexual minority young women appeared to be at the most risk for clinical levels of anxiety and related disorders. In addition, concealment of sexual orientation significantly predicted symptoms of social phobia. Implications are offered for the cognitive and behavioral treatment of anxiety and related disorders in this population. PMID:26763500

  13. The Effects of Concealing Academic Achievement Information on Adolescents' Self-Concept

    ERIC Educational Resources Information Center

    Zhang, Baoshan; Wang, Mo; Li, Juan; Yu, Guoliang; Bi, Yan-Ling

    2011-01-01

    Using an experimental design, the effect of concealing academic achievement information on adolescents' self-concept was examined in the current study. Specifically, adolescents with low academic achievement and adolescents with average to high academic achievement (N = 129) were randomly assigned to different interview contexts wherein…

  14. Shape-descriptor-based detection of concealed weapons in millimeter-wave data

    NASA Astrophysics Data System (ADS)

    Slamani, Mohamed-Adel; Ferris, David D., Jr.

    2001-03-01

    Shape parameters based on circularity, Fourier descriptors, and invariant moments are studied for the automatic detection of weapons in millimeter-wave data. The data is collected by a 30-frames-per-second millimeter-wave (MMW) imager manufactured by Trex Enterprises for the detection of weapons concealed underneath a person's clothing. Results are illustrated through processing real MMW data.

  15. Detecting concealed information using feedback related event-related brain potentials.

    PubMed

    Sai, Liyang; Lin, Xiaohong; Hu, Xiaoqing; Fu, Genyue

    2014-10-01

    Employing an event-related potential (ERP)-based concealed information test (CIT), the present study investigated (1) the neurocognitive processes when people received feedbacks regarding their deceptive/truthful responses and (2) whether such feedback-related ERP activities can be used to detect concealed information above and beyond the recognition-related P300. During the CIT, participants were presented with rare, meaningful probes (their own names) embedded within a series of frequent yet meaningless irrelevants (others' names). Participants were instructed to deny their recognition of the probes. Critically, following participants' responses, they were provided with feedbacks regarding whether they succeeded or failed in the CIT. Replicating previous ERP-based CITs, we found a larger P300 elicited by probe compared to irrelevant. Regarding feedback-related ERPs, a temporospatial Principle Component Analyses found two ERP components that were not only sensitive to feedback manipulations but also can discriminate probe from irrelevant: an earlier, central-distributed positivity that was elicited by "success" feedbacks peaked around 219ms; and a later, right central-distributed positivity that was also elicited by "success" feedbacks, peaked around 400ms. Importantly, the feedback ERPs were not correlated with P300 that was elicited by probe/irrelevant, suggesting that these two ERPs reflect independent processes underlying memory concealment. These findings illustrate the feasibility and promise of using feedback-related ERPs to detect concealed memory and thus deception. PMID:25058495

  16. Fear Perceptions in Public Parks: Interactions of Environmental Concealment, the Presence of People Recreating, and Gender

    ERIC Educational Resources Information Center

    Jorgensen, Lisa J.; Ellis, Gary D.; Ruddell, Edward

    2013-01-01

    This research examined the effect of concealment (environmental cues), presence or absence of people recreating (social cues), and gender on individuals' fear of crime in a community park setting. Using a 7-point single-item indicator, 732 participants from two samples (540 park visitors and 192 college students) rated their estimates of fear…

  17. A non-imaging polarized terahertz passive system for detecting and identifying concealed explosives

    NASA Astrophysics Data System (ADS)

    Karam, Mostafa A.; Meyer, Doug

    2011-06-01

    Existing terahertz THz systems for detecting concealed explosives are not capable of identifying explosive type which leads to higher false alarm rates. Moreover, some of those systems are imaging systems that invade personal privacy, and require more processing and computational resources. Other systems have no polarization preference which makes them incapable of capturing the geometric features of an explosive. In this study a non-imaging polarized THz passive system for detecting and identifying concealed explosives overcoming the forgoing shortcomings is developed. The system employs a polarized passive THz sensor in acquiring emitted data from a scene that may have concealed explosives. The acquired data are decomposed into their natural resonance frequencies, and the number of those frequencies is used as criteria in detecting the explosive presence. If the presence of an explosive is confirmed, a set of physically based retrieval algorithms is used in extracting the explosive dielectric constant/refractive index value from natural resonance frequencies and amplitudes of associated signals. Comparing the refractive index value against a database of refractive indexes of known explosives identifies the explosive type. As an application, a system having a dual polarized radiometer operating within the frequency band of 0.62- 0.82 THz is presented and used in detecting and identifying person borne C-4 explosive concealed under a cotton garment. The system showed higher efficiencies in detecting and identifying the explosive.

  18. How Many More Guns?: Estimating the Effect of Allowing Licensed Concealed Handguns on a College Campus

    ERIC Educational Resources Information Center

    Bouffard, Jeffrey A.; Nobles, Matt R.; Wells, William; Cavanaugh, Michael R.

    2012-01-01

    Among other arguments, advocates for lifting bans on carrying concealed handguns on campus propose that this would increase the prevalence of legitimately carried handguns, which might then deter crimes or be used to intervene in campus shooting incidents like the one that took place at Virginia Tech in 2007. Opponents suggest that increased…

  19. The Cost of Question Concealment: Eye-Tracking and MEG Evidence

    ERIC Educational Resources Information Center

    Harris, Jesse; Pylkkanen, Liina; McElree, Brian; Frisson, Steven

    2008-01-01

    Although natural language appears to be largely compositional, the meanings of certain expressions cannot be straightforwardly recovered from the meanings of their parts. This study examined the online processing of one such class of expressions: "concealed questions", in which the meaning of a complex noun phrase ("the proof of the theorem")…

  20. 36-Month-Olds Conceal Visual and Auditory Information from Others

    ERIC Educational Resources Information Center

    Melis, Alicia P.; Call, Josep; Tomasello, Michael

    2010-01-01

    By three years of age, children are skilled at assessing under which circumstances others can see things. However, nothing is known about whether they can use this knowledge to guide their own deceptive behaviour. Here we investigated 3-year-olds' ability to strategically inhibit or conceal forbidden actions that a nearby adult experimenter could…

  1. Telescope Time Allocation Tool

    NASA Astrophysics Data System (ADS)

    Alves, J.

    2005-03-01

    TaToo is ESO's new Time Allocation Tool. This software scheduler is a combination of a user-friendly graphical user interface and an intelligent constraint-programming engine fine-tuned to ESO's scheduling problem. TaToo is able to produce a high quality and reliable schedule taking into consideration all constraints of the recommended programs for all telescopes in about 15 minutes. This performance allows schedulers at ESO-VISAS to simulate and evaluate different scenarios, optimize the scheduling of engineering activities at the observatories, and in the end construct the most science efficient schedule possible.

  2. [Organ allocation. Ethical issues].

    PubMed

    Cattorini, P

    2010-01-01

    The criteria for allocating organs are one of the most debated ethical issue in the transplantation programs. The article examines some rules and principles followed by "Nord Italia Transplant program", summarized in its Principles' Charter and explained in a recent interdisciplinary book. General theories of justice and their application to individual clinical cases are commented and evaluated, in order to foster a public, democratic, transparent debate among professionals and citizens, scientific associations and customers' organizations. Some specific moral dilemmas are focused regarding the concepts of proportionate treatment, unselfish donation by living persons, promotion of local institutions efficiency. PMID:20677677

  3. Concealed explosive detection on personnel using a wideband holographic millimeter-wave imaging system

    NASA Astrophysics Data System (ADS)

    Sheen, David M.; McMakin, Douglas L.; Collins, H. D.; Hall, Thomas E.; Severtsen, Ronald H.

    1996-06-01

    A novel wideband millimeter-wave imaging system is presently being developed at Pacific Northwest National Laboratory (PNNL) that will allow rapid inspection of personnel for concealed explosives, handguns, or other threats. Millimeter-wavelength electromagnetic waves are effective for this application since they readily penetrate common clothing materials, while being partially reflected from the person under surveillance as well as any concealed items. To form an image rapidly, a linear array of 128 antennas is used to electronically scan over a horizontal aperture of 0.75 meters, while the linear array is mechanically swept over a vertical aperture of 2 meters. At each point over this 2-D aperture, coherent wideband data reflected from the target is gathered using wide-beamwidth antennas. The data is recorded coherently, and reconstructed (focused) using an efficient image reconstruction algorithm developed at PNNL. This algorithm works in the near-field of both the target and the scanned aperture and preserves the diffraction limited resolution of less than one-wavelength. The wide frequency bandwidth is used to provide depth resolution, which allows the image to be fully focused over a wide range of depths, resulting in a full 3-D image. This is not possible in a normal optical (or quasi-optical) imaging system. This system has been extensively tested using concealed metal and plastic weapons, and has recently been tested using real plastic explosives (C-4 and RDX) and simulated liquid explosives concealed on personnel. Millimeter-waves do not penetrate the human body, so it is necessary to view the subject from several angles in order to fully inspect for concealed weapons. Full animations containing 36 - 72 frames recorded from subjects rotated by 5 - 10 degrees, have been found to be extremely useful for rapid, effective inspection of personnel.

  4. Computationally efficient control allocation

    NASA Technical Reports Server (NTRS)

    Durham, Wayne (Inventor)

    2001-01-01

    A computationally efficient method for calculating near-optimal solutions to the three-objective, linear control allocation problem is disclosed. The control allocation problem is that of distributing the effort of redundant control effectors to achieve some desired set of objectives. The problem is deemed linear if control effectiveness is affine with respect to the individual control effectors. The optimal solution is that which exploits the collective maximum capability of the effectors within their individual physical limits. Computational efficiency is measured by the number of floating-point operations required for solution. The method presented returned optimal solutions in more than 90% of the cases examined; non-optimal solutions returned by the method were typically much less than 1% different from optimal and the errors tended to become smaller than 0.01% as the number of controls was increased. The magnitude of the errors returned by the present method was much smaller than those that resulted from either pseudo inverse or cascaded generalized inverse solutions. The computational complexity of the method presented varied linearly with increasing numbers of controls; the number of required floating point operations increased from 5.5 i, to seven times faster than did the minimum-norm solution (the pseudoinverse), and at about the same rate as did the cascaded generalized inverse solution. The computational requirements of the method presented were much better than that of previously described facet-searching methods which increase in proportion to the square of the number of controls.

  5. Research on allocation efficiency of the daisy chain allocation algorithm

    NASA Astrophysics Data System (ADS)

    Shi, Jingping; Zhang, Weiguo

    2013-03-01

    With the improvement of the aircraft performance in reliability, maneuverability and survivability, the number of the control effectors increases a lot. How to distribute the three-axis moments into the control surfaces reasonably becomes an important problem. Daisy chain method is simple and easy to be carried out in the design of the allocation system. But it can not solve the allocation problem for entire attainable moment subset. For the lateral-directional allocation problem, the allocation efficiency of the daisy chain can be directly measured by the area of its subset of attainable moments. Because of the non-linear allocation characteristic, the subset of attainable moments of daisy-chain method is a complex non-convex polygon, and it is difficult to solve directly. By analyzing the two-dimensional allocation problems with a "micro-element" idea, a numerical calculation algorithm is proposed to compute the area of the non-convex polygon. In order to improve the allocation efficiency of the algorithm, a genetic algorithm with the allocation efficiency chosen as the fitness function is proposed to find the best pseudo-inverse matrix.

  6. Deutschunterricht fuer Blinde. (German Instruction for the Blind)

    ERIC Educational Resources Information Center

    Vaverkova, Irena

    1978-01-01

    The working group "German for the Blind" of the Slovakian Modern Language Association in Bratislava (Czechoslovakia) outlines its program to investigate didactic-methodological-psychological problems in foreign language teaching for the blind, to develop modern and effective methods, textbooks and aids for blind schools and for adult…

  7. Sighted Children Learn About Blindness

    ERIC Educational Resources Information Center

    Scheffers, Wenda L.

    1977-01-01

    In a 20-lesson unit, sighted second-to fourth-grade students were taught about the long cane, guide dogs, daily living skills, eye physiology, causes of blindness, eye care, braille, and attitudes toward blindness. (CL)

  8. Testing Children for Color Blindness

    MedlinePlus

    ... Español Eye Health / News Testing Children for Color Blindness Written by: Shirley Dang Apr. 03, 2014 New ... shows that kids can be tested for color blindness as soon as age 4, finds Caucasian boys ...

  9. Culture and Change Blindness

    ERIC Educational Resources Information Center

    Masuda, Takahiko; Nisbett, Richard E.

    2006-01-01

    Research on perception and cognition suggests that whereas East Asians view the world holistically, attending to the entire field and relations among objects, Westerners view the world analytically, focusing on the attributes of salient objects. These propositions were examined in the change-blindness paradigm. Research in that paradigm finds…

  10. Folklore of Blindness.

    ERIC Educational Resources Information Center

    Wagner-Lampl, A.; Oliver, G. W.

    1994-01-01

    This article uses both case examples and reports from archives and oral literature to illustrate the broad range of connections between blindness and superstitions, folklore, beliefs, and mythology. Clinicians are urged to be aware of these beliefs as they counsel individuals adapting to the loss of vision. (Author/DB)

  11. Blinded by Science.

    ERIC Educational Resources Information Center

    Snyder, Tom

    1994-01-01

    Huge infusion of technology is coming into education; nothing can stop it, because so much money is involved. With computer marketers in driver seat instead of teachers, schools risk being blinded by science. Vendors have coopted progressive education buzzwords, including "frontal teaching,""linear thinking," and "computer equity." Limited…

  12. Homer: The Blind Bard

    ERIC Educational Resources Information Center

    Doorley, Rachelle; King, Judith

    2005-01-01

    This article describes notable cultural, historical, and artistic elements emanating from sculptures originating in ancient Greece. The "blind bard" and its connection to the legendary Greek poet, Homer; Homer's impact on literary history; trends among Roman sculptures; and Roman replication of Greek art are described. Questions to consider are…

  13. Corneal blindness and xenotransplantation.

    PubMed

    Lamm, Vladimir; Hara, Hidetaka; Mammen, Alex; Dhaliwal, Deepinder; Cooper, David K C

    2014-01-01

    Approximately 39 million people are blind worldwide, with an estimated 285 million visually impaired. The developing world shoulders 90% of the world's blindness, with 80% of causative diseases being preventable or treatable. Blindness has a major detrimental impact on the patient, community, and healthcare spending. Corneal diseases are significant causes of blindness, affecting at least 4 million people worldwide. The prevalence of corneal disease varies between parts of the world. Trachoma, for instance, is the second leading cause of blindness in Africa, after cataracts, but is rarely found today in developed nations. When preventive strategies have failed, corneal transplantation is the most effective treatment for advanced corneal disease. The major surgical techniques for corneal transplantation include penetrating keratoplasty (PK), anterior lamellar keratoplasty, and endothelial keratoplasty (EK). Indications for corneal transplantation vary between countries, with Fuchs' dystrophy being the leading indication in the USA and keratoconus in Australia. With the exception of the USA, where EK will soon overtake PK as the most common surgical procedure, PK is the overwhelming procedure of choice. Success using corneal grafts in developing nations, such as Nepal, demonstrates the feasibility of corneal transplantation on a global scale. The number of suitable corneas from deceased human donors that becomes available will never be sufficient, and so research into various alternatives, for example stem cells, amniotic membrane transplantation, synthetic and biosynthetic corneas, and xenotransplantation, is progressing. While each of these has potential, we suggest that xenotransplantation holds the greatest potential for a corneal replacement. With the increasing availability of genetically engineered pigs, pig corneas may alleviate the global shortage of corneas in the near future. PMID:25268248

  14. Programs for the Deaf Blind.

    ERIC Educational Resources Information Center

    American Annals of the Deaf, 1987

    1987-01-01

    The directory lists 30 programs for deaf-blind children and youth, the 10 regional offices of the Helen Keller National Center for Deaf-Blind Youths and Adults, and five programs for training teachers of the deaf-blind. Provided for each program is address, director's name, and phone number. (DB)

  15. Concealed threat detection with the IRAD sub-millimeter wave 3D imaging radar

    NASA Astrophysics Data System (ADS)

    Robertson, Duncan A.; Cassidy, Scott L.; Jones, Ben; Clark, Anthony

    2014-06-01

    Sub-millimeter wave 3D imaging radar is a promising technology for the stand-off detection of threats concealed on people. The IRAD 340 GHz 3D imaging radar uses polarization intensity information to identify signatures associated with concealed threats. We report on an extensive trials program which has been carried out involving dozens of individual subjects wearing a variety of different clothing to evaluate the detection of a wide range of threat and benign items. We have developed an automatic algorithm to run on the radar which yields a level of anomaly indication in real time. Statistical analysis of the large volume of recorded data has enabled performance metrics for the radar system to be evaluated.

  16. Time-delay concealment and complexity enhancement of an external-cavity laser through optical injection.

    PubMed

    Li, Nianqiang; Pan, Wei; Locquet, A; Citrin, D S

    2015-10-01

    The concealment of the time-delay signature (TDS) of chaotic external-cavity lasers is necessary to ensure the security of optical chaos-based cryptosystems. We show that this signature can be removed simply by optically injecting an external-cavity laser with a large linewidth-enhancement factor into a second, noninjection-locked, semiconductor laser. Concealment is ensured both in the amplitude and in the phase of the optical field, satisfying a sought-after property of optical chaos-based communications. Meanwhile, enhancement of the dynamical complexity, characterized by permutation entropy, coincides with strong TDS suppression over a wide range of parameters, the area for which depends sensitively on the linewidth-enhancement factor. PMID:26421545

  17. Terahertz absorbance spectrum fitting method for quantitative detection of concealed contraband

    NASA Astrophysics Data System (ADS)

    Wang, Yingxin; Zhao, Ziran; Chen, Zhiqiang; Kang, Kejun; Feng, Bing; Zhang, Yan

    2007-12-01

    We present a quantitative method for the nondestructive detection of concealed contraband based on terahertz transmission spectroscopy. Without knowing the prior information of barrier materials, the amount of concealed contraband can be extracted by approximating the terahertz absorbance spectrum of the barrier material with a low-order polynomial and then fitting the measured absorbance spectrum of the inspected object with the polynomial and the known standard spectrum of this kind of contraband. We verify the validity of this method using a sample of explosive 1,3,5-trinitro-s-triazine (RDX) covered with several different barrier materials which are commonly encountered in actual inspection, and good agreement between the calculated and actual value of the amount of RDX is obtained for the experiments performed under both nitrogen and air atmospheres. This indicates that the presented method can achieve quantitative detection of hidden contraband, which is important for security inspection applications.

  18. Identifying the location of a concealed object through unintentional eye movements.

    PubMed

    Neuman, Yair; Assaf, Dan; Israeli, Navot

    2015-01-01

    In some investigative and interrogative contexts, the investigator is seeking to identify the location of an object (e.g., implanted bomb) which is known to a given subject (e.g., a terrorist). In this paper, we present a non-intrusive methodology for uncovering the loci of a concealed object by analyzing the subject's eye movements. Using a combination of eye tracking, psychological manipulation and a search algorithm, we have performed two experiments. In the first experiment, we have gained 58% hit rate in identifying the location of the concealed object and in the second experiment 56% hit rate. The pros and cons of the methodology for forensic investigation are discussed. PMID:25904879

  19. Identifying the location of a concealed object through unintentional eye movements

    PubMed Central

    Neuman, Yair; Assaf, Dan; Israeli, Navot

    2015-01-01

    In some investigative and interrogative contexts, the investigator is seeking to identify the location of an object (e.g., implanted bomb) which is known to a given subject (e.g., a terrorist). In this paper, we present a non-intrusive methodology for uncovering the loci of a concealed object by analyzing the subject's eye movements. Using a combination of eye tracking, psychological manipulation and a search algorithm, we have performed two experiments. In the first experiment, we have gained 58% hit rate in identifying the location of the concealed object and in the second experiment 56% hit rate. The pros and cons of the methodology for forensic investigation are discussed. PMID:25904879

  20. Unsupervised image segmentation for passive THz broadband images for concealed weapon detection

    NASA Astrophysics Data System (ADS)

    Ramírez, Mabel D.; Dietlein, Charles R.; Grossman, Erich; Popović, Zoya

    2007-04-01

    This work presents the application of a basic unsupervised classification algorithm for the segmentation of indoor passive Terahertz images. The 30,000 pixel broadband images of a person with concealed weapons under clothing are taken at a range of 0.8-2m over a frequency range of 0.1-1.2THz using single-pixel row-based raster scanning. The spiral-antenna coupled 36x1x0.02μm Nb bridge cryogenic micro-bolometers are developed at NIST-Optoelectronics Division. The antenna is evaporated on a 250μm thick Si substrate with a 4mm diameter hyper-hemispherical Si lens. The NETD of the microbolometer is 125mK at an integration time of 30 ms. The background temperature calibration is performed with a known 25 pixel source above 330 K, and a measured background fluctuation of 200-500mK. Several weapons were concealed under different fabrics: cotton, polyester, windblocker jacket and thermal sweater. Measured temperature contrasts ranged from 0.5-1K for wrinkles in clothing to 5K for a zipper and 8K for the concealed weapon. In order to automate feature detection in the images, some image processing and pattern recognition techniques have been applied and the results are presented here. We show that even simple algorithms, that can potentially be performed in real time, are capable of differentiating between a metal and a dielectric object concealed under clothing. Additionally, we show that pre-processing can reveal low temperature contrast features, such as folds in clothing.

  1. Antidromic Atrioventricular Reciprocating Tachycardia Using a Concealed Retrograde Conducting Left Lateral Accessory Pathway.

    PubMed

    Gonzalez, Jaime E; Zipse, Matthew M; Nguyen, Duy T; Sauer, William H

    2016-03-01

    Atrioventricular reciprocating tachycardia is a common cause of undifferentiated supraventricular tachycardia. In patients with manifest or concealed accessory pathways, it is imperative to assess for the presence of other accessory pathways. Multiple accessory pathways are present in 4% to 10% of patients and are more common in patients with structural heart disease. In rare cases, multiple accessory pathways can act as the anterograde and retrograde limbs of the tachycardia. PMID:26920167

  2. ARPA/NIJ/Rome Laboratory concealed weapon detection program: an overview

    NASA Astrophysics Data System (ADS)

    Currie, Nicholas C.; Demma, Fred J.; Ferris, David D., Jr.; McMillan, Robert W.; Wicks, Michael C.

    1996-06-01

    Recent advances in passive and active imaging and non- imaging sensor technology offer the potential to detect weapons that are concealed beneath a person's clothing. Sensors that are discussed in this paper are characterized as either non-imaging or imaging. Non-imaging sensors include wide band radar and portal devices such as metal detectors. In general the strength of non-imaging sensors rest with the fact that they are generally inexpensive and can rapidly perform bulk separation between regions where persons are likely to be carrying concealed weapons and those regions that are likely to contain persons who are unarmed. The bulk process is typically accomplished at the expense of false alarm rate. Millimeter-wave (MMW), microwave, x-ray, acoustic, magnetic, and infrared (IR) imaging sensor technologies provide with greater certainty the means to isolate persons within a crowd that are carrying concealed weapons and to identify the weapon type. The increased certainty associated with imaging sensors is accomplished at the expense of cost and bulk surveillance of the crowd. CWD technologies have a variety of military and civilian applications. This technology focus area addresses specific military needs under the Defense Advanced Research Projects Agency's (DARPA) operations other than war/law enforcement (OOTW/LE). Additionally, this technology has numerous civilian law enforcement applications that are being investigated under the National Institute of Justice's (NIJ) Concealed Weapons Detection program. This paper discusses the wide variety of sensors that might be employed in support of a typical scenario, the strengths and weaknesses of each of the sensors relative to the given scenario, and how CWD breadboards will be tested to determine the optimal CWD application. It rapidly becomes apparent that no single sensor will completely satisfy the CWD mission necessitating the fusion of two or more of these sensors.

  3. Tracheal tube obstruction in a case of concealed tracheomalacia--a case report.

    PubMed

    Athanassiou, L; Charissi, N

    2005-06-01

    We report on the successful mangement of airway obstruction, immediately after tracheal intubation for elective operation, in a patient with concealed tracheomalacia. We discuss the issues posed in patients with mild or undiagnosed chronic obstructive pulmonary disease (COPD) that are relevant to tracheomalacia. We underline the link between tracheomalacia and COPD and emphasize the high level of awareness needed, in order to avoid or manage promptly adverse events during airway management for anesthesia in these patients. PMID:16438015

  4. Three-Dimensional Millimeter-wave Imaging for Concealed Weapon Detection

    SciTech Connect

    Sheen, David M. ); McMakin, Douglas L. ); Hall, Thomas E. )

    2000-12-01

    Millimeter-wave imaging techniques and systems have been developed at the Pacific Northwest National Laboratory (PNNL) for the detection of concealed weapons and contraband at airports and other secure locations. These techniques were derived from microwave holography techniques which utilize phase and amplitude information recorded over a two-dimensional aperture to reconstruct a focused image of the target. Millimeter-wave imaging is well suited to the detection of concealed weapons or other contraband carried on personnel since millimeter-waves are non-ionizing, readily penetrate common clothing material, and are reflected from the human body and any concealed items. In this paper, a wide-bandwidth, three-dimensional, holographic microwave imaging technique is described. Practical weapon detection systems for airport, or other high-throughput applications, require high-speed scanning on the order of 3 to 10 seconds. To achieve this goal, a prototype imaging system utilizing a 2 7-33 GHz linear sequentially switched array and a high-speed linear scanner has been developed and tested. This system is described in detail along with numerous imaging results.

  5. Image fusion based on millimeter-wave for concealed weapon detection

    NASA Astrophysics Data System (ADS)

    Zhu, Weiwen; Zhao, Yuejin; Deng, Chao; Zhang, Cunlin; Zhang, Yalin; Zhang, Jingshui

    2010-11-01

    This paper describes a novel multi sensors image fusion technology which is presented for concealed weapon detection (CWD). It is known to all, because of the good transparency of the clothes at millimeter wave band, a millimeter wave radiometer can be used to image and distinguish concealed contraband beneath clothes, for example guns, knives, detonator and so on. As a result, we adopt the passive millimeter wave (PMMW) imaging technology for airport security. However, in consideration of the wavelength of millimeter wave and the single channel mechanical scanning, the millimeter wave image has law optical resolution, which can't meet the need of practical application. Therefore, visible image (VI), which has higher resolution, is proposed for the image fusion with the millimeter wave image to enhance the readability. Before the image fusion, a novel image pre-processing which specifics to the fusion of millimeter wave imaging and visible image is adopted. And in the process of image fusion, multi resolution analysis (MRA) based on Wavelet Transform (WT) is adopted. In this way, the experiment result shows that this method has advantages in concealed weapon detection and has practical significance.

  6. Preventing shoulder-surfing attack with the concept of concealing the password objects' information.

    PubMed

    Ho, Peng Foong; Kam, Yvonne Hwei-Syn; Wee, Mee Chin; Chong, Yu Nam; Por, Lip Yee

    2014-01-01

    Traditionally, picture-based password systems employ password objects (pictures/icons/symbols) as input during an authentication session, thus making them vulnerable to "shoulder-surfing" attack because the visual interface by function is easily observed by others. Recent software-based approaches attempt to minimize this threat by requiring users to enter their passwords indirectly by performing certain mental tasks to derive the indirect password, thus concealing the user's actual password. However, weaknesses in the positioning of distracter and password objects introduce usability and security issues. In this paper, a new method, which conceals information about the password objects as much as possible, is proposed. Besides concealing the password objects and the number of password objects, the proposed method allows both password and distracter objects to be used as the challenge set's input. The correctly entered password appears to be random and can only be derived with the knowledge of the full set of password objects. Therefore, it would be difficult for a shoulder-surfing adversary to identify the user's actual password. Simulation results indicate that the correct input object and its location are random for each challenge set, thus preventing frequency of occurrence analysis attack. User study results show that the proposed method is able to prevent shoulder-surfing attack. PMID:24991649

  7. Stepped-frequency CW radar for concealed weapon detection and through-the-wall surveillance

    NASA Astrophysics Data System (ADS)

    Hunt, Allen R.; Hogg, R. Douglas

    2002-08-01

    Both concealed weapons detection and through the wall surveillance are significant problems for both law enforcement and military personnel. While on the surface it would appear that these two problems are unrelated technologically, they do, in fact, share some common ground. A concealed weapon acts as resonant object, exhibiting electromagnetic resonance peaks at frequencies characteristic of the weapon's major dimensions. For handguns the frequency range of interest lies approximately between 450 MHz and 2 GHz. As it turns out, this is also a region over which many common building materials are largely transparent. As part of grant 97-IJ-CX-K013 from the National Institute of Justice, AKELA, Inc. has developed a stepped-frequency, CW radar that covers this frequency range. The radar is digitally synthesized and controlled and has a range resolution of approximately 4'. Digital waveform control gives the radar the ability to avoid interference with other electronic devices, to tailor data collection for signal processing requirements, and to change its sweep time in response to operational requirements. AKELA has developed a brassboard concealed weapons detector that uses this radar. A through the wall imaging system that uses the radar is currently in development under AFRL Contract F30602-00-C-0205.

  8. Concealed neuroanatomy in Michelangelo's Separation of Light From Darkness in the Sistine Chapel.

    PubMed

    Suk, Ian; Tamargo, Rafael J

    2010-05-01

    Michelangelo Buonarroti (1475-1564) was a master anatomist as well as an artistic genius. He dissected cadavers numerous times and developed a profound understanding of human anatomy. From 1508 to 1512, Michelangelo painted the ceiling of the Sistine Chapel in Rome. His Sistine Chapel frescoes are considered one of the monumental achievements of Renaissance art. In the winter of 1511, Michelangelo entered the final stages of the Sistine Chapel project and painted 4 frescoes along the longitudinal apex of the vault, which completed a series of 9 central panels depicting scenes from the Book of Genesis. It is reported that Michelangelo concealed an image of the brain in the first of these last 4 panels, namely, the Creation of Adam. Here we present evidence that he concealed another neuronanatomic structure in the final panel of this series, the Separation of Light From Darkness, specifically a ventral view of the brainstem. The Separation of Light From Darkness is an important panel in the Sistine Chapel iconography because it depicts the beginning of Creation and is located directly above the altar. We propose that Michelangelo, a deeply religious man and an accomplished anatomist, intended to enhance the meaning of this iconographically critical panel and possibly document his anatomic accomplishments by concealing this sophisticated neuroanatomic rendering within the image of God. PMID:20404688

  9. Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects' Information

    PubMed Central

    Ho, Peng Foong; Kam, Yvonne Hwei-Syn; Wee, Mee Chin

    2014-01-01

    Traditionally, picture-based password systems employ password objects (pictures/icons/symbols) as input during an authentication session, thus making them vulnerable to “shoulder-surfing” attack because the visual interface by function is easily observed by others. Recent software-based approaches attempt to minimize this threat by requiring users to enter their passwords indirectly by performing certain mental tasks to derive the indirect password, thus concealing the user's actual password. However, weaknesses in the positioning of distracter and password objects introduce usability and security issues. In this paper, a new method, which conceals information about the password objects as much as possible, is proposed. Besides concealing the password objects and the number of password objects, the proposed method allows both password and distracter objects to be used as the challenge set's input. The correctly entered password appears to be random and can only be derived with the knowledge of the full set of password objects. Therefore, it would be difficult for a shoulder-surfing adversary to identify the user's actual password. Simulation results indicate that the correct input object and its location are random for each challenge set, thus preventing frequency of occurrence analysis attack. User study results show that the proposed method is able to prevent shoulder-surfing attack. PMID:24991649

  10. Video inpainting with short-term windows: application to object removal and error concealment.

    PubMed

    Ebdelli, Mounira; Le Meur, Olivier; Guillemot, Christine

    2015-10-01

    In this paper, we propose a new video inpainting method which applies to both static or free-moving camera videos. The method can be used for object removal, error concealment, and background reconstruction applications. To limit the computational time, a frame is inpainted by considering a small number of neighboring pictures which are grouped into a group of pictures (GoP). More specifically, to inpaint a frame, the method starts by aligning all the frames of the GoP. This is achieved by a region-based homography computation method which allows us to strengthen the spatial consistency of aligned frames. Then, from the stack of aligned frames, an energy function based on both spatial and temporal coherency terms is globally minimized. This energy function is efficient enough to provide high quality results even when the number of pictures in the GoP is rather small, e.g. 20 neighboring frames. This drastically reduces the algorithm complexity and makes the approach well suited for near real-time video editing applications as well as for loss concealment applications. Experiments with several challenging video sequences show that the proposed method provides visually pleasing results for object removal, error concealment, and background reconstruction context. PMID:26011884

  11. Active wideband 350GHz imaging system for concealed-weapon detection

    NASA Astrophysics Data System (ADS)

    Sheen, David M.; Hall, Thomas E.; Severtsen, Ronald H.; McMakin, Douglas L.; Hatchell, Brian K.; Valdez, Patrick L. J.

    2009-05-01

    A prototype active wideband 350 GHz imaging system has been developed to address the urgent need for standoff concealed-weapon detection. This system is based on a wideband, heterodyne, frequency-multiplier-based transceiver system coupled to a quasi-optical focusing system and high-speed conical scanner. This system is able to quickly scan personnel for concealed weapons. Additionally, due to the wideband operation, this system provides accurate ranging information, and the images obtained are fully three-dimensional. Waves in the microwave, millimeter-wave, and terahertz (3 GHz to 1 THz) frequency bands are able to penetrate many optical obscurants, and can be used to form the basis of high-resolution imaging systems. Waves in the sub-millimeter-wave band (300 GHz to 1 THz) are particularly interesting for standoff concealed-weapon detection at ranges of 5 - 20+ meters, due to their unique combination of high resolution and clothing penetration. The Pacific Northwest National Laboratory (PNNL) has previously developed portal screening systems that operate at the lower end of the millimeter-wave frequency range around 30 GHz. These systems are well suited for screening within portals; however, increasing the range of these systems would dramatically reduce the resolution due to diffraction at their relatively long wavelength. In this paper, the standoff 350 GHz imaging system is described in detail and numerous imaging results are presented.

  12. Fixations and eye-blinks allow for detecting concealed crime related memories.

    PubMed

    Peth, Judith; Kim, Johann S C; Gamer, Matthias

    2013-04-01

    The Concealed Information Test (CIT) is a method of forensic psychophysiology that allows for revealing concealed crime related knowledge. Such detection is usually based on autonomic responses but there is a huge interest in other measures that can be acquired unobtrusively. Eye movements and blinks might be such measures but their validity is unclear. Using a mock crime procedure with a manipulation of the arousal during the crime as well as the delay between crime and CIT, we tested whether eye tracking measures allow for detecting concealed knowledge. Guilty participants showed fewer but longer fixations on central crime details and this effect was even present after stimulus offset and accompanied by a reduced blink rate. These ocular measures were partly sensitive for induction of emotional arousal and time of testing. Validity estimates were moderate but indicate that a significant differentiation between guilty and innocent subjects is possible. Future research should further investigate validity differences between gaze measures during a CIT and explore the underlying mechanisms. PMID:23511446

  13. On the sensitivity of terahertz gyrotron based systems for remote detection of concealed radioactive materials

    NASA Astrophysics Data System (ADS)

    Nusinovich, G. S.; Sprangle, P.; Semenov, V. E.; Dorozhkina, D. S.; Glyavin, M. Yu

    2012-06-01

    This paper analyzes some features of systems intended to remotely detect concealed radioactive materials by using a focused THz radiation. This concept is based on possibility to focus high-power THz radiation in a small spot where the wave field exceeds the breakdown threshold. However, in the absence of any sources of ionization, the probability to have in this breakdown-prone volume any seed electrons is very low. Thus, high breakdown rate in a series of THz pulses will indicate the presence of concealed radioactive materials in the vicinity of a focused wave beam. The goal of the present paper is to determine by using the statistical theory THz pulse duration required for reliable initiation of the discharge. Then, the detectable mass of the radioactive material is determined as the function of distance and of the THz wave power and pulse duration. Lastly, possible benefits from using pulse compressors, which shorten the pulse duration but increase the wave power and, hence, the breakdown-prone volume, are analyzed. It is shown that the use of pulse compressors can significantly improve the sensitivity of THz gyrotron based systems for remote detection of concealed radioactive materials.

  14. Disclosure and Concealment of Sexual Orientation and the Mental Health of Non-Gay-Identified, Behaviorally-Bisexual Men

    PubMed Central

    Schrimshaw, Eric W.; Siegel, Karolynn; Downing, Martin J.; Parsons, Jeffrey T.

    2013-01-01

    Objective Although bisexual men report lower levels of mental health relative to gay men, few studies have examined the factors that contribute to bisexual men’s mental health. Bisexual men are less likely to disclose, and more likely to conceal (i.e., a desire to hide), their sexual orientation than gay men. Theory suggests that this may adversely impact their mental health. This report examined the factors associated with disclosure and with concealment of sexual orientation, the association of disclosure and concealment with mental health, and the potential mediators (i.e., internalized homophobia, social support) of this association with mental health. Method An ethnically-diverse sample of 203 non-gay-identified, behaviorally-bisexual men who do not disclose their same-sex behavior to their female partners were recruited in New York City to complete a single set of self-report measures. Results Concealment was associated with higher income, a heterosexual identification, living with a wife or girlfriend, more frequent sex with women, and less frequent sex with men. Greater concealment, but not disclosure to friends and family, was significantly associated with lower levels of mental health. Multiple mediation analyses revealed that both internalized homophobia and general emotional support significantly mediated the association between concealment and mental health. Conclusions The findings demonstrate that concealment and disclosure are independent constructs among bisexual men. Further, they suggest that interventions addressing concerns about concealment, emotional support, and internalized homophobia may be more beneficial for increasing the mental health of bisexual men than those focused on promoting disclosure. PMID:23276123

  15. [Blindness after prostate biopsy].

    PubMed

    Heinzelbecker, J; von Zastrow, C; Alken, P

    2009-02-01

    We report on a case of sepsis-associated irreversible blindness in a patient after transrectal rebiopsy of the prostate. The patient was on immunosuppressive and long-term antibiotic treatment. Such a severe complication after transrectal biopsy of the prostate is unusual. Peri-interventional antibiotic prophylaxis reduces the general risk for infections after needle biopsy of the prostate. To avoid severe complications, suitable antibiotic prophylaxis in high-risk patients is recommended. PMID:19037622

  16. Blind shaft development

    SciTech Connect

    Fiscor, S.

    2009-02-15

    The article discusses how Shaft Drillers International (SDI) is breaking new ground in shaft development and ground stabilization. Techniques of blind shaft drilling and raise bore shaft development developed by SDI are briefly explained. An associated company, Coastal Drilling East, deals with all types of ground improvement such as pre-grouting work for shafts, grouting of poor soil and water leaks into the mine. 3 photos.

  17. Stochastic blind motion deblurring.

    PubMed

    Xiao, Lei; Gregson, James; Heide, Felix; Heidrich, Wolfgang

    2015-10-01

    Blind motion deblurring from a single image is a highly under-constrained problem with many degenerate solutions. A good approximation of the intrinsic image can, therefore, only be obtained with the help of prior information in the form of (often nonconvex) regularization terms for both the intrinsic image and the kernel. While the best choice of image priors is still a topic of ongoing investigation, this research is made more complicated by the fact that historically each new prior requires the development of a custom optimization method. In this paper, we develop a stochastic optimization method for blind deconvolution. Since this stochastic solver does not require the explicit computation of the gradient of the objective function and uses only efficient local evaluation of the objective, new priors can be implemented and tested very quickly. We demonstrate that this framework, in combination with different image priors produces results with Peak Signal-to-Noise Ratio (PSNR) values that match or exceed the results obtained by much more complex state-of-the-art blind motion deblurring algorithms. PMID:25974941

  18. Collaborative Resource Allocation

    NASA Technical Reports Server (NTRS)

    Wang, Yeou-Fang; Wax, Allan; Lam, Raymond; Baldwin, John; Borden, Chester

    2007-01-01

    Collaborative Resource Allocation Networking Environment (CRANE) Version 0.5 is a prototype created to prove the newest concept of using a distributed environment to schedule Deep Space Network (DSN) antenna times in a collaborative fashion. This program is for all space-flight and terrestrial science project users and DSN schedulers to perform scheduling activities and conflict resolution, both synchronously and asynchronously. Project schedulers can, for the first time, participate directly in scheduling their tracking times into the official DSN schedule, and negotiate directly with other projects in an integrated scheduling system. A master schedule covers long-range, mid-range, near-real-time, and real-time scheduling time frames all in one, rather than the current method of separate functions that are supported by different processes and tools. CRANE also provides private workspaces (both dynamic and static), data sharing, scenario management, user control, rapid messaging (based on Java Message Service), data/time synchronization, workflow management, notification (including emails), conflict checking, and a linkage to a schedule generation engine. The data structure with corresponding database design combines object trees with multiple associated mortal instances and relational database to provide unprecedented traceability and simplify the existing DSN XML schedule representation. These technologies are used to provide traceability, schedule negotiation, conflict resolution, and load forecasting from real-time operations to long-range loading analysis up to 20 years in the future. CRANE includes a database, a stored procedure layer, an agent-based middle tier, a Web service wrapper, a Windows Integrated Analysis Environment (IAE), a Java application, and a Web page interface.

  19. A double-blind, randomized controlled trial to compare the effect of biannual peripheral magnetic resonance imaging, radiography and standard of care disease progression monitoring on pharmacotherapeutic escalation in rheumatoid and undifferentiated inflammatory arthritis: study protocol for a randomized controlled trial

    PubMed Central

    2014-01-01

    Background Permanent joint damage is a major consequence of rheumatoid arthritis (RA), the most common and destructive form of inflammatory arthritis. In aggressive disease, joint damage can occur within 6 months from symptom onset. Early, intensive treatment with conventional and biologic disease-modifying anti-rheumatic drugs (DMARDs) can delay the onset and progression of joint damage. The primary objective of the study is to investigate the value of magnetic resonance imaging (MRI) or radiography (X-ray) over standard of care as tools to guide DMARD treatment decision-making by rheumatologists for the care of RA. Methods A double-blind, randomized controlled trial has been designed. Rheumatoid and undifferentiated inflammatory arthritis patients will undergo an MRI and X-ray assessment every 6 months. Baseline adaptive randomization will be used to allocate participants to MRI, X-ray, or sham-intervention groups on a background of standard of care. Prognostic markers, treating physician, and baseline DMARD therapy will be used as intervention allocation parameters. The outcome measures in rheumatology RA MRI score and the van der Heijde-modified Sharp score will be used to evaluate the MRI and X-ray images, respectively. Radiologists will score anonymized images for all patients regardless of intervention allocation. Disease progression will be determined based on the study-specific, inter-rater smallest detectable difference. Allocation-dependent, intervention-concealed reports of positive or negative disease progression will be reported to the treating rheumatologist. Negative reports will be delivered for the sham-intervention group. Study-based radiology clinical reports will be provided to the treating rheumatologists for extra-study X-ray requisitions to limit patient radiation exposure as part of diagnostic imaging standard of care. DMARD treatment dose escalation and therapy changes will be measured to evaluate the primary objective. A sample size of

  20. Compact multiframe blind deconvolution.

    PubMed

    Hope, Douglas A; Jefferies, Stuart M

    2011-03-15

    We describe a multiframe blind deconvolution (MFBD) algorithm that uses spectral ratios (the ratio of the Fourier spectra of two data frames) to model the inherent temporal signatures encoded by the observed images. In addition, by focusing on the separation of the object spectrum and system transfer functions only at spatial frequencies where the measured signal is above the noise level, we significantly reduce the number of unknowns to be determined. This "compact" MFBD yields high-quality restorations in a much shorter time than is achieved with MFBD algorithms that do not model the temporal signatures; it may also provide higher-fidelity solutions. PMID:21403711

  1. Unsupervised Blind Deconvolution

    NASA Astrophysics Data System (ADS)

    Baena-Galle, R.; Kann, L.; Mugnier, L.; Gudimetla, R.; Johnson, R.; Gladysz, S.

    2013-09-01

    "Blind" deconvolution is rarely executed blindly. All available methods have parameters which the user fine-tunes until the most visually-appealing reconstruction is achieved. The "art" of deconvolution is to find constraints which allow for the best estimate of an object to be recovered, but in practice these parameterized constraints often reduce deconvolution to the struggle of trial and error. In the course of AFOSR-sponsored activities we are developing a general maximum a posteriori framework for the problem of imaging through atmospheric turbulence, with the emphasis on multi-frame blind deconvolution. Our aim is to develop deconvolution strategy which is reference-less, i.e. no calibration PSF is required, extendable to longer exposures, and applicable to imaging with adaptive optics. In the first part of the project the focus has been on developing a new theory of statistics of images taken through turbulence, both with-, and without adaptive optics. Images and their Fourier transforms have been described as random phasor sums, their fluctuations controlled by wavefront "cells" and moments of the phase. The models were validated using simulations and real data from the 3.5m telescope at the Starfire Optical Range in New Mexico. Another important ingredient of the new framework is the capability to estimate the average PSF automatically from the target observations. A general approach, applicable to any type of object, has been proposed. Here use is made of an object-cancelling transformation of the image sequence. This transformation yields information about the atmospheric PSF. Currently, the PSF estimation module and the theoretical constraints on PSF variability are being incorporated into multi-frame blind deconvolution. In preliminary simulation tests we obtained significantly sharper images with respect to the starting observations and PSF estimates which closely track the input kernels. Thanks to access to the SOR 3.5m telescope we are now testing

  2. 24 CFR 92.50 - Formula allocation.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 24 Housing and Urban Development 1 2011-04-01 2011-04-01 false Formula allocation. 92.50 Section 92.50 Housing and Urban Development Office of the Secretary, Department of Housing and Urban Development HOME INVESTMENT PARTNERSHIPS PROGRAM Allocation Formula § 92.50 Formula allocation. (a) Jurisdictions eligible for a formula allocation. HUD...

  3. Ultra-wide-band 3D microwave imaging scanner for the detection of concealed weapons

    NASA Astrophysics Data System (ADS)

    Rezgui, Nacer-Ddine; Andrews, David A.; Bowring, Nicholas J.

    2015-10-01

    The threat of concealed weapons, explosives and contraband in footwear, bags and suitcases has led to the development of new devices, which can be deployed for security screening. To address known deficiencies of metal detectors and x-rays, an UWB 3D microwave imaging scanning apparatus using FMCW stepped frequency working in the K and Q bands and with a planar scanning geometry based on an x y stage, has been developed to screen suspicious luggage and footwear. To obtain microwave images of the concealed weapons, the targets are placed above the platform and the single transceiver horn antenna attached to the x y stage is moved mechanically to perform a raster scan to create a 2D synthetic aperture array. The S11 reflection signal of the transmitted sweep frequency from the target is acquired by a VNA in synchronism with each position step. To enhance and filter from clutter and noise the raw data and to obtain the 2D and 3D microwave images of the concealed weapons or explosives, data processing techniques are applied to the acquired signals. These techniques include background subtraction, Inverse Fast Fourier Transform (IFFT), thresholding, filtering by gating and windowing and deconvolving with the transfer function of the system using a reference target. To focus the 3D reconstructed microwave image of the target in range and across the x y aperture without using focusing elements, 3D Synthetic Aperture Radar (SAR) techniques are applied to the post-processed data. The K and Q bands, between 15 to 40 GHz, show good transmission through clothing and dielectric materials found in luggage and footwear. A description of the system, algorithms and some results with replica guns and a comparison of microwave images obtained by IFFT, 2D and 3D SAR techniques are presented.

  4. Electromagnetic induction imaging of concealed metallic objects by means of resonating circuits

    NASA Astrophysics Data System (ADS)

    Guilizzoni, R.; Watson, J. C.; Bartlett, P. A.; Renzoni, F.

    2016-05-01

    An electromagnetic induction system, suitable for 2D imaging of metallic samples of different electrical conductivities, has been developed. The system is based on a parallel LCR circuit comprising a ferrite-cored coil (7.8 mm x 9.5 mm, L=680 μH at 1 KHz), a variable resistor and capacitor. The working principle of the system is based on eddy current induction inside a metallic sample when this is introduced into the AC magnetic field created by the coil. The inductance of the LCR circuit is modified due to the presence of the sample, to an extent that depends on its conductivity. Such modification is known to increase when the system is operated at its resonant frequency. Characterizing different metals based on their values of conductivity is therefore possible by utilizing a suitable system operated at resonance. Both imaging and material characterization were demonstrated by means of the proposed electromagnetic induction technique. Furthermore, the choice of using a system with an adjustable resonant frequency made it possible to select resonances that allow magnetic-field penetration through conductive screens. Investigations on the possibility of imaging concealed metals by penetrating such shields have been carried out. A penetration depth of δ~3 mm through aluminium (Al) was achieved. This allowed concealed metallic samples- having conductivities ranging from 0.54 to 59.77 MSm-1 and hidden behind 1.5-mm-thick Al shields- to be imaged. Our results demonstrate that the presence of the concealed metallic objects can be revealed. The technique was thus shown to be a promising detection tool for security applications.

  5. Face and Voice as Social Stimuli Enhance Differential Physiological Responding in a Concealed Information Test

    PubMed Central

    Ambach, Wolfgang; Assmann, Birthe; Krieg, Bennet; Vaitl, Dieter

    2012-01-01

    Attentional, intentional, and motivational factors are known to influence the physiological responses in a Concealed Information Test (CIT). Although concealing information is essentially a social action closely related to motivation, CIT studies typically rely on testing participants in an environment lacking of social stimuli: subjects interact with a computer while sitting alone in an experimental room. To address this gap, we examined the influence of social stimuli on the physiological responses in a CIT. Seventy-one participants underwent a mock-crime experiment with a modified CIT. In a between-subjects design, subjects were either questioned acoustically by a pre-recorded male voice presented together with a virtual male experimenter’s uniform face or by a text field on the screen, which displayed the question devoid of face and voice. Electrodermal activity (EDA), respiration line length (RLL), phasic heart rate (pHR), and finger pulse waveform length (FPWL) were registered. The Psychopathic Personality Inventory – Revised (PPI-R) was administered in addition. The differential responses of RLL, pHR, and FPWL to probe vs. irrelevant items were greater in the condition with social stimuli than in the text condition; interestingly, the differential responses of EDA did not differ between conditions. No modulatory influence of the PPI-R sum or subscale scores was found. The results emphasize the relevance of social aspects in the process of concealing information and in its detection. Attentional demands as well as the participants’ motivation to avoid detection might be the important links between social stimuli and physiological responses in the CIT. PMID:23293613

  6. Experimental methods of indoor millimeter-wave radiometric imaging for personnel concealed contraband detection

    NASA Astrophysics Data System (ADS)

    Hu, Taiyang; Xiao, Zelong; Li, Hao; Lv, Rongchuan; Lu, Xuan

    2014-11-01

    The increasingly emerging terrorism attacks and violence crimes around the world have posed severe threats to public security, so carrying out relevant research on advanced experimental methods of personnel concealed contraband detection is crucial and meaningful. All of the advantages of imaging covertly, avoidance of interference with other systems, intrinsic property of being safe to persons under screening , and the superior ability of imaging through natural or manmade obscurants, have significantly combined to enable millimeter-wave (MMW) radiometric imaging to offer great potential in personnel concealed contraband detection. Based upon the current research status of MMW radiometric imaging and urgent demands of personnel security screening, this paper mainly focuses on the experimental methods of indoor MMW radiometric imaging. The reverse radiation noise resulting from super-heterodyne receivers seriously affects the image experiments carried out at short range, so both the generation mechanism and reducing methods of this noise are investigated. Then, the benefit of sky illumination no longer exists for the indoor radiometric imaging, and this leads to the decrease in radiometric temperature contrast between target and background. In order to enhance the radiometric temperature contrast for improving indoor imaging performance, the noise illumination technique is adopted in the indoor imaging scenario. In addition, the speed and accuracy of concealed contraband detection from acquired MMW radiometric images are usually restricted to the deficiencies in traditional artificial interpretation by security inspectors, thus an automatic recognition and location algorithm by integrating improved Fuzzy C-means clustering with moment invariants is put forward. A series of original results are also presented to demonstrate the significance and validity of these methods.

  7. Exploiting synthetic aperture radar imagery for retrieving vibration signatures of concealed machinery

    NASA Astrophysics Data System (ADS)

    Pérez, Francisco; Campbell, Justin B.; Jaramillo, Monica; Dunkel, Ralf; Atwood, Thomas; Doerry, Armin; Gerstle, Walter H.; Santhanam, Balu; Hayat, Majeed M.

    2016-05-01

    It has been demonstrated that the instantaneous acceleration associated with vibrating objects that are directly imaged by synthetic aperture radar (SAR) can be estimated through the application of the discrete fractional Fourier transform (DFrFT) using the information contained in the complex SAR image. In general, vibration signatures may include, for example, the number of chirped sinusoids as well as their respective base frequencies and chirp rates. By further processing the DFrFT-processed data for clutter-noise rejection by means of pseudo- subspace methods, has been shown that the SAR-vibrometry method can be reliable as long as the signal-to-noise ratio (SNR) and the signal-to-clutter ratio (SCR) of the slow-time SAR signal at the range-line of interest exceeds 15dB. Meanwhile, the Nyquist theorem dictates that the maximum measurable vibration frequency is limited by half of the pulse-repetition frequency. This paper focuses on the detection and estimation of vibrations generated by machinery concealed within buildings and other structures. This is a challenging task in general because the vibration signatures of the source are typically altered by their housing structure; moreover, the SNR at the surface of the housing structure tends to be reduced. Here, experimental results for three different vibrating targets, including one concealed target, are reported using complex SAR images acquired by the General Atomics Lynx radar at resolutions of 1-ft and 4-in. The concealed vibrating target is actuated by a gear motor with an off-balance weight attached to it, which is enclosed by a wooden housing. The vibrations of the motor are transmitted to a chimney that extends above the housing structure. Using the SAR vibrometry approach, it is shown that it is possible to distinguish among the three vibrating objects based upon their vibration signatures.

  8. Shaeer’s Technique: A Minimally Invasive Procedure for Monsplasty and Revealing the Concealed Penis

    PubMed Central

    2016-01-01

    Background: A concealed penis is a condition where part of the penis is invisible below the surface of the prepubic skin. Dermolipectomy can correct this condition, although it involves a long abdominal crease incision, or infrapubic incision around the base of the penis, and a possibility for genital lymphedema. This study describes Shaeer’s technique, a minimally invasive method for revealing the concealed penis. Methods: A 1- to 2-cm-long incision was cut over the anterior superior iliac spine (ASIS) on either side. A long curved blunt forceps was inserted from one incision, down to the base of the penis and then up to the contralateral ASIS. A 5-mm wide nonabsorbable tape was picked up by the forceps from 1 incision and pulled through to emerge from the other. Pulling on the tape cephalad pulled the mons pubis and revealed the penis. The tape was sutured to the periosteum overlying the ASIS on either side. Patients were followed up for 18 months for penile length, complications, and overall satisfaction. Results: Twenty patients were operated upon. Preoperatively, flaccid visible length was 3 ± 0.9 cm, and erect visible length was 8 ± 4.6 cm. Postoperatively, the flaccid visible length was 7.1 ± 2.1 cm, with a 57.9% improvement in length (P < 0.0001). Erect visible length was 11.8 ± 2.1 cm, with a 32% improvement in length (P < 0.0001). Length gain was maintained for 18 months. Conclusion: Shaeer’s technique is a minimally invasive, short, and simple procedure for monsplasty and revealing the concealed penis. PMID:27622092

  9. Standoff concealed weapon detection using a 350 GHz radar imaging system

    SciTech Connect

    Sheen, David M.; Hall, Thomas E.; Severtsen, Ronald H.; McMakin, Douglas L.; Hatchell, Brian K.; Valdez, Patrick LJ

    2010-04-01

    The Pacific Northwest National Laboratory is currently developing a 350 GHz, active, wideband, three-dimensional, radar imaging system to evaluate the feasibility of active sub-mm imaging for standoff concealed weapon detection. The prototype radar imaging system is based on a wideband, heterodyne, frequency-multiplier-based transceiver system coupled to a quasi-optical focusing system and high-speed rotating conical scanner. The wideband operation of this system provides accurate ranging information, and the images obtained are fully three-dimensional. Recent improvements to the system include increased imaging speed using improved balancing techniques, wider bandwidth, and image display techniques.

  10. Concealed long QT syndrome and intractable partial epilepsy: a case report.

    PubMed

    Anderson, Jason H; Bos, Johan Martijn; Meyer, Fredric B; Cascino, Gregory D; Ackerman, Michael J

    2012-11-01

    Herein, we describe a patient with concealed type 2 long QT syndrome with concomitant electroencephalogram-documented epilepsy. Although syncope in patients with long QT syndrome is common and often secondary to cerebral hypoxia after a protracted ventricular arrhythmia, this article demonstrates the importance of avoiding "tunnel vision" as patients with long QT syndrome could also have a primary seizure disorder. Identification of the etiology underlying seizurelike activity is paramount in instituting effective therapy. Furthermore, we theorize that abnormal KCHN2-encoded potassium channel repolarization in the brain could result in epilepsy and arrhythmias in long QT syndrome. PMID:23058853

  11. Millimetre wave and terahertz technology for the detection of concealed threats: a review

    NASA Astrophysics Data System (ADS)

    Kemp, Michael C.

    2006-09-01

    There has been intense interest in the use of millimetre wave and terahertz technology for the detection of concealed weapons, explosives and other threats. Electromagnetic waves at these frequencies are safe, penetrate barriers and have short enough wavelengths to allow discrimination between objects. In addition, many solids including explosives have characteristic spectroscopic signatures at terahertz wavelengths which can be used to identify them. This paper reviews the progress which has been made in recent years and identifies the achievements, challenges and prospects for these technologies in checkpoint people screening, stand off detection of improvised explosive devices (IEDs) and suicide bombers as well as more specialized screening tasks.

  12. Ambient air cooling for concealed soft body armor in a hot environment.

    PubMed

    Ryan, Greg A; Bishop, Stacy H; Herron, Robert L; Katica, Charles P; Elbon, Bre'anna L; Bosak, Andrew M; Bishop, Phillip

    2014-01-01

    Concealed soft body armor inhibits convective and evaporative heat loss and increases heat storage, especially in hot environments. One option to potentially mitigate heat storage is to promote airflow under the soft body armor. The purpose of this study was to evaluate the effect of ambient air induction (∼100 liters per minute) on heat strain while wearing concealed soft body armor in a hot environment (wet bulb globe temperature = 30°C). A counter-balanced, repeated measures protocol was performed with nine healthy male volunteers. Participants were fitted with either a traditional or modified Level II concealed soft body armor. Participants performed cycles of 12 min of walking (1.25 liters per minute) and 3 min of arm curls (0.6 liters per minute) for a total of 60 min. Two-way repeated measures ANOVA was used to assess the mean differences in physiological measures (rectal temperature, heart rate, micro-environment [temperature and relative humidity]). Post hoc Bonferroni analysis and paired samples t-tests (alpha = 0.01) were conducted on omnibus significant findings. Perceptual measures (perceived exertion, thermal comfort) were analyzed using Wilcoxon Signed Ranks Tests. Modification led to an improvement in perceived exertion at 45 min (MOD: 10 ± 1; CON: 11 ± 2; p ≤ 0.001) and 60 min (MOD: 10 ± 2; CON: 12 ± 2; p ≤ 0.001) and a reduction in micro-environment temperature in MOD (1.0 ± 0.2°C, p = 0.03) compared to CON. Modification did not attenuate change in rectal temperature or heart rate (p < 0.01) during 60-min work bout. Change in rectal temperature approached significance between MOD and CON at the end of the work bout (MOD: 0.4 ± 0.2°C; CON: 0.7 ± 0.3°C; p = 0.048). The slope of rectal temperature was significantly greater (p = 0.04) under CON compared to MOD. These data suggest that air induction may provide small benefits while wearing concealed soft body armor, though improvements are needed to lessen physiological strain

  13. Fabric filter blinding mechanisms

    SciTech Connect

    Notestein, J.E.; Shang, J.Y.

    1982-08-01

    This discussion of various bag/cloth filter degradation mechanisms is mostly common sense. However, this information is occasionally lost in the subtleties of real-system operation. Although this paper is written with reference to fluidized-bed combustion (FBC) applications, the insights are generally applicable. For enumeration of particular filter fabric and baghouse experiences in FBC applications, the reader is referred to a report by Davy McKee Corporatin (no date). A fabric filter is a composite matrix of fibers oriented to retain the dust particles from dust-laden gas. The cleaned gas passes through the fabric filter; the retained dust particles are deposited on the surface of (and within) the fiber matrix. The retained dust can be later removed through mechanical means. The fabric may be made of any fibrous material, spun in yarn, and then woven, impacted, needled, or bonded into a felt. Deep penetration of aggregated fine particles, lack of dust removal during filter cleaning, and chars or condensed aerosols may contribute to the increase in pressure drop across the filter. This increases the filter operation power consumption and, consequently, reduces the filtration capacity. The phenomenon of building a high-pressure drop in spite of filter cleaning provisions is known as blinding. In order to maintain an acceptable gas throughput, blinding problems must be addressed. Recommendations are given: maintain temperature above dew point, use filter aids, by-pass filter during start-up or operational upsets, etc.

  14. Collective credit allocation in science

    PubMed Central

    Shen, Hua-Wei; Barabási, Albert-László

    2014-01-01

    Collaboration among researchers is an essential component of the modern scientific enterprise, playing a particularly important role in multidisciplinary research. However, we continue to wrestle with allocating credit to the coauthors of publications with multiple authors, because the relative contribution of each author is difficult to determine. At the same time, the scientific community runs an informal field-dependent credit allocation process that assigns credit in a collective fashion to each work. Here we develop a credit allocation algorithm that captures the coauthors’ contribution to a publication as perceived by the scientific community, reproducing the informal collective credit allocation of science. We validate the method by identifying the authors of Nobel-winning papers that are credited for the discovery, independent of their positions in the author list. The method can also compare the relative impact of researchers working in the same field, even if they did not publish together. The ability to accurately measure the relative credit of researchers could affect many aspects of credit allocation in science, potentially impacting hiring, funding, and promotion decisions. PMID:25114238

  15. Parasitism rate, parasitoid community composition and host specificity on exposed and semi-concealed caterpillars from a tropical rainforest.

    PubMed

    Hrcek, Jan; Miller, Scott E; Whitfield, James B; Shima, Hiroshi; Novotny, Vojtech

    2013-10-01

    The processes maintaining the enormous diversity of herbivore-parasitoid food webs depend on parasitism rate and parasitoid host specificity. The two parameters have to be evaluated in concert to make conclusions about the importance of parasitoids as natural enemies and guide biological control. We document parasitism rate and host specificity in a highly diverse caterpillar-parasitoid food web encompassing 266 species of lepidopteran hosts and 172 species of hymenopteran or dipteran parasitoids from a lowland tropical forest in Papua New Guinea. We found that semi-concealed hosts (leaf rollers and leaf tiers) represented 84% of all caterpillars, suffered a higher parasitism rate than exposed caterpillars (12 vs. 5%) and their parasitoids were also more host specific. Semi-concealed hosts may therefore be generally more amenable to biological control by parasitoids than exposed ones. Parasitoid host specificity was highest in Braconidae, lower in Diptera: Tachinidae, and, unexpectedly, the lowest in Ichneumonidae. This result challenges the long-standing view of low host specificity in caterpillar-attacking Tachinidae and suggests higher suitability of Braconidae and lower suitability of Ichneumonidae for biological control of caterpillars. Semi-concealed hosts and their parasitoids are the largest, yet understudied component of caterpillar-parasitoid food webs. However, they still remain much closer in parasitism patterns to exposed hosts than to what literature reports on fully concealed leaf miners. Specifically, semi-concealed hosts keep an equally low share of idiobionts (2%) as exposed caterpillars. PMID:23463243

  16. Not quite so blind: Semantic processing despite inattentional blindness.

    PubMed

    Schnuerch, Robert; Kreitz, Carina; Gibbons, Henning; Memmert, Daniel

    2016-04-01

    We often fail to detect clearly visible, yet unexpected objects when our attention is otherwise engaged, a phenomenon widely known as inattentional blindness. The potentially devastating consequences and the mediators of such failures of awareness have been studied extensively. Surprisingly, however, hardly anything is known about whether and how we process the objects that go unnoticed during inattentional blindness. In 2 experiments, we demonstrate that the meaning of objects undetected due to inattentional blindness interferes with the classification of attended stimuli. Responses were significantly slower when the semantic content of an undetected stimulus contradicted that of the attended, to-be-judged object. We thus clarify the depth of the "blindness" caused by inattention, as we provide compelling evidence that failing to detect the unexpected does not preclude its processing, even at postperceptual stages. Despite inattentional blindness, our mind obviously still has access to something as refined as meaning. (PsycINFO Database Record PMID:26766509

  17. Corneal blindness: a global perspective.

    PubMed Central

    Whitcher, J. P.; Srinivasan, M.; Upadhyay, M. P.

    2001-01-01

    Diseases affecting the cornea are a major cause of blindness worldwide, second only to cataract in overall importance. The epidemiology of corneal blindness is complicated and encompasses a wide variety of infectious and inflammatory eye diseses that cause corneal scarring, which ultimately leads to functional blindness. In addition, the prevalence of corneal disease varies from country to country and even from one population to another. While cataract is responsible for nearly 20 million of the 45 million blind people in the world, the next major cause is trachoma which blinds 4.9 million individuals, mainly as a result of corneal scarring and vascularization. Ocular trauma and corneal ulceration are significant causes of corneal blindness that are often underreported but may be responsible for 1.5-2.0 million new cases of monocular blindness every year. Causes of childhood blindness (about 1.5 million worldwide with 5 million visually disabled) include xerophthalmia (350,000 cases annually), ophthalmia neonatorum, and less frequently seen ocular diseases such as herpes simplex virus infections and vernal keratoconjunctivitis. Even though the control of onchocerciasis and leprosy are public health success stories, these diseases are still significant causes of blindness--affecting a quarter of a million individuals each. Traditional eye medicines have also been implicated as a major risk factor in the current epidemic of corneal ulceration in developing countries. Because of the difficulty of treating corneal blindness once it has occurred, public health prevention programmes are the most cost-effective means of decreasing the global burden of corneal blindness. PMID:11285665

  18. Participants’ Experiences of Being Debriefed to Placebo Allocation in a Clinical Trial

    PubMed Central

    Bishop, Felicity L.; Jacobsen, Eric E.; Shaw, Jessica; Kaptchuk, Ted J.

    2013-01-01

    Participants in placebo-controlled clinical trials give informed consent to be randomized to verum or placebo. However, researchers rarely tell participants which treatment they actually received. We interviewed four participants in a trial of acupuncture for irritable bowel syndrome, before, during, and after they received a course of placebo treatments over six weeks. During the final interview, we informed participants that they had received a course of placebo treatments. We used an idiographic phenomenological approach based on the Sheffield School to describe each participant’s experiences of being blinded to and then debriefed to placebo allocation. Our participants’ experiences of blinding and debriefing were embodied, related to their goals in undertaking the study, and social (e.g., embedded in trusting and valued relationships with acupuncturists). We suggest ways in which debriefing to placebo allocation can be managed sensitively to facilitate positive outcomes for participants. PMID:22673094

  19. Overview on Deaf-Blindness

    ERIC Educational Resources Information Center

    Miles, Barbara

    2008-01-01

    It may seem that deaf-blindness refers to a total inability to see or hear. However, in reality deaf-blindness is a condition in which the combination of hearing and visual losses in children cause "such severe communication and other develop mental and educational needs that they cannot be accommodated in special education programs solely for…

  20. Blind-Anchor-Nut-Installation Fixture (BANIF)

    NASA Technical Reports Server (NTRS)

    Willey, Norman F., Jr.; Linker, James F.

    1994-01-01

    Blind-anchor-nut-installation fixture, BANIF, developed for replacing or installing anchor nuts in blind holes or other inaccessible places. Attachment of anchor nut to BANIF enables placement of anchor nut on blind side of component.

  1. Inverse synthetic aperture radar imaging for concealed object detection on a naturally walking person

    NASA Astrophysics Data System (ADS)

    Zhuravlev, Andrey; Ivashov, Sergey; Razevig, Vladimir; Vasiliev, Igor; Bechtel, Timothy

    2014-05-01

    This paper describes the architecture of a microwave radar system intended for imaging concealed objects under clothing as a subject walks through the inspection area. The system uses the principle of inverse aperture which is achieved by a person's movement past a stationary microwave sensor array. In the system, the vertical resolution is achieved by arranging microwave sensors vertically while the horizontal resolution is due to the subject's horizontal motion. The positioning of the objects is achieved by employing a synchronous video sensor that allows coherent radar signal processing. A possible radar signal processing technique based on signal accumulation is described. Numerical experiments are conducted with the described object trajectory model. The influence of positioning errors attributed to the video positioning system is also modeled numerically. An experimental setup is designed and proposed to evaluate the suggested signal processing techniques on real data with an electro-mechanical scanner and single transceiver. It is suggested that the signal acquisition with the system can be accomplished using the stop motion technique, in which a series of changing stationary scenes is sampled and processed. Experimental radar images are demonstrated for stationary objects with concealed items and considered as reference images. Further development of the system is suggested.

  2. Combined illumination cylindrical millimeter-wave imaging technique for concealed weapon detection

    NASA Astrophysics Data System (ADS)

    Sheen, David M.; McMakin, Douglas L.; Hall, Thomas E.

    2000-07-01

    A novel millimeter-wave imaging technique has been developed for personnel surveillance applications, including the detection of concealed weapons, explosives, drugs, and other contraband material. Millimeter-waves are high-frequency radio waves in the frequency band of 30 - 300 GHz, and pose no health threat to humans at moderate power levels. These waves readily penetrate common clothing materials, and are reflected by the human body and by concealed items. The combined illumination cylindrical imaging concept consists of a vertical, high-resolution, millimeter-wave array of antennas which is scanned in a cylindrical manner about the person under surveillance. Using a computer, the data from this scan is mathematically reconstructed into a series of focused 3D images of the person. After reconstruction, the images are combined into a single high-resolution 3D image of the person under surveillance. This combined image is then rendered using 3D computer graphics techniques. The combined cylindrical illumination is critical as it allows the display of information from all angles. This is necessary because millimeter-waves do not penetrate the body. Ultimately, the images displayed to the operate will be icon-based to protect the privacy of the person being screened. Novel aspects of this technique include the cylindrical scanning concept and the image reconstruction algorithm, which was developed specifically for this imaging system. An engineering prototype based on this cylindrical imaging technique has been fabricated and tested. This work has been sponsored by the Federal Aviation Administration.

  3. Combined Illumination Cylindrical Millimeter-Wave Imaging Technique for Concealed Weapon Detection

    SciTech Connect

    Sheen, David M.; McMakin, Douglas L.; Hall, Thomas E.

    2000-04-01

    A novel millimeter-wave imaging technique has been developed for personnel surveillance applications, including the detection of concealed weapons, explosives, drugs, and other contraband material. Millimeter-waves are high-frequency radio waves in the frequency band of 30-300 GHz, and pose no health threat to humans at moderate power levels. These waves readily penetrate common clothing materials, and are reflected by the human body and by concealed items. The combined illumination cylindrical imaging concept consists of a vertical, high-resolution, millimeter-wave array of antennas which is scanned in a cylindrical manner about the person under surveillance. Using a computer, the data from this scan is mathematically reconstructed into a series of focused 3-D images of the person. After reconstruction, the images are combined into a single high-resolution three-dimensional image of the person under surveillance. This combined image is then rendered using 3-D computer graphics techniques. The combined cylindrical illumination is critical as it allows the display of information from all angles. This is necessary because millimeter-waves do not penetrate the body. Ultimately, the images displayed to the operator will be icon-based to protect the privacy of the person being screened. Novel aspects of this technique include the cylindrical scanning concept and the image reconstruction algorithm, which was developed specifically for this imaging system. An engineering prototype based on this cylindrical imaging technique has been fabricated and tested. This work has been sponsored by the Federal Aviation Administration (FAA).

  4. Exposed and concealed antigens as vaccine targets for controlling ticks and tick-borne diseases.

    PubMed

    Nuttall, P A; Trimnell, A R; Kazimirova, M; Labuda, M

    2006-04-01

    Tick vaccines derived from Bm86, a midgut membrane-bound protein of the cattle tick, Boophilus microplus, are currently the only commercially available ectoparasite vaccines. Despite its introduction to the market in 1994, and the recognized need for alternatives to chemical pesticides, progress in developing effective antitick vaccines (and ectoparasite vaccines in general) is slow. The primary rate-limiting step is the identification of suitable antigenic targets for vaccine development. Two sources of candidate vaccine antigens have been identified: 'exposed' antigens that are secreted in tick saliva during attachment and feeding on a host and 'concealed' antigens that are normally hidden from the host. Recently, a third group of antigens has been distinguished that combines the properties of both exposed and concealed antigens. This latter group offers the prospect of a broad-spectrum vaccine effective against both adults and immature stages of a wide variety of tick species. It also shows transmission-blocking and protective activity against a tick-borne pathogen. With the proliferation of molecular techniques and their application to vaccine development, there are high hopes for new and effective antitick vaccines that also control tick-borne diseases. PMID:16542317

  5. An edge-based temporal error concealment for MPEG-coded video

    NASA Astrophysics Data System (ADS)

    Huang, Yu-Len; Lien, Hsiu-Yi

    2005-07-01

    When transmitted over unreliable channels, the compressed video can suffer severe degradation. Some strategies were employed to make an acceptable quality of the decoded image sequence. Error concealment (EC) technique is one of effective approaches to diminish the quality degradation. A number of EC algorithms have been developed to combat the transmission errors for MPEG-coded video. These methods always work well to reconstruct the smooth or regular damaged macroblocks. However, for damaged macroblocks were irregular or high-detail, the reconstruction may follow noticeable blurring consequence or not match well with the surrounding macroblocks. This paper proposes an edgebased temporal EC model to conceal the errors. In the proposed method, both the spatial and the temporal contextual features in compressed video are measured by using an edge detector, i.e. Sobel operator. The edge information surrounding a damaged macroblock is utilized to estimate the lost motion vectors based on the boundary matching technique. Next, the estimated motion vectors are used to reconstruct the damaged macroblock by exploiting the information in reference frames. In comparison with traditional EC algorithms, the proposed method provides a significant improvement on both objective peak signal-to-noise ratio (PSNR) measurement and subjective visual quality of MPEG-coded video.

  6. Development of a longer range standoff millimetre wave radar concealed threat detector

    NASA Astrophysics Data System (ADS)

    Bowring, Nicholas J.; Southgate, Matthew J.; Andrews, David A.; Rezgui, Nacer D.; Harmer, Stuart W.; O'Reilly, Dean

    2013-05-01

    A millimeter wave (75 - 110 GHz) polarimetric radar system (MiRTLE) has been developed for the detection of threat objects, such as guns, knives, or explosive devices, which have been concealed under clothing upon the human body. The system uses a Gaussian lens antenna to enable operation at stand-off ranges up to 25 meters. By utilizing ultra-wideband Swept Frequency Continuous Wave Radar very high range resolution (~ 10mm) is realized. The system is capable of detecting objects positioned in front of the body and of measuring the range of a target. By interpretation of the scattered waveform, the presence of a wide spectrum of threat items concealed on the human body may be detected. Threat detection is autonomously rendered by application of a neural network to the scattered time domain, polarimetric radar returns and the system may be taught to alarm or reject certain classes of objects; this allows for highly specific or broad spectrum threat detection. The radar system is portable and operator steerable allowing standoff monitoring of moving human targets in real time. Rapid (1ms) sweep times and fast signal acquisition and processing allow decisions to be made at video frame rates (30 fps) and integrated directly to a video feed providing the operator with a field of view and facilitating aiming. Performance parameters for detection of guns and simulated explosive devices are presented for ranges up to 25 meters.

  7. Concealed weapons detection with an improved passive millimeter-wave imager

    NASA Astrophysics Data System (ADS)

    Martin, Christopher A.; Kolinko, Vladimir G.

    2004-08-01

    Trex Enterprises has developed a second-generation passive millimeter-wave imaging system for detection of concealed weapons and explosives at standoff ranges. Passive millimeter-wave sensors form an image from naturally emitted blackbody radiation in the millimeter-wave portion of the electromagnetic spectrum. Radiation at this wavelength passes through most types of clothing, allowing the user to acquire an image of any articles on a suspect"s person that differ significantly from the human body in their reflectivity or radiometric temperature at millimeter-wave wavelengths. Trex Enterprises previously demonstrated a first-generation concealed weapon detection system with the ability to detect handguns and knives under heavy clothing at a range of 27". The second-generation imager, while similar in concept, has an improved field-of-view and a much reduced size and weight. The imager is to be put through a battery of tests by both Trex Enterprises and the National Institute Of Justice to determine its ability to detect both metallic and non-metallic knives and handguns as well as various types of explosive devices. The tests will be conducted indoors and outdoors at various ranges.

  8. Detection of hazardous liquids concealed in glass, plastic, and aluminum containers

    NASA Astrophysics Data System (ADS)

    Ramirez, Michael L.; Ortiz, William; Ruiz, Orlando; Pacheco-Londoño, Leonardo; Hernández-Rivera, Samuel P.

    2007-04-01

    The use of liquid explosives by terrorists has raised the attention to the use of hazardous liquids as threats to people, buildings and transportation systems. Hazardous liquids such as explosive mixtures, flammables or even chemical warfare agents (CWA) can be concealed in common containers and pass security checks undetected. This work presents three non invasive, non destructive detection approaches that can be used to characterize the content of common liquid containers and detect if the liquid is the intended or a concealed hazardous liquid. Fiber optic coupled Raman spectroscopy and Stand off Raman spectroscopy were used to inspect the content of glass and plastic bottles and thermal conductivity was used to asses the liquid inside aluminum cans. Raman spectroscopy experiments were performed at 532 nm, 488 nm and 785 nm excitation wavelengths. The hazardous liquids under consideration included CWA simulant DMMP, hydrogen peroxide, acetone, cyclohexane, ethanol and nitric acid. These techniques have potential use as a detector for hazardous liquids at a check point or to inspect suspicious bottles from a distance.

  9. Noninvasive detection of concealed explosives: depth profiling through opaque plastics by time-resolved Raman spectroscopy.

    PubMed

    Petterson, Ingeborg E Iping; López-López, María; García-Ruiz, Carmen; Gooijer, Cees; Buijs, Joost B; Ariese, Freek

    2011-11-15

    The detection of explosives concealed behind opaque, diffusely scattering materials is a challenge that requires noninvasive analytical techniques for identification without having to manipulate the package. In this context, this study focuses on the application of time-resolved Raman spectroscopy (TRRS) with a picosecond pulsed laser and an intensified charge-coupled device (ICCD) detector for the noninvasive identification of explosive materials through several millimeters of opaque polymers or plastic packaging materials. By means of a short (250 ps) gate which can be delayed several hundred picoseconds after the laser pulse, the ICCD detector allows for the temporal discrimination between photons from the surface of a sample and those from deeper layers. TRRS was applied for the detection of the two main isomers of dinitrotoluene, 2,4-dinitrotoluene, and 2,6-dinitrotoluene as well as for various other components of explosive mixtures, including akardite II, diphenylamine, and ethyl centralite. Spectra were obtained through different diffuse scattering white polymer materials: polytetrafluoroethylene (PTFE), polyoxymethylene (POM), and polyethylene (PE). Common packaging materials of various thicknesses were also selected, including polystyrene (PS) and polyvinyl chloride (PVC). With the demonstration of the ability to detect concealed, explosives-related compounds through an opaque first layer, this study may have important applications in the security and forensic fields. PMID:21967622

  10. Survey of state-of-the-art technology in remote concealed weapon detection

    NASA Astrophysics Data System (ADS)

    Currie, Nicholas C.; Demma, Fred J.; Ferris, David D., Jr.; McMillan, Robert W.; Vannicola, Vincent C.; Wicks, Michael C.

    1995-09-01

    Recent advances in millimeter-wave (MMV), microwave, and infrared (IR) technologies provide the means to detect concealed weapons remotely through clothing and is some cases through walls. Since the developemnt of forward-looking infrared instruments, work has been ongoing in attempting to use these devices for concealed weapon detection based on temperatrue differences between metallic weapons and in the infrared has led to the development of techniques based on lower frequencies. Focal plane arrays operating MMW frequencies are becoming available which eliminate the need for a costly and slow mechanical scanner for generating images. These radiometric sensors also detect temperature differences between weapons and the human body background. Holographic imaging systems operating at both microwave and MMW frequencies have been developed which generate images of near photographic quality through clothing and through thin, nonmetallic walls. Finally, a real- aperture radar is useful for observing people and detecting weapons through walls and in the field under reduced visibility conditions. This paper will review all of these technologies and give examples of images generated by each type of sensor. An assessment of the future of this technology with regard to law enforcement applications will also be given.

  11. The successively temporal error concealment algorithm using error-adaptive block matching principle

    NASA Astrophysics Data System (ADS)

    Lee, Yu-Hsuan; Wu, Tsai-Hsing; Chen, Chao-Chyun

    2014-09-01

    Generally, the temporal error concealment (TEC) adopts the blocks around the corrupted block (CB) as the search pattern to find the best-match block in previous frame. Once the CB is recovered, it is referred to as the recovered block (RB). Although RB can be the search pattern to find the best-match block of another CB, RB is not the same as its original block (OB). The error between the RB and its OB limits the performance of TEC. The successively temporal error concealment (STEC) algorithm is proposed to alleviate this error. The STEC procedure consists of tier-1 and tier-2. The tier-1 divides a corrupted macroblock into four corrupted 8 × 8 blocks and generates a recovering order for them. The corrupted 8 × 8 block with the first place of recovering order is recovered in tier-1, and remaining 8 × 8 CBs are recovered in tier-2 along the recovering order. In tier-2, the error-adaptive block matching principle (EA-BMP) is proposed for the RB as the search pattern to recover remaining corrupted 8 × 8 blocks. The proposed STEC outperforms sophisticated TEC algorithms on average PSNR by 0.3 dB on the packet error rate of 20% at least.

  12. Combining Blink, Pupil, and Response Time Measures in a Concealed Knowledge Test

    PubMed Central

    Seymour, Travis L.; Baker, Christopher A.; Gaunt, Joshua T.

    2013-01-01

    The response time (RT) based Concealed Knowledge Test (CKT) has been shown to accurately detect participants’ knowledge of mock-crime-related information. Tests based on ocular measures such as pupil-size and blink-rate have sometimes resulted in poor classification, or lacked detailed classification analyses. The present study examines the fitness of multiple pupil and blink related responses in the CKT paradigm. To maximize classification efficiency, participants’ concealed knowledge was assessed using both individual test measures and combinations of test measures. Results show that individual pupil-size, pupil-slope, and pre-response blink-rate measures produce efficient classifications. Combining pupil and blink measures yielded more accuracy classifications than individual ocular measures. Although RT-based tests proved efficient, combining RT with ocular measures had little incremental benefit. It is argued that covertly assessing ocular measures during RT-based tests may guard against effective countermeasure use in applied settings. A compound classification procedure was used to categorize individual participants and yielded high hit rates and low false-alarm rates without the need for adjustments between test paradigms and subject populations. We conclude that with appropriate test paradigms and classification analyses, ocular measures may prove as effective as other indices, though additional research is needed. PMID:23382718

  13. Specific NIST projects in support of the NIJ Concealed Weapon Detection and Imaging Program

    NASA Astrophysics Data System (ADS)

    Paulter, Nicholas G.

    1998-12-01

    The Electricity Division of the National Institute of Standards and Technology is developing revised performance standards for hand-held (HH) and walk-through (WT) metal weapon detectors, test procedures and systems for these detectors, and a detection/imaging system for finding concealed weapons. The revised standards will replace the existing National Institute of Justice (NIJ) standards for HH and WT devices and will include detection performance specifications as well as system specifications (environmental conditions, mechanical strength and safety, response reproducibility and repeatability, quality assurance, test reporting, etc.). These system requirements were obtained from the Law Enforcement and corrections Technology Advisory Council, an advisory council for the NIJ. Reproducible and repeatable test procedures and appropriate measurement systems will be developed for evaluating HH and WT detection performance. A guide to the technology and application of non- eddy-current-based detection/imaging methods (such as acoustic, passive millimeter-wave and microwave, active millimeter-wave and terahertz-wave, x-ray, etc.) Will be developed. The Electricity Division is also researching the development of a high- frequency/high-speed (300 GH to 1 THz) pulse-illuminated, stand- off, video-rate, concealed weapons/contraband imaging system.

  14. Concealing of facial expressions by a wild Barbary macaque (Macaca sylvanus).

    PubMed

    Thunström, Maria; Kuchenbuch, Paul; Young, Christopher

    2014-07-01

    Behavioural research on non-vocal communication among non-human primates and its possible links to the origin of human language is a long-standing research topic. Because human language is under voluntary control, it is of interest whether this is also true for any communicative signals of other species. It has been argued that the behaviour of hiding a facial expression with one's hand supports the idea that gestures might be under more voluntary control than facial expressions among non-human primates, and it has also been interpreted as a sign of intentionality. So far, the behaviour has only been reported twice, for single gorilla and chimpanzee individuals, both in captivity. Here, we report the first observation of concealing of facial expressions by a monkey, a Barbary macaque (Macaca sylvanus), living in the wild. On eight separate occasions between 2009 and 2011 an adult male was filmed concealing two different facial expressions associated with play and aggression ("play face" and "scream face"), 22 times in total. The videos were analysed in detail, including gaze direction, hand usage, duration, and individuals present. This male was the only individual in his group to manifest this behaviour, which always occurred in the presence of a dominant male. Several possible interpretations of the function of the behaviour are discussed. The observations in this study indicate that the gestural communication and cognitive abilities of monkeys warrant more research attention. PMID:24770588

  15. Partner choice through concealed floral sugar rewards evolved with the specialization of ant-plant mutualisms.

    PubMed

    Chomicki, Guillaume; Staedler, Yannick M; Schönenberger, Jürg; Renner, Susanne S

    2016-09-01

    Obligate mutualisms require filtering mechanisms to prevent their exploitation by opportunists, but ecological contexts and traits facilitating the evolution of such mechanisms are largely unknown. We investigated the evolution of filtering mechanisms in an epiphytic ant-plant symbiotic system in Fiji involving Rubiaceae and dolichoderine ants, using field experiments, metabolomics, X-ray micro-computed tomography (micro-CT) scanning and phylogenetics. We discovered a novel plant reward consisting of sugary sap concealed in post-anthetic flowers only accessible to Philidris nagasau workers that bite through the thick epidermis. In five of the six species of Rubiaceae obligately inhabited by this ant, the nectar glands functioned for 10 d after a flower's sexual function was over. Sugar metabolomics and field experiments showed that ant foraging tracks sucrose levels, which only drop at the onset of fruit development. Ontogenetic analyses of our focal species and their relatives revealed a 25-fold increase in nectary size and delayed fruit development in the ant-rewarding species, and Bayesian analyses of several traits showed the correlated evolution of sugar rewards and symbiosis specialization. Concealed floral nectar forestalls exploitation by opportunists (generalist ants) and stabilizes these obligate mutualisms. Our study pinpoints the importance of partner choice mechanisms in transitions from facultative to obligate mutualisms. PMID:27159681

  16. When Interference Helps: Increasing Executive Load to Facilitate Deception Detection in the Concealed Information Test

    PubMed Central

    Visu-Petra, George; Varga, Mihai; Miclea, Mircea; Visu-Petra, Laura

    2013-01-01

    The possibility to enhance the detection efficiency of the Concealed Information Test (CIT) by increasing executive load was investigated, using an interference design. After learning and executing a mock crime scenario, subjects underwent three deception detection tests: an RT-based CIT, an RT-based CIT plus a concurrent memory task (CITMem), and an RT-based CIT plus a concurrent set-shifting task (CITShift). The concealed information effect, consisting in increased RT and lower response accuracy for probe items compared to irrelevant items, was evidenced across all three conditions. The group analyses indicated a larger difference between RTs to probe and irrelevant items in the dual-task conditions, but this difference was not translated in a significantly increased detection efficiency at an individual level. Signal detection parameters based on the comparison with a simulated innocent group showed accurate discrimination for all conditions. Overall response accuracy on the CITMem was highest and the difference between response accuracy to probes and irrelevants was smallest in this condition. Accuracy on the concurrent tasks (Mem and Shift) was high, and responses on these tasks were significantly influenced by CIT stimulus type (probes vs. irrelevants). The findings are interpreted in relation to the cognitive load/dual-task interference literature, generating important insights for research on the involvement of executive functions in deceptive behavior. PMID:23543918

  17. Development of THz-range Gyrotrons for Detection of Concealed Radioactive Materials

    NASA Astrophysics Data System (ADS)

    Nusinovich, Gregory S.; Pu, Ruifeng; Antonsen, Thomas M.; Sinitsyn, Oleksandr V.; Rodgers, John; Mohamed, Ali; Silverman, Joseph; Al-Sheikhly, Mohamad; Dimant, Yakov S.; Milikh, Gennady M.; Glyavin, Michael Yu.; Luchinin, Alexei G.; Kopelovich, Eugene A.; Granatstein, Victor L.

    2011-03-01

    The Center for Applied Electromagnetics (AppEl) at the University of Maryland had started development of a sub-THz gyrotron for detecting concealed radioactive materials. The concept is based on the use of a high-power gyrotron whose power being focused in a small spot with dimensions on the order of a wavelength exceeds the threshold level required for initiating a freely localized microwave breakdown in air. However, in the absence of radioactive materials, the ambient electron density is so small that there is a very small probability to find a free electron in this small volume to trigger the avalanche breakdown process. Therefore the fact that the breakdown was observed would indicate that there is a hidden radioactive material in the vicinity of a focused wave beam. We present the design data for a 200-300 kW, 670 GHz gyrotron operating with a pulsed solenoid and describe a single-shot pulsed solenoid producing 27-28 T magnetic fields. Also numerous issues in this specific application are discussed, viz. threshold conditions for initiating the breakdown, production of gamma rays by concealed radioactive materials and their role in producing low energy electrons outside a container, wave beam focusing in a small spot by a limited-size antenna, random walk of energetic electrons which may result in appearance of free electrons in a given volume during the RF pulse and comparison of diffusion time with the time required for competing processes, such as ionization and three-body attachment.

  18. Portable concealed weapon detection using millimeter-wave FMCW radar imaging

    NASA Astrophysics Data System (ADS)

    Johnson, Michael A.; Chang, Yu-Wen

    2001-02-01

    Unobtrusive detection of concealed weapons on persons or in abandoned bags would provide law enforcement a powerful tool to focus resources and increase traffic throughput in high- risk situations. We have developed a fast image scanning 94 GHz radar system that is suitable for portable operation and remote viewing of radar data. This system includes a novel fast image-scanning antenna that allows for the acquisition of medium resolution 3D millimeter wave images of stationary targets with frame times on order of one second. The 3D radar data allows for potential isolation of concealed weapons from body and environmental clutter such as nearby furniture or other people. The radar is an active system so image quality is not affected indoors, emitted power is however very low so there are no health concerns for operator or targets. The low power operation is still sufficient to penetrate heavy clothing or material. Small system size allows for easy transport and rapid deployment of the system as well as an easy migration path to future hand held systems.

  19. Decision Makers Use Norms, Not Cost-Benefit Analysis, When Choosing to Conceal or Reveal Unfair Rewards

    PubMed Central

    Heimann, Marco; Girotto, Vittorio; Legrenzi, Paolo; Bonnefon, Jean-François

    2013-01-01

    We introduce the Conceal or Reveal Dilemma, in which individuals receive unfair benefits, and must decide whether to conceal or to reveal this unfair advantage. This dilemma has two important characteristics: it does not lend itself easily to cost-benefit analysis, neither to the application of any strong universal norm. As a consequence, it is ideally suited to the study of interindividual and intercultural variations in moral-economic norms. In this paper we focus on interindividual variations, and we report four studies showing that individuals cannot be swayed by financial incentives to conceal or to reveal, and follow instead fixed, idiosyncratic strategies. We discuss how this result can be extended to individual and cultural variations in the tendency to display or to hide unfair rewards. PMID:24066040

  20. Blindness from quinine toxicity.

    PubMed Central

    Bacon, P; Spalton, D J; Smith, S E

    1988-01-01

    We report a case of quinine overdose in a 47-year-old man who presented with blindness. Fundus photography demonstrates the acute and subsequent retinal changes, and his visual recovery to normal acuity with visual field constriction is documented. Pupillary and electrodiagnostic findings are recorded. Stellate ganglion block has been widely advocated as a helpful therapeutic measure, but out patient was treated with a unilateral stellate ganglion block without apparent benefit to that eye. From a review of the literature we believe that quinine produces its effects by toxicity on the retina rather than by vasoconstriction and that stellate ganglion block probably does not alter the natural history of the retinal toxicity. Images PMID:3281709

  1. Task allocation among multiple intelligent robots

    NASA Technical Reports Server (NTRS)

    Gasser, L.; Bekey, G.

    1987-01-01

    Researchers describe the design of a decentralized mechanism for allocating assembly tasks in a multiple robot assembly workstation. Currently, the approach focuses on distributed allocation to explore its feasibility and its potential for adaptability to changing circumstances, rather than for optimizing throughput. Individual greedy robots make their own local allocation decisions using both dynamic allocation policies which propagate through a network of allocation goals, and local static and dynamic constraints describing which robots are elibible for which assembly tasks. Global coherence is achieved by proper weighting of allocation pressures propagating through the assembly plan. Deadlock avoidance and synchronization is achieved using periodic reassessments of local allocation decisions, ageing of allocation goals, and short-term allocation locks on goals.

  2. Resource Allocation: A Participatory Process.

    ERIC Educational Resources Information Center

    Reid, Alban E.

    Whether a participatory process for resource allocation in a public community college setting occurs depends upon several key factors: (1) the leadership style of the institutional chief executive officer; (2) the administrative organizational structure of the institution; (3) the relationship which exists between and among members of the various…

  3. Report on Tribal Priority Allocations.

    ERIC Educational Resources Information Center

    Bureau of Indian Affairs (Dept. of Interior), Washington, DC.

    As part of Bureau of Indian Affairs (BIA) funding, Tribal Priority Allocations (TPA) are the principal source of funds for tribal governments and agency offices at the reservation level. According to their unique needs and circumstances, tribes may prioritize funding among eight general categories: government, human services, education, public…

  4. Regulating nutrient allocation in plants

    DOEpatents

    Udvardi, Michael; Yang, Jiading; Worley, Eric

    2014-12-09

    The invention provides coding and promoter sequences for a VS-1 and AP-2 gene, which affects the developmental process of senescence in plants. Vectors, transgenic plants, seeds, and host cells comprising heterologous VS-1 and AP-2 genes are also provided. Additionally provided are methods of altering nutrient allocation and composition in a plant using the VS-1 and AP-2 genes.

  5. Administrators' Decisions about Resource Allocation

    ERIC Educational Resources Information Center

    Knight, William E.; Folkins, John W.; Hakel, Milton D.; Kennell, Richard P.

    2011-01-01

    Do academic administrators make decisions about resource allocation differently depending on the discipline receiving the funding? Does an administrator's academic identity influence these decisions? This study explored those questions with a sample of 1,690 academic administrators at doctoral-research universities. Participants used fictional…

  6. Brief Report: How Do They Manage Social Interaction? The Influence of Concealing Academic Achievement Information on Self-Monitoring by Adolescents with Low Achievement

    ERIC Educational Resources Information Center

    Zhang, Baoshan; Zhao, Jun-Yan; Yu, Guoliang

    2010-01-01

    During social interactions people self-monitor their behavior at least partially to conceal socially devalued characteristics. This study examined the influences of concealing academic achievement on self-monitoring in an academically-relevant social interaction. An interview paradigm called for school-aged adolescent participants (total N = 86)…

  7. Repetition blindness and homophone blindness in young and older adults.

    PubMed

    Tyrrell, Caitlin J; James, Lori E; Noble, Paula M

    2016-11-01

    We tested age effects on repetition blindness (RB), defined as the reduced probability of reporting a target word following presentation of the same word in a rapidly presented list. We also tested age effects on homophone blindness (HB), in which the first word is a homophone of the target word rather than a repeated word. Thirty young and 28 older adults viewed rapidly presented lists of words containing repeated, homophone, or unrepeated word pairs and reported all of the words immediately after each list. Older adults exhibited a greater degree of RB and HB than young adults using a conditional scoring method that provides certainty that blindness has occurred. The existence of RB and HB for both age groups, and increased blindness for older compared to young adults, supports predictions of a binding theory that has successfully accounted for a wide range of phenomena in cognitive aging. PMID:26982878

  8. Perceptual Repetition Blindness Effects

    NASA Technical Reports Server (NTRS)

    Hochhaus, Larry; Johnston, James C.; Null, Cynthia H. (Technical Monitor)

    1994-01-01

    The phenomenon of repetition blindness (RB) may reveal a new limitation on human perceptual processing. Recently, however, researchers have attributed RB to post-perceptual processes such as memory retrieval and/or reporting biases. The standard rapid serial visual presentation (RSVP) paradigm used in most RB studies is, indeed, open to such objections. Here we investigate RB using a "single-frame" paradigm introduced by Johnston and Hale (1984) in which memory demands are minimal. Subjects made only a single judgement about whether one masked target word was the same or different than a post-target probe. Confidence ratings permitted use of signal detection methods to assess sensitivity and bias effects. In the critical condition for RB a precue of the post-target word was provided prior to the target stimulus (identity precue), so that the required judgement amounted to whether the target did or did not repeat the precue word. In control treatments, the precue was either an unrelated word or a dummy.

  9. Reusable captive blind fastener

    NASA Technical Reports Server (NTRS)

    Peterson, S. A. (Inventor)

    1981-01-01

    A one piece reusable fastener capable of joining materials together from one side (blind backside) comprises a screw driven pin ending in a wedge-shaped expander cone. The cone cooperates within a slotted collar end which has a number of tangs on a cylindrical body. The fastener is set by inserting it through aligned holes in the workpieces to be joined. Turning the pin in one direction draws the cone into the collar, deforming the tangs radially outward to mate with tapered back-tapered hold in the workpiece, thus fastening the two pieces together. Reversing the direction of the pin withdraws the cone from the collar, and allows the tangs to resume their contracted configuration without withdrawing the fastener from the insertion hole. The fastener is capable of joining materials together from only one side with substantial strength in tension and shear over many resue attachment cycles, with no special operations on the main assembly parts other than the tapering of the back end of the insertion hole.

  10. Empathy's blind spot.

    PubMed

    Slaby, Jan

    2014-05-01

    The aim of this paper is to mount a philosophical challenge to the currently highly visible research and discourse on empathy. The notion of empathetic perspective-shifting-a conceptually demanding, high-level construal of empathy in humans that arguably captures the core meaning of the term-is criticized from the standpoint of a philosophy of normatively accountable agency. Empathy in this demanding sense fails to achieve a true understanding of the other and instead risks to impose the empathizer's self-constitutive agency upon the person empathized with. Attempts to 'simulate' human agency, or attempts to emulate its cognitive or emotional basis, will likely distort their target phenomena in profound ways. Thus, agency turns out to be empathy's blind spot. Elements of an alternative understanding of interpersonal relatedness are also discussed, focusing on aspects of 'interaction theory'. These might do some of the work that high-level constructs of empathy had been supposed to do without running into similar conceptual difficulties. PMID:24420745

  11. Image enhancement and denoising by wavelet transform for concealed weapon detection

    NASA Astrophysics Data System (ADS)

    Raghuveer, M. R.

    1997-02-01

    Wavelet transform based techniques were developed and investigated for isolation and enhancement of objects in images. The primary motivation is the development of image processing algorithms as part of an automatic system for the detection of concealed weapons under a person's clothing; a problem of considerable potential utility to the military in certain common types of deployment in the post cold war environment such as small unit operations. The issue has potential for other dual use purposes such as law enforcement applications. Wavelet decompositions of the currently available images in the Rome Laboratory database, namely, noisy, low contrast, infrared images, were studied in space-scale-amplitude space. An isolation technique for separating potential suspicious regions/objects from surrounding clutter has been proposed. Based on the images available, the study indicates that the technique is promising in providing the image enhancement necessary for further pattern detection and classification.

  12. Remote concealed weapon detection in millimeter-wave region: active and passive

    NASA Astrophysics Data System (ADS)

    Stanko, Stephan; Klöppel, Frank; Huck, Johann; Nötel, Denis; Hägelen, Manfred; Briese, Gunnar; Gregor, Alexander; Erukulla, Sreenivas; Fuchs, Hans-Hellmuth; Essen, Helmut; Pagels, Anke

    2006-09-01

    Sensors used for Security purposes have to cover the non-invasive inspection of persons, baggage and letters with the aim to detect weapons, explosives and chemical or biological threat material. Currently, emphasis is placed on system concepts and technologies for this type of applications, employing millimeterwave-, submillimeterwave- and terahertz sensors. This is based on the capability of these frequency bands to look through textiles and the possibility to achieve a geometric resolution which is sufficient to resolve critical items within the necessary range. Using multiple frequencies promises to give more detailed information about the structure of the observed objects. Furthermore, to overcome the limitations of passive millimeter- and submillimeterwave sensors which depend on indirect illumination, systems using miniaturized mmw-radar modules are applied as well. This paper describes two approaches for the detection of concealed weapons, the first using a millimeterwave radiometer on a scanner and the second employing a miniaturized radar module based on a synthetic aperture method.

  13. Intentional retrieval suppression can conceal guilty knowledge in ERP memory detection tests.

    PubMed

    Bergström, Zara M; Anderson, Michael C; Buda, Marie; Simons, Jon S; Richardson-Klavehn, Alan

    2013-09-01

    Brain-activity markers of guilty knowledge have been promoted as accurate and reliable measures for establishing criminal culpability. Tests based on these markers interpret the presence or absence of memory-related neural activity as diagnostic of whether or not incriminating information is stored in a suspect's brain. This conclusion critically relies on the untested assumption that reminders of a crime uncontrollably elicit memory-related brain activity. However, recent research indicates that, in some circumstances, humans can control whether they remember a previous experience by intentionally suppressing retrieval. We examined whether people could use retrieval suppression to conceal neural evidence of incriminating memories as indexed by Event-Related Potentials (ERPs). When people were motivated to suppress crime retrieval, their memory-related ERP effects were significantly decreased, allowing guilty individuals to evade detection. Our findings indicate that brain measures of guilty knowledge may be under criminals' intentional control and place limits on their use in legal settings. PMID:23664804

  14. A concealed small bowel perforation in an adult secondary to bicycle handlebar trauma

    PubMed Central

    Nolan, GJ; Simpson, RR

    2013-01-01

    Traumatic abdominal wall hernia (TAWH) secondary to bicycle handlebar is a rare injury. The majority of the literature describes abdominal wall herniation in children. We present a rare case of TAWH in an adult with a concealed small bowel perforation. Although clinical examination in conjunction with computed tomography can exclude the majority of solid organ injuries, small bowel injuries can often be missed. Our case initially revealed a serosal tear in the small bowel but, on close inspection, a separate 3mm perforation was identified, hidden in the small bowel mesentery. We strongly support a low threshold for operative intervention if there is any suspicion. Moreover, we stress the importance of meticulous examination during laparotomy as this injury could have been easily missed, resulting in potential morbidity or mortality in a patient sustaining such an injury. PMID:23676803

  15. Deep Raman spectroscopy for the non-invasive standoff detection of concealed chemical threat agents.

    PubMed

    Izake, Emad L; Cletus, Biju; Olds, William; Sundarajoo, Shankaran; Fredericks, Peter M; Jaatinen, Esa

    2012-05-30

    Deep Raman spectroscopy has been utilized for the standoff detection of concealed chemical threat agents from a distance of 15 m under real life background illumination conditions. By using combined time and space resolved measurements, various explosive precursors hidden in opaque plastic containers were identified non-invasively. Our results confirm that combined time and space resolved Raman spectroscopy leads to higher selectivity towards the sub-layer over the surface layer as well as enhanced rejection of fluorescence from the container surface when compared to standoff spatially offset Raman spectroscopy. Raman spectra that have minimal interference from the packaging material and good signal-to-noise ratio were acquired within 5 s of measurement time. A new combined time and space resolved Raman spectrometer has been designed with nanosecond laser excitation and gated detection, making it of lower cost and complexity than picosecond-based laboratory systems. PMID:22608458

  16. 220GHz wideband 3D imaging radar for concealed object detection technology development and phenomenology studies

    NASA Astrophysics Data System (ADS)

    Robertson, Duncan A.; Macfarlane, David G.; Bryllert, Tomas

    2016-05-01

    We present a 220 GHz 3D imaging `Pathfinder' radar developed within the EU FP7 project CONSORTIS (Concealed Object Stand-Off Real-Time Imaging for Security) which has been built to address two objectives: (i) to de-risk the radar hardware development and (ii) to enable the collection of phenomenology data with ~1 cm3 volumetric resolution. The radar combines a DDS-based chirp generator and self-mixing multiplier technology to achieve a 30 GHz bandwidth chirp with such high linearity that the raw point response is close to ideal and only requires minor nonlinearity compensation. The single transceiver is focused with a 30 cm lens mounted on a gimbal to acquire 3D volumetric images of static test targets and materials.

  17. Intentional retrieval suppression can conceal guilty knowledge in ERP memory detection tests☆

    PubMed Central

    Bergström, Zara M.; Anderson, Michael C.; Buda, Marie; Simons, Jon S.; Richardson-Klavehn, Alan

    2013-01-01

    Brain-activity markers of guilty knowledge have been promoted as accurate and reliable measures for establishing criminal culpability. Tests based on these markers interpret the presence or absence of memory-related neural activity as diagnostic of whether or not incriminating information is stored in a suspect's brain. This conclusion critically relies on the untested assumption that reminders of a crime uncontrollably elicit memory-related brain activity. However, recent research indicates that, in some circumstances, humans can control whether they remember a previous experience by intentionally suppressing retrieval. We examined whether people could use retrieval suppression to conceal neural evidence of incriminating memories as indexed by Event-Related Potentials (ERPs). When people were motivated to suppress crime retrieval, their memory-related ERP effects were significantly decreased, allowing guilty individuals to evade detection. Our findings indicate that brain measures of guilty knowledge may be under criminals’ intentional control and place limits on their use in legal settings. PMID:23664804

  18. A novel Dual Probe Complex Trial Protocol for detection of concealed information.

    PubMed

    Labkovsky, Elena; Rosenfeld, J Peter

    2014-11-01

    In simply guilty (SG), countermeasure-using guilty (CM), and innocent (IN) subjects, a new concealed information test, the P300-based Dual Probe Complex Trial Protocol was tested in a mock crime scenario. It combines an oddball protocol with two stimuli (probe, irrelevant) and another with three stimuli (probe, irrelevant, target) into one trial, doubling detected mock crime information per unit time, compared to previous protocols. Probe-irrelevant amplitude differences were significant in SG and CM, but not IN subjects. On a measure from both two and three stimulus protocol parts of the Dual Probe Complex Trial Protocol trial, accuracy was 94.7% (based on a .9 bootstrap criterion). The criterion-independent area (AUC) under the receiver operating characteristic (from signal detection theory) measuring SG and CM versus IN discriminability averaged .92 (in a range of 0.5-1.0). Countermeasures enhanced irrelevant (not probe) P300s in CM groups. PMID:24981064

  19. Effects of coping and cooperative instructions on guilty and informed innocents' physiological responses to concealed information.

    PubMed

    Zvi, Liza; Nachson, Israel; Elaad, Eitan

    2012-05-01

    Previous research on the Concealed Information Test indicates that knowledge of the critical information of a given event is sufficient for the elicitation of strong physiological reactions, thus facilitating detection by the test. Other factors that affect the test's efficacy are deceptive verbal responses to the test's questions and motivation of guilty examinees to avoid detection. In the present study effects of coping and cooperative instructions - delivered to guilty and innocent participants - on detection were examined. In a mock-theft experiment guilty participants who actually committed a mock-crime, and informed innocent participants who handled the critical items of the crime in an innocent context, were instructed to adopt either a coping or a cooperative attitude toward the polygraph test. Results indicated that both, guilt and coping behavior, were associated with enhanced physiological responses to the critical information, whereas innocence and cooperative behavior attenuated physiological responses. Theoretical and applied implications of the results are discussed. PMID:22330977

  20. Memory instructions, vocalization, mock crimes, and concealed information tests with a polygraph.

    PubMed

    Bradley, M T; Malik, F J; Cullen, M C

    2011-12-01

    Accuracy rates with polygraphs using concealed information tests (CITs) depend on memory for crime details. Some participants read instructions on murdering a dummy victim that specified exact crime details asked on the subsequent CIT. Others read instructions not stating details, but still requiring interaction with the exact same details for the crime. For example, the murder weapon was under four heavy boxes. Instructions stated either "... remove the 4 boxes ..." or "... remove the boxes ..." Thus, each group removed four boxes, but only one group was primed with the number "4" beforehand. In addition, the victim unexpectedly shouted at some participants during the crime. An innocent group was not exposed to either manipulation. Memory, detection scores, and detection rates were lower for guilty participants not primed with details. Sound affected detection scores but not memory, and there was no interaction between the two factors. Information tests are limited by how crime information is received. PMID:22403929

  1. Event-related potentials increase the discrimination performance of the autonomic-based concealed information test.

    PubMed

    Matsuda, Izumi; Nittono, Hiroshi; Ogawa, Tokihiro

    2011-12-01

    The concealed information test (CIT) assesses an examinee's crime-relevant memory on the basis of physiological differences between crime-relevant and irrelevant items. The CIT based on autonomic measures has been used for criminal investigations, while the CIT based on event-related potentials (ERPs) has been suggested as a useful alternative. To combine these two methods, we developed a quantification method of ERPs measured in the autonomic-based CIT where each item was repeated only 5 times. Results showed that the peak amplitude of the ERP difference wave between crime-relevant and irrelevant items could discriminate between guilty and innocent participants effectively even when only 5 trials were used for averaging. This ERP measure could detect some participants who were missed by the autonomic measures. Combining the ERP and autonomic measures significantly improved the discrimination performance of the autonomic-based CIT. PMID:21806637

  2. Psychophysiological and behavioral measures for detecting concealed information: the role of memory for crime details.

    PubMed

    Nahari, Galit; Ben-Shakhar, Gershon

    2011-06-01

    This study examined the role of memory for crime details in detecting concealed information using the electrodermal measure, Symptom Validity Test, and Number Guessing Test. Participants were randomly assigned to three groups: guilty, who committed a mock theft; informed-innocents, who were exposed to crime-relevant items; and uninformed-innocents, who had no crime-relevant information. Participants were tested immediately or 1 week later. Results showed (a) all tests detected the guilty in the immediate condition, and combining the tests improved detection efficiency; (b) tests' efficiency declined in the delayed condition, mainly for peripheral details; (c) no distinction between guilty and informed innocents was possible in the immediate, yet some distinction emerged in the delayed condition. These findings suggest that, while time delay may somewhat reduce the ability to detect the guilty, it also diminishes the danger of accusing informed-innocents. PMID:20958308

  3. Combining skin conductance and forced choice in the detection of concealed information.

    PubMed

    Meijer, Ewout H; Smulders, Fren T Y; Johnston, James E; Merckelbach, Harald L G J

    2007-09-01

    An advantage of the concealed information polygraph test (CIT) is that its false positive rate is determined on statistical grounds, and can be set a priori at arbitrary low levels (i.e., few innocents declared guilty). This criterion, however, inevitably leads to a loss of sensitivity (i.e., more guilty suspects declared innocent). We explored whether the sensitivity of a CIT procedure could be increased by adding an independent measure that is based on an entirely different psychological mechanism. In two experiments, we explored whether the accuracy of a CIT procedure could be increased by adding Symptom Validity Testing (SVT), a relatively simple, forced-choice, self-report procedure that has previously been used to detect malingering in various contexts. Results of a feigned amnesia experiment but not from a mock crime experiment showed that a combination measure of both tests yielded better detection than either test alone. PMID:17584188

  4. Deception awareness improves P300-based deception detection in concealed information tests.

    PubMed

    Rosenfeld, J Peter; Hu, Xiaoqing; Pederson, Kristine

    2012-10-01

    We asked if increased awareness of deception enhanced P300-based detection of concealed information with two groups: 1) Control subjects saw a randomized series of either rare probes (subject home towns), frequent irrelevants (other towns), and rare targets, which are irrelevant stimuli but requiring Button 1 responses. Probes and non-target irrelevants required Button 2 responses. Controls were told to be sure they performed target/non-target discrimination correctly, and were so reminded throughout the run. 2) Deception subjects received an identical stimulus series and response instructions, but were also alerted about their deception (pressing a non-recognition button to probes) before and throughout the run. The deception group had significantly greater differences between probe and irrelevant P300s than controls, as well as significantly greater individual detections (10/10) than did controls (5/10), suggesting that the deception awareness manipulation enhances test sensitivity. PMID:22750420

  5. Laboratory Techniques for the Blind

    ERIC Educational Resources Information Center

    Tombaugh, Dorothy

    1972-01-01

    Describes modifications of laboratory procedures for the BSCS Green Version biology, including dissection, microbiology, animal behavior, physiology, biochemistry, and genetics that make the methods suitable for direct experimentation by blind students. Discusses models as substitutes for microscopy. (AL)

  6. American Foundation for the Blind

    MedlinePlus

    ... and Electronic Materials Webinars and Online Courses Accessible Technology AccessWorld ® : Technology News for People Who Are Blind or Visually Impaired Find Assistive Technology Products Using Technology: Apps, Guides, Video Demonstrations, and ...

  7. Relationships among Self-Concealment, Mindfulness and Negative Psychological Outcomes in Asian American and European American College Students

    ERIC Educational Resources Information Center

    Masuda, Akihiko; Wendell, Johanna W.; Chou, Ying-Yi; Feinstein, Amanda B.

    2010-01-01

    Research on Asian Americans and their psychological adjustment is limited. Consisting of two cross-sectional studies, the present investigation examined the relationships among self-concealment, mindfulness, emotional distress in stressful interpersonal situations, and general psychological ill-health in Asian American college students, and in…

  8. [Cardioversion for paroxysmal supraventricular tachycardia during lung surgery in a patient with concealed Wolff-Parkinson-White syndrome].

    PubMed

    Sato, Yoshiharu; Nagata, Hirofumi; Inoda, Ayako; Miura, Hiroko; Watanabe, Yoko; Suzuki, Kenji

    2014-10-01

    We report a case of paroxysmal supraventricular tachycardia (PSVT) that occurred during video-assisted thoracoscopic (VATS) lobectomy in a patient with concealed Wolff-Parkinson-White (WPW) syndrome. A 59-year-old man with lung cancer was scheduled for VATS lobectomy under general anesthesia. After inserting a thoracic epidural catheter, general anesthesia was induced with intravenous administration of propofol. Anesthesia was maintained with inhalation of desfurane in an air/oxygen mixture and intravenous infusion of remifentanil. Recurrent PSVT occurred three times, and the last episode of PSVT continued for 50 minutes regardless of administration of antiarrhythmic drugs. Synchronized electric shock via adhesive electrode pads on the patient's chest successfully converted PSVT back to normal sinus rhythm. The remaining course and postoperative period were uneventful. An electrophysiological study performed after hospital discharge detected concealed WPW syndrome, which had contributed to the development of atrioventricular reciprocating tachycardia. Concealed WPW syndrome is a rare, but critical complication that could possibly cause lethal atrial tachyarrhythmias during the perioperative period. In the present case, cardioversion using adhesive electrode pads briefly terminated PSVT in a patient with concealed WPW syndrome. PMID:25693338

  9. Self-Concealment, Social Network Sites Usage, Social Appearance Anxiety, Loneliness of High School Students: A Model Testing

    ERIC Educational Resources Information Center

    Dogan, Ugur; Çolak, Tugba Seda

    2016-01-01

    This study was tested a model for explain to social networks sites (SNS) usage with structural equation modeling (SEM). Using SEM on a sample of 475 high school students (35% male, 65% female) students, model was investigated the relationship between self-concealment, social appearance anxiety, loneliness on SNS such as Twitter and Facebook usage.…

  10. Manipulating item proportion and deception reveals crucial dissociation between behavioral, autonomic, and neural indices of concealed information.

    PubMed

    Suchotzki, Kristina; Verschuere, Bruno; Peth, Judith; Crombez, Geert; Gamer, Matthias

    2015-02-01

    Developed as an alternative to traditional deception detection methods, the concealed information test (CIT) assesses recognition of critical (e.g., crime-relevant) "probes." Most often, recognition has been measured as enhanced skin conductance responses (SCRs) to probes compared to irrelevant foils (CIT effect). More recently, also differentially enlarged reaction times (RTs) and increased neural activity in the bilateral inferior frontal gyrus, the right middle frontal gyrus, and the right temporo-parietal junction have been observed. The aims of the current functional magnetic resonance imaging (fMRI) study were to (1) investigate the boundary conditions of the CIT effects in all three measures and thereby (2) gain more insight into the relative contribution of two mechanisms underlying enhanced responding to concealed information (i.e., orienting versus response inhibition). Therefore, we manipulated the proportion of probe versus irrelevant items, and whether suspects were instructed to actively deny recognition of probe knowledge (i.e., deceive) during the test. Results revealed that whereas overt deception was not necessary for the SCR CIT effect, it was crucial for the RT and the fMRI-based CIT effects. The proportion manipulation enhanced the CIT effect in all three measures. The results indicate that different mental processes might underlie the response pattern in the CIT. While skin conductance responding to concealed information may best be explained by orienting theory, it seems that response inhibition drives RT and blood oxygen level dependent responding to concealed information. PMID:25277495

  11. Tissue Engineering: Biomimetic Concealing of PLGA Microspheres in a 3D Scaffold to Prevent Macrophage Uptake (Small 11/2016).

    PubMed

    Minardi, Silvia; Corradetti, Bruna; Taraballi, Francesca; Sandri, Monica; Martinez, Jonathan O; Powell, Sebastian T; Tampieri, Anna; Weiner, Bradley K; Tasciotti, Ennio

    2016-03-01

    Avoiding the clearance of drug delivery systems from 3D scaffolds is crucial to preserve the bioactivity of their therapeutic payload. This is accomplished on page 1479, by E. Tasciotti and co-workers, through a "concealing" strategy: cloaking PLGA microspheres with the type I collagen matrix of a biomimetic scaffold, which enables the control of the production of inflammatory mediators. PMID:26970527

  12. Disclosure and Concealment of Sexual Orientation and the Mental Health of Non-Gay-Identified, Behaviorally Bisexual Men

    ERIC Educational Resources Information Center

    Schrimshaw, Eric W.; Siegel, Karolynn; Downing, Martin J., Jr.; Parsons, Jeffrey T.

    2013-01-01

    Objective: Although bisexual men report lower levels of mental health relative to gay men, few studies have examined the factors that contribute to bisexual men's mental health. Bisexual men are less likely to disclose, and more likely to conceal (i.e., a desire to hide), their sexual orientation than gay men. Theory suggests that this may…

  13. P300 amplitudes in the concealed information test are less affected by depth of processing than electrodermal responses

    PubMed Central

    Gamer, Matthias; Berti, Stefan

    2012-01-01

    The Concealed Information Test (CIT) has been used in the laboratory as well as in field applications to detect concealed crime related memories. The presentation of crime relevant details to guilty suspects has been shown to elicit enhanced N200 and P300 amplitudes of the event-related brain potentials (ERPs) as well as greater skin conductance responses (SCRs) as compared to neutral test items. These electrophysiological and electrodermal responses were found to incrementally contribute to the validity of the test, thereby suggesting that these response systems are sensitive to different psychological processes. In the current study, we tested whether depth of processing differentially affects N200, P300, and SCR amplitudes in the CIT. Twenty participants carried out a mock crime and became familiar with central and peripheral crime details. A CIT that was conducted 1 week later revealed that SCR amplitudes were larger for central details although central and peripheral items were remembered equally well in a subsequent explicit memory test. By contrast, P300 amplitudes elicited by crime related details were larger but did not differ significantly between question types. N200 amplitudes did not allow for detecting concealed knowledge in this study. These results indicate that depth of processing might be one factor that differentially affects central and autonomic nervous system responses to concealed information. Such differentiation might be highly relevant for field applications of the CIT. PMID:23162454

  14. 23 CFR 660.107 - Allocations.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 23 Highways 1 2010-04-01 2010-04-01 false Allocations. 660.107 Section 660.107 Highways FEDERAL HIGHWAY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION ENGINEERING AND TRAFFIC OPERATIONS SPECIAL PROGRAMS (DIRECT FEDERAL) Forest Highways § 660.107 Allocations. On October 1 of each fiscal year, the FHWA will allocate 66 percent of Public Lands...

  15. 15 CFR 923.110 - Allocation formula.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Allocation formula. 923.110 Section... Grants § 923.110 Allocation formula. (a) As required by subsection 306(a), the Secretary may make grants...) Allocation formula factors and weighting. Each State eligible to receive a financial assistance award...

  16. 10 CFR 455.31 - Allocation formulas.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 3 2010-01-01 2010-01-01 false Allocation formulas. 455.31 Section 455.31 Energy... § 455.31 Allocation formulas. (a) Financial assistance for conducting technical assistance programs for... this section. (c) The allocation factor (K) shall be determined by the formula: EC14NO91.086 where,...

  17. 24 CFR 574.130 - Formula allocations.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 3 2010-04-01 2010-04-01 false Formula allocations. 574.130... URBAN DEVELOPMENT COMMUNITY FACILITIES HOUSING OPPORTUNITIES FOR PERSONS WITH AIDS Formula Entitlements § 574.130 Formula allocations. (a) Data sources. HUD will allocate funds based on the number of cases...

  18. 45 CFR 1355.57 - Cost allocation.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false Cost allocation. 1355.57 Section 1355.57 Public... MAINTENANCE PAYMENTS, ADOPTION ASSISTANCE, AND CHILD AND FAMILY SERVICES GENERAL § 1355.57 Cost allocation. (a... maintenance payments or adoption assistance payments may be made under the State plan. (b) Cost allocation...

  19. 45 CFR 400.13 - Cost allocation.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 2 2010-10-01 2010-10-01 false Cost allocation. 400.13 Section 400.13 Public... for Refugee Resettlement Award of Grants to States § 400.13 Cost allocation. (a) A State must allocate... management of the State's refugee program (e.g., development of the State plan, overall program...

  20. 45 CFR 400.13 - Cost allocation.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 2 2011-10-01 2011-10-01 false Cost allocation. 400.13 Section 400.13 Public... for Refugee Resettlement Award of Grants to States § 400.13 Cost allocation. (a) A State must allocate... management of the State's refugee program (e.g., development of the State plan, overall program...

  1. 45 CFR 1355.57 - Cost allocation.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 4 2011-10-01 2011-10-01 false Cost allocation. 1355.57 Section 1355.57 Public... MAINTENANCE PAYMENTS, ADOPTION ASSISTANCE, AND CHILD AND FAMILY SERVICES GENERAL § 1355.57 Cost allocation. (a... maintenance payments or adoption assistance payments may be made under the State plan. (b) Cost allocation...

  2. 24 CFR 92.50 - Formula allocation.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 24 Housing and Urban Development 1 2014-04-01 2014-04-01 false Formula allocation. 92.50 Section 92.50 Housing and Urban Development Office of the Secretary, Department of Housing and Urban Development HOME INVESTMENT PARTNERSHIPS PROGRAM Allocation Formula § 92.50 Formula allocation....

  3. 24 CFR 92.50 - Formula allocation.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 1 2013-04-01 2013-04-01 false Formula allocation. 92.50 Section 92.50 Housing and Urban Development Office of the Secretary, Department of Housing and Urban Development HOME INVESTMENT PARTNERSHIPS PROGRAM Allocation Formula § 92.50 Formula allocation....

  4. 24 CFR 92.50 - Formula allocation.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 1 2012-04-01 2012-04-01 false Formula allocation. 92.50 Section 92.50 Housing and Urban Development Office of the Secretary, Department of Housing and Urban Development HOME INVESTMENT PARTNERSHIPS PROGRAM Allocation Formula § 92.50 Formula allocation....

  5. 45 CFR 98.55 - Cost allocation.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 1 2014-10-01 2014-10-01 false Cost allocation. 98.55 Section 98.55 Public... of Child Care and Development Funds § 98.55 Cost allocation. (a) The Lead Agency and subgrantees shall keep on file cost allocation plans or indirect cost agreements, as appropriate, that have...

  6. 45 CFR 98.55 - Cost allocation.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 1 2011-10-01 2011-10-01 false Cost allocation. 98.55 Section 98.55 Public... of Child Care and Development Funds § 98.55 Cost allocation. (a) The Lead Agency and subgrantees shall keep on file cost allocation plans or indirect cost agreements, as appropriate, that have...

  7. 45 CFR 1355.57 - Cost allocation.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 4 2012-10-01 2012-10-01 false Cost allocation. 1355.57 Section 1355.57 Public... MAINTENANCE PAYMENTS, ADOPTION ASSISTANCE, AND CHILD AND FAMILY SERVICES GENERAL § 1355.57 Cost allocation. (a...) Cost allocation and distribution for the planning, design, development, installation and operation...

  8. 45 CFR 400.13 - Cost allocation.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 2 2013-10-01 2012-10-01 true Cost allocation. 400.13 Section 400.13 Public... for Refugee Resettlement Award of Grants to States § 400.13 Cost allocation. (a) A State must allocate... management of the State's refugee program (e.g., development of the State plan, overall program...

  9. 45 CFR 400.13 - Cost allocation.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 2 2012-10-01 2012-10-01 false Cost allocation. 400.13 Section 400.13 Public... for Refugee Resettlement Award of Grants to States § 400.13 Cost allocation. (a) A State must allocate... management of the State's refugee program (e.g., development of the State plan, overall program...

  10. Concealed Fertility and Extended Female Sexuality in a Non-Human Primate (Macaca assamensis)

    PubMed Central

    Fürtbauer, Ines; Heistermann, Michael; Schülke, Oliver; Ostner, Julia

    2011-01-01

    In numerous primates living in mixed-sex groups, females display probabilistic cues of fertility to simultaneously concentrate paternity to dominant males while diluting it amongst others as a means to reduce the risk of infanticide and to increase male care for offspring. A few species, however, lack these cues and potentially conceal fertility from males; yet, to date, little is known about mating patterns and their underlying proximate mechanisms in such species. Here, we investigated mating activity and sexual consortships relative to female reproductive state in wild Assamese macaques (Macaca assamensis), a species where females lack prominent anogenital swellings and copulation calls. During two mating seasons (2837 contact hours) we recorded sexual and social behaviors, sexual consortships, and collected 1178 fecal samples (n = 15 females) which were analyzed for progestogen concentrations to assess female reproductive state and to determine the timing of ovulation and conception. Although mostly conceiving in their first ovarian cycle, females were sexually receptive throughout the entire 4-month mating season, and within-cycle mating frequencies were not increased during fertile phases. Dominant males did not monopolize fertile matings, and consortships by high-ranking males lasted for long periods, which were not exclusively linked to female fertile phases. Furthermore, females copulated promiscuously but not randomly, i.e. for almost every female, matings were concentrated to a certain male, irrespective of male rank. Collectively, we demonstrate that fertility is undisclosed to males. The extreme extended female sexuality facilitated by concealed fertility may allow females to create differentiated mating relationships within a promiscuous mating system. Our study provides important new insight into the plasticity of female sexuality in non-human primates. PMID:21853074

  11. Brain fingerprinting classification concealed information test detects US Navy military medical information with P300

    PubMed Central

    Farwell, Lawrence A.; Richardson, Drew C.; Richardson, Graham M.; Furedy, John J.

    2014-01-01

    A classification concealed information test (CIT) used the “brain fingerprinting” method of applying P300 event-related potential (ERP) in detecting information that is (1) acquired in real life and (2) unique to US Navy experts in military medicine. Military medicine experts and non-experts were asked to push buttons in response to three types of text stimuli. Targets contain known information relevant to military medicine, are identified to subjects as relevant, and require pushing one button. Subjects are told to push another button to all other stimuli. Probes contain concealed information relevant to military medicine, and are not identified to subjects. Irrelevants contain equally plausible, but incorrect/irrelevant information. Error rate was 0%. Median and mean statistical confidences for individual determinations were 99.9% with no indeterminates (results lacking sufficiently high statistical confidence to be classified). We compared error rate and statistical confidence for determinations of both information present and information absent produced by classification CIT (Is a probe ERP more similar to a target or to an irrelevant ERP?) vs. comparison CIT (Does a probe produce a larger ERP than an irrelevant?) using P300 plus the late negative component (LNP; together, P300-MERMER). Comparison CIT produced a significantly higher error rate (20%) and lower statistical confidences: mean 67%; information-absent mean was 28.9%, less than chance (50%). We compared analysis using P300 alone with the P300 + LNP. P300 alone produced the same 0% error rate but significantly lower statistical confidences. These findings add to the evidence that the brain fingerprinting methods as described here provide sufficient conditions to produce less than 1% error rate and greater than 95% median statistical confidence in a CIT on information obtained in the course of real life that is characteristic of individuals with specific training, expertise, or organizational

  12. Millimeter-wave concealed weapons detection and through-the-wall imaging systems

    NASA Astrophysics Data System (ADS)

    Huguenin, G. Richard

    1997-02-01

    Millimetrix' millimeter wave passive imaging technology offers the opportunity for rapid and remote detection of metallic and non-metallic weapons, plastic explosives, drugs, and other contraband concealed under multiple layers of clothing without the necessity of a direct physical search. The purely passive imaging technique relies solely on the existing natural emissions from the scene objects, does not expose the person to any man-made radiation, and is therefore completely harmless to the person being observed and to all others in the area. Screening can be done remotely and with as much discretion as the situation requires. The passive imaging approach to the detection of concealed weapons and contraband hidden under people's clothing works well at millimeter wavelengths because of a fortunate convergence of a number of key factors: (1) adequate resolution in a reasonable sensor size; (2) high transparency of virtually all clothing; and (3) the extraordinarily high emissivity of human flesh compared to the vast majority of other materials. Longer (microwave) wavelengths are impractical because of sensor size and resolution issues, and shorter (infrared) wavelengths are impractical because of the poor transparency of most clothing. The ability of millimeter wave emissions to penetrate many common building materials permits the remote observation, using active millimeter wave sensors, of people and other objects within a room from outside of that room. The resulting through-the-wall 'live' video images of people and furnishings will indicate their location, posture, and activity within a room which should be valuable knowledge to Special Operations, SWAT, and other military and law enforcement personnel prior to their entering that room. Millimeter wave radar imaging systems based on passive MillivisionR camera technology are being developed by Millimetrix (and other members of the MIRTAC TRP consortium) for through-the-wall imaging system (TWIS) applications.

  13. Brain fingerprinting classification concealed information test detects US Navy military medical information with P300.

    PubMed

    Farwell, Lawrence A; Richardson, Drew C; Richardson, Graham M; Furedy, John J

    2014-01-01

    A classification concealed information test (CIT) used the "brain fingerprinting" method of applying P300 event-related potential (ERP) in detecting information that is (1) acquired in real life and (2) unique to US Navy experts in military medicine. Military medicine experts and non-experts were asked to push buttons in response to three types of text stimuli. Targets contain known information relevant to military medicine, are identified to subjects as relevant, and require pushing one button. Subjects are told to push another button to all other stimuli. Probes contain concealed information relevant to military medicine, and are not identified to subjects. Irrelevants contain equally plausible, but incorrect/irrelevant information. Error rate was 0%. Median and mean statistical confidences for individual determinations were 99.9% with no indeterminates (results lacking sufficiently high statistical confidence to be classified). We compared error rate and statistical confidence for determinations of both information present and information absent produced by classification CIT (Is a probe ERP more similar to a target or to an irrelevant ERP?) vs. comparison CIT (Does a probe produce a larger ERP than an irrelevant?) using P300 plus the late negative component (LNP; together, P300-MERMER). Comparison CIT produced a significantly higher error rate (20%) and lower statistical confidences: mean 67%; information-absent mean was 28.9%, less than chance (50%). We compared analysis using P300 alone with the P300 + LNP. P300 alone produced the same 0% error rate but significantly lower statistical confidences. These findings add to the evidence that the brain fingerprinting methods as described here provide sufficient conditions to produce less than 1% error rate and greater than 95% median statistical confidence in a CIT on information obtained in the course of real life that is characteristic of individuals with specific training, expertise, or organizational

  14. Enhanced terahertz imaging system performance analysis and design tool for concealed weapon identification

    NASA Astrophysics Data System (ADS)

    Murrill, Steven R.; Franck, Charmaine C.; Espinola, Richard L.; Petkie, Douglas T.; De Lucia, Frank C.; Jacobs, Eddie L.

    2011-11-01

    The U.S. Army Research Laboratory (ARL) and the U.S. Army Night Vision and Electronic Sensors Directorate (NVESD) have developed a terahertz-band imaging system performance model/tool for detection and identification of concealed weaponry. The details of the MATLAB-based model which accounts for the effects of all critical sensor and display components, and for the effects of atmospheric attenuation, concealment material attenuation, and active illumination, were reported on at the 2005 SPIE Europe Security & Defence Symposium (Brugge). An advanced version of the base model that accounts for both the dramatic impact that target and background orientation can have on target observability as related to specular and Lambertian reflections captured by an active-illumination-based imaging system, and for the impact of target and background thermal emission, was reported on at the 2007 SPIE Defense and Security Symposium (Orlando). This paper will provide a comprehensive review of an enhanced, user-friendly, Windows-executable, terahertz-band imaging system performance analysis and design tool that now includes additional features such as a MODTRAN-based atmospheric attenuation calculator and advanced system architecture configuration inputs that allow for straightforward performance analysis of active or passive systems based on scanning (single- or line-array detector element(s)) or staring (focal-plane-array detector elements) imaging architectures. This newly enhanced THz imaging system design tool is an extension of the advanced THz imaging system performance model that was developed under the Defense Advanced Research Project Agency's (DARPA) Terahertz Imaging Focal-Plane Technology (TIFT) program. This paper will also provide example system component (active-illumination source and detector) trade-study analyses using the new features of this user-friendly THz imaging system performance analysis and design tool.

  15. Vitamin D and Musculoskeletal Status in Nova Scotian Women Who Wear Concealing Clothing

    PubMed Central

    Ojah, Rani C. I.; Welch, Jo M.

    2012-01-01

    Bone and muscle weakness due to vitamin D deficiency is common among Muslim women who reside in sunny, equatorial countries. The purpose of this study was to determine if living in a northern maritime location additionally disadvantages women who wear concealing clothes. A cross-sectional matched pair design was used to compare women who habitually wore concealing clothing with women who dressed according to western norms. Each premenopausal hijab-wearing woman (n = 11) was matched by age, height, weight and skin tone with a western-dressed woman. Subjects were tested by hand grip dynamometry to assess muscular strength and by quantitative ultrasound at the calcaneus to assess bone status. Nutritional intake was obtained by 24 h recall. Serum 25-hydroxyvitamin D (s-25(OH)D) status was determined in seven matched pairs. The hijab group had lower s-25(OH)D than women who wore western clothes (40 ± 28 vs. 81 ± 32 nmol/L, p= 0.01). Grip strength in the right hand was lower in the hijab-wearing women (p = 0.05) but this appeared to be due to less participation in intense exercise. Bone status did not differ between groups (p= 0.9). Dietary intake of vitamin D was lower in the hijab-wearers (316 ± 353 vs. 601 ± 341 IU/day, p= 0.001). This pilot study suggests that women living in a northern maritime location appear to be at risk for vitamin D insufficiency and therefore should consider taking vitamin D supplements. PMID:22690323

  16. Vitamin D and musculoskeletal status in Nova Scotian women who wear concealing clothing.

    PubMed

    Ojah, Rani C I; Welch, Jo M

    2012-05-01

    Bone and muscle weakness due to vitamin D deficiency is common among Muslim women who reside in sunny, equatorial countries. The purpose of this study was to determine if living in a northern maritime location additionally disadvantages women who wear concealing clothes. A cross-sectional matched pair design was used to compare women who habitually wore concealing clothing with women who dressed according to western norms. Each premenopausal hijab-wearing woman (n = 11) was matched by age, height, weight and skin tone with a western-dressed woman. Subjects were tested by hand grip dynamometry to assess muscular strength and by quantitative ultrasound at the calcaneus to assess bone status. Nutritional intake was obtained by 24 h recall. Serum 25-hydroxyvitamin D (s-25(OH)D) status was determined in seven matched pairs. The hijab group had lower s-25(OH)D than women who wore western clothes (40 ± 28 vs. 81 ± 32 nmol/L, p= 0.01). Grip strength in the right hand was lower in the hijab-wearing women (p = 0.05) but this appeared to be due to less participation in intense exercise. Bone status did not differ between groups (p= 0.9). Dietary intake of vitamin D was lower in the hijab-wearers (316 ± 353 vs. 601 ± 341 IU/day, p= 0.001). This pilot study suggests that women living in a northern maritime location appear to be at risk for vitamin D insufficiency and therefore should consider taking vitamin D supplements. PMID:22690323

  17. Programs for the Deaf-Blind.

    ERIC Educational Resources Information Center

    American Annals of the Deaf, 1991

    1991-01-01

    This directory lists contact information for programs for the deaf-blind in the United States in 3 categories: (1) programs for deaf-blind children and youth (29 programs listed); (2) Helen Keller National Center for Deaf-Blind Youth and Adults (1 national and 10 regional offices); and (3) programs for training teachers of the deaf-blind (4…

  18. What It's Like to Be Color Blind

    MedlinePlus

    ... Homework? Here's Help White House Lunch Recipes What It's Like to Be Color Blind KidsHealth > For Kids > What It's Like to Be Color Blind Print A A ... blind. But some people really are color blind. It doesn't mean they can't see any ...

  19. A Perceptual Repetition Blindness Effect

    NASA Technical Reports Server (NTRS)

    Hochhaus, Larry; Johnston, James C.; Null, Cynthia H. (Technical Monitor)

    1994-01-01

    Before concluding Repetition Blindness is a perceptual phenomenon, alternative explanations based on memory retrieval problems and report bias must be rejected. Memory problems were minimized by requiring a judgment about only a single briefly displayed field. Bias and sensitivity effects were empirically measured with an ROC-curve analysis method based on confidence ratings. Results from five experiments support the hypothesis that Repetition Blindness can be a perceptual phenomenon.

  20. Communication patterns and allocation strategies.

    SciTech Connect

    Leung, Vitus Joseph; Mache, Jens Wolfgang; Bunde, David P.

    2004-01-01

    Motivated by observations about job runtimes on the CPlant system, we use a trace-driven microsimulator to begin characterizing the performance of different classes of allocation algorithms on jobs with different communication patterns in space-shared parallel systems with mesh topology. We show that relative performance varies considerably with communication pattern. The Paging strategy using the Hilbert space-filling curve and the Best Fit heuristic performed best across several communication patterns.

  1. Minority Transportation Expenditure Allocation Model

    1993-04-12

    MITRAM (Minority TRansportation expenditure Allocation Model) can project various transportation related attributes of minority (Black and Hispanic) and majority (white) populations. The model projects vehicle ownership, vehicle miles of travel, workers, new car and on-road fleet fuel economy, amount and share of household income spent on gasoline, and household expenditures on public transportation and taxis. MITRAM predicts reactions to sustained fuel price changes for up to 10 years after the change.

  2. ESTIMATED STATISTICS ON BLINDNESS AND VISION PROBLEMS. NATIONAL SOCIETY FOR THE PREVENTION OF BLINDNESS FACT BOOK.

    ERIC Educational Resources Information Center

    HATFIELD, ELIZABETH M.

    CURRENT ESTIMATES AND SOME TREND DATA ARE PRESENTED ON THE FOLLOWING SUBJECTS -- POPULATION GROWTH (1940-1960), PREVALENCE OF LEGAL BLINDNESS, NEW CASES OF LEGAL BLINDNESS, AGE DISTRIBUTION OF LEGALLY BLIND PERSONS, CAUSES OF LEGAL BLINDNESS, CHANGING PATTERNS IN CAUSES OF LEGAL BLINDNESS, CASES OF GLAUCOMA, SCHOOL CHILDREN NEEDING EYE CARE,…

  3. [Aiming for zero blindness].

    PubMed

    Nakazawa, Toru

    2015-03-01

    Glaucoma is the leading cause of acquired blindness in Japan. One reason that it often leads to blindness is that it can continue to worsen even after effective medical reduction of intraocular pressure (IOP), the only evidence-based treatment. The limitations of current treatments make it critical to identify IOP-independent factors that can cause glaucoma and develop new drugs to target these factors. This is a challenging task, as the pathology of glaucoma is thought to be very complex, with different combinations of factors underlying its development and progression in different patients. Additionally, there is a deficiency in methods to efficiently perform clinical evaluations and reliably probe the state of the disease over relatively short periods. In addition, newly developed drugs need to be evaluated with clinical trials, for which human and financial resources are limited, before they can be widely used for treatment. Taking all these issues into consideration, it is evident that there are two urgent issues to consider: the development of methods to classify glaucoma in detail based on its pathology, and the improvement of clinical evaluation methods. In this review, we discuss some of our efforts to develop new neuroprotective agents for glaucoma, with a focus on the following three areas: 1. Clinical research and development of methods to classify glaucoma in detail based on IOP-independent factors, and the exploration of possibilities for the improvement of clinical evaluation of glaucoma. 2. Pathology-based research and development of new drugs for glaucoma, focusing on comprehensive gene expression analysis and the development of molecule-targeting drugs, using murine optic nerve crush as a disease model. 3. Development of next generation in vivo imaging modalities and the establishment of infrastructure enabling "big-data" analysis. First, we discuss our clinical research and the development of methods to classify glaucoma in detail based on IOP

  4. Allocating Variability and Reserve Requirements (Presentation)

    SciTech Connect

    Kirby, B.; King, J.; Milligan, M.

    2011-10-01

    This presentation describes how you could conceivably allocate variability and reserve requirements, including how to allocate aggregation benefits. Conclusions of this presentation are: (1) Aggregation provides benefits because individual requirements are not 100% correlated; (2) Method needed to allocate reduced requirement among participants; (3) Differences between allocation results are subtle - (a) Not immediately obvious which method is 'better'; (b) Many are numerically 'correct', they sum to the physical requirement; (c) Many are not 'fair', Results depend on sub-aggregation and/or the order individuals are included; and (4) Vector allocation method is simple and fair.

  5. 45 CFR 402.31 - Determination of allocations.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... ASSISTANCE GRANTS State Allocations § 402.31 Determination of allocations. (a) Allocation formula. Allocations will be computed according to a formula using the following factors and weights: (1) 50...

  6. 45 CFR 402.31 - Determination of allocations.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... State Allocations § 402.31 Determination of allocations. (a) Allocation formula. Allocations will be computed according to a formula using the following factors and weights: (1) 50 percent based on the...

  7. 20 CFR 416.983 - How we evaluate statutory blindness.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false How we evaluate statutory blindness. 416.983... AGED, BLIND, AND DISABLED Determining Disability and Blindness Blindness § 416.983 How we evaluate statutory blindness. We will find that you are blind if you are statutorily blind within the meaning...

  8. 20 CFR 416.982 - Blindness under a State plan.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Blindness under a State plan. 416.982 Section..., BLIND, AND DISABLED Determining Disability and Blindness Blindness § 416.982 Blindness under a State... plan because of your blindness for the month of December 1973; and (c) You continue to be blind...

  9. 20 CFR 416.983 - How we evaluate statutory blindness.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false How we evaluate statutory blindness. 416.983... AGED, BLIND, AND DISABLED Determining Disability and Blindness Blindness § 416.983 How we evaluate statutory blindness. We will find that you are blind if you are statutorily blind within the meaning...

  10. 20 CFR 416.982 - Blindness under a State plan.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false Blindness under a State plan. 416.982 Section..., BLIND, AND DISABLED Determining Disability and Blindness Blindness § 416.982 Blindness under a State... plan because of your blindness for the month of December 1973; and (c) You continue to be blind...

  11. 20 CFR 416.982 - Blindness under a State plan.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Blindness under a State plan. 416.982 Section..., BLIND, AND DISABLED Determining Disability and Blindness Blindness § 416.982 Blindness under a State... plan because of your blindness for the month of December 1973; and (c) You continue to be blind...

  12. 20 CFR 416.983 - How we evaluate statutory blindness.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false How we evaluate statutory blindness. 416.983... AGED, BLIND, AND DISABLED Determining Disability and Blindness Blindness § 416.983 How we evaluate statutory blindness. We will find that you are blind if you are statutorily blind within the meaning...

  13. 20 CFR 416.982 - Blindness under a State plan.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false Blindness under a State plan. 416.982 Section..., BLIND, AND DISABLED Determining Disability and Blindness Blindness § 416.982 Blindness under a State... plan because of your blindness for the month of December 1973; and (c) You continue to be blind...

  14. 20 CFR 416.983 - How we evaluate statutory blindness.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false How we evaluate statutory blindness. 416.983... AGED, BLIND, AND DISABLED Determining Disability and Blindness Blindness § 416.983 How we evaluate statutory blindness. We will find that you are blind if you are statutorily blind within the meaning...

  15. 20 CFR 416.982 - Blindness under a State plan.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false Blindness under a State plan. 416.982 Section..., BLIND, AND DISABLED Determining Disability and Blindness Blindness § 416.982 Blindness under a State... plan because of your blindness for the month of December 1973; and (c) You continue to be blind...

  16. 20 CFR 416.983 - How we evaluate statutory blindness.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false How we evaluate statutory blindness. 416.983... AGED, BLIND, AND DISABLED Determining Disability and Blindness Blindness § 416.983 How we evaluate statutory blindness. We will find that you are blind if you are statutorily blind within the meaning...

  17. Effectiveness of Blind & Ultrasound Guided Corticosteroid Injection in Impingement Syndrome

    PubMed Central

    Haghighat, Shila; Taheri, Parisa; Banimehdi, Mohsen; Taghavi, Arash

    2016-01-01

    Local steroid injections are common for treatment of impingement syndrome. Corticosteroid injections methods are basically in two formats, blind or with image guidance. The aim of this study is to compare the effect of ultrasound-guided in comparison with blind corticosteroid injections in patients with impingement syndrome. This study is a randomized clinical trial study undertaken in patients with diagnosis of impingement syndrome done in Isfahan University of Medical Science clinics from February 2014 to February 2015. The number of all patients registered in the study is 48; and then 40 patients were allocated to either control group randomly which received blind steroid injection or case group that underwent ultrasound-guided steroid injection. The clinical symptoms were assessed using Shoulder Pain and Disability Index (SPADI) questionnaire, Visual Analogue Scale (VAS) and shoulder range of motion (ROM) using goniometer at baseline and six weeks after the injection. Data analysis revealed a significant difference in the mean of the VAS, SPADI and shoulder ROM in both groups 6 weeks after intervention (P < 0.05). Patients with ultrasound guided corticosteroid injection had statistically significant improvements in function and shoulder ROM (abduction, flexion) compared to blind injection group after 6 weeks (P<0.05). There was not significant differences in pain (VAS) and internal and external rotation between these two groups (p>0.05). Our findings suggest that US image guided can improve the shoulder function of patients with impingement syndrome, and thus can be considered in comprehensive care programs of these patients for fast speed of rehabilitation.

  18. Latent IBP Compound Dirichlet Allocation.

    PubMed

    Archambeau, Cedric; Lakshminarayanan, Balaji; Bouchard, Guillaume

    2015-02-01

    We introduce the four-parameter IBP compound Dirichlet process (ICDP), a stochastic process that generates sparse non-negative vectors with potentially an unbounded number of entries. If we repeatedly sample from the ICDP we can generate sparse matrices with an infinite number of columns and power-law characteristics. We apply the four-parameter ICDP to sparse nonparametric topic modelling to account for the very large number of topics present in large text corpora and the power-law distribution of the vocabulary of natural languages. The model, which we call latent IBP compound Dirichlet allocation (LIDA), allows for power-law distributions, both, in the number of topics summarising the documents and in the number of words defining each topic. It can be interpreted as a sparse variant of the hierarchical Pitman-Yor process when applied to topic modelling. We derive an efficient and simple collapsed Gibbs sampler closely related to the collapsed Gibbs sampler of latent Dirichlet allocation (LDA), making the model applicable in a wide range of domains. Our nonparametric Bayesian topic model compares favourably to the widely used hierarchical Dirichlet process and its heavy tailed version, the hierarchical Pitman-Yor process, on benchmark corpora. Experiments demonstrate that accounting for the power-distribution of real data is beneficial and that sparsity provides more interpretable results. PMID:26353244

  19. Constrained Allocation Flux Balance Analysis.

    PubMed

    Mori, Matteo; Hwa, Terence; Martin, Olivier C; De Martino, Andrea; Marinari, Enzo

    2016-06-01

    New experimental results on bacterial growth inspire a novel top-down approach to study cell metabolism, combining mass balance and proteomic constraints to extend and complement Flux Balance Analysis. We introduce here Constrained Allocation Flux Balance Analysis, CAFBA, in which the biosynthetic costs associated to growth are accounted for in an effective way through a single additional genome-wide constraint. Its roots lie in the experimentally observed pattern of proteome allocation for metabolic functions, allowing to bridge regulation and metabolism in a transparent way under the principle of growth-rate maximization. We provide a simple method to solve CAFBA efficiently and propose an "ensemble averaging" procedure to account for unknown protein costs. Applying this approach to modeling E. coli metabolism, we find that, as the growth rate increases, CAFBA solutions cross over from respiratory, growth-yield maximizing states (preferred at slow growth) to fermentative states with carbon overflow (preferred at fast growth). In addition, CAFBA allows for quantitatively accurate predictions on the rate of acetate excretion and growth yield based on only 3 parameters determined by empirical growth laws. PMID:27355325

  20. Constrained Allocation Flux Balance Analysis

    PubMed Central

    Mori, Matteo; Hwa, Terence; Martin, Olivier C.

    2016-01-01

    New experimental results on bacterial growth inspire a novel top-down approach to study cell metabolism, combining mass balance and proteomic constraints to extend and complement Flux Balance Analysis. We introduce here Constrained Allocation Flux Balance Analysis, CAFBA, in which the biosynthetic costs associated to growth are accounted for in an effective way through a single additional genome-wide constraint. Its roots lie in the experimentally observed pattern of proteome allocation for metabolic functions, allowing to bridge regulation and metabolism in a transparent way under the principle of growth-rate maximization. We provide a simple method to solve CAFBA efficiently and propose an “ensemble averaging” procedure to account for unknown protein costs. Applying this approach to modeling E. coli metabolism, we find that, as the growth rate increases, CAFBA solutions cross over from respiratory, growth-yield maximizing states (preferred at slow growth) to fermentative states with carbon overflow (preferred at fast growth). In addition, CAFBA allows for quantitatively accurate predictions on the rate of acetate excretion and growth yield based on only 3 parameters determined by empirical growth laws. PMID:27355325

  1. Night Blindness and Ancient Remedy

    PubMed Central

    Al Binali, H.A. Hajar

    2014-01-01

    The aim of this article is to briefly review the history of night blindness and its treatment from ancient times until the present. The old Egyptians, the Babylonians, the Greeks and the Arabs used animal liver for treatment and successfully cured the disease. The author had the opportunity to observe the application of the old remedy to a patient. Now we know what the ancients did not know, that night blindness is caused by Vitamin A deficiency and the animal liver is the store house for Vitamin A. PMID:25774260

  2. Computer Reader for the Blind

    NASA Technical Reports Server (NTRS)

    1990-01-01

    Optacon II uses the same basic technique of converting printed information into a tactile image as did Optacon. Optacon II can also be connected directly to a personal computer, which opens up a new range of job opportunities for the blind. Optacon II is not limited to reading printed words, it can convert any graphic image viewed by the camera. Optacon II demands extensive training for blind operators. TSI provides 60-hour training courses at its Mountain View headquarters and at training centers around the world. TeleSensory discontinued production of the Optacon as of December 1996.

  3. Night blindness and ancient remedy.

    PubMed

    Al Binali, H A Hajar

    2014-01-01

    The aim of this article is to briefly review the history of night blindness and its treatment from ancient times until the present. The old Egyptians, the Babylonians, the Greeks and the Arabs used animal liver for treatment and successfully cured the disease. The author had the opportunity to observe the application of the old remedy to a patient. Now we know what the ancients did not know, that night blindness is caused by Vitamin A deficiency and the animal liver is the store house for Vitamin A. PMID:25774260

  4. [The punishment of blinding and the life of the blind].

    PubMed

    Büttner, Jan Ulrich

    2009-01-01

    The article deals with a group of people who were deprived of their eyesight by private acts of force or by executions of lawful sentences. In early medieval texts blinding is frequently mentioned in connection with popes, kings, princes or bishops. However, since the High Middle Ages these dignitaries were increasingly spared the loss of their eyes. It may be said that on the whole, from the eighth to the twelfth century, blinding was overwhelmingly used to dispose of political adversaries, but did then rapidly turn into a criminal punishment. In the earliest 'Landfriedensordnungen' of the late eleventh century, the loss of the perpetrator's eyes crops up as punishment for breach of the peace, while later it was applied to a variety of more or less serious offences. The destiny of the blinded in the early Middle Ages is only highlighted by sketches of a few individual cases; for the High and late Middle Ages--apart from a few notable exceptions--it is only possible to reflect on the general situation of blind people in society, since the sources usually do not differentiate between those having lost their sight through human violence or due to other causes. PMID:20506724

  5. Allocating Railway Platforms Using A Genetic Algorithm

    NASA Astrophysics Data System (ADS)

    Clarke, M.; Hinde, C. J.; Withall, M. S.; Jackson, T. W.; Phillips, I. W.; Brown, S.; Watson, R.

    This paper describes an approach to automating railway station platform allocation. The system uses a Genetic Algorithm (GA) to find how a station’s resources should be allocated. Real data is used which needs to be transformed to be suitable for the automated system. Successful or ‘fit’ allocations provide a solution that meets the needs of the station schedule including platform re-occupation and various other constraints. The system associates the train data to derive the station requirements. The Genetic Algorithm is used to derive platform allocations. Finally, the system may be extended to take into account how further parameters that are external to the station have an effect on how an allocation should be applied. The system successfully allocates around 1000 trains to platforms in around 30 seconds requiring a genome of around 1000 genes to achieve this.

  6. Effects of perceived reliability and generalization of crime-related information on detection in the concealed information test.

    PubMed

    Elaad, Eitan

    2010-03-01

    The accuracy of the Concealed Information Test (CIT) in detecting information concealed by informed innocent participants was assessed under varying levels of probability that the obtained information is related to the crime and is therefore correct. For this purpose, 64 participants were randomly assigned to four experimental conditions that were formed by probability levels that the gathered information is correct and is related to the crime. Either absolutely correct (100% correct), highly correct (80%, correct), highly incorrect (20% correct) or totally incorrect (0%, correct) conditions were created. Response generalization was manipulated by replacing 3 of 6 correct items with related stimuli. The replaced stimuli were related to the correct items either semantically, phonetically, or numerically. Informed innocent participants showed larger electrodermal responses to items with a higher probability of being correct. It was further found that participants elicited stronger responses to correct than to replaced items. Theoretical and practical implications of the present results are discussed. PMID:20093151

  7. Task relevance and recognition of concealed information have different influences on electrodermal activity and event-related brain potentials.

    PubMed

    Gamer, Matthias; Berti, Stefan

    2010-03-01

    This study aimed at differentiating between memory- and task-related processes and their correlates on the electrodermal and electrocortical level during information concealment. Variations of the Guilty Knowledge Test were implemented in two experiments while we measured skin conductance responses (SCRs) and event-related brain potentials. P300 amplitudes were specifically enhanced for items requiring a deviant behavioral response but they were not sensitive to concealed knowledge. In contrast, N200 amplitudes differed between memorized and irrelevant items in both experiments. SCR measures reflected a combined influence of task relevance and probe recognition, and they provided incremental validity above N200 amplitudes. These results suggest that the P300 mainly reflects task relevance in the given experimental setting whereas the N200 amplitude is sensitive to previously encoded information and potentially linked to response monitoring processes. PMID:20003148

  8. The compassion of concealment: silence between older caregivers and dying patients in the AIDS era, northwest Tanzania.

    PubMed

    de Klerk, Josien

    2012-01-01

    In northwest Tanzania, where AIDS has been present for 25 years, AIDS-related illness is a trigger through which community members discuss personal experiences of loss and assess social relationships. The terminal phase of AIDS demands intimate social relations between patients and caretakers. In this final phase of illness, caretakers are scrutinised for their behaviour towards the patient. In the moral world in which caregiving takes place, the act of concealing is considered an intrinsic part of proper care. Current debates on morality, stigma and secrecy inform my argument that acts of concealment around dying are not so much related to the exclusion and ostracism of patients but to inclusion and compassionate care. PMID:22092190

  9. Grossly calcified choroid plexus concealing foramen of Monro meningiomas as an unusual cause of obstructive hydrocephalus

    PubMed Central

    Kawaguchi, Tomohiro; Fujimura, Miki; Tominaga, Teiji

    2016-01-01

    Various intraventricular tumors can present with calcifications; however, the choroid plexus can also have physiological calcifications. This is the first case report of meningiomas located at the bilateral foramen of Monro (FOM), concealed by a grossly calcified choroid plexus, presenting with obstructive hydrocephalus. A 60-year-old woman with disturbed consciousness was admitted by ambulance. Head computed tomography revealed significantly high-density lesions that smoothly extended from the choroid plexus of the lateral ventricles to the third ventricle. They occupied both sides of the FOM, resulting in obstructive hydrocephalus. The diagnostic endoscopic biopsy was performed using a flexible neuroendoscopic system, and an egg shell-like grossly calcified choroid plexus was found to smoothly extend toward the FOM. Resection was not selected because the calcified lesions had tightly adhered to the veins and fornix; therefore, the patient underwent ventriculo-peritoneal shunting. The lesions were histologically identified as psammomatous meningiomas with low proliferation potential (the Ki-67 labeling index was lower than 1%). She was discharged 10 days after surgery without neurological deficits. As calcifications can have tumoral and nontumoral origins, we considered neuroendoscopic exploration to be essential in order to achieve an accurate diagnosis and select optimal management. PMID:26889294

  10. Hiding true emotions: micro-expressions in eyes retrospectively concealed by mouth movements

    PubMed Central

    Iwasaki, Miho; Noguchi, Yasuki

    2016-01-01

    When we encounter someone we dislike, we may momentarily display a reflexive disgust expression, only to follow-up with a forced smile and greeting. Our daily lives are replete with a mixture of true and fake expressions. Nevertheless, are these fake expressions really effective at hiding our true emotions? Here we show that brief emotional changes in the eyes (micro-expressions, thought to reflect true emotions) can be successfully concealed by follow-up mouth movements (e.g. a smile). In the same manner as backward masking, mouth movements of a face inhibited conscious detection of all types of micro-expressions in that face, even when viewers paid full attention to the eye region. This masking works only in a backward direction, however, because no disrupting effect was observed when the mouth change preceded the eye change. These results provide scientific evidence for everyday behaviours like smiling to dissemble, and further clarify a major reason for the difficulty we face in discriminating genuine from fake emotional expressions. PMID:26915796

  11. Detection of contraband concealed on the body using x-ray imaging

    NASA Astrophysics Data System (ADS)

    Smith, Gerald J.

    1997-01-01

    In an effort to avoid detection, smugglers and terrorists are increasingly using the body as a vehicle for transporting illicit drugs, weapons, and explosives. This trend illustrates the natural tendency of traffickers to seek the path of least resistance, as improved interdiction technology and operational effectiveness have been brought to bear on other trafficking avenues such as luggage, cargo, and parcels. In response, improved technology for human inspection is being developed using a variety of techniques. ASE's BodySearch X-ray Inspection Systems uses backscatter x-ray imaging of the human body to quickly, safely, and effectively screen for drugs, weapons, and explosives concealed on the body. This paper reviews the law enforcement and social issues involved in human inspections, and briefly describes the ASE BodySearch systems. Operator training, x-ray image interpretation, and maximizing systems effectiveness are also discussed. Finally, data collected from operation of the BodySearch system in the field is presented, and new law enforcement initiatives which have come about due to recent events are reviewed.

  12. Paternal signature in kin recognition cues of a social insect: concealed in juveniles, revealed in adults

    PubMed Central

    Wong, Janine W. Y.; Meunier, Joël; Lucas, Christophe; Kölliker, Mathias

    2014-01-01

    Kin recognition is a key mechanism to direct social behaviours towards related individuals or avoid inbreeding depression. In insects, recognition is generally mediated by cuticular hydrocarbon (CHC) compounds, which are partly inherited from parents. However, in social insects, potential nepotistic conflicts between group members from different patrilines are predicted to select against the expression of patriline-specific signatures in CHC profiles. Whereas this key prediction in the evolution of insect signalling received empirical support in eusocial insects, it remains unclear whether it can be generalized beyond eusociality to less-derived forms of social life. Here, we addressed this issue by manipulating the number of fathers siring clutches tended by females of the European earwig, Forficula auricularia, analysing the CHC profiles of the resulting juvenile and adult offspring, and using discriminant analysis to estimate the information content of CHC with respect to the maternal and paternal origin of individuals. As predicted, if paternally inherited cues are concealed during family life, increases in mating number had no effect on information content of CHC profiles among earwig juveniles, but significantly decreased the one among adult offspring. We suggest that age-dependent expression of patriline-specific cues evolved to limit the risks of nepotism as family-living juveniles and favour sibling-mating avoidance as group-living adults. These results highlight the role of parental care and social life in the evolution of chemical communication and recognition cues. PMID:25165768

  13. Paternal signature in kin recognition cues of a social insect: concealed in juveniles, revealed in adults.

    PubMed

    Wong, Janine W Y; Meunier, Joël; Lucas, Christophe; Kölliker, Mathias

    2014-10-22

    Kin recognition is a key mechanism to direct social behaviours towards related individuals or avoid inbreeding depression. In insects, recognition is generally mediated by cuticular hydrocarbon (CHC) compounds, which are partly inherited from parents. However, in social insects, potential nepotistic conflicts between group members from different patrilines are predicted to select against the expression of patriline-specific signatures in CHC profiles. Whereas this key prediction in the evolution of insect signalling received empirical support in eusocial insects, it remains unclear whether it can be generalized beyond eusociality to less-derived forms of social life. Here, we addressed this issue by manipulating the number of fathers siring clutches tended by females of the European earwig, Forficula auricularia, analysing the CHC profiles of the resulting juvenile and adult offspring, and using discriminant analysis to estimate the information content of CHC with respect to the maternal and paternal origin of individuals. As predicted, if paternally inherited cues are concealed during family life, increases in mating number had no effect on information content of CHC profiles among earwig juveniles, but significantly decreased the one among adult offspring. We suggest that age-dependent expression of patriline-specific cues evolved to limit the risks of nepotism as family-living juveniles and favour sibling-mating avoidance as group-living adults. These results highlight the role of parental care and social life in the evolution of chemical communication and recognition cues. PMID:25165768

  14. Grossly calcified choroid plexus concealing foramen of Monro meningiomas as an unusual cause of obstructive hydrocephalus.

    PubMed

    Kawaguchi, Tomohiro; Fujimura, Miki; Tominaga, Teiji

    2016-01-01

    Various intraventricular tumors can present with calcifications; however, the choroid plexus can also have physiological calcifications. This is the first case report of meningiomas located at the bilateral foramen of Monro (FOM), concealed by a grossly calcified choroid plexus, presenting with obstructive hydrocephalus. A 60-year-old woman with disturbed consciousness was admitted by ambulance. Head computed tomography revealed significantly high-density lesions that smoothly extended from the choroid plexus of the lateral ventricles to the third ventricle. They occupied both sides of the FOM, resulting in obstructive hydrocephalus. The diagnostic endoscopic biopsy was performed using a flexible neuroendoscopic system, and an egg shell-like grossly calcified choroid plexus was found to smoothly extend toward the FOM. Resection was not selected because the calcified lesions had tightly adhered to the veins and fornix; therefore, the patient underwent ventriculo-peritoneal shunting. The lesions were histologically identified as psammomatous meningiomas with low proliferation potential (the Ki-67 labeling index was lower than 1%). She was discharged 10 days after surgery without neurological deficits. As calcifications can have tumoral and nontumoral origins, we considered neuroendoscopic exploration to be essential in order to achieve an accurate diagnosis and select optimal management. PMID:26889294

  15. Finding concealed active faults: Extending the southern Whidbey Island fault across the Puget Lowland, Washington

    NASA Astrophysics Data System (ADS)

    Sherrod, Brian L.; Blakely, Richard J.; Weaver, Craig S.; Kelsey, Harvey M.; Barnett, Elizabeth; Liberty, Lee; Meagher, Karen L.; Pape, Kristin

    2008-05-01

    The southern Whidbey Island fault zone (SWIF), as previously mapped using borehole data, potential field anomalies, and marine seismic reflection surveys, consists of three subparallel, northwest trending strands extending ˜100 km from near Vancouver Island to the northern Puget Lowland. East of Puget Sound, the SWIF makes landfall between the cities of Seattle and Everett but is concealed beneath a thick mantle of young glacial deposits and vegetation. A ˜20-km-wide, northwest trending swath of subparallel, low-amplitude aeromagnetic anomalies crosses this region of the Puget Lowland and is on strike with the SWIF. The most prominent aeromagnetic anomaly, the Cottage Lake lineament, extends at least 18 km and lies approximately on strike with the SWIF on Whidbey Island. Subtle scarps and topographic lineaments on Pleistocene surfaces, visible on high-resolution lidar topography at a number of locations along the SWIF, lie on or near these magnetic anomalies. In the field, scarps exhibit northeast-side-up and vertical relief of 1 to 5 m. Excavations across several lidar scarps lying on or near magnetic anomalies show evidence for multiple folding and faulting events since deglaciation, most likely above buried reverse/oblique faults. Excavations in areas away from magnetic anomalies do not show evidence of tectonic deformation. In total, paleoseismological evidence suggests that the SWIF produced at least four earthquakes since deglaciation about 16,400 years ago, the most recent less than 2700 years ago.

  16. Children's Lie-Telling to Conceal a Parent's Transgression: Legal Implications

    PubMed Central

    Talwar, Victoria; Lee, Kang; Bala, Nicholas; Lindsay, R. C. L.

    2008-01-01

    Children's lie-telling behavior to conceal the transgression of a parent was examined in 2 experiments. In Experiment 1 (N = 137), parents broke a puppet and told their children (3–11-year-olds) not to tell anyone. Children answered questions about the event. Children's moral understanding of truth- and lie-telling was assessed by a second interviewer and the children then promised to tell the truth (simulating court competence examination procedures). Children were again questioned about what happened to the puppet. Regardless of whether the interview was conducted with their parent absent or present, most children told the truth about their parents' transgression. When the likelihood of the child being blamed for the transgression was reduced, significantly more children lied. There was a significant, yet limited, relation between children's lie-telling behavior and their moral understanding of lie- or truth-telling. Further, after children were questioned about issues concerning truth- and lie-telling and asked to promise to tell the truth, significantly more children told the truth about their parents' transgression. Experiment 2 (N = 64) replicated these findings, with children who were questioned about lies and who then promised to tell the truth more likely to tell the truth in a second interview than children who did not participate in this procedure before questioning. Implications for the justice system are discussed. PMID:15499823

  17. Using self-authentication and recovery images for error concealment in wireless environments

    NASA Astrophysics Data System (ADS)

    Lin, Ching-Yung; Sow, Daby; Chang, Shih-Fu

    2001-11-01

    Handling packet loss or delay in the mobile and/or Internet environment is usually a challenging problem for multimedia transmission. Using connection-oriented protocol such as TCP may introduce intolerable time delay in re-transmission. Using datagram-oriented protocols such as UDP may cause partial representation in case of packet loss. In this paper, we propose a new method of using our self-authentication-and-recovery images (SARI) to do the error detection and concealment in the UDP environment. The lost information in a SARI image can be approximately recovered based on the embedded watermark, which includes the content-based authentication information and recovery information. Images or video frames are watermarked in a priori such that no additional mechanism is needed in the networking or the encoding process. Because the recovery is not based on adjacent blocks, the proposed method can recover the corrupted area even though the information loss happen in large areas or high variant areas. Our experiments show the advantages of such technique in both transmission time saving and broad application potentials.

  18. Mobile TNA system to detect explosives and drugs concealed in cars and trucks

    NASA Astrophysics Data System (ADS)

    Bendahan, Joseph; Gozani, Tsahi

    1998-12-01

    The drug problem in the U.S. is serious and efforts to fight it are constrained by the lack of adequate means to curb the inflow of smuggled narcotics into the country through cargo containers. Also, events such as the disastrous explosion in Oklahoma City, the IRA bombing in London, and the bombing of the U.S. military residence in Dharan make the development of new tools for the detection of explosives and drugs in vehicles imperative. Thermal neutron analysis (TNA) technology, developed for the detection of explosives in suitcases, and detection of landmines and unexploded ordnance is presently being applied to the nonintrusive detection of significant amounts of explosives and drugs concealed in cars, trucks and large cargo containers. TNA technology is based on the analysis of characteristic gamma rays emitted following thermal neutron capture. A TNA system can be used in a variety of operational scenarios, such as inspection before an unloaded cargo container from a spit is moved to temporary storage, inspection of trucks unloaded from a ferry, or inspection of vehicles parked close to Federal building or military bases. This paper will discuss the detection process and operational scenarios, and will present results from recent simulations and measurements.

  19. Fourier transform infared spectroscopic imaging for the identification of concealed drug residue particles and fingerprints

    NASA Astrophysics Data System (ADS)

    Ricci, Camilla; Chan, K. L. Andrew; Kazarian, Sergei G.

    2006-09-01

    Conventional FTIR spectroscopy and microscopy has been widely used in forensic science. New opportunities exist to obtain rapid chemical images and to enhance the sensitivity of detection of trace materials using attenuated total reflection (ATR) Fourier transform infrared (FTIR) spectroscopy coupled with a focal-plane array (FPA) detector. In this work, the sensitivity of ATR-FTIR spectroscopic imaging using three different kinds of ATR crystals (Ge coupled with an infrared microscope, ZnSe and diamond) and resulting in three different optical arrangements for the detection of model drug particles is discussed. Model systems of ibuprofen and paracetamol particles having a size below 32 micrometers have been prepared by sieving. The sensitivity level in the three different approaches has been compared and it has been found that both micro and macro-ATR imaging methods have proven to be a promising techniques for the identification of concealed drug particles. To demonstrate the power and applicability of FTIR chemical imaging to forensic research, various examples are discussed. This includes investigation of the changes of chemical nature of latent fingerprint residue under controlled conditions of humidity and temperature studied by ATR-FTIR imaging. This study demonstrates the potential of spectroscopic imaging for visualizing the chemical changes of fingerprints.

  20. Detection and classification of concealed weapons using a magnetometer-based portal

    NASA Astrophysics Data System (ADS)

    Kotter, Dale K.; Roybal, Lyle G.; Polk, Robert E.

    2002-08-01

    A concealed weapons detection technology was developed through the support of the National Institute of Justice (NIJ) to provide a non intrusive means for rapid detection, location, and archiving of data (including visual) of potential suspects and weapon threats. This technology, developed by the Idaho National Engineering and Environmental Laboratory (INEEL), has been applied in a portal style weapons detection system using passive magnetic sensors as its basis. This paper will report on enhancements to the weapon detection system to enable weapon classification and to discriminate threats from non-threats. Advanced signal processing algorithms were used to analyze the magnetic spectrum generated when a person passes through a portal. These algorithms analyzed multiple variables including variance in the magnetic signature from random weapon placement and/or orientation. They perform pattern recognition and calculate the probability that the collected magnetic signature correlates to a known database of weapon versus non-weapon responses. Neural networks were used to further discriminate weapon type and identify controlled electronic items such as cell phones and pagers. False alarms were further reduced by analyzing the magnetic detector response by using a Joint Time Frequency Analysis digital signal processing technique. The frequency components and power spectrum for a given sensor response were derived. This unique fingerprint provided additional information to aid in signal analysis. This technology has the potential to produce major improvements in weapon detection and classification.

  1. Hiding true emotions: micro-expressions in eyes retrospectively concealed by mouth movements.

    PubMed

    Iwasaki, Miho; Noguchi, Yasuki

    2016-01-01

    When we encounter someone we dislike, we may momentarily display a reflexive disgust expression, only to follow-up with a forced smile and greeting. Our daily lives are replete with a mixture of true and fake expressions. Nevertheless, are these fake expressions really effective at hiding our true emotions? Here we show that brief emotional changes in the eyes (micro-expressions, thought to reflect true emotions) can be successfully concealed by follow-up mouth movements (e.g. a smile). In the same manner as backward masking, mouth movements of a face inhibited conscious detection of all types of micro-expressions in that face, even when viewers paid full attention to the eye region. This masking works only in a backward direction, however, because no disrupting effect was observed when the mouth change preceded the eye change. These results provide scientific evidence for everyday behaviours like smiling to dissemble, and further clarify a major reason for the difficulty we face in discriminating genuine from fake emotional expressions. PMID:26915796

  2. The caregiving bind: concealing the demands of informal care can undermine the caregiving identity.

    PubMed

    Moore, Helen; Gillespie, Alex

    2014-09-01

    Disagreements and misunderstandings between informal caregivers and care-receivers have been widely reported, but the causes are unclear. The present article compares the views of people with acquired brain injury and their main informal caregivers (28 dyads, n = 56). First, we report a quantitative analysis finding that the majority of disagreements were about caregivers' identity. Caregivers saw themselves as less confident, less intelligent, more embarrassed, more independent and more overprotective than care-receivers rated them to be. Caregivers understood the care-receivers' ratings but disagreed with them' Second, we report a qualitative analysis focussing on how caregivers felt themselves to be perceived by significant others. Caregivers felt that the care-receiver, family members, the general public, health services and even friends often have negative views of them. The 'caregiving bind' is proposed as a cause of caregivers' negative identity. It arises when caregivers try to protect the care-receiver's identity by concealing the extent of informal care provision, with the unintended consequence of undermining the prospects of the caregiver receiving positive social recognition for the challenging work of caregiving. The caregiving bind has implications for therapy and points to the potential of friends and health services to provide caregivers with positive social recognition. PMID:24996218

  3. Effect of Temperature and Moisture on the Development of Concealed Damage in Raw Almonds (Prunus dulcis).

    PubMed

    Rogel-Castillo, Cristian; Zuskov, David; Chan, Bronte Lee; Lee, Jihyun; Huang, Guangwei; Mitchell, Alyson E

    2015-09-23

    Concealed damage (CD) is a brown discoloration of nutmeat that appears only after kernels are treated with moderate heat (e.g., roasting). Identifying factors that promote CD in almonds is of significant interest to the nut industry. Herein, the effect of temperature (35 and 45 °C) and moisture (<5, 8, and 11%) on the composition of volatiles in raw almonds (Prunus dulcis var. Nonpareil) was studied using HS-SPME-GC/MS. A CIE LCh colorimetric method was developed to identify raw almonds with CD. A significant increase in CD was demonstrated in almonds exposed to moisture (8% kernel moisture content) at 45 °C as compared to 35 °C. Elevated levels of volatiles related to lipid peroxidation and amino acid degradation were observed in almonds with CD. These results suggest that postharvest moisture exposure resulting in an internal kernel moisture ≥ 8% is a key factor in the development of CD in raw almonds and that CD is accelerated by temperature. PMID:26320359

  4. Systematic changes in tonic physiological activities during the Concealed Information Test.

    PubMed

    Ogawa, Tokihiro; Matsuda, Izumi; Hirota, Akihisa; Takasawa, Noriyoshi

    2014-12-01

    Many studies on the Concealed Information Test have focused on phasic physiological changes that are temporally locked to stimulus presentation. However, little is known about changes in tonic, basal physiological levels throughout a stimulus series. This study focused on changes in tonic physiological activities during the CIT. Thirty-nine participants carried out a mock theft and subsequently received a CIT. Skin conductance, heart rate, and normalized pulse volume (NPV) were recorded. The pre-stimulus physiological level of these measures throughout the CIT series was compared across a question series with different serial positions of the relevant item. Results showed that changes in the pre-stimulus level differed depending on the serial position of the relevant item. Skin conductance declined throughout the series, but showed a transient increase after relevant item presentation. Heart rate was relatively constant throughout the series, but decreased after relevant item presentation. NPV continued to decrease until the relevant item, but increased thereafter, indicating a pattern similar to the classic Peak of Tension concept. In addition, the pre-stimulus NPV showed a significant relevant-irrelevant difference. Theoretical and practical implications of these findings are discussed. PMID:25152172

  5. Psychophysiological detection of concealed information shared by groups: an empirical study of the searching CIT.

    PubMed

    Breska, Assaf; Zaidenberg, Daphna; Gronau, Nurit; Ben-Shakhar, Gershon

    2014-06-01

    This study focused on the application of the Concealed Information Test (CIT) to situations in which the crime-related information is shared by a group of suspects but is not available to the investigators (a method known as the "searching CIT," or SCIT). Twenty-two groups, each comprising 4 to 7 participants (115 in total), planned 1 of 2 mock crimes (kidnapping or bank robbery). While planning the crime, each group decided on 5 crime-related critical items (e.g., the city in which the bank was located). Each critical item was chosen from a predefined set of 4 alternatives. At a second stage, the SCIT was administered individually and each participant was tested on the 2 crimes-the actual planned crime, in which the participant was "guilty," and the unplanned crime, in which the participant was "innocent." Two algorithms, adopted from Breska, Ben-Shakhar, and Gronau (2012), were applied to detect the critical items and to differentiate between "guilty" and "innocent" participants. Findings revealed that differentiation efficiency based on electrodermal and respiration measures was identical to that obtained with the standard CIT when applied to large groups, but lower, although significantly greater than chance, when applied to differentiate between small groups. PMID:24564513

  6. Improved method for calculating the respiratory line length in the Concealed Information Test.

    PubMed

    Matsuda, Izumi; Ogawa, Tokihiro

    2011-08-01

    The Concealed Information Test (CIT) assesses an examinee's knowledge about a crime based on response differences between crime-relevant and crime-irrelevant items. One effective measure in the CIT is the respiration line length, which is the average of the moving distances of the respiration curve in a specified time interval after the item onset. However, the moving distance differs between parts of a respiratory cycle. As a result, the calculated respiration line length is biased by how the parts of the respiratory cycles are included in the time interval. To resolve this problem, we propose a weighted average method, which calculates the respiration line length per cycle and weights it with the proportion that the cycle occupies in the time interval. Simulation results indicated that the weighted average method removes the bias of respiration line lengths compared to the original method. The results of experimental CIT data demonstrated that the weighted average method significantly increased the discrimination performance as compared with the original method. The weighted average method is a promising method for assessing respiration changes in response to question items more accurately, which improves the respiration-based discrimination performance of the CIT. PMID:21689693

  7. A possible concealed pluton in Beaverhead and Madison Counties, Montana, and Clark County, Idaho

    USGS Publications Warehouse

    Witkind, Irving Jerome

    1974-01-01

    A northeast-trending magnetic anomaly in parts of Beaverhead and Madison Counties, Mont., and Clark County, Idaho, may reflect the trend, shape, and size of a concealed pluton. The type of rock that forms the pluton(?) is unknown. A small volcanic pipe, possibly a diatreme, is at the southeast end of the high. The pipe, about 92 m (300 ft) in diameter, consists of a rubbly basalt-like matrix through which are scattered xenoliths of Precambrian crystalline rocks and of various Paleozoic and Mesozoic strata. It is uncertain whether the juxtaposition of the pipe and the magnetic high is meaningful or is merely fortuitous. Although no mineralized rock was found in the area underlain by the anomaly, placer gold has been found nearby. Some 113 km (70 mi) to the west, in Custer and Lemhi Counties, Idaho, a similar northeast-trending magnetic high marks the site of the Gilmore mining district. The similarities in trend, shape, and magnitude between the two anomalies suggest that the high in Beaverhead and Madison Counties should be investigated for undetected mineral deposits, possibly by a geochemical survey.

  8. Current Research and Potential Applications of the Concealed Information Test: An Overview

    PubMed Central

    Ben-Shakhar, Gershon

    2012-01-01

    Research interest in psychophysiological detection of deception has significantly increased since the September 11 terror attack in the USA. In particular, the concealed information test (CIT), designed to detect memory traces that can connect suspects to a certain crime, has been extensively studied. In this paper I will briefly review several psychophysiological detection paradigms that have been studied, with a focus on the CIT. The theoretical background of the CIT, its strength and weaknesses, its potential applications as well as research finings related to its validity (based on a recent meta-analytic study), will be discussed. Several novel research directions, with a focus on factors that may affect CIT detection in realistic settings (e.g., memory for crime details; the effect of emotional stress during crime execution) will be described. Additionally, research focusing on mal-intentions and attempts to detect terror networks using information gathered from groups of suspects using both the standard CIT and the searching CIT will be reviewed. Finally, implications of current research to the actual application of the CIT will be discussed and several recommendations that can enhance the use of the CIT will be made. PMID:23060826

  9. New way for concealed object detection using passive THz images without their viewing

    NASA Astrophysics Data System (ADS)

    Trofimov, Vyacheslav A.; Trofimov, Vladislav V.

    2015-10-01

    We developed new real-time algorithm, based on the correlation function, for concealed object detection using computer processing of the passive THz images without their viewing. This algorithm allows us to make a conclusion about presence of forbidden objects on the human body. To increase the THz image quality we propose a new algorithm in comparison with algorithms which have developed by us early. It allows to increase a temperature resolution of the passive THz camera at least 20 times. This approach is based on a correlation function application for computer processing of the raw THz image. The correlation computing occurs between characteristics of the raw THz image, produced by the passive THz camera, and characteristics of a standard image corresponding to one of the detecting objects (knife, gun,…). The standard image moves in two directions along a image under analysis. As a result, 2 D correlation function is obtained. Multiplying this function by color number belonging to a grey scale, we restore the image under the analysis. This allows to suppress a noise on a new image. This algorithm is very convenient for using and has a high performance. Developed approach opens also new type of algorithms for the passive THz image quality enhancing.

  10. Influence of countermeasures on the validity of the Concealed Information Test.

    PubMed

    Peth, Judith; Suchotzki, Kristina; Gamer, Matthias

    2016-09-01

    The Concealed Information Test (CIT) is a psychophysiological technique that allows for detecting crime-related knowledge. Usually, autonomic response measures are used for this purpose, but ocular measures have also been proposed recently. Prior studies reported heterogeneous results for the usage of countermeasures (CM) to corrupt the CIT's validity, depending on the CM technique and the dependent measure. The current study systematically compared the application of physical and mental CM on autonomic and ocular measures during the CIT. Sixty participants committed a mock crime and were assigned to one of three guilty conditions: standard guilty (without CM), physical CM, or mental CM. An additional group of 20 innocents was investigated with the same CIT to calculate validity estimates. Electrodermal responses were more vulnerable for CM usage compared to heart rate and respiration, and physical CM were more effective than mental CM. Independent of CM usage, a combined score of autonomic responses enabled a valid differentiation between guilty and innocent examinees. Fixations and blinks also allowed for detecting crime-related knowledge, but these measures were more affected by CM application than autonomic responses. The current study delivered further evidence that CM differentially impact physiological and ocular responses in the CIT. Whereas individual data channels were strongly affected by CM usage, a combination of different response measures yielded a relatively stable differentiation of guilty and innocent examinees when mental CM were used. These findings are especially relevant for field applications and might inspire future studies to detect or prevent CM usage in CIT examinations. PMID:27338719

  11. The Invisible Work of Closeting: A Qualitative Study About Strategies Used by Lesbian and Gay Persons to Conceal Their Sexual Orientation.

    PubMed

    Malterud, Kirsti; Bjorkman, Mari

    2016-10-01

    The last decades have offered substantial improvement regarding human rights for lesbian and gay (LG) persons. Yet LG persons are often in the closet, concealing their sexual orientation. We present a qualitative study based on 182 histories submitted from 161 LG individuals to a Web site. The aim was to explore experiences of closeting among LG persons in Norway. A broad range of strategies was used for closeting, even among individuals who generally considered themselves to be out of the closet. Concealment was enacted by blunt denial, clever avoidance, or subtle vagueness. Other strategies included changing or eliminating the pronoun or name of the partner in ongoing conversations. Context-dependent concealment, differentiating between persons, situations, or arenas, was repeatedly applied for security or convenience. We propose a shift from "being in the closet" to "situated concealment of sexual orientation." PMID:26914706

  12. An intelligent allocation algorithm for parallel processing

    NASA Technical Reports Server (NTRS)

    Carroll, Chester C.; Homaifar, Abdollah; Ananthram, Kishan G.

    1988-01-01

    The problem of allocating nodes of a program graph to processors in a parallel processing architecture is considered. The algorithm is based on critical path analysis, some allocation heuristics, and the execution granularity of nodes in a program graph. These factors, and the structure of interprocessor communication network, influence the allocation. To achieve realistic estimations of the executive durations of allocations, the algorithm considers the fact that nodes in a program graph have to communicate through varying numbers of tokens. Coarse and fine granularities have been implemented, with interprocessor token-communication duration, varying from zero up to values comparable to the execution durations of individual nodes. The effect on allocation of communication network structures is demonstrated by performing allocations for crossbar (non-blocking) and star (blocking) networks. The algorithm assumes the availability of as many processors as it needs for the optimal allocation of any program graph. Hence, the focus of allocation has been on varying token-communication durations rather than varying the number of processors. The algorithm always utilizes as many processors as necessary for the optimal allocation of any program graph, depending upon granularity and characteristics of the interprocessor communication network.

  13. Error concealment and early resynchronization techniques for MPEG-2 video streams damaged by transmission over ATM networks

    NASA Astrophysics Data System (ADS)

    Fernandez, Carlos L.; Basso, Andrea; Hubaux, Jean-Pierre

    1996-03-01

    In this paper we present some error concealment techniques for MPEG-2 video coded and multiplexed streams damaged by ATM cell losses. Decoder early resynchronization limits the effects of transmission errors by decoding some information that is normally discarded from the damaged MPEG-2 video bitstreams. A part of this information cannot be completely decoded due to its differential coding among macroblocks (DC levels, motion vectors). Three different techniques are presented for the case of DC level recovery in Intra pictures. Two of them are predictive techniques, one operating in the frequency domain and the other in the spatial domain. The third technique provides an exact reconstruction of DC values using special data coded into the user data area of the MPEG-2 video bitstream. For not resynchronized areas classical temporal and spatial concealment techniques are used. These techniques have been tested on a simulated environment which includes an implementation of MPEG-2 elementary video coding and decoding and MPEG-2 system standards. The ATM transmission part has been simulated by means of specialized simulation software. Results relative to the presented concealment techniques are included.

  14. Arkansas School Provides Computer Training to Blind.

    ERIC Educational Resources Information Center

    Technological Horizons in Education, 1980

    1980-01-01

    Describes a program and equipment used to teach computer programing to blind and visually impaired students at the Arkansas Enterprises for the Blind in Little Rock. Requirements for admission to this program are given. (JN)

  15. Blindness Biggest Fear for Many Americans

    MedlinePlus

    ... page: https://medlineplus.gov/news/fullstory_160254.html Blindness Biggest Fear for Many Americans Losing vision would ... 4, 2016 THURSDAY, Aug. 4, 2016 (HealthDay News) -- Blindness is what many Americans fear most, a new ...

  16. Indiana School for the Blind Visits Goddard

    NASA Video Gallery

    This video shows highlights of the Indiana School for the Blind and Visually Impaired, and the Indian Creek Public High School visit to NASA's Goddard Space Flight Center in June 2011. Both blind a...

  17. Sensory Aids for the Blind.

    ERIC Educational Resources Information Center

    National Academy of Sciences - National Research Council, Washington, DC. Committee on Prosthetics Research and Development.

    The problems of providing sensory aids for the blind are presented and a report on the present status of aids discusses direct translation and recognition reading machines as well as mobility aids. Aspects of required research considered are the following: assessment of needs; vision, audition, taction, and multimodal communication; reading aids,…

  18. Metro Navigation for the Blind

    ERIC Educational Resources Information Center

    Sanchez, Jaime; Saenz, Mauricio

    2010-01-01

    This study evaluates the impact of using the software program AudioMetro, a tool that supports the orientation and mobility of people who are blind in the Metro system of Santiago de Chile. A quasi-experimental study considering experimental and control groups and using the paired Student's t in a two sample test analysis (pretest-posttest) was…

  19. Reading Machines for Blind People.

    ERIC Educational Resources Information Center

    Fender, Derek H.

    1983-01-01

    Ten stages of developing reading machines for blind people are analyzed: handling of text material; optics; electro-optics; pattern recognition; character recognition; storage; speech synthesizers; browsing and place finding; computer indexing; and other sources of input. Cost considerations of the final product are emphasized. (CL)

  20. Aquatic Recreation for the Blind.

    ERIC Educational Resources Information Center

    Cordellos, Harry C.

    The sixth in a series of booklets on physical education and recreation for the handicapped describes aquatic activities for blind persons. Written by a partially sighted athlete, the document discusses swimming pool characteristics and special pools for the visually impaired. Qualities of swimming instructors are reviewed, and suggestions for…

  1. Floating device aligns blind connections

    NASA Technical Reports Server (NTRS)

    Resel, J. E.

    1966-01-01

    Panel-mounted connectors overcome the misalignment of blind connectors in electronic rack mounted equipment. The connector is free to move in the vertical direction by the action of a parallelogram mount. This freedom of motion maintains the guide pin hole centerline parallel to the guide pin centerline at all times.

  2. Piagetian Reasoning and the Blind.

    ERIC Educational Resources Information Center

    Hatwell, Yvette

    Available for the first time in an English translation, the book reports the results of a series of studies undertaken in the early 1960s on the cognitive development of children with congenital blindness. Chapters one and two review the literaure on such topics as the concept of sensory compensation and the nature of tactual space and provide…

  3. Multihandicapped Blind. Final Project Report.

    ERIC Educational Resources Information Center

    Jones, Lloyd

    The final report of the Garden Grove unified school district project for 1969 through 1972 (funded through Title III) involving six multiply handicapped, legally blind children, 7- to 10-years-old, who were previously excluded from special education (SE) classes is presented. Described as the main procedural objective is development of a…

  4. Constant time worker thread allocation via configuration caching

    DOEpatents

    Eichenberger, Alexandre E; O'Brien, John K. P.

    2014-11-04

    Mechanisms are provided for allocating threads for execution of a parallel region of code. A request for allocation of worker threads to execute the parallel region of code is received from a master thread. Cached thread allocation information identifying prior thread allocations that have been performed for the master thread are accessed. Worker threads are allocated to the master thread based on the cached thread allocation information. The parallel region of code is executed using the allocated worker threads.

  5. The Spatial Cognition of Blind Pedestrians.

    ERIC Educational Resources Information Center

    Hollyfield, Rebecca L.; Foulke, Emerson

    1983-01-01

    Four groups (sighted, blindfolded sighted, legally blind, and blind) of adults were trained to traverse a five-block route in a residential neighborhood and were then asked to reconstruct the route from memory. Results showed the blind and sighted adults demonstrated similar abilities to learn routes but showed significant differences in memorial…

  6. Programs for the Deaf-Blind.

    ERIC Educational Resources Information Center

    American Annals of the Deaf, 1990

    1990-01-01

    The directory lists 28 state or multistate programs for deaf blind children and youth, the national center and 10 regional offices of the Helen Keller National Center for Deaf-Blind Youths and Adults, and 4 programs for training teachers of the deaf-blind. Information usually provided includes, address, director's name, and phone number. (DB)

  7. Deaf-Blind Perspectives, 1997-1998.

    ERIC Educational Resources Information Center

    Deaf-Blind Perspectives, 1998

    1998-01-01

    This one-year collection of three serial issues focuses on problem solving skills for children with deaf-blindness, the history and change in the education of children who are deaf-blind since the rubella epidemic of the 1960's, and early identification of infants who are deaf-blind. Specific articles include: (1) "Research to Practice Focus on:…

  8. Resources for Visually Impaired or Blind Students.

    ERIC Educational Resources Information Center

    Hart, Elizabeth

    2000-01-01

    Suggests resources for school librarians who need materials for visually impaired or blind students. Highlights include the National Library Service for the Blind and Physically Handicapped; Louis Database of Accessible Materials for People Who Are Blind or Visually Impaired; Braille books; large print books, audio books; assistive technology; and…

  9. Deaf-Blind Perspectives, 1998-1999.

    ERIC Educational Resources Information Center

    Malloy, Peggy, Ed.

    1998-01-01

    This collection of three issues focuses on competencies for teachers of learners who are deaf-blind, living with deaf-blindness, and resources in Australia for parents and families of students who are deaf-blind. Articles include: (1) "Research-to-Practice Focus: Competencies for Teachers of Learners Who Are Deafblind" (Marianne Riggio), which…

  10. 45 CFR 233.70 - Blindness.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 2 2013-10-01 2012-10-01 true Blindness. 233.70 Section 233.70 Public Welfare... FINANCIAL ASSISTANCE PROGRAMS § 233.70 Blindness. (a) State plan requirements. A State plan under title X or XVI of the Social Security Act must: (1) Contain a definition of blindness in terms of...

  11. 45 CFR 233.70 - Blindness.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 2 2012-10-01 2012-10-01 false Blindness. 233.70 Section 233.70 Public Welfare... FINANCIAL ASSISTANCE PROGRAMS § 233.70 Blindness. (a) State plan requirements. A State plan under title X or XVI of the Social Security Act must: (1) Contain a definition of blindness in terms of...

  12. 45 CFR 233.70 - Blindness.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 2 2014-10-01 2012-10-01 true Blindness. 233.70 Section 233.70 Public Welfare... FINANCIAL ASSISTANCE PROGRAMS § 233.70 Blindness. (a) State plan requirements. A State plan under title X or XVI of the Social Security Act must: (1) Contain a definition of blindness in terms of...

  13. Psychomotor Development for the Deaf-Blind.

    ERIC Educational Resources Information Center

    Sherrill, Claudine

    The stages of psychomotor development in deaf blind children and youth are reviewed, and educational principles to guide psychomotor development programs for the deaf blind are outlined. Etiological factors which contribute to the psychomotor development of deaf blind persons are discussed including nonambulation and sensory deprivation, heart…

  14. Congenital Blindness Leads to Enhanced Vibrotactile Perception

    ERIC Educational Resources Information Center

    Wan, Catherine Y.; Wood, Amanda G.; Reutens, David C.; Wilson, Sarah J.

    2010-01-01

    Previous studies have shown that in comparison with the sighted, blind individuals display superior non-visual perceptual abilities and differ in brain organisation. In this study, we investigated the performance of blind and sighted participants on a vibrotactile discrimination task. Thirty-three blind participants were classified into one of…

  15. Model Deaf/Blind Prevocational Training Project.

    ERIC Educational Resources Information Center

    Stoddard, Denis W.; And Others

    Presented is a report of a 4-month project designed to review literature on projects pertaining to deaf-blind prevocational training, to implement a model prevocational program for six severely handicapped deaf-blind students (10 years old), and to conduct two workshops in the area of prevocational training for deaf-blind students. Provided in…

  16. 40 CFR 74.26 - Allocation formula.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 16 2010-07-01 2010-07-01 false Allocation formula. 74.26 Section 74.26 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) SULFUR DIOXIDE OPT-INS Allowance Calculations for Combustion Sources § 74.26 Allocation formula. (a)...

  17. Projected 1999-2000 Cost Allocation Summary.

    ERIC Educational Resources Information Center

    Wisconsin Technical Coll. System Board, Madison.

    Information contained in this summary was derived from data submitted by Wisconsin technical colleges on their 1999-2000 projected cost allocation schedules. Cost allocation information is used to calculate the distribution of state aids to each college, and prepare financial and enrollment reports including state statistical summaries and reports…

  18. 45 CFR 205.150 - Cost allocation.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... ASSISTANCE PROGRAMS § 205.150 Cost allocation. A State plan under title I, IV-A, X, XIV, or XVI (AABD) of the Social Security Act must provide that the State agency will have an approved cost allocation plan on file with the Department in accordance with the requirements contained in subpart E of 45 CFR part...

  19. 45 CFR 205.150 - Cost allocation.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... ASSISTANCE PROGRAMS § 205.150 Cost allocation. A State plan under title I, IV-A, X, XIV, or XVI (AABD) of the Social Security Act must provide that the State agency will have an approved cost allocation plan on file with the Department in accordance with the requirements contained in subpart E of 45 CFR part...

  20. 24 CFR 945.203 - Allocation plan.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... units based on information provided by: (A) The needs assessment prepared in accordance with 24 CFR 8.25... dwelling units in the project for the year preceding the date of submission of the allocation plan to HUD... available for occupancy during the two-year period following the date of submission of the allocation...

  1. 50 CFR 600.517 - Allocations.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 50 Wildlife and Fisheries 12 2013-10-01 2013-10-01 false Allocations. 600.517 Section 600.517 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE MAGNUSON-STEVENS ACT PROVISIONS Foreign Fishing § 600.517 Allocations. The...

  2. 50 CFR 600.517 - Allocations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Allocations. 600.517 Section 600.517 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE MAGNUSON-STEVENS ACT PROVISIONS Foreign Fishing § 600.517 Allocations. The...

  3. 50 CFR 660.320 - Allocations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... limited entry gear is open. When the fishery for a vessel's limited entry gear has closed, groundfish caught by that vessel with open access gear will be counted against the open access allocation. All... Indian fishery, is divided into limited entry and open access fisheries. Separate allocations for...

  4. Thematic Mapper data for forest resource allocation

    NASA Technical Reports Server (NTRS)

    Zeff, Ilene S.; Merry, Carolyn J.

    1993-01-01

    A technique for classifying a Landsat Thematic Mapper image was demonstrated on the Wayne National Forest of southeastern Ohio. The classified image was integrated into a geographic information system database, and prescriptive forest land use allocation models were developed using the techniques of cartographic modeling. Timber harvest sites and accompanying haul roads were allocated.

  5. 23 CFR 1240.15 - Allocations.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 23 Highways 1 2014-04-01 2014-04-01 false Allocations. 1240.15 Section 1240.15 Highways NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION AND FEDERAL HIGHWAY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION GUIDELINES SAFETY INCENTIVE GRANTS FOR USE OF SEAT BELTS-ALLOCATIONS BASED ON SEAT BELT USE...

  6. 23 CFR 1240.15 - Allocations.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 23 Highways 1 2010-04-01 2010-04-01 false Allocations. 1240.15 Section 1240.15 Highways NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION AND FEDERAL HIGHWAY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION GUIDELINES SAFETY INCENTIVE GRANTS FOR USE OF SEAT BELTS-ALLOCATIONS BASED ON SEAT BELT USE...

  7. 23 CFR 1240.15 - Allocations.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 23 Highways 1 2013-04-01 2013-04-01 false Allocations. 1240.15 Section 1240.15 Highways NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION AND FEDERAL HIGHWAY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION GUIDELINES SAFETY INCENTIVE GRANTS FOR USE OF SEAT BELTS-ALLOCATIONS BASED ON SEAT BELT USE...

  8. 23 CFR 1240.15 - Allocations.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 23 Highways 1 2011-04-01 2011-04-01 false Allocations. 1240.15 Section 1240.15 Highways NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION AND FEDERAL HIGHWAY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION GUIDELINES SAFETY INCENTIVE GRANTS FOR USE OF SEAT BELTS-ALLOCATIONS BASED ON SEAT BELT USE...

  9. 23 CFR 1240.15 - Allocations.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 23 Highways 1 2012-04-01 2012-04-01 false Allocations. 1240.15 Section 1240.15 Highways NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION AND FEDERAL HIGHWAY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION GUIDELINES SAFETY INCENTIVE GRANTS FOR USE OF SEAT BELTS-ALLOCATIONS BASED ON SEAT BELT USE...

  10. 10 CFR 490.503 - Credit allocation.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 3 2011-01-01 2011-01-01 false Credit allocation. 490.503 Section 490.503 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Alternative Fueled Vehicle... described in section 490.507 of this part, DOE shall allocate one credit for each alternative fueled...

  11. 10 CFR 490.503 - Credit allocation.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 3 2010-01-01 2010-01-01 false Credit allocation. 490.503 Section 490.503 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Alternative Fueled Vehicle... described in section 490.507 of this part, DOE shall allocate one credit for each alternative fueled...

  12. 10 CFR 490.503 - Credit allocation.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 3 2013-01-01 2013-01-01 false Credit allocation. 490.503 Section 490.503 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Alternative Fueled Vehicle... described in section 490.507 of this part, DOE shall allocate one credit for each alternative fueled...

  13. 10 CFR 490.503 - Credit allocation.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 3 2012-01-01 2012-01-01 false Credit allocation. 490.503 Section 490.503 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Alternative Fueled Vehicle... described in section 490.507 of this part, DOE shall allocate one credit for each alternative fueled...

  14. Rethinking Reinforcement: Allocation, Induction, and Contingency

    ERIC Educational Resources Information Center

    Baum, William M.

    2012-01-01

    The concept of reinforcement is at least incomplete and almost certainly incorrect. An alternative way of organizing our understanding of behavior may be built around three concepts: "allocation," "induction," and "correlation." Allocation is the measure of behavior and captures the centrality of choice: All behavior entails choice and consists of…

  15. A Time Allocation Study of University Faculty

    ERIC Educational Resources Information Center

    Link, Albert N.; Swann, Christopher A.; Bozeman, Barry

    2008-01-01

    Many previous time allocation studies treat work as a single activity and examine trade-offs between work and other activities. This paper investigates the at-work allocation of time among teaching, research, grant writing and service by science and engineering faculty at top US research universities. We focus on the relationship between tenure…

  16. 50 CFR 660.55 - Allocations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... halibut regulations) is managed under regulations at 50 CFR part 300, subpart E. Beginning with the 2011..., the OY is reduced by the Pacific Coast treaty Indian tribal harvest (allocations, set-asides, and...: recreational estimates are not deducted here). (1) Pacific Coast treaty Indian tribal allocations,...

  17. Acquisitions Allocations: Fairness, Equity and Bundled Pricing.

    ERIC Educational Resources Information Center

    Packer, Donna

    2001-01-01

    Examined the effect of an interdisciplinary Web-based citation database with full text, the ProQuest Research Library, on the Western State University library's acquisitions allocation plan. Used list price of full-text journals to calculate increases in acquisitions funding. A list of articles discussing formula allocation is appended.…

  18. 42 CFR 24.2 - Allocation.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 1 2011-10-01 2011-10-01 false Allocation. 24.2 Section 24.2 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES PERSONNEL SENIOR BIOMEDICAL RESEARCH SERVICE § 24.2 Allocation. (a) The Secretary, within the number authorized in the PHS Act, shall determine...

  19. 42 CFR 24.2 - Allocation.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Allocation. 24.2 Section 24.2 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES PERSONNEL SENIOR BIOMEDICAL RESEARCH SERVICE § 24.2 Allocation. (a) The Secretary, within the number authorized in the PHS Act, shall determine...

  20. 48 CFR 5452.249 - Allocation.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 7 2011-10-01 2011-10-01 false Allocation. 5452.249 Section 5452.249 Federal Acquisition Regulations System DEFENSE LOGISTICS AGENCY, DEPARTMENT OF DEFENSE SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 5452.249 Allocation. The...

  1. 39 CFR 3060.12 - Asset allocation.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Asset allocation. 3060.12 Section 3060.12 Postal Service POSTAL REGULATORY COMMISSION PERSONNEL ACCOUNTING PRACTICES AND TAX RULES FOR THE THEORETICAL COMPETITIVE PRODUCTS ENTERPRISE § 3060.12 Asset allocation. Within 6 months of January 23, 2009, and for...

  2. 42 CFR 433.34 - Cost allocation.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Department in accordance with the requirements contained in subpart E of 45 CFR part 95. Subpart E also sets... 42 Public Health 4 2013-10-01 2013-10-01 false Cost allocation. 433.34 Section 433.34 Public... Provisions § 433.34 Cost allocation. A State plan under Title XIX of the Social Security Act must...

  3. 42 CFR 433.34 - Cost allocation.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Department in accordance with the requirements contained in subpart E of 45 CFR part 95. Subpart E also sets... 42 Public Health 4 2012-10-01 2012-10-01 false Cost allocation. 433.34 Section 433.34 Public... Provisions § 433.34 Cost allocation. A State plan under Title XIX of the Social Security Act must...

  4. 42 CFR 433.34 - Cost allocation.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Department in accordance with the requirements contained in subpart E of 45 CFR part 95. Subpart E also sets... 42 Public Health 4 2011-10-01 2011-10-01 false Cost allocation. 433.34 Section 433.34 Public... Provisions § 433.34 Cost allocation. A State plan under Title XIX of the Social Security Act must...

  5. 48 CFR 5452.249 - Allocation.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Allocation. 5452.249 Section 5452.249 Federal Acquisition Regulations System DEFENSE LOGISTICS AGENCY, DEPARTMENT OF DEFENSE SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 5452.249 Allocation. The...

  6. 45 CFR 98.55 - Cost allocation.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Cost allocation. 98.55 Section 98.55 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION CHILD CARE AND DEVELOPMENT FUND Use of Child Care and Development Funds § 98.55 Cost allocation. (a) The Lead Agency and...

  7. 42 CFR 24.2 - Allocation.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 42 Public Health 1 2014-10-01 2014-10-01 false Allocation. 24.2 Section 24.2 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES PERSONNEL SENIOR BIOMEDICAL RESEARCH SERVICE § 24... number of SBRS slots to be allocated to each participating Operating Division. (b) The SBRS Policy...

  8. 42 CFR 24.2 - Allocation.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 42 Public Health 1 2013-10-01 2013-10-01 false Allocation. 24.2 Section 24.2 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES PERSONNEL SENIOR BIOMEDICAL RESEARCH SERVICE § 24... number of SBRS slots to be allocated to each participating Operating Division. (b) The SBRS Policy...

  9. 42 CFR 24.2 - Allocation.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 42 Public Health 1 2012-10-01 2012-10-01 false Allocation. 24.2 Section 24.2 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES PERSONNEL SENIOR BIOMEDICAL RESEARCH SERVICE § 24... number of SBRS slots to be allocated to each participating Operating Division. (b) The SBRS Policy...

  10. 50 CFR 660.55 - Allocations.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Sablefish S. of 36° N. lat. 42 58 PACIFIC OCEAN PERCH 95 5 WIDOW 91 9 Chilipepper S. of 40°10′ N. lat. 75 25... rockfish, Pacific Ocean Perch, and widow rockfish, the trawl allocation will be further subdivided among.... For darkblotched rockfish, Pacific Ocean Perch, and widow rockfish, the trawl allocation is...

  11. 50 CFR 660.55 - Allocations.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Sablefish S. of 36° N. lat. 42 58 PACIFIC OCEAN PERCH 95 5 WIDOW 91 9 Chilipepper S. of 40°10′ N. lat. 75 25... rockfish, Pacific Ocean Perch, and widow rockfish, the trawl allocation will be further subdivided among.... For darkblotched rockfish, Pacific Ocean Perch, and widow rockfish, the trawl allocation is...

  12. 50 CFR 660.55 - Allocations.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... PACIFIC OCEAN PERCH 95 5 WIDOW 91 9 Chilipepper S. of 40°10′ N. lat. 75 25 Splitnose S. of 40°10′ N. lat... rockfish, Pacific Ocean Perch, and widow rockfish, the trawl allocation is further subdivided among the... nonwhiting fishery. (B) Pacific Ocean Perch (POP). Allocate 17 percent or 30 mt, whichever is greater, of...

  13. 50 CFR 660.55 - Allocations.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 50 Wildlife and Fisheries 13 2013-10-01 2013-10-01 false Allocations. 660.55 Section 660.55 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE (CONTINUED) FISHERIES OFF WEST COAST STATES West Coast Groundfish Fisheries § 660.55 Allocations. (a) General. An...

  14. Are outcome-adaptive allocation trials ethical?

    PubMed

    Hey, Spencer Phillips; Kimmelman, Jonathan

    2015-04-01

    Randomization is firmly established as a cornerstone of clinical trial methodology. Yet, the ethics of randomization continues to generate controversy. The default, and most efficient, allocation scheme randomizes patients equally (1:1) across all arms of study. However, many randomized trials are using outcome-adaptive allocation schemes, which dynamically adjust the allocation ratio in favor of the better performing treatment arm. Advocates of outcome-adaptive allocation contend that it better accommodates clinical equipoise and promotes informed consent, since such trials limit patient-subject exposure to sub-optimal care. In this essay, we argue that this purported ethical advantage of outcome-adaptive allocation does not stand up to careful scrutiny in the setting of two-armed studies and/or early-phase research. PMID:25649106

  15. Bioethics for clinicians: 13. Resource allocation.

    PubMed

    McKneally, M F; Dickens, B M; Meslin, E M; Singer, P A

    1997-07-15

    Questions of resource allocation can pose practical and ethical dilemmas for clinicians. In the Aristotelian conception of distributive justice, the unequal allocation of a scarce resource may be justified by morally relevant factors such as need or likelihood of benefit. Even using these criteria, it can be difficult to reconcile completing claims to determine which patients should be given priority. To what extent the physician's fiduciary duty toward a patient should supersede the interests of other patients and society as a whole is also a matter of controversy. Although the courts have been reluctant to become involved in allocation decisions in health care, they expect physicians to show allegiance to their patients regardless of budgetary concerns. The allocation of resources on the basis of clinically irrelevant factors such as religion or sexual orientation is prohibited. Clear, fair and publicly acceptable institutional and professional policies can help to ensure that resource allocation decisions are transparent and defensible. PMID:9238146

  16. Design of spectrally versatile forward-looking ground-penetrating radar for detection of concealed targets

    NASA Astrophysics Data System (ADS)

    Phelan, Brian R.; Ressler, Marc A.; Mazzaro, Gregory J.; Sherbondy, Kelly D.; Narayanan, Ram M.

    2013-05-01

    The design of high-resolution radars which can operate in theater involves a careful consideration of the radar's radiated spectrum. While a wide bandwidth yields better target detectability and classification, it can also interfere with other devices and/or violate federal and international communication laws. Under the Army Research Laboratory (ARL) Partnerships in Research Transition (PIRT) program, we are developing a Stepped-Frequency Radar (SFR) which allows for manipulation of the radiated spectrum, while still maintaining an effective ultra-wide bandwidth for achieving good range resolution. The SFR is a forward-looking, ultra-wideband (UWB) imaging radar capable of detecting concealed targets. This paper presents the research and analysis undertaken during the design of the SFR which will eventually complement an existing ARL system, the Synchronous Impulse REconstruction (SIRE) radar. The SFR is capable of excising prohibited frequency bands, while maintaining the down-range resolution capability of the original SIRE radar. The SFR has two transmit antennas and a 16-element receive antenna array, and this configuration achieves suitable cross-range resolution for target detection. The SFR, like the SIRE radar, is a vehicle mounted, forward-looking, ground penetrating radar (GPR) capable of using synthetic aperture radar (SAR) technology for the detection of subsurface targets via 3D imaging. Many contradicting design considerations are analyzed in this paper. The selection of system bandwidth, antenna types, number of antennas, frequency synthesizers, digitizers, receive amplifiers, wideband splitters, and many other components are critical to the design of the SFR. Leveraging commercial components and SIRE sub-systems were design factors offering an expedited time to the initial implementation of the radar while reducing overall costs. This SFR design will result in an ARL asset to support obscured target detection such as improvised explosive devices

  17. Remote Detection of Concealed Radioactive Materials by Using Focused Powerful Terahertz Radiation

    NASA Astrophysics Data System (ADS)

    Nusinovich, Gregory S.

    2016-06-01

    This review paper summarizes the results of studies of a novel concept of the remote detection of concealed radioactive materials by using focused high-power terahertz (THz) radiation. The concept is based on the known fact that the ambient electron density in air is low (one to three free electrons per cubic centimeter). These electrons can serve as seed electrons from which an avalanche breakdown in strong electromagnetic fields starts. When a powerful THz radiation is focused in a small spot, the breakdown-prone volume can be much smaller than a cubic centimeter. So, the probability of having some free electrons in this volume and, hence, the probability of breakdown are low in the absence of additional sources of air ionization. However, in the vicinity of radioactive materials (10-20 m), the electron density can be higher, and, hence, there are always some seed free electrons from which the avalanche ionization will start. Thus, the breakdown rate in this case can be close to 100 %. Realization of this concept requires studies of various physical and technical issues. First, it is necessary to develop a high-power source of (sub-) THz radiation whose power, frequency, and pulse duration are sufficient for realizing this goal. Second, it is necessary to analyze numerous issues important for realizing this concept. Among these issues are (a) enhancement of the ionization level of air molecules in the presence of hidden radioactive materials, (b) estimating the minimum detectable mass of radioactive material, (c) formation of breakdown-prone volumes in focused THz wave beams, and (d) effect of atmospheric conditions on the propagation and focusing of THz wave beams and on the optimal location of the breakdown-prone volume between a container with hidden radioactive material and a THz antenna. The results of these studies are described below.

  18. Concealed d-wave pairs in the s± condensate of iron-based superconductors.

    PubMed

    Ong, Tzen; Coleman, Piers; Schmalian, Jörg

    2016-05-17

    A central question in iron-based superconductivity is the mechanism by which the paired electrons minimize their strong mutual Coulomb repulsion. In most unconventional superconductors, Coulomb repulsion is minimized through the formation of higher angular momentum Cooper pairs, with Fermi surface nodes in the pair wavefunction. The apparent absence of such nodes in the iron-based superconductors has led to a belief they form an s-wave ([Formula: see text]) singlet state, which changes sign between the electron and hole pockets. However, the multiorbital nature of these systems opens an alternative possibility. Here, we propose a new class of [Formula: see text] state containing a condensate of d-wave Cooper pairs, concealed by their entanglement with the iron orbitals. By combining the d-wave ([Formula: see text]) motion of the pairs with the internal angular momenta [Formula: see text] of the iron orbitals to make a singlet ([Formula: see text]), an [Formula: see text] superconductor with a nontrivial topology is formed. This scenario allows us to understand the development of octet nodes in potassium-doped Ba1-x KXFe2As2 as a reconfiguration of the orbital and internal angular momentum into a high spin ([Formula: see text]) state; the reverse transition under pressure into a fully gapped state can then be interpreted as a return to the low-spin singlet. The formation of orbitally entangled pairs is predicted to give rise to a shift in the orbital content at the Fermi surface, which can be tested via laser-based angle-resolved photoemission spectroscopy. PMID:27140626

  19. Expanded opportunities of THz passive camera for the detection of concealed objects

    NASA Astrophysics Data System (ADS)

    Trofimov, Vyacheslav A.; Trofimov, Vladislav V.; Kuchik, Igor E.

    2013-10-01

    Among the security problems, the detection of object implanted into either the human body or animal body is the urgent problem. At the present time the main tool for the detection of such object is X-raying only. However, X-ray is the ionized radiation and therefore can not be used often. Other way for the problem solving is passive THz imaging using. In our opinion, using of the passive THz camera may help to detect the object implanted into the human body under certain conditions. The physical reason of such possibility arises from temperature trace on the human skin as a result of the difference in temperature between object and parts of human body. Modern passive THz cameras have not enough resolution in temperature to see this difference. That is why, we use computer processing to enhance the passive THz camera resolution for this application. After computer processing of images captured by passive THz camera TS4, developed by ThruVision Systems Ltd., we may see the pronounced temperature trace on the human body skin from the water, which is drunk by person, or other food eaten by person. Nevertheless, there are many difficulties on the way of full soution of this problem. We illustrate also an improvement of quality of the image captured by comercially available passive THz cameras using computer processing. In some cases, one can fully supress a noise on the image without loss of its quality. Using computer processing of the THz image of objects concealed on the human body, one may improve it many times. Consequently, the instrumental resolution of such device may be increased without any additional engineering efforts.

  20. Using fMRI to decode true thoughts independent of intention to conceal.

    PubMed

    Yang, Zhi; Huang, Zirui; Gonzalez-Castillo, Javier; Dai, Rui; Northoff, Georg; Bandettini, Peter

    2014-10-01

    Multi-variate pattern analysis (MVPA) applied to BOLD-fMRI has proven successful at decoding complicated fMRI signal patterns associated with a variety of cognitive processes. One cognitive process, not yet investigated, is the mental representation of "Yes/No" thoughts that precede the actual overt response to a binary "Yes/No" question. In this study, we focus on examining: (1) whether spatial patterns of the hemodynamic response carry sufficient information to allow reliable decoding of "Yes/No" thoughts; and (2) whether decoding of "Yes/No" thoughts is independent of the intention to respond honestly or dishonestly. To achieve this goal, we conducted two separate experiments. Experiment 1, collected on a 3T scanner, examined the whole brain to identify regions that carry sufficient information to permit significantly above-chance prediction of "Yes/No" thoughts at the group level. In Experiment 2, collected on a 7T scanner, we focused on the regions identified in Experiment 1 to examine the capability of achieving high decoding accuracy at the single subject level. A set of regions--namely right superior temporal gyrus, left supra-marginal gyrus, and left middle frontal gyrus--exhibited high decoding power. Decoding accuracy for these regions increased with trial averaging. When 18 trials were averaged, the median accuracies were 82.5%, 77.5%, and 79.5%, respectively. When trials were separated according to deceptive intentions (set via experimental cues), and classifiers were trained on honest trials, but tested on trials where subjects were asked to deceive, the median accuracies of these regions still reached 66%, 75%, and 78.5%. These results provide evidence that concealed "Yes/No" thoughts are encoded in the BOLD signal, retaining some level of independence from the subject's intentions to answer honestly or dishonestly. These findings also suggest the theoretical possibility for more efficient brain-computer interfaces where subjects only need to think

  1. Using brain MERMER testing to detect knowledge despite efforts to conceal.

    PubMed

    Farwell, L A; Smith, S S

    2001-01-01

    This experiment examined the accuracy and reliability of the memory and encoding related multifaceted electroencephalographic response (MERMER) technique for detecting information related to events subjects have experienced, despite subjects' efforts to conceal that knowledge. Information obtained through interviews was used to develop stimulus sets consisting of words and phrases presented to subjects visually by computer. Sets were composed of three types of stimuli: life experience-related (Probes), stimuli the subject was asked to memorize and respond to (Targets), and irrelevant information (Irrelevants). Each set of stimuli was tested on two individuals: (1) one individual who had participated in the event in question--and thus had the relevant information stored in his/her brain, and (2) one who had not. Six subjects were tested. Electrical brain responses to the stimuli were recorded non-invasively from the scalp and analyzed. MERMERs, (memory and encoding related multifaceted electroencephalographic responses), of which the P300 is a sub-component, were used to determine whether the subject had the relevant information stored in his brain (information present) or not (information absent), thus indicating whether or not each subject had participated in the real-life event in question. Bootstrapping was used to analyze and compare the responses to the three types of stimuli. As predicted, MERMERs were elicited by Probe stimuli only in the subjects who had participated in the investigated event, by Target stimuli in all subjects, and in no case by Irrelevant stimuli. For each of the six subjects, brain MERMER testing correctly determined whether the subject had participated in and consequently knew about the event in question (information present) or had not participated (information absent). The statistical confidence for this determination was 99.9% in five cases and 90.0% in one case. The article concludes with a discussion of areas of future research and

  2. A novel concealed information test method based on independent component analysis and support vector machine.

    PubMed

    Gao, Junfeng; Lu, Liang; Yang, Yong; Yu, Gang; Na, Liantao; Rao, NiNi

    2012-01-01

    The concealed information test (CIT) has drawn much attention and has been widely investigated in recent years. In this study, a novel CIT method based on denoised P3 and machine learning was proposed to improve the accuracy of lie detection. Thirty participants were chosen as the guilty and innocent participants to perform the paradigms of 3 types of stimuli. The electroencephalogram (EEG) signals were recorded and separated into many single trials. In order to enhance the signal noise ratio (SNR) of P3 components, the independent component analysis (ICA) method was adopted to separate non-P3 components (i.e., artifacts) from every single trial. In order to automatically identify the P3 independent components (ICs), a new method based on topography template was proposed to automatically identify the P3 ICs. Then the P3 waveforms with high SNR were reconstructed on Pz electrodes. Second, the 3 groups of features based on time,frequency, and wavelets were extracted from the reconstructed P3 waveforms. Finally, 2 classes of feature samples were used to train a support vector machine (SVM) classifier because it has higher performance compared with several other classifiers. Meanwhile, the optimal number of P3 ICs and some other parameter values in the classifiers were determined by the cross-validation procedures. The presented method achieved a balance test accuracy of 84.29% on detecting P3 components for the guilty and innocent participants. The presented method improves the efficiency of CIT in comparison with previous reported methods. PMID:22423552

  3. Carbon allocation and accumulation in conifers

    SciTech Connect

    Gower, S.T.; Isebrands, J.G.; Sheriff, D.W.

    1995-07-01

    Forests cover approximately 33% of the land surface of the earth, yet they are responsible for 65% of the annual carbon (C) accumulated by all terrestrial biomes. In general, total C content and net primary production rates are greater for forests than for other biomes, but C budgets differ greatly among forests. Despite several decades of research on forest C budgets, there is still an incomplete understanding of the factors controlling C allocation. Yet, if we are to understand how changing global events such as land use, climate change, atmospheric N deposition, ozone, and elevated atmospheric CO{sub 2} affect the global C budget, a mechanistic understanding of C assimilation, partitioning, and allocation is necessary. The objective of this chapter is to review the major factors that influence C allocation and accumulation in conifer trees and forests. In keeping with the theme of this book, we will focus primarily on evergreen conifers. However, even among evergreen conifers, leaf, canopy, and stand-level C and nutrient allocation patterns differ, often as a function of leaf development and longevity. The terminology related to C allocation literature is often inconsistent, confusing and inadequate for understanding and integrating past and current research. For example, terms often used synonymously to describe C flow or movement include translocation, transport, distribution, allocation, partitioning, apportionment, and biomass allocation. A common terminology is needed because different terms have different meanings to readers. In this paper we use C allocation, partitioning, and accumulation according to the definitions of Dickson and Isebrands (1993). Partitioning is the process of C flow into and among different chemical, storage, and transport pools. Allocation is the distribution of C to different plant parts within the plant (i.e., source to sink). Accumulation is the end product of the process of C allocation.

  4. Change blindness and eyewitness testimony.

    PubMed

    Davies, Graham; Hine, Sarah

    2007-07-01

    The authors explored the relevance of research on change blindness to eyewitness identification and testimony under intentional and incidental memory conditions. Participants (N = 80, 40 men and 40 women) viewed a video enactment of a burglary in which the identity of the burglar changed at the halfway point of the film. Half of participants were briefed to remember the content, and the other half were not. All were tested for the recall of the content, awareness of the change, and ability to identify either or both of the burglars. Some 61% of participants did not notice the identity change. Rates of detection were significantly higher in participants in the intentional condition, who also recalled significantly more detail from the film. Awareness of change was also significantly related to content recall scores and accuracy of identification of both burglars. The results illustrate the interrelation between the eyewitness and change blindness literatures. PMID:17725074

  5. Mobility aid for the blind

    NASA Technical Reports Server (NTRS)

    1982-01-01

    A project to develop an effective mobility aid for blind pedestrians which acquires consecutive images of the scenes before a moving pedestrian, which locates and identifies the pedestrian's path and potential obstacles in the path, which presents path and obstacle information to the pedestrian, and which operates in real-time is discussed. The mobility aid has three principal components: an image acquisition system, an image interpretation system, and an information presentation system. The image acquisition system consists of a miniature, solid-state TV camera which transforms the scene before the blind pedestrian into an image which can be received by the image interpretation system. The image interpretation system is implemented on a microprocessor which has been programmed to execute real-time feature extraction and scene analysis algorithms for locating and identifying the pedestrian's path and potential obstacles. Identity and location information is presented to the pedestrian by means of tactile coding and machine-generated speech.

  6. Sensory Augmentation for the Blind

    PubMed Central

    Kärcher, Silke M.; Fenzlaff, Sandra; Hartmann, Daniela; Nagel, Saskia K.; König, Peter

    2012-01-01

    Common navigational aids used by blind travelers during large-scale navigation divert attention away from important cues of the immediate environment (i.e., approaching vehicles). Sensory augmentation devices, relying on principles similar to those at work in sensory substitution, can potentially bypass the bottleneck of attention through sub-cognitive implementation of a set of rules coupling motor actions with sensory stimulation. We provide a late blind subject with a vibrotactile belt that continually signals the direction of magnetic north. The subject completed a set of behavioral tests before and after an extended training period. The tests were complemented by questionnaires and interviews. This newly supplied information improved performance on different time scales. In a pointing task we demonstrate an instant improvement of performance based on the signal provided by the device. Furthermore, the signal was helpful in relevant daily tasks, often complicated for the blind, such as keeping a direction over longer distances or taking shortcuts in familiar environments. A homing task with an additional attentional load demonstrated a significant improvement after training. The subject found the directional information highly expedient for the adjustment of his inner maps of familiar environments and describes an increase in his feeling of security when exploring unfamiliar environments with the belt. The results give evidence for a firm integration of the newly supplied signals into the behavior of this late blind subject with better navigational performance and more courageous behavior in unfamiliar environments. Most importantly, the complementary information provided by the belt lead to a positive emotional impact with enhanced feeling of security. The present experimental approach demonstrates the positive potential of sensory augmentation devices for the help of handicapped people. PMID:22403535

  7. The allocation of the radio spectrum

    NASA Astrophysics Data System (ADS)

    Jackson, C. L.

    1980-02-01

    The system of the radio spectrum (10 kHz-300 GHz) allocation is discussed in its technical, economic, and managerial aspects. Possible improvements to the system are considered, such as minimizing human management, establishing a single authority for the allocation of the spectrum, and stimulating a more efficient use of the spectrum with economic incentives. The 'anarchy band' concept, a system of dynamic allocation, is suggested as a means of replacing human management with electronic equipment. The growing importance of the satellite portion of the spectrum is also shown.

  8. Linear modelling of attentional resource allocation

    NASA Technical Reports Server (NTRS)

    Pierce, B.

    1978-01-01

    Eight subjects time-shared performance of two compensatory tracking tasks under conditions when both were of constant difficulty, and when the control order of one task (designated primary) was varied over time within a trial. On line performance feedback was presented on half of the trials. The data are interpreted in terms of a linear model of the operator's attention allocation system, and suggest that this allocation is strongly suboptimal. Furthermore, the limitations in reallocating attentional resources between tasks, in response to difficulty fluctuations were not reduced by augmented performance feedback. Some characteristics of the allocation system are described, and reasons for its limitations suggested.

  9. SBI allocation between heavy and singlet missiles

    SciTech Connect

    Canavan, G.H.

    1991-04-01

    The optimal allocation of space-based interceptors (SBIs) between fixed, heavy missiles and mobile singlets can be derived from approximate expressions for the boost-phase penetration of each. Singlets can cluster before launch and have shorter burn times, which reduce their availability to SBIs by an order of magnitude. Singlet penetration decreased slowly with the number of SBIs allocated to them; heavy missile penetration falls rapidly. The allocation to the heavy missiles falls linearly with their number. The penetration of heavy and singlet missiles is proportional to their numbers and inversely proportional to their availability. 8 refs., 2 figs.

  10. 50 CFR 679.62 - Inshore sector cooperative allocation program.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... pollock cooperative permit. (3) Conversion of quota share percentage to TAC allocations. (Effective April... that subarea. Each cooperative's annual pollock TAC allocation may be published in the proposed...

  11. 50 CFR 679.62 - Inshore sector cooperative allocation program.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... pollock cooperative permit. (3) Conversion of quota share percentage to TAC allocations. (Effective April... that subarea. Each cooperative's annual pollock TAC allocation may be published in the proposed...

  12. 50 CFR 679.62 - Inshore sector cooperative allocation program.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... pollock cooperative permit. (3) Conversion of quota share percentage to TAC allocations. (Effective April... that subarea. Each cooperative's annual pollock TAC allocation may be published in the proposed...

  13. Noise-resistant system of concealed information transfer on a chaotic delayed feedback oscillator with switchable delay time

    NASA Astrophysics Data System (ADS)

    Kul'minskii, D. D.; Ponomarenko, V. I.; Karavaev, A. S.; Prokhorov, M. D.

    2016-05-01

    We propose a system of concealed information transfer based on a delayed feedback oscillator with switchable chaotic regimes. The proposed system is analyzed numerically and experimentally. The dependences of the bit error rate during transmission of a binary information signal on the signal-to-noise ratio, attenuation of the signal in the communication channel, and the duration of the time interval during which a bit is transferred are constructed. The high stability of the system to noise and amplitude distortions of a signal in the communication channel is demonstrated.

  14. First record of genus Puliciphora Dahl (Diptera: Phoridae) associated with rabbit carcasses placed in concealed environments in Malaysia.

    PubMed

    Zuha, Raja Muhammad; See, Huong Wen; Disney, R Henry L; Omar, Baharudin

    2014-12-01

    Scuttle flies of genus Puliciphora Dahl (Diptera: Phoridae) are recorded for the first time in Malaysia from rabbit carcasses placed in concealed environments. They consist of Puliciphora borinquenensis Wheeler ♂♀, Puliciphora obtecta Meijere ♀ and Puliciphora beckeri Meijere ♀. All species were obtained from rabbit carcasses in used luggage and garbage bin placed at Forensic Science Simulation Site, Universiti Kebangsaan Malaysia, Bangi, Selangor. The specimens were collected from the carcasses using a modified Malaise trap, an entomological aspirator and preserved in 70% ethanol. This report expands the geographical distributions of these species and their microhabitat, suggests its possible important role in forensic entomology. PMID:25466156

  15. Using pretest data to screen low-reactivity individuals in the autonomic-based concealed information test.

    PubMed

    Matsuda, Izumi; Ogawa, Tokihiro; Tsuneoka, Michiko; Verschuere, Bruno

    2015-03-01

    The concealed information test (CIT) can be used to assess whether an individual possesses crime-related information. However, its discrimination performance has room for improvement. We examined whether screening out participants who do not respond distinctively on a pretest improves the diagnosticity of a mock-crime CIT. Before conducting the CIT, we gave a pretest to 152 participants, 80 of whom were assigned as guilty. Pretest screening significantly improved the diagnostic value of the mock-crime CIT; however, it also led to a substantial number of undiagnosed participants (33.6%). Pretest screening holds promise, but its application would benefit from dedicated measures for screening out participants. PMID:25208848

  16. Concealed carry weapon permits: a Second Amendment right or a recipe for disaster on our nation's campuses?

    PubMed

    Fennell, Reginald

    2009-01-01

    Crimes on college campuses can "strike fear" into the lives of those in higher education and a shooting is one of the crimes that ranks at the top of the most feared acts of violence. Maybe more direct counseling for clients who have weapons with regard to anticipatory guidance on firearms is needed. However, the debate continues with proposed legislation in different states regarding Second Amendment rights to legally carry concealed weapons on our Nation's campuses. What should be our response to this legislation? PMID:19892645

  17. 42 CFR 457.228 - Cost allocation.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... or appropriate CHIP Agency will have an approved cost allocation plan on file with the Department in accordance with the requirements contained in subpart E of 45 CFR part 95. Subpart E also sets forth...

  18. 50 CFR 648.87 - Sector allocation.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... permit sanctions pursuant to 15 CFR part 904. If an ACE allocated to a sector is not exceeded in a given... CFR part 904, each sector, permit/vessel owner, and vessel operator participating in the sector may...

  19. The Ethics of Allocating Uterine Transplants.

    PubMed

    Bayefsky, Michelle J; Berkman, Benjamin E

    2016-07-01

    In September 2014, a healthy male child was born in Sweden following a successful uterine transplantation (UTx). The event brought hope to many women without functional uteruses around the world. Having a child with a transplanted uterus is now possible, and as knowledge of the procedure proliferates and interest in UTx grows, it is important to begin thinking about how a scarce supply of uteruses will be allocated. This article represents a first discussion of the range of factors that must be considered in answering the allocation question. The primary issues addressed are (1) the motivation to seek treatment, (2) allocation by age, (3) child-rearing capacity, and (4) the amount of infertility treatment required. A set of eligibility and ranking criteria are presented. These criteria are not exhaustive but are intended to spark discussion about how uteruses can be allocated in a just manner. PMID:26864991

  20. Optimal Resource Allocation in Library Systems

    ERIC Educational Resources Information Center

    Rouse, William B.

    1975-01-01

    Queueing theory is used to model processes as either waiting or balking processes. The optimal allocation of resources to these processes is defined as that which maximizes the expected value of the decision-maker's utility function. (Author)

  1. Fund allocation using capacitated vehicle routing problem

    NASA Astrophysics Data System (ADS)

    Mamat, Nur Jumaadzan Zaleha; Jaaman, Saiful Hafizah; Ahmad, Rokiah Rozita; Darus, Maslina

    2014-09-01

    In investment fund allocation, it is unwise for an investor to distribute his fund into several assets simultaneously due to economic reasons. One solution is to allocate the fund into a particular asset at a time in a sequence that will either maximize returns or minimize risks depending on the investor's objective. The vehicle routing problem (VRP) provides an avenue to this issue. VRP answers the question on how to efficiently use the available fleet of vehicles to meet a given service demand, subjected to a set of operational requirements. This paper proposes an idea of using capacitated vehicle routing problem (CVRP) to optimize investment fund allocation by employing data of selected stocks in the FTSE Bursa Malaysia. Results suggest that CRVP can be applied to solve the issue of investment fund allocation and increase the investor's profit.

  2. Optimal dynamic bandwidth allocation for complex networks

    NASA Astrophysics Data System (ADS)

    Jiang, Zhong-Yuan; Liang, Man-Gui; Li, Qian; Guo, Dong-Chao

    2013-03-01

    Traffic capacity of one network strongly depends on the link’s bandwidth allocation strategy. In previous bandwidth allocation mechanisms, once one link’s bandwidth is allocated, it will be fixed throughout the overall traffic transmission process. However, the traffic load of every link changes from time to time. In this paper, with finite total bandwidth resource of the network, we propose to dynamically allocate the total bandwidth resource in which each link’s bandwidth is proportional to the queue length of the output buffer of the link per time step. With plenty of data packets in the network, the traffic handling ability of all links of the network achieves full utilization. The theoretical analysis and the extensive simulation results on complex networks are consistent. This work is valuable for network service providers to improve network performance or to do reasonable network design efficiently.

  3. 49 CFR 262.5 - Allocation requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... IMPROVEMENT PROJECTS § 262.5 Allocation requirements. At least fifty percent of all grant funds awarded under this section out of funds appropriated for a fiscal year shall be provided as grant awards of not...

  4. 49 CFR 262.5 - Allocation requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... IMPROVEMENT PROJECTS § 262.5 Allocation requirements. At least fifty percent of all grant funds awarded under this section out of funds appropriated for a fiscal year shall be provided as grant awards of not...

  5. 49 CFR 262.5 - Allocation requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... IMPROVEMENT PROJECTS § 262.5 Allocation requirements. At least fifty percent of all grant funds awarded under this section out of funds appropriated for a fiscal year shall be provided as grant awards of not...

  6. 49 CFR 262.5 - Allocation requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... IMPROVEMENT PROJECTS § 262.5 Allocation requirements. At least fifty percent of all grant funds awarded under this section out of funds appropriated for a fiscal year shall be provided as grant awards of not...

  7. A new quantum blind signature with unlinkability

    NASA Astrophysics Data System (ADS)

    Shi, Wei-Min; Zhang, Jian-Biao; Zhou, Yi-Hua; Yang, Yu-Guang

    2015-08-01

    Recently, some quantum blind signature protocols have been proposed. However, the previous schemes cannot satisfy the unlinkability requirement. To overcome the drawback of unlinkability in the previous schemes, we propose a new quantum blind signature based on Bell states with the help of an authentic party. In this paper, we provide a method to inject a randomizing factor into a message when it is signed by the signer and then get rid of the blind factor from the blinded signature when it is verified by the verifier. Even when the message owner publishes the message-signature pair, the signer cannot identify the association between the message-signature pair and the blind signature he generated. Therefore, our scheme really realizes unlinkability property. At last, analysis results show that this scheme satisfies the basis security requirements of a weak signature such as no-counterfeiting, no-disavowing, blindness and traceability, and our total efficiency is not less than the previous schemes.

  8. Allocating petroleum products during oil supply disruptions.

    PubMed

    Bezdek, R H; Taylor, W B

    1981-06-19

    Four options for allocating a long-term, severe shortfall of petroleum imports are analyzed: oil price and allocation controls, coupon gasoline rationing, variable gasoline tax and rebate, and no oil price controls with partial rebates. Each of these options is evaluated in terms of four criteria: microeconomic effects, macroeconomic effects, equity, and practical problems. The implications of this analysis for energy contingency planning are discussed. PMID:17746245

  9. Optimality versus stability in water resource allocation.

    PubMed

    Read, Laura; Madani, Kaveh; Inanloo, Bahareh

    2014-01-15

    Water allocation is a growing concern in a developing world where limited resources like fresh water are in greater demand by more parties. Negotiations over allocations often involve multiple groups with disparate social, economic, and political status and needs, who are seeking a management solution for a wide range of demands. Optimization techniques for identifying the Pareto-optimal (social planner solution) to multi-criteria multi-participant problems are commonly implemented, although often reaching agreement for this solution is difficult. In negotiations with multiple-decision makers, parties who base decisions on individual rationality may find the social planner solution to be unfair, thus creating a need to evaluate the willingness to cooperate and practicality of a cooperative allocation solution, i.e., the solution's stability. This paper suggests seeking solutions for multi-participant resource allocation problems through an economics-based power index allocation method. This method can inform on allocation schemes that quantify a party's willingness to participate in a negotiation rather than opt for no agreement. Through comparison of the suggested method with a range of distance-based multi-criteria decision making rules, namely, least squares, MAXIMIN, MINIMAX, and compromise programming, this paper shows that optimality and stability can produce different allocation solutions. The mismatch between the socially-optimal alternative and the most stable alternative can potentially result in parties leaving the negotiation as they may be too dissatisfied with their resource share. This finding has important policy implications as it justifies why stakeholders may not accept the socially optimal solution in practice, and underlies the necessity of considering stability where it may be more appropriate to give up an unstable Pareto-optimal solution for an inferior stable one. Authors suggest assessing the stability of an allocation solution as an

  10. Allocation Games: Addressing the Ill-Posed Nature of Allocation in Life-Cycle Inventories.

    PubMed

    Hanes, Rebecca J; Cruze, Nathan B; Goel, Prem K; Bakshi, Bhavik R

    2015-07-01

    Allocation is required when a life cycle contains multi-functional processes. One approach to allocation is to partition the embodied resources in proportion to a criterion, such as product mass or cost. Many practitioners apply multiple partitioning criteria to avoid choosing one arbitrarily. However, life cycle results from different allocation methods frequently contradict each other, making it difficult or impossible for the practitioner to draw any meaningful conclusions from the study. Using the matrix notation for life-cycle inventory data, we show that an inventory that requires allocation leads to an ill-posed problem: an inventory based on allocation is one of an infinite number of inventories that are highly dependent upon allocation methods. This insight is applied to comparative life-cycle assessment (LCA), in which products with the same function but different life cycles are compared. Recently, there have been several studies that applied multiple allocation methods and found that different products were preferred under different methods. We develop the Comprehensive Allocation Investigation Strategy (CAIS) to examine any given inventory under all possible allocation decisions, enabling us to detect comparisons that are not robust to allocation, even when the comparison appears robust under conventional partitioning methods. While CAIS does not solve the ill-posed problem, it provides a systematic way to parametrize and examine the effects of partitioning allocation. The practical usefulness of this approach is demonstrated with two case studies. The first compares ethanol produced from corn stover hydrolysis, corn stover gasification, and corn grain fermentation. This comparison was not robust to allocation. The second case study compares 1,3-propanediol (PDO) produced from fossil fuels and from biomass, which was found to be a robust comparison. PMID:26061700

  11. Advances in liver transplantation allocation systems

    PubMed Central

    Schilsky, Michael L; Moini, Maryam

    2016-01-01

    With the growing number of patients in need of liver transplantation, there is a need for adopting new and modifying existing allocation policies that prioritize patients for liver transplantation. Policy should ensure fair allocation that is reproducible and strongly predictive of best pre and post transplant outcomes while taking into account the natural history of the potential recipients liver disease and its complications. There is wide acceptance for allocation policies based on urgency in which the sickest patients on the waiting list with the highest risk of mortality receive priority. Model for end-stage liver disease and Child-Turcotte-Pugh scoring system, the two most universally applicable systems are used in urgency-based prioritization. However, other factors must be considered to achieve optimal allocation. Factors affecting pre-transplant patient survival and the quality of the donor organ also affect outcome. The optimal system should have allocation prioritization that accounts for both urgency and transplant outcome. We reviewed past and current liver allocation systems with the aim of generating further discussion about improvement of current policies. PMID:26973389

  12. Advances in liver transplantation allocation systems.

    PubMed

    Schilsky, Michael L; Moini, Maryam

    2016-03-14

    With the growing number of patients in need of liver transplantation, there is a need for adopting new and modifying existing allocation policies that prioritize patients for liver transplantation. Policy should ensure fair allocation that is reproducible and strongly predictive of best pre and post transplant outcomes while taking into account the natural history of the potential recipients liver disease and its complications. There is wide acceptance for allocation policies based on urgency in which the sickest patients on the waiting list with the highest risk of mortality receive priority. Model for end-stage liver disease and Child-Turcotte-Pugh scoring system, the two most universally applicable systems are used in urgency-based prioritization. However, other factors must be considered to achieve optimal allocation. Factors affecting pre-transplant patient survival and the quality of the donor organ also affect outcome. The optimal system should have allocation prioritization that accounts for both urgency and transplant outcome. We reviewed past and current liver allocation systems with the aim of generating further discussion about improvement of current policies. PMID:26973389

  13. Blindness. [prosthetic devices and sensory aids

    NASA Technical Reports Server (NTRS)

    Pudenz, R. H.

    1974-01-01

    The possibilities are considered that modern electronics and engineering have to offer the individual with a damaged or disordered nervous system, especially the blind person. Discussed are the incidence and principal causes of blindness, past research activities, and a capsule review of some of the more interesting programs designed to provide the blind with the ability to be mobile in their environment and to read printed matter.

  14. Minimum entropy deconvolution and blind equalisation

    NASA Technical Reports Server (NTRS)

    Satorius, E. H.; Mulligan, J. J.

    1992-01-01

    Relationships between minimum entropy deconvolution, developed primarily for geophysics applications, and blind equalization are pointed out. It is seen that a large class of existing blind equalization algorithms are directly related to the scale-invariant cost functions used in minimum entropy deconvolution. Thus the extensive analyses of these cost functions can be directly applied to blind equalization, including the important asymptotic results of Donoho.

  15. Application of Behavior Modification to Blind Children.

    ERIC Educational Resources Information Center

    Hayes, Charles S.; Weinhouse, Ellen

    1978-01-01

    Research and application of principles of behavior modification with visually impaired and blind children are reviewed with particular attention to lower functioning multiply impaired children. (Author)

  16. A Concealed Intracranial Aneurysm Detected after Recanalization of an Occluded Vessel: A Case Report and Literature Review

    PubMed Central

    Torikoshi, Sadaharu; Akiyama, Yoshinori

    2016-01-01

    Background Based on the results of several randomized controlled trials, acute endovascular thrombectomy is strongly recommended for patients with acute ischemic stroke due to large artery occlusion (LAO). The incidence of an intracranial aneurysm has been reported to be approximately 5% in the general population. Therefore, the possibility of the coincidence of LAO and an intracranial aneurysm at the distal part of an occluded vessel should be considered. Summary A 74-year-old female patient presented with the sudden onset of consciousness disturbance and left-sided weakness. Neuroimages demonstrated an acute infarction due to right middle cerebral artery occlusion. The occlusion was successfully treated, and an aneurysm was incidentally detected at the occluded artery. We reviewed the literature and identified 11 cases in 8 reports, which were similar to our case. Among the 11 cases, aneurysms ruptured during endovascular therapy in 2 cases. In the present report, we discussed the prediction of concealed aneurysms and avoidance of their rupture during endovascular intervention. Key Message The presence of an aneurysm concealed behind an embolus should be carefully assessed on preoperative and intraoperative neuroimages. The important findings for suspecting such an aneurysm are a hyperdense nodular sign on preoperative computed tomography and unusual motion of the microwire during the endovascular intervention. Even if there is no finding indicative of an aneurysm, the catheter and thrombectomy devices should be more carefully advanced than usual, especially at the common sites of aneurysms, and the devices should be appropriately chosen. PMID:27051404

  17. An interfering n-back task facilitates the detection of concealed information with EDA but impedes it with cardiopulmonary physiology.

    PubMed

    Ambach, Wolfgang; Stark, Rudolf; Vaitl, Dieter

    2011-06-01

    One approach to investigate psychophysiological processes occurring in the Concealed Information Test (CIT) is to use a parallel task, which engages specific mental activity in addition to the CIT. In the present study, the influence of an interfering n-back task on the physiological responses in a Concealed Information Test (CIT) was investigated. Forty participants underwent a mock-crime experiment with a modified CIT. In a within-subject design, the CIT was applied in blocks with and without an additional n-back task. Electrodermal activity (EDA), respiration line length (RLL), heart rate (HR), and finger pulse waveform length (FPWL) were registered. Reaction times in the n-back task and the CIT were recorded. The parallel task enhanced the differential EDA response to probe vs. irrelevant items, while it diminished the response differences for RLL and phasic HR. Results shed light upon working-memory-related processes in the CIT. The diverging effects of the interfering mental activity on electrodermal and cardiopulmonary measures, if replicable, might contribute to a better understanding of the psychophysiological responsiveness underlying the CIT. PMID:21440579

  18. A functional analysis of deception detection of a mock crime using infrared thermal imaging and the Concealed Information Test

    PubMed Central

    Park, Kevin K.; Suk, Hye Won; Hwang, Heungsun; Lee, Jang-Han

    2013-01-01

    The purpose of this study was to utilize thermal imaging and the Concealed Information Test to detect deception in participants who committed a mock crime. A functional analysis using a functional ANOVA and a functional discriminant analysis was conducted to decrease the variation in the physiological data collected through the thermal imaging camera. Participants chose between a non-crime mission (Innocent Condition: IC), or a mock crime (Guilty Condition: GC) of stealing a wallet in a computer lab. Temperature in the periorbital region of the face was measured while questioning participants regarding mock crime details. Results revealed that the GC showed significantly higher temperatures when responding to crime relevant items compared to irrelevant items, while the IC did not. The functional ANOVA supported the initial results that facial temperatures of the GC elevated when responding to crime relevant items, demonstrating an interaction between group (guilty/innocent) and relevance (relevant/irrelevant). The functional discriminant analysis revealed that answering crime relevant items can be used to discriminate guilty from innocent participants. These results suggest that measuring facial temperatures in the periorbital region while conducting the Concealed Information Test is able to differentiate the GC from the IC. PMID:23470924

  19. Pixel-level Matching Based Multi-hypothesis Error Concealment Modes for Wireless 3D H.264/MVC Communication

    NASA Astrophysics Data System (ADS)

    El-Shafai, Walid

    2015-09-01

    3D multi-view video (MVV) is multiple video streams shot by several cameras around a single scene simultaneously. Therefore it is an urgent task to achieve high 3D MVV compression to meet future bandwidth constraints while maintaining a high reception quality. 3D MVV coded bit-streams that are transmitted over wireless network can suffer from error propagation in the space, time and view domains. Error concealment (EC) algorithms have the advantage of improving the received 3D video quality without any modifications in the transmission rate or in the encoder hardware or software. To improve the quality of reconstructed 3D MVV, we propose an efficient adaptive EC algorithm with multi-hypothesis modes to conceal the erroneous Macro-Blocks (MBs) of intra-coded and inter-coded frames by exploiting the spatial, temporal and inter-view correlations between frames and views. Our proposed algorithm adapts to 3D MVV motion features and to the error locations. The lost MBs are optimally recovered by utilizing motion and disparity matching between frames and views on pixel-by-pixel matching basis. Our simulation results show that the proposed adaptive multi-hypothesis EC algorithm can significantly improve the objective and subjective 3D MVV quality.

  20. Electron beam injected into ground generates subsoil x-rays that may deactivate concealed electronics used to trigger explosive devices

    NASA Astrophysics Data System (ADS)

    Retsky, Michael

    2008-04-01

    Explosively formed projectiles (EFP) are a major problem in terrorism and asymmetrical warfare. EFPs are often triggered by ordinary infrared motion detectors. A potential weak link is that such electronics are not hardened to ionizing radiation and can latch-up or enter other inoperative states after exposure to a single short event of ionizing radiation. While these can often be repaired with a power restart, they also can produce shorts and permanent damage. A problem of course is that we do not want to add radiation exposure to the long list of war related hazards. Biological systems are highly sensitive to integrated dosage but show no particular sensitivity to short pulses. There may be a way to generate short pulsed subsoil radiation to deactivate concealed electronics without introducing radiation hazards to military personnel and civilian bystanders. Electron beams of 30 MeV that can be produced by portable linear accelerators (linacs) propagate >20 m in air and 10-12 cm in soil. X-radiation is produced by bremsstrahlung and occurs subsoil beneath the point of impact and is mostly forward directed. Linacs 1.5 m long can produce 66 MWatt pulses of subsoil x-radiation 1 microsecond or less in duration. Untested as yet, such a device could be mounted on a robotic vehicle that precedes a military convoy and deactivates any concealed electronics within 10-20 meters on either side of the road.

  1. Ultra wide band detection of on body concealed weapons using the out of plane polarized late time response

    NASA Astrophysics Data System (ADS)

    Harmer, Stuart; Andrews, David; Bowring, Nicholas; Rezgui, Nacer; Southgate, Matthew

    2009-09-01

    A method of detecting concealed handguns and knives, both on and off body, has been developed. The method utilizes aspect-independent natural, complex resonances (poles) excited by illuminating the target with frequency swept, ultrawide band microwaves in the range 0.5 - 18 GHz. These natural resonances manifest as a Late Time Response (LTR) that extends significantly (~ 5 ns) beyond the direct reflections from the human body (the Early Time Response) and are of the form of a superposition of exponentially decaying sinusoidal waveforms. Two handguns are examined, both on the human body and in isolation, by the established methodology of applying the Generalised-Pencil-Of-Function to the late time response data of the target. These poles allow the weapon to be effectively classified. Out of plane polarized (cross-polarized) scattered response is used here as this gives improved discrimination between the early and late time responses. Determination of the presence or absence of particular weapons concealed under clothing, on the human body, is demonstrated. A novel bow-tie slot antenna is described which has good pulse and frequency response over the range 0.3-1 GHz and which is suitable for excitation of the fundamental natural resonances.

  2. 42 CFR 436.531 - Determination of blindness.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 42 Public Health 4 2014-10-01 2014-10-01 false Determination of blindness. 436.531 Section 436.531... Requirements for Medicaid Eligibility Blindness § 436.531 Determination of blindness. In determining blindness... determine on behalf of the agency— (1) Whether the individual meets the definition of blindness; and...

  3. 42 CFR 436.531 - Determination of blindness.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 42 Public Health 4 2012-10-01 2012-10-01 false Determination of blindness. 436.531 Section 436.531... Requirements for Medicaid Eligibility Blindness § 436.531 Determination of blindness. In determining blindness... determine on behalf of the agency— (1) Whether the individual meets the definition of blindness; and...

  4. 42 CFR 436.531 - Determination of blindness.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 42 Public Health 4 2013-10-01 2013-10-01 false Determination of blindness. 436.531 Section 436.531... Requirements for Medicaid Eligibility Blindness § 436.531 Determination of blindness. In determining blindness... determine on behalf of the agency— (1) Whether the individual meets the definition of blindness; and...

  5. Difference Blindness/Blindness Difference: Student Explorations of "Disability" over the Internet.

    ERIC Educational Resources Information Center

    Murphy, Kelly; And Others

    This case study describes the Internet correspondence using MOO, a multiuser, object-oriented site, that was developed between six third-grade girls and TCC, an adult with blindness. The changes from the students' original attitudes toward blindness, that blindness posed a barrier to communication and relationship-building, into their acceptance…

  6. Astronomy with the color blind

    NASA Astrophysics Data System (ADS)

    Smith, Donald A.; Melrose, Justyn

    2014-12-01

    The standard method to create dramatic color images in astrophotography is to record multiple black and white images, each with a different color filter in the optical path, and then tint each frame with a color appropriate to the corresponding filter. When combined, the resulting image conveys information about the sources of emission in the field, although one should be cautious in assuming that such an image shows what the subject would "really look like" if a person could see it without the aid of a telescope. The details of how the eye processes light have a significant impact on how such images should be understood, and the step from perception to interpretation is even more problematic when the viewer is color blind. We report here on an approach to manipulating stacked tricolor images that, while abandoning attempts to portray the color distribution "realistically," do result in enabling those suffering from deuteranomaly (the most common form of color blindness) to perceive color distinctions they would otherwise not be able to see.

  7. 7 CFR 1780.18 - Allocation of program funds.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... amounts held in reserve or distributed by base or administrative allocation times the basic State factor... available for allocation−NO reserve−total base and administrative allocations) × SF. (4) Transition formula... program section. (5) Base allocation. An amount that may be allocated to each State dependent upon...

  8. 49 CFR 198.13 - Grant allocation formula.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Grant allocation formula. 198.13 Section 198.13... PIPELINE SAFETY PROGRAMS Grant Allocation § 198.13 Grant allocation formula. (a) Beginning in calendar year... state agency comments on any proposed changes to the allocation formula. (f) Grants are limited to...

  9. 49 CFR 198.13 - Grant allocation formula.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 3 2011-10-01 2011-10-01 false Grant allocation formula. 198.13 Section 198.13... PIPELINE SAFETY PROGRAMS Grant Allocation § 198.13 Grant allocation formula. (a) Beginning in calendar year... state agency comments on any proposed changes to the allocation formula. (f) Grants are limited to...

  10. 49 CFR 198.13 - Grant allocation formula.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 3 2012-10-01 2012-10-01 false Grant allocation formula. 198.13 Section 198.13... PIPELINE SAFETY PROGRAMS Grant Allocation § 198.13 Grant allocation formula. (a) Beginning in calendar year... state agency comments on any proposed changes to the allocation formula. (f) Grants are limited to...

  11. 49 CFR 198.13 - Grant allocation formula.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 3 2013-10-01 2013-10-01 false Grant allocation formula. 198.13 Section 198.13... PIPELINE SAFETY PROGRAMS Grant Allocation § 198.13 Grant allocation formula. (a) Beginning in calendar year... state agency comments on any proposed changes to the allocation formula. (f) Grants are limited to...

  12. 49 CFR 198.13 - Grant allocation formula.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 3 2014-10-01 2014-10-01 false Grant allocation formula. 198.13 Section 198.13... PIPELINE SAFETY PROGRAMS Grant Allocation § 198.13 Grant allocation formula. (a) Beginning in calendar year... state agency comments on any proposed changes to the allocation formula. (f) Grants are limited to...

  13. 47 CFR 2.106 - Table of Frequency Allocations.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 1 2013-10-01 2013-10-01 false Table of Frequency Allocations. 2.106 Section 2.106 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL FREQUENCY ALLOCATIONS AND RADIO TREATY MATTERS; GENERAL RULES AND REGULATIONS Allocation, Assignment, and Use of Radio Frequencies § 2.106 Table of Frequency Allocations. Editorial...

  14. 47 CFR 2.106 - Table of Frequency Allocations.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 1 2014-10-01 2014-10-01 false Table of Frequency Allocations. 2.106 Section 2.106 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL FREQUENCY ALLOCATIONS AND RADIO TREATY MATTERS; GENERAL RULES AND REGULATIONS Allocation, Assignment, and Use of Radio Frequencies § 2.106 Table of Frequency Allocations. Link to...

  15. 47 CFR 2.106 - Table of Frequency Allocations.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 1 2012-10-01 2012-10-01 false Table of Frequency Allocations. 2.106 Section 2.106 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL FREQUENCY ALLOCATIONS AND RADIO TREATY MATTERS; GENERAL RULES AND REGULATIONS Allocation, Assignment, and Use of Radio Frequencies § 2.106 Table of Frequency Allocations. Editorial...

  16. 12 CFR 28.52 - Allocated transfer risk reserve.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Allocated transfer risk reserve. 28.52 Section... ACTIVITIES International Lending Supervision § 28.52 Allocated transfer risk reserve. (a) Establishment of allocated transfer risk reserve. A banking institution shall establish an allocated transfer risk...

  17. 26 CFR 1.141-6 - Allocation and accounting rules.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 26 Internal Revenue 2 2012-04-01 2012-04-01 false Allocation and accounting rules. 1.141-6 Section... Allocation and accounting rules. (a) Allocation of proceeds to expenditures. For purposes of §§ 1.141-1.... Thus, allocations generally may be made using any reasonable, consistently applied accounting...

  18. 26 CFR 1.141-6 - Allocation and accounting rules.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 26 Internal Revenue 2 2014-04-01 2014-04-01 false Allocation and accounting rules. 1.141-6 Section... Allocation and accounting rules. (a) Allocation of proceeds to expenditures. For purposes of §§ 1.141-1.... Thus, allocations generally may be made using any reasonable, consistently applied accounting...

  19. 26 CFR 1.141-6 - Allocation and accounting rules.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 26 Internal Revenue 2 2013-04-01 2013-04-01 false Allocation and accounting rules. 1.141-6 Section... Allocation and accounting rules. (a) Allocation of proceeds to expenditures. For purposes of §§ 1.141-1.... Thus, allocations generally may be made using any reasonable, consistently applied accounting...

  20. 12 CFR 28.52 - Allocated transfer risk reserve.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Allocated transfer risk reserve. 28.52 Section... ACTIVITIES International Lending Supervision § 28.52 Allocated transfer risk reserve. (a) Establishment of allocated transfer risk reserve. A banking institution shall establish an allocated transfer risk...