Science.gov

Sample records for allocation concealment blinding

  1. Quality assessment of reporting of randomization, allocation concealment, and blinding in traditional chinese medicine RCTs: A review of 3159 RCTs identified from 260 systematic reviews

    PubMed Central

    2011-01-01

    Background Randomized controlled trials (RCTs) which are of poor quality tend to exaggerate the effect estimate and lead to wrong or misleading conclusions. The aim of this study is to assess the quality of randomization methods, allocation concealment and blinding within traditional Chinese medicine (TCM) RCTs, discuss issues identified for current TCM RCTs, and provide suggestions for quality improvement. Methods We searched Chinese Biomedical Database (CBM, 1978 to July 31, 2009) and the Cochrane Library (Issue 2, 2009) to collect TCM systematic reviews and meta-analyses according to inclusion/exclusion criteria, from which RCTs could be identified. The quality assessment involved whether the randomization methods, allocation concealment and blinding were adequate or not based the study reported. Stratified analyses were conducted of different types of diseases published in different journals (both Chinese and foreign) using different interventions. SPSS 15.0 software was used for statistic analyses. Results A total of 3159 RCTs were included, of which 2580 were published in Chinese journals and 579 in foreign journals. There were 381 (12%) RCTs which used adequate randomization methods; 207 (7%) RCTs which used adequate allocation concealment and 601 (19%) which used adequate blinding; there were 130 (4%) RCTs which both used adequate randomization methods and allocation concealment; and there were only 100 (3%) RCTs which used adequate randomization methods, allocation concealment, as well as blinding. In the RCTs published in foreign journals, the adequate randomization methods, allocation concealment and blinding accounted for a relatively large proportion (25%, 26%, and 60%, respectively) and increased with years, while in the RCTs published in Chinese journals, only the adequate randomization methods improved over time. The quality of non-drug intervention (chiefly acupuncture) RCTs was higher than that of drug intervention RCTs. In drug intervention, the

  2. Blindness

    MedlinePlus

    ... de los dientes Video: Getting an X-ray Blindness KidsHealth > For Kids > Blindness Print A A A ... help, are sometimes called "legally blind." What Causes Blindness? Vision problems can develop before a baby is ...

  3. Blindness

    MedlinePlus

    ... Emergency Room? What Happens in the Operating Room? Blindness KidsHealth > For Kids > Blindness A A A What's ... help, are sometimes called "legally blind." What Causes Blindness? Vision problems can develop before a baby is ...

  4. Some effects of stimulant medication on response allocation: a double-blind analysis.

    PubMed

    Kelley, Michael E; Fisher, Wayne W; Lomas, Joanna E; Sanders, Roy Q

    2006-01-01

    Children who are diagnosed with attention deficit hyperactivity disorder (or who engage in behavior consistent with such a diagnosis) are often prescribed stimulant medications for hyperactive or inattentive behaviors. However, the mechanisms by which stimulant medications affect individuals' behavior are rarely evaluated. The purpose of the current study was to evaluate the effects of stimulant medication on response allocation when antecedents and consequences were held constant and equated. Results indicated that the presence of an amphetamine medication (Adderall) influenced response allocation across two concurrently available responses while all other stimulus conditions were held constant.

  5. Concealed wire tracing apparatus

    DOEpatents

    Kronberg, James W.

    1994-01-01

    An apparatus and method that combines a signal generator and a passive signal receiver to detect and record the path of partially or completely concealed electrical wiring without disturbing the concealing surface. The signal generator applies a series of electrical pulses to the selected wiring of interest. The applied pulses create a magnetic field about the wiring that can be detected by a coil contained within the signal receiver. An audible output connected to the receiver and driven by the coil reflects the receivers position with respect to the wiring. The receivers audible signal is strongest when the receiver is directly above the wiring and the long axis of the receivers coil is parallel to the wiring. A marking means is mounted on the receiver to mark the location of the wiring as the receiver is directed over the wiring's concealing surface. Numerous marks made on various locations of the concealing surface will trace the path of the wiring of interest.

  6. Authenticating concealed private data while maintaining concealment

    DOEpatents

    Thomas, Edward V.; Draelos, Timothy J.

    2007-06-26

    A method of and system for authenticating concealed and statistically varying multi-dimensional data comprising: acquiring an initial measurement of an item, wherein the initial measurement is subject to measurement error; applying a transformation to the initial measurement to generate reference template data; acquiring a subsequent measurement of an item, wherein the subsequent measurement is subject to measurement error; applying the transformation to the subsequent measurement; and calculating a Euclidean distance metric between the transformed measurements; wherein the calculated Euclidean distance metric is identical to a Euclidean distance metric between the measurement prior to transformation.

  7. Concealing with Structured Light

    PubMed Central

    Sun, Jingbo; Zeng, Jinwei; Wang, Xi; Cartwright, Alexander N.; Litchinitser, Natalia M.

    2014-01-01

    While making objects less visible (or invisible) to a human eye or a radar has captured people's imagination for centuries, current attempts towards realization of this long-awaited functionality range from various stealth technologies to recently proposed cloaking devices. A majority of proposed approaches share a number of common deficiencies such as design complexity, polarization effects, bandwidth, losses and the physical size or shape requirement complicating their implementation especially at optical frequencies. Here we demonstrate an alternative way to conceal macroscopic objects by structuring light itself. In our approach, the incident light is transformed into an optical vortex with a dark core that can be used to conceal macroscopic objects. Once such a beam passed around the object it is transformed back into its initial Gaussian shape with minimum amplitude and phase distortions. Therefore, we propose to use that dark core of the vortex beam to conceal an object that is macroscopic yet small enough to fit the dark (negligibly low intensity) region of the beam. The proposed concealing approach is polarization independent, easy to fabricate, lossless, operates at wavelengths ranging from 560 to 700 nm, and can be used to hide macroscopic objects providing they are smaller than vortex core. PMID:24522638

  8. Concealed wire tracing apparatus

    DOEpatents

    Kronberg, J.W.

    1994-05-31

    An apparatus and method that combines a signal generator and a passive signal receiver to detect and record the path of partially or completely concealed electrical wiring without disturbing the concealing surface is disclosed. The signal generator applies a series of electrical pulses to the selected wiring of interest. The applied pulses create a magnetic field about the wiring that can be detected by a coil contained within the signal receiver. An audible output connected to the receiver and driven by the coil reflects the receivers position with respect to the wiring. The receivers audible signal is strongest when the receiver is directly above the wiring and the long axis of the receivers coil is parallel to the wiring. A marking means is mounted on the receiver to mark the location of the wiring as the receiver is directed over the wiring's concealing surface. Numerous marks made on various locations of the concealing surface will trace the path of the wiring of interest. 4 figs.

  9. Identifying concealment-related responses in the concealed information test.

    PubMed

    Matsuda, Izumi; Nittono, Hiroshi; Ogawa, Tokihiro

    2013-07-01

    The concealed information test (CIT) assesses an examinee's recognition of a crime-relevant item using physiological measures. However, a guilty examinee not only recognizes the crime-relevant item but also conceals the recognition intentionally. In this study, we attempted to identify the effect of concealing the recognition on event-related potentials and autonomic responses. After committing a mock theft of two items, 30 participants received two CITs: one for an item that they had to conceal, and the other for an item that they had disclosed. N2, P3, heart rate, skin conductance, and cutaneous blood flow differed between crime-relevant and irrelevant items in both CITs. In contrast, late positive potential and respiration differed between crime-relevant and irrelevant items only when the examinee needed to conceal. The former measures appear to be related to orienting process, whereas the latter to controlled process related to concealment.

  10. Detection of a concealed object

    DOEpatents

    Keller, Paul E.; Hall, Thomas E.; McMakin, Douglas L.

    2008-04-29

    Disclosed are systems, methods, devices, and apparatus to determine if a clothed individual is carrying a suspicious, concealed object. This determination includes establishing data corresponding to an image of the individual through interrogation with electromagnetic radiation in the 200 MHz to 1 THz range. In one form, image data corresponding to intensity of reflected radiation and differential depth of the reflecting surface is received and processed to detect the suspicious, concealed object.

  11. Detection of a concealed object

    DOEpatents

    Keller, Paul E [Richland, WA; Hall, Thomas E [Kennewick, WA; McMakin, Douglas L [Richland, WA

    2010-11-16

    Disclosed are systems, methods, devices, and apparatus to determine if a clothed individual is carrying a suspicious, concealed object. This determination includes establishing data corresponding to an image of the individual through interrogation with electromagnetic radiation in the 200 MHz to 1 THz range. In one form, image data corresponding to intensity of reflected radiation and differential depth of the reflecting surface is received and processed to detect the suspicious, concealed object.

  12. Handheld ultrasonic concealed weapon detector

    NASA Astrophysics Data System (ADS)

    Wilde, Norbert; Niederhaus, Steve; Lam, Hon; Lum, Chris

    2002-08-01

    A handheld, battery-operated prototype of a concealed weapon detector (CWD) has been built and tested. Designed to detect both metallic and non-metallic weapons, the sensor utilizes focused ultrasound (40 kHz frequency) to remotely detect concealed objects from beyond arm's length out to a range of about 25 feet (8 meters). Applications include weapon detection in prison settings, by officers in the field for stand-off frisking of suspects, and as supplemental security at courthouse entrances and other monitored portals. The detector emits an adjustable, audible alarm (with provision for an earphone jack) as well as a visible light-bar indicator when an object has been detected. An aiming light, with momentary switch, allows the user to accurately determine the location of the concealed object. A presentation of the detector's capabilities and limitations will be presented along with probability of detection (PD) data obtained using the latest prototype version.

  13. Handheld Concealed Weapons Detector Development

    DTIC Science & Technology

    2003-03-01

    Enforcement, Edward M. Carapezza, Donald Spector, Eds., Proc. SPIE 2938, 110 - 119 (1997). 3. Franklin Felber, Norbert Wild, Scott Nunan , Dennis Breuner... Nunan , D. Breuner, and F. Doft, "Handheld Ultrasound Concealed-Weapons Detector," in Enforcement and Security Technologies, A. Trent DePersia, J. J

  14. Standoff detection of concealed handguns

    NASA Astrophysics Data System (ADS)

    Rezgui, Nacer; Andrews, David; Bowring, Nicholas; Harmer, Stuart; Southgate, Matthew

    2008-04-01

    An active technique for the standoff detection and identification of concealed conducting items such as handguns and knives is presented. This technique entails illuminating an object with wide range stepped millimetre wave radiation and inducing a local electromagnetic field comprised of a superposition of modes. The coupling to these modes from the illuminating and scattered fields is, in general, frequency dependent and this forms the basis for the detection and identification of conducting items. The object needs to be fully illuminated if a full spectrum of modes and therefore a full frequency response are to be excited and collected. The scattered EM power is measured at "stand off" distance of several metres as the illuminating field is frequency swept and patterns in frequency response characteristic to the target item being sought are looked for. This system relies on contributions from the aspect independent late time responses employed by Baum1 together with aspect independent information derived specifically from gun barrels and polarisation from scattering effects. This technique is suitable for a deployable gun and concealed weapons detection system and does not rely on imaging techniques for determining the presence of a gun. Experimental sets of responses from typical metal or partially conducting objects such as keys, mobile phones and concealed handguns are presented at a range of frequencies.

  15. Handheld ultrasonic concealed weapon detector

    NASA Astrophysics Data System (ADS)

    Wild, Norbert C.; Doft, Frank; Breuner, Dennis; Felber, Franklin S.

    2001-02-01

    A handheld, battery-operated prototype of a concealed weapon detector has been built and tested. Designed to detect both metallic and non-metallic weapons, the sensor utilizes focused ultrasound (40 kHz frequency) to remotely detect concealed objects from beyond arm's length out to a range of about 12 feet (4 meters). The detector can be used in prison settings, by officers in the field to allow for stand-off frisking of suspects, and to supplement security at courthouse entrances and other monitored portals. The detector emits an audible alarm (with provision for an earphone jack) as well as a visible light-bar indicator when an object is detected. A high intensity aiming light, with momentary switch, allows the user to accurately determine the location of the concealed object. Current efforts are aimed at increasing the probability of detection, reducing the false-alarm rate, and extending the range of detectability out to 20 feet. Plans for accomplishing these tasks will be presented together with data showing the effective range and probability of detection for the present system.

  16. Method for imaging a concealed object

    DOEpatents

    Davidson, James R [Idaho Falls, ID; Partin, Judy K [Idaho Falls, ID; Sawyers, Robert J [Idaho Falls, ID

    2007-07-03

    A method for imaging a concealed object is described and which includes a step of providing a heat radiating body, and wherein an object to be detected is concealed on the heat radiating body; imaging the heat radiating body to provide a visibly discernible infrared image of the heat radiating body; and determining if the visibly discernible infrared image of the heat radiating body is masked by the presence of the concealed object.

  17. ISAR for concealed objects imaging

    NASA Astrophysics Data System (ADS)

    Zhuravlev, A.; Razevig, V.; Vasiliev, I.; Ivashov, S.; Voronin, V.

    2015-03-01

    A new promising architecture of microwave personnel screening system is analyzed in this paper with numerical simulations. This architecture is based on the concept of inverse aperture synthesis applied to a naturally moving person. The extent of the synthetic aperture is formed by a stationary vertical linear antenna array and by a length of subject's trajectory as he moves in the vicinity of this antenna array. The coherent radar signal processing is achieved by a synchronous 3D video-sensor whose data are used to track the subject. The advantages of the proposed system architecture over currently existing systems are analyzed. Synthesized radar images are obtained by numerical simulations with a human torso model with concealed objects. Various aspects of the system architecture are considered, including: advantages of using sparse antenna arrays to decrease the number of antenna elements, the influence of positioning errors of body surface due to outer clothing. It was shown that detailed radar images of concealed objects can be obtained with a narrow-band signal due to the depth information available from the 3D video sensor. The considered ISAR architecture is considered perspective to be used on infrastructure objects owing to its superior qualities: highest throughput, small footprint, simple design of the radar sub-system, non-required co-operation of the subject.

  18. [Advances in the studies of concealed penis].

    PubMed

    Fan, Sheng-hai; Li, Xue-de

    2015-09-01

    Concealed penis is usually found in children, which affects the patients both physiologically and psychologically. Some of the patients are wrongly treated by circumcision, which may bring about serious consequences to the sexual life of the patients in their adulthood. In the recent years, this disease has been receiving more and more attention from both doctors and parents. However, controversies remain as to its classification, pathogenesis, pathology, and treatment. This paper focuses on the understanding and advances in the studies of concealed penis.

  19. Blindness - resources

    MedlinePlus

    Resources - blindness ... The following organizations are good resources for information on blindness : American Foundation for the Blind -- www.afb.org Foundation Fighting Blindness -- www.blindness.org National Eye Institute -- ...

  20. Detecting concealed objects at a checkpoint

    DOEpatents

    McMakin, Douglas L.; Hall, Thomas E.; Sheen, David M.; Severtsen, Ronald H.

    2008-07-29

    Disclosed are systems, methods, devices, and apparatus to interrogate a clothed individual with electromagnetic radiation to determine if a concealed object is being carried. This determination includes establishing data corresponding to an image of the individual with a pair of opposed, semi-cylindrical array panels each configured to interrogate the individual with electromagnetic radiation in the 200 MHz to 1 THz range.

  1. Concealment of Child Sexual Abuse in Sports

    ERIC Educational Resources Information Center

    Hartill, Mike

    2013-01-01

    When the sexual abuse of children is revealed, it is often found that other nonabusing adults were aware of the abuse but failed to act. During the past twenty years or so, the concealment of child sexual abuse (CSA) within organizations has emerged as a key challenge for child protection work. Recent events at Pennsylvania State University (PSU)…

  2. Concealed Questions. In Search of Answers

    ERIC Educational Resources Information Center

    Frana, Ilaria

    2010-01-01

    This dissertation examines the semantic interpretation of various types of DPs in so-called concealed-question (CQ) constructions, as "Bill's phone number" in the sentence "John knows Bill's phone number". The peculiar characteristic of DP-CQs is that they are interpreted as having the meaning of an embedded question. So, for instance, the…

  3. Paraclinoid aneurysm concealed by sphenoid wing meningioma.

    PubMed

    Petrecca, Kevin; Sirhan, Denis

    2009-02-01

    The coexistence of brain tumours and aneurysms is rare. In all previously reported cases the aneurysm was detectable by angiography. We report here a case in which a paraclinoid internal carotid artery aneurysm was coexistent and concealed from angiographic detection by an adjacent parasellar meningioma.

  4. Automated Human Screening for Detecting Concealed Knowledge

    ERIC Educational Resources Information Center

    Twyman, Nathan W.

    2012-01-01

    Screening individuals for concealed knowledge has traditionally been the purview of professional interrogators investigating a crime. But the ability to detect when a person is hiding important information would be of high value to many other fields and functions. This dissertation proposes design principles for and reports on an implementation…

  5. Student Attitudes Toward Concealed Handguns on Campus at 2 Universities

    PubMed Central

    Bouffard, Jeffrey A.; Wells, William; Nobles, Matt R.

    2012-01-01

    We examined student support for a policy that would allow carrying of concealed handguns on university campuses. Large percentages of students at 2 universities expressed very low levels of comfort with the idea of permitting concealed handgun carrying on campus, suggesting that students may not welcome less restrictive policies. Students held slightly different opinions about concealed handguns on and off campus, suggesting that they view the campus environment as unique with respect to concealed handgun carrying. PMID:22720763

  6. Student attitudes toward concealed handguns on campus at 2 universities.

    PubMed

    Cavanaugh, Michael R; Bouffard, Jeffrey A; Wells, William; Nobles, Matt R

    2012-12-01

    We examined student support for a policy that would allow carrying of concealed handguns on university campuses. Large percentages of students at 2 universities expressed very low levels of comfort with the idea of permitting concealed handgun carrying on campus, suggesting that students may not welcome less restrictive policies. Students held slightly different opinions about concealed handguns on and off campus, suggesting that they view the campus environment as unique with respect to concealed handgun carrying.

  7. 25 CFR 11.444 - Carrying concealed weapons.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 25 Indians 1 2014-04-01 2014-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor...

  8. 25 CFR 11.444 - Carrying concealed weapons.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor...

  9. 25 CFR 11.444 - Carrying concealed weapons.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 25 Indians 1 2012-04-01 2011-04-01 true Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor...

  10. 25 CFR 11.444 - Carrying concealed weapons.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 25 Indians 1 2013-04-01 2013-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor...

  11. 25 CFR 11.444 - Carrying concealed weapons.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 25 Indians 1 2011-04-01 2011-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor...

  12. Characteristics of women who deny or conceal pregnancy.

    PubMed

    Friedman, Susan Hatters; Heneghan, Amy; Rosenthal, Miriam

    2007-01-01

    In order to assess characteristics of women with denial or concealment of pregnancy until delivery, the authors conducted a retrospective study of women with no history of prenatal care who presented to their institution for delivery or immediately postpartum. Among these women, 29% had denied pregnancy, and 9% had concealed pregnancy. Authors constructed models predicting denial or concealment of pregnancy and further elucidated subtypes of denial and concealment of pregnancy. Strikingly, psychiatric consultation was rare for women who had denied or concealed their pregnancies, and yet they would often subsequently take responsibility for their infants.

  13. Passive millimeter-wave concealed weapon detection

    NASA Astrophysics Data System (ADS)

    Sinclair, Gordon N.; Anderton, Rupert N.; Appleby, Roger

    2001-02-01

    A method of detecting weapons concealed under clothing using passive millimeter wave imaging is described. The optical properties of clothing are discussed and examples given of the spectral reflectivity and transmission. The transmission tends to be constant from 60 to 150 GHz above which it decreases for some clothing materials. The transmission of a cotton T-shirt is typically 95% and of a leather jacket up to 85% at lower frequencies. A model is presented for calculating the contrast of a metallic concealed weapon when hidden under clothing and it indicates contrasts as large as 200 K can be realized outdoors. The advantages of real time over static frame imagery are discussed. It is concluded that real time imagery offers considerable advantages as weapons can be very varied in size, position and orientation and movement offers vital clues to the human observer which aid the recognition process.

  14. Induction detection of concealed bulk banknotes

    NASA Astrophysics Data System (ADS)

    Fuller, Christopher; Chen, Antao

    2012-06-01

    The smuggling of bulk cash across borders is a serious issue that has increased in recent years. In an effort to curb the illegal transport of large numbers of paper bills, a detection scheme has been developed, based on the magnetic characteristics of bank notes. The results show that volumes of paper currency can be detected through common concealing materials such as plastics, cardboard, and fabrics making it a possible potential addition to border security methods. The detection scheme holds the potential of also reducing or eliminating false positives caused by metallic materials found in the vicinity, by observing the stark difference in received signals caused by metal and currency. The detection scheme holds the potential to detect for both the presence and number of concealed bulk notes, while maintaining the ability to reduce false positives caused by metal objects.

  15. Medical makeup for concealing facial scars.

    PubMed

    Mee, Donna; Wong, Brian J F

    2012-10-01

    Surgical, laser, and pharmacological therapies are all used to correct scars and surgical incisions, though have limits with respect to how well facial skin can be restored or enhanced. The use of cosmetics has long been a relevant adjunct to all scar treatment modalities. In recent years, technical advancements in the chemistry and composition of cosmetic products have provided the patient with a broader range of products to employ for concealing scars. This review will provide an overview of contemporary methods for concealing facial scars, birthmarks, and pigmentary changes without the use of traditional/dated, heavy appearing camouflage products. Additionally, general guidelines and information will be provided with respect to identifying competent makeup artists for care of the medical patient. The article by no means is meant to be a tutorial, but rather serves as a starting point in this allied field of medicine.

  16. Concealed evaporite basin drilled in Arizona

    SciTech Connect

    Rauzi, S.L.

    1996-10-21

    The White Mountains of Arizona are a high forested plateau underlain by volcanic rocks of Late Pliocene and Quaternary age on the south margin of the Colorado plateau province. Elevations range from 6,000--11,590 ft, with winter snow and summer rain but ideal conditions for much of the year. There was no evidence of a Permian evaporite basin concealed beneath the White Mountain volcanic field until 1993, when the Tonto 1 Alpine-Federal, a geothermal test well, was drilled. This test did not encounter thermal waters, but it did encounter a surprisingly thick and unexpected sequence of anhydrite, dolomite, and petroliferous limestone assigned to the Supai (Yeso) formation of Permian age. The Tonto test was continuously cored through the Permian section, providing invaluable information that is now stored at the Arizona Geological Survey in Tucson. The paper describes the area geology and the concealed basin.

  17. Concealed weapons detection using electromagnetic resonances

    NASA Astrophysics Data System (ADS)

    Hunt, Allen R.; Hogg, R. Douglas; Foreman, William

    1998-12-01

    Concealed weapons pose a significant threat to both law enforcement and security agency personnel. The uncontrolled environments associated with peacekeeping and the move toward relaxation of concealed weapons laws here in the U.S. provide a strong motivation for developing weapons detection technologies which are noninvasive and can function noncooperatively. Existing weapons detection systems are primarily oriented to detecting metal and require the cooperation of the person being searched. The new generation of detectors under development that focuses primarily on imaging methods, faces problems associated with privacy issues. There remains a need for a weapons detector which is portable, detects weapons remotely, avoids the issues associated with privacy rights, can tell the difference between car keys and a knife, and is affordable enough that one can be issued to every peacekeeper and law enforcement officer. AKELA is developing a concealed weapons detector that uses wideband radar techniques to excite natural electromagnetic resonances that characterize the size, shape, and material composition of an object. Neural network processing is used to classify the difference between weapons and nuisance objects. We have constructed both time and frequency domain test systems and used them to gather experimental data on a variety of armed and unarmed individuals. These experiments have been performed in an environment similar to the operational environment. Preliminary results from these experiments show that it is possible to detect a weapon being carried by an individual from a distance of 10 to 15 feet, and to detect a weapon being concealed behind the back. The power required is about 100 milliwatts. A breadboard system is being fabricated and will be used by AKELA and our law enforcement partner to gather data in operationally realistic situations. While a laptop computer will control the breadboard system, the wideband radar electronics will fit in a box the

  18. Imaging sensor fusion for concealed weapon detection

    NASA Astrophysics Data System (ADS)

    Currie, Nicholas C.; Demma, Fred J.; Ferris, David D., Jr.; McMillan, Robert W.; Wicks, Michael C.; Zyga, Kathleen

    1997-02-01

    Sensors are needed for concealed weapon detection which perform better with regard to weapon classification, identification, probability of detection and false alarm rate than the magnetic sensors commonly used in airports. We have concluded that no single sensor will meet the requirements for a reliable concealed weapon detector and thus that sensor fusion is required to optimize detection probability and false alarm rate by combining sensor outputs in a synergistic fashion. This paper describes microwave, millimeter wave, far infrared, infrared, x-ray, acoustic, and magnetic sensors which have some promise in the field of concealed weapon detection. The strengths and weaknesses of these devices are discussed, and examples of the outputs of most of them are given. Various approaches to fusion of these sensors are also described, from simple cuing of one sensor by another to improvement of image quality by using multiple systems. It is further concluded that none of the sensors described herein will ever replace entirely the airport metal detector, but that many of them meet needs imposed by applications requiring a higher detection probability and lower false alarm rate.

  19. Embedded wavelet video coding with error concealment

    NASA Astrophysics Data System (ADS)

    Chang, Pao-Chi; Chen, Hsiao-Ching; Lu, Ta-Te

    2000-04-01

    We present an error-concealed embedded wavelet (ECEW) video coding system for transmission over Internet or wireless networks. This system consists of two types of frames: intra (I) frames and inter, or predicted (P), frames. Inter frames are constructed by the residual frames formed by variable block-size multiresolution motion estimation (MRME). Motion vectors are compressed by arithmetic coding. The image data of intra frames and residual frames are coded by error-resilient embedded zerotree wavelet (ER-EZW) coding. The ER-EZW coding partitions the wavelet coefficients into several groups and each group is coded independently. Therefore, the error propagation effect resulting from an error is only confined in a group. In EZW coding any single error may result in a totally undecodable bitstream. To further reduce the error damage, we use the error concealment at the decoding end. In intra frames, the erroneous wavelet coefficients are replaced by neighbors. In inter frames, erroneous blocks of wavelet coefficients are replaced by data from the previous frame. Simulations show that the performance of ECEW is superior to ECEW without error concealment by 7 to approximately 8 dB at the error-rate of 10-3 in intra frames. The improvement still has 2 to approximately 3 dB at a higher error-rate of 10-2 in inter frames.

  20. Detecting persons concealed in a vehicle

    DOEpatents

    Tucker, Jr., Raymond W.

    2005-03-29

    An improved method for detecting the presence of humans or animals concealed within in a vehicle uses a combination of the continuous wavelet transform and a ratio-based energy calculation to determine whether the motion detected using seismic sensors placed on the vehicle is due to the presence of a heartbeat within the vehicle or is the result of motion caused by external factors such as the wind. The method performs well in the presence of light to moderate ambient wind levels, producing far fewer false alarm indications. The new method significantly improves the range of ambient environmental conditions under which human presence detection systems can reliably operate.

  1. Induction detection of concealed bulk banknotes

    NASA Astrophysics Data System (ADS)

    Fuller, Christopher; Chen, Antao

    2011-10-01

    Bulk cash smuggling is a serious issue that has grown in volume in recent years. By building on the magnetic characteristics of paper currency, induction sensing is found to be capable of quickly detecting large masses of banknotes. The results show that this method is effective in detecting bulk cash through concealing materials such as plastics, cardboards, fabrics and aluminum foil. The significant difference in the observed phase between the received signals caused by conducting materials and ferrite compounds, found in banknotes, provides a good indication that this process can overcome the interference by metal objects in a real sensing application. This identification strategy has the potential to not only detect the presence of banknotes, but also the number, while still eliminating false positives caused by metal objects.

  2. Color image fusion for concealed weapon detection

    NASA Astrophysics Data System (ADS)

    Toet, Alexander

    2003-09-01

    Recent advances in passive and active imaging sensor technology offer the potential to detect weapons that are concealed underneath a person's clothing or carried along in bags. Although the concealed weapons can sometimes easily be detected, it can be difficult to perceive their context, due to the non-literal nature of these images. Especially for dynamic crowd surveillance purposes it may be impossible to rapidly asses with certainty which individual in the crowd is the one carrying the observed weapon. Sensor fusion is an enabling technology that may be used to solve this problem. Through fusion the signal of the sensor that depicts the weapon can be displayed in the context provided by a sensor of a different modality. We propose an image fusion scheme in which non-literal imagery can be fused with standard color images such that the result clearly displays the observed weapons in the context of the original color image. The procedure is such that the relevant contrast details from the non-literal image are transferred to the color image without altering the original color distribution of this image. The result is a natural looking color image that fluently combines all details from both input sources. When an observer who performs a dynamic crowd surveillance task, detects a weapon in the scene, he will also be able to quickly determine which person in the crowd is actually carrying the observed weapon (e.g. "the man with the red T-shirt and blue jeans"). The method is illustrated by the fusion of thermal 8-12 μm imagery with standard RGB color images.

  3. Concealed semantic and episodic autobiographical memory electrified

    PubMed Central

    Ganis, Giorgio; Schendan, Haline E.

    2013-01-01

    Electrophysiology-based concealed information tests (CIT) try to determine whether somebody possesses concealed information about a crime-related item (probe) by comparing event-related potentials (ERPs) between this item and comparison items (irrelevants). Although the broader field is sometimes referred to as “memory detection,” little attention has been paid to the precise type of underlying memory involved. This study begins addressing this issue by examining the key distinction between semantic and episodic memory in the autobiographical domain within a CIT paradigm. This study also addresses the issue of whether multiple repetitions of the items over the course of the session habituate the brain responses. Participants were tested in a 3-stimulus CIT with semantic autobiographical probes (their own date of birth) and episodic autobiographical probes (a secret date learned just before the study). Results dissociated these two memory conditions on several ERP components. Semantic probes elicited a smaller frontal N2 than episodic probes, consistent with the idea that the frontal N2 decreases with greater pre-existing knowledge about the item. Likewise, semantic probes elicited a smaller central N400 than episodic probes. Semantic probes also elicited a larger P3b than episodic probes because of their richer meaning. In contrast, episodic probes elicited a larger late positive complex (LPC) than semantic probes, because of the recent episodic memory associated with them. All these ERPs showed a difference between probes and irrelevants in both memory conditions, except for the N400, which showed a difference only in the semantic condition. Finally, although repetition affected the ERPs, it did not reduce the difference between probes and irrelevants. These findings show that the type of memory associated with a probe has both theoretical and practical importance for CIT research. PMID:23355816

  4. Concealing their communication: exploring psychosocial predictors of young drivers' intentions and engagement in concealed texting.

    PubMed

    Gauld, Cassandra S; Lewis, Ioni; White, Katherine M

    2014-01-01

    Making a conscious effort to hide the fact that you are texting while driving (i.e., concealed texting) is a deliberate and risky behaviour involving attention diverted away from the road. As the most frequent users of text messaging services and mobile phones while driving, young people appear at heightened risk of crashing from engaging in this behaviour. This study investigated the phenomenon of concealed texting while driving, and utilised an extended Theory of Planned Behaviour (TPB) including the additional predictors of moral norm, mobile phone involvement, and anticipated regret to predict young drivers' intentions and subsequent behaviour. Participants (n=171) were aged 17-25 years, owned a mobile phone, and had a current driver's licence. Participants completed a questionnaire measuring their intention to conceal texting while driving, and a follow-up questionnaire a week later to report their behavioural engagement. The results of hierarchical multiple regression analyses showed overall support for the predictive utility of the TPB with the standard constructs accounting for 69% of variance in drivers' intentions, and the extended predictors contributing an additional 6% of variance in intentions over and above the standard constructs. Attitude, subjective norm, PBC, moral norm, and mobile phone involvement emerged as significant predictors of intentions; and intention was the only significant predictor of drivers' self-reported behaviour. These constructs can provide insight into key focal points for countermeasures including advertising and other public education strategies aimed at influencing young drivers to reconsider their engagement in this risky behaviour.

  5. Concealing Concealment: The Mediating Role of Internalized Heterosexism in Psychological Distress Among Lesbian, Gay, and Bisexual Older Adults.

    PubMed

    Hoy-Ellis, Charles P

    2016-01-01

    Recent population-based studies indicate that sexual minorities aged 50 and older experience significantly higher rates of psychological distress than their heterosexual age-peers. The minority stress model has been useful in explaining disparately high rates of psychological distress among younger sexual minorities. The purpose of this study is to test a hypothesized structural relationship between two minority stressors--internalized heterosexism and concealment of sexual orientation--and consequent psychological distress among a sample of 2,349 lesbian, gay, and bisexual adults aged 50 to 95 years old. Structural equation modeling indicates that concealment has a nonsignificant direct effect on psychological distress but a significant indirect effect that is mediated through internalized heterosexism; the effect of concealment is itself concealed. This may explain divergent results regarding the role of concealment in psychological distress in other studies, and the implications will be discussed.

  6. Concealing Concealment: The Mediating Role of Internalized Heterosexism in Psychological Distress Among Lesbian, Gay, and Bisexual Older Adults

    PubMed Central

    Hoy-Ellis, Charles P.

    2016-01-01

    Recent population-based studies indicate that sexual minorities aged 50 and older experience significantly higher rates of psychological distress than their heterosexual age-peers. The minority stress model has been useful in explaining disparately high rates of psychological distress among younger sexual minorities. The purpose of this study is to test a hypothesized structural relationship between two minority stressors—internalized heterosexism and concealment of sexual orientation—and consequent psychological distress among a sample of 2,349 lesbian, gay, and bisexual adults aged 50 to 95 years old. Structural equation modeling indicates that concealment has a nonsignificant direct effect on psychological distress but a significant indirect effect that is mediated through internalized heterosexism; the effect of concealment is itself concealed. This may explain divergent results regarding the role of concealment in psychological distress in other studies, and the implications will be discussed. PMID:26322654

  7. Concealed identification symbols and nondestructive determination of the identification symbols

    DOEpatents

    Nance, Thomas A.; Gibbs, Kenneth M.

    2014-09-16

    The concealing of one or more identification symbols into a target object and the subsequent determination or reading of such symbols through non-destructive testing is described. The symbols can be concealed in a manner so that they are not visible to the human eye and/or cannot be readily revealed to the human eye without damage or destruction of the target object. The identification symbols can be determined after concealment by e.g., the compilation of multiple X-ray images. As such, the present invention can also provide e.g., a deterrent to theft and the recovery of lost or stolen objects.

  8. Color blindness

    MedlinePlus

    ... have trouble telling the difference between red and green. This is the most common type of color ... color blindness often have problems seeing reds and greens, too. The most severe form of color blindness ...

  9. Blind Astronomers

    NASA Astrophysics Data System (ADS)

    Hockey, Thomas A.

    2011-01-01

    The phrase "blind astronomer” is used as an allegorical oxymoron. However, there were and are blind astronomers. What of famous blind astronomers? First, it must be stated that these astronomers were not martyrs to their craft. It is a myth that astronomers blind themselves by observing the Sun. As early as France's William of Saint-Cloud (circa 1290) astronomers knew that staring at the Sun was ill-advised and avoided it. Galileo Galilei did not invent the astronomical telescope and then proceed to blind himself with one. Galileo observed the Sun near sunrise and sunset or through projection. More than two decades later he became blind, as many septuagenarians do, unrelated to their profession. Even Isaac Newton temporarily blinded himself, staring at the reflection of the Sun when he was a twentysomething. But permanent Sun-induced blindness? No, it did not happen. For instance, it was a stroke that left Scotland's James Gregory (1638-1675) blind. (You will remember the Gregorian telescope.) However, he died days later. Thus, blindness little interfered with his occupation. English Abbot Richard of Wallingford (circa 1291 - circa 1335) wrote astronomical works and designed astronomical instruments. He was also blind in one eye. Yet as he further suffered from leprosy, his blindness seems the lesser of Richard's maladies. Perhaps the most famous professionally active, blind astronomer (or almost blind astronomer) is Dominique-Francois Arago (1786-1853), director until his death of the powerful nineteenth-century Paris Observatory. I will share other _ some poignant _ examples such as: William Campbell, whose blindness drove him to suicide; Leonhard Euler, astronomy's Beethoven, who did nearly half of his life's work while almost totally blind; and Edwin Frost, who "observed” a total solar eclipse while completely sightless.

  10. Approach trajectory planning system for maximum concealment

    NASA Technical Reports Server (NTRS)

    Warner, David N., Jr.

    1986-01-01

    A computer-simulation study was undertaken to investigate a maximum concealment guidance technique (pop-up maneuver), which military aircraft may use to capture a glide path from masked, low-altitude flight typical of terrain following/terrain avoidance flight enroute. The guidance system applied to this problem is the Fuel Conservative Guidance System. Previous studies using this system have concentrated on the saving of fuel in basically conventional land and ship-based operations. Because this system is based on energy-management concepts, it also has direct application to the pop-up approach which exploits aircraft performance. Although the algorithm was initially designed to reduce fuel consumption, the commanded deceleration is at its upper limit during the pop-up and, therefore, is a good approximation of a minimum-time solution. Using the model of a powered-lift aircraft, the results of the study demonstrated that guidance commands generated by the system are well within the capability of an automatic flight-control system. Results for several initial approach conditions are presented.

  11. An Ontology-Based Approach to Blind Spot Revelation in Critical Infrastructure Protection Planning

    NASA Astrophysics Data System (ADS)

    Blackwell, Joshua; Tolone, William J.; Lee, Seok-Won; Xiang, Wei-Ning; Marsh, Lydia

    One widely perceived yet poorly understood phenomenon in the practice of critical infrastructure protection is that of blind spots. These are certain aspects of the interrelationships among different critical infrastructure systems (CI systems) that could trigger catastrophe across CI systems but are concealed from planners, and discovered only in the aftermath of a crisis. In this paper, we discuss the sources of blind spots, and explore the feasibility of various techniques to help reveal blind spots.

  12. TDCS Guided using fMRI Significantly Accelerates Learning to Identify Concealed Objects

    PubMed Central

    Clark, Vincent P.; Coffman, Brian A.; Mayer, Andy R.; Weisend, Michael P.; Lane, Terran D.R.; Calhoun, Vince D.; Raybourn, Elaine M.; Garcia, Christopher M.; Wassermann, Eric M.

    2011-01-01

    The accurate identification of obscured and concealed objects in complex environments was an important skill required for survival during human evolution, and is required today for many forms of expertise. Here we used transcranial direct current stimulation (tDCS) guided using neuroimaging to increase learning rate in a novel, minimally guided discovery-learning paradigm. Ninety-six subjects identified threat-related objects concealed in naturalistic virtual surroundings used in real-world training. A variety of brain networks were found using fMRI data collected at different stages of learning, with two of these networks focused in right inferior frontal and right parietal cortex. Anodal 2.0 mA tDCS performed for 30 minutes over these regions in a series of single-blind, randomized studies resulted in significant improvements in learning and performance compared with 0.1 mA tDCS. This difference in performance increased to a factor of two after a one-hour delay. A dose-response effect of current strength on learning was also found. Taken together, these brain imaging and stimulation studies suggest that right frontal and parietal cortex are involved in learning to identify concealed objects in naturalistic surroundings. Furthermore, they suggest that the application of anodal tDCS over these regions can greatly increase learning, resulting in one of the largest effects on learning yet reported. The methods developed here may be useful to decrease the time required to attain expertise in a variety of settings. PMID:21094258

  13. [Concealed and simulated trauma fatalities(II)].

    PubMed

    Klotzbach, H; Püschel, K

    2001-12-01

    A careful investigation of fatal accidents is required due to the relevant financial consequences for the insured as well as for the insurance company. An evaluation of post-mortem cases handled by our institute from 1988 to 1998 showed that 16% of all fatal accidents were not initially classified as such; it was only possible to determine the cause by post-mortem and criminal investigation. The frequency of a relevant alcoholization varied with different types of accidents. Furthermore, of all fatal accidents, 3% were revealed to be deceptive. Those 42 cases in total, presenting themselves as fatal accidents at first glance, were later determined either to be natural deaths (n = 27), homicide (n = 11) or suicide (n = 4). In addition to this, autopsies showed 83 cases of death to be sequelae to accidents. Particularly in cases of a victim plunging out of the window or into water, it can be difficult to make the distinction between natural death--e.g. as a reason for falling--and suicide or homicide. Further difficulties can result from interpretations of the findings in cases of putrefaction, mauling by animals, defects caused by burning or severely deformed corpses. In these cases, the importance of patho-morphological findings from the autopsy must be emphasized. Indirect sequelae of accidents may be pulmonary embolism or pneumonia. The cause of death has to be classified as accidental if the chain of events is of traumatic origin. Mistakes can be avoided if the medical history is taken conscientiously. If no facts are available, the cause of death should be certificated as undetermined. Our evaluation only included autopsy cases from our institute. The concealed fatal accidents which were incorrectly certified as natural deaths or the cases dismissed by the police and the public prosecutor without performing an autopsy were not evaluated.

  14. Temporal spying and concealing process in fibre-optic data transmission systems through polarization bypass

    PubMed Central

    Bony, P.Y.; Guasoni, M.; Morin, P.; Sugny, D.; Picozzi, A.; Jauslin, H.R.; Pitois, S.; Fatome, J.

    2014-01-01

    Recent research has been focused on the ability to manipulate a light beam in such a way to hide, namely to cloak, an event over a finite time or localization in space. The main idea is to create a hole or a gap in the spatial or time domain so as to allow for an object or data to be kept hidden for a while and then to be restored. By enlarging the field of applications of this concept to telecommunications, researchers have recently reported the possibility to hide transmitted data in an optical fibre. Here we report the first experimental demonstration of perpetual temporal spying and blinding process of optical data in fibre-optic transmission line based on polarization bypass. We successfully characterize the performance of our system by alternatively copying and then concealing 100% of a 10-Gb s−1 transmitted signal. PMID:25135759

  15. [Cortical blindness].

    PubMed

    Chokron, S

    2014-02-01

    Cortical blindness refers to a visual loss induced by a bilateral occipital lesion. The very strong cooperation between psychophysics, cognitive psychology, neurophysiology and neuropsychology these latter twenty years as well as recent progress in cerebral imagery have led to a better understanding of neurovisual deficits, such as cortical blindness. It thus becomes possible now to propose an earlier diagnosis of cortical blindness as well as new perspectives for rehabilitation in children as well as in adults. On the other hand, studying complex neurovisual deficits, such as cortical blindness is a way to infer normal functioning of the visual system.

  16. [Global blindness].

    PubMed

    Schulze Schwering, M

    2007-10-01

    Worldwide there are 37 million people who are completely blind and another 112 million whose sight is severely restricted. Of all blind people throughout the world, 85% live in developing countries. In three quarters of cases, blindness could be prevented or treated. The VISION 2020 campaign is dedicated to halving the number of people suffering from the diseases leading to blindness by means of disease control, training of specialist ophthalmic staff and development of appropriate infrastructures. More effort is needed if these goals are to be met. German ophthalmologists engaged in conservative and surgical treatments who join in and support VISION 2020 will be welcomed.

  17. Millimeter-wave imaging for concealed weapon detection

    NASA Astrophysics Data System (ADS)

    McMakin, Douglas L.; Sheen, David M.; Hall, Thomas E.

    2003-07-01

    Full body, real-time, millimeter-wave imaging systems have been developed at the Pacific Northwest National Laboratory for the detection of body-worn, concealed weapons and contraband at security checkpoints. These security systems employ methods derived from microwave holography techniques that utilize phase and amplitude information recorded over a two-dimensional aperture to reconstruct a focused image of the target. Millimeter-wave imaging is well suited for the detection of concealed weapons or other contraband carried on personnel, since millimeter waves are non-ionizing, readily penetrate common clothing material, and are reflected from the human body and any concealed items. In this paper, wide-bandwidth, three-dimensional, holographic microwave imaging techniques and a full-body, planar, millimeter-wave imaging system are described.

  18. Millimeter-wave imaging for concealed weapon detection

    SciTech Connect

    McMakin, Douglas L.; Sheen, David M.; Hall, Thomas E.

    2003-07-16

    Full-body, real-time, millimeter-wave imaging systems have been developed at the Pacific Northwest National Laboratory for the detection of body-worn, concealed weapons and contraband at security checkpoints. These security systems employ methods derived from microwave holography techniques that utilize phase and amplitude information recorded over a two-dimensional aperture to reconstruct a focused image of the target. Millimeter-wave imaging is well suited for the detection of concealed weapons or other contraband carried on personnel, since millimeter waves are non-ionizing, readily penetrate common clothing material, and are reflected from the human body and any concealed items. In this paper, wide-bandwidth, three-dimensional, holographic microwave imaging techniques and a full-body, planar, millimeter-wave imaging system are described.

  19. Strategic concealment of sexual identity in an estrilid finch

    PubMed Central

    Langmore, N. E.; Bennett, A. T. D.

    1999-01-01

    One explanation for the evolution of sexual monomorphism is the sexual indistinguishability hypothesis, which argues that in group-living species individuals might benefit by concealing their sex to reduce sexual competition. We tested this hypothesis in long-tailed finches Poephila acuticauda. Males and females could not be reliably distinguished morphologically or by analysis of the reflectance spectra (300 to 700 nm) from the plumage and bill. Males seemed unable to distinguish the sex of an unfamiliar individual in the absence of behavioural cues; they were equally likely to court and copulate with unfamiliar males and females but rarely courted familiar males. Here we report the first experimental evidence that sexual monomorphism enables strategic concealment of sex. Males were more likely to reveal their sex when faced with a solitary unfamiliar individual than a group of unfamiliar individuals. When encountering an unfamiliar male that revealed his sex, subordinate males were more likely to conceal their sex than dominant males.

  20. Concealed pregnancy: prevalence, perinatal measures and socio-demographics.

    PubMed

    Thynne, C; Gaffney, G; O'Neill, M; Tonge, M; Sherlock, C

    2012-09-01

    A target group of women who concealed their pregnancy (n = 43) was compared to an aged-matched control group (n = 30) that experienced a crisis pregnancy. Comparisons were also made with a larger dataset (n = 6363) of births in University Hospital Galway (UHG) (normative group). Data was analysed using the Chi-square test and the Kolmogorov-Smirnoff two-sample test. The number of women from the target group that were from a rural background was 28 (65%), compared to 10 (33%) from the control group. The number of women from the target group that feared a negative parental reaction to the pregnancy was 34 (79%), compared to 12 (40%) from the control group. The birth weight in the target group was 4009 lower than the normative birth weight. The average age of women who concealed was 8 years lower than the normative age. The prevalence of concealed pregnancy in UHG was one in every 148 births.

  1. Detection and identification of concealed weapons using matrix pencil

    NASA Astrophysics Data System (ADS)

    Adve, Raviraj S.; Thayaparan, Thayananthan

    2011-06-01

    The detection and identification of concealed weapons is an extremely hard problem due to the weak signature of the target buried within the much stronger signal from the human body. This paper furthers the automatic detection and identification of concealed weapons by proposing the use of an effective approach to obtain the resonant frequencies in a measurement. The technique, based on Matrix Pencil, a scheme for model based parameter estimation also provides amplitude information, hence providing a level of confidence in the results. Of specific interest is the fact that Matrix Pencil is based on a singular value decomposition, making the scheme robust against noise.

  2. Do Children Understand That People Selectively Conceal or Express Emotion?

    ERIC Educational Resources Information Center

    Hayashi, Hajimu; Shiomi, Yuki

    2015-01-01

    This study examined whether children understand that people selectively conceal or express emotion depending upon the context. We prepared two contexts for a verbal display task for 70 first-graders, 80 third-graders, 64 fifth-graders, and 71 adults. In both contexts, protagonists had negative feelings because of the behavior of the other…

  3. Detection of concealed and buried chemicals by using multifrequency excitations

    SciTech Connect

    Gao Yaohui; Chen, Meng-Ku; Yang, Chia-En; Chang, Yun-Ching; Yao, Jim; Cheng Jiping; Yin, Stuart; Hui Rongqing; Ruffin, Paul; Brantley, Christina; Edwards, Eugene; Luo, Claire

    2010-08-15

    In this paper, we present a new type of concealed and buried chemical detection system by stimulating and enhancing spectroscopic signatures with multifrequency excitations, which includes a low frequency gradient dc electric field, a high frequency microwave field, and higher frequency infrared (IR) radiations. Each excitation frequency plays a unique role. The microwave, which can penetrate into the underground and/or pass through the dielectric covers with low attenuation, could effectively transform its energy into the concealed and buried chemicals and increases its evaporation rate from the sample source. Subsequently, a gradient dc electric field, generated by a Van De Graaff generator, not only serves as a vapor accelerator for efficiently expediting the transportation process of the vapor release from the concealed and buried chemicals but also acts as a vapor concentrator for increasing the chemical concentrations in the detection area, which enables the trace level chemical detection. Finally, the stimulated and enhanced vapors on the surface are detected by the IR spectroscopic fingerprints. Our theoretical and experimental results demonstrate that more than sixfold increase in detection signal can be achieved by using this proposed technology. The proposed technology can also be used for standoff detection of concealed and buried chemicals by adding the remote IR and/or thermal spectroscopic and imaging detection systems.

  4. Quantum Image Steganography and Steganalysis Based On LSQu-Blocks Image Information Concealing Algorithm

    NASA Astrophysics Data System (ADS)

    A. AL-Salhi, Yahya E.; Lu, Songfeng

    2016-08-01

    Quantum steganography can solve some problems that are considered inefficient in image information concealing. It researches on Quantum image information concealing to have been widely exploited in recent years. Quantum image information concealing can be categorized into quantum image digital blocking, quantum image stereography, anonymity and other branches. Least significant bit (LSB) information concealing plays vital roles in the classical world because many image information concealing algorithms are designed based on it. Firstly, based on the novel enhanced quantum representation (NEQR), image uniform blocks clustering around the concrete the least significant Qu-block (LSQB) information concealing algorithm for quantum image steganography is presented. Secondly, a clustering algorithm is proposed to optimize the concealment of important data. Finally, we used Con-Steg algorithm to conceal the clustered image blocks. Information concealing located on the Fourier domain of an image can achieve the security of image information, thus we further discuss the Fourier domain LSQu-block information concealing algorithm for quantum image based on Quantum Fourier Transforms. In our algorithms, the corresponding unitary Transformations are designed to realize the aim of concealing the secret information to the least significant Qu-block representing color of the quantum cover image. Finally, the procedures of extracting the secret information are illustrated. Quantum image LSQu-block image information concealing algorithm can be applied in many fields according to different needs.

  5. Campaign for Right to Carry Concealed Guns on Campuses Gains Traction

    ERIC Educational Resources Information Center

    Wiseman, Rachel

    2012-01-01

    Five years after the Virginia Tech massacre prompted a student in Texas to start a Facebook page in favor of the right to carry concealed weapons on college campuses, the resulting group, Students for Concealed Carry, has advanced its cause. In more than a dozen states, legislation has been introduced to allow the carrying of concealed firearms on…

  6. Dynamic Channel Allocation

    DTIC Science & Technology

    2003-09-01

    7 1 . Fixed Channel Allocation (FCA) ........................................................7 2. Dynamic Channel ...19 7. CSMA/CD-Based Multiple Network Lines .....................................20 8. Hybrid Channel Allocation in Wireless Networks...28 1 . Channel Allocation

  7. Concealed objects detection based on FWT in active millimeter-wave images

    NASA Astrophysics Data System (ADS)

    Du, Kun; Zhang, Lu; Chen, Wei; Wan, Guolong; Fu, Ruoran

    2017-01-01

    Active millimeter-wave (MMW) near-filed human imaging is a means for concealed objects detection. A method of concealed objects detection based on fast wavelet transforms (FWT) in the usage of active MMW images is presented as a result of image characteristics, which includes high resolution, characteristics varying in different parts of the human, imaging influenced among human, concealed objects and other objects, and different textures of concealed objects. Images segmentation utilizing results of edge detection based on FWT is conducted and preliminary segmentation results can be obtained. Some kinds of concealed objects according to comparing gray value of concealed objects to human average gray value can be detected in this paper. The experiments of concealed objects on images of actual acquisition are conducted with a result of accurate rate 80.92% and false alarm rate 11.78%, illustrating the effectiveness of the method proposed in this paper.

  8. A hybrid frame concealment algorithm for H.264/AVC.

    PubMed

    Yan, Bo; Gharavi, Hamid

    2010-01-01

    In packet-based video transmissions, packets loss due to channel errors may result in the loss of the whole video frame. Recently, many error concealment algorithms have been proposed in order to combat channel errors; however, most of the existing algorithms can only deal with the loss of macroblocks and are not able to conceal the whole missing frame. In order to resolve this problem, in this paper, we have proposed a new hybrid motion vector extrapolation (HMVE) algorithm to recover the whole missing frame, and it is able to provide more accurate estimation for the motion vectors of the missing frame than other conventional methods. Simulation results show that it is highly effective and significantly outperforms other existing frame recovery methods.

  9. Could plate tectonics on Venus be concealed by volcanic deposits

    NASA Technical Reports Server (NTRS)

    Kaula, W. M.; Muradian, L. M.

    1982-01-01

    The present investigation is supplementary to a study reported by Kaula and Phillips (1981). From an analysis of Pioneer Venus altimetry, Kaula and Phillips had inferred that any heat loss from the planet by plate tectonics must be small compared to that from the earth. However, it has been suggested by others that plate tectonic may exist on Venus, but that the expected 'square root of s' dependence of the topographic drop off is not observed because it is concealed by lava flows. The present investigation has the objective to conduct an examination whether this suggestion of concealment by lava flow is correct. On the basis of the performed analysis, it is concluded that the results obtained by Kaula and Phillips appear to be well justified.

  10. ID-Check: Online Concealed Information Test Reveals True Identity.

    PubMed

    Verschuere, Bruno; Kleinberg, Bennett

    2016-01-01

    The Internet has already changed people's lives considerably and is likely to drastically change forensic research. We developed a web-based test to reveal concealed autobiographical information. Initial studies identified a number of conditions that affect diagnostic efficiency. By combining these moderators, this study investigated the full potential of the online ID-check. Participants (n = 101) tried to hide their identity and claimed a false identity in a reaction time-based Concealed Information Test. Half of the participants were presented with personal details (e.g., first name, last name, birthday), whereas the others only saw irrelevant details. Results showed that participants' true identity could be detected with high accuracy (AUC = 0.98; overall accuracy: 86-94%). Online memory detection can reliably and validly detect whether someone is hiding their true identity. This suggests that online memory detection might become a valuable tool for forensic applications.

  11. Blind Ambition

    ERIC Educational Resources Information Center

    Olson, Catherine Applefeld

    2009-01-01

    No matter how dedicated they may be, some teachers are daunted by extreme challenges. Carol Agler, music director at the Ohio State School for the Blind (OSSB), is not one of those teachers. Since joining the OSSB staff 11 years ago, Agler has revived the school's long-dormant band program and created its first marching band. Next January, she…

  12. Blindness Clues

    ERIC Educational Resources Information Center

    Science Teacher, 2005

    2005-01-01

    Age-related macular degeneration is the leading cause of blindness in older adults, yet researchers are still in the dark about many of the factors that cause this incurable disease. But new insight from University of Florida (UF) and German researchers about a genetic link between rhesus monkeys with macular degeneration and humans could unlock…

  13. Content-based retransmission with error concealment for astronomical images

    NASA Astrophysics Data System (ADS)

    Thienphrapa, Paul; Boussalis, Helen; Liu, Charles; Rad, Khosrow; Dong, Jane

    2005-10-01

    The James Webb Space Telescope (JWST) is expected to produce a vast amount of images that are valuable for astronomical research and education. To support research activities related to JWST mission, NASA has provided funds to establish the Structures Pointing and Control Engineering (SPACE) Laboratory at the California State University, Los Angeles (CSULA). One of the research activities in SPACE lab is to design an effective and efficient transmission system to disseminate JWST images across the Internet. This paper presents a prioritized transmission method to provide the best quality of the transferred image based on the joint-optimization of content-based retransmission and error concealment. First, the astronomical image is compressed using a scalable wavelet-based approach, then packetized into independently decodable packets. To facilitate the joint-optimization of two mutually dependent error control methods, a novel content index is declared to represent the significance of the packet content as well as its importance in error concealment. Based on the defined content index, the optimal retransmission schedule is determined to maximize the quality of the received image under delay constraint with the given error concealment method. Experimental results demonstrate that the proposed approach is very effective to combat the packet loss during transmission to achieve a desirable quality of the received astronomical images.

  14. Biomedical psychiatry and its concealed metaphors: an anthropological perspective.

    PubMed

    Martínez-Hernáez, Angel

    2013-09-01

    The idea that power relations structure social life is self-evident to most anthropologists. Western medical knowledge or biomedicine, and by extension science or scientific knowledge, however, has until relatively recently been exempt from anthropological scrutiny in political terms. An understanding of biomedicine as a system of knowledge that is not a copy of facts but a representation of them has entailed a break with the traditional separation of folk knowledge and scientific knowledge in anthropology, making it possible to include biomedicine in the repertoire of ethnographic objects. The peculiarity of biomedicine as a cultural system, seen from this perspective, lies in a paradox: its self-characterization as a set of non-ideological discourses and practices is a representation that conceals its ideological and power-saturated nature. Through an analysis of DSM-IV-TR, this article explores some of the representational strategies through which this concealment takes place in biomedical psychiatry: the asocial and universal character of mental illness categories; the neutrality of clinical practice; and the non-moral nature of clinical criteria and judgment. These are concealed metaphors in the true sense, for not only do they speak of something without naming it but they also deny their own existence as metaphors.

  15. 77 FR 20553 - Relay Services for Deaf-Blind Individuals

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-05

    ... COMMISSION 47 CFR Part 64 Relay Services for Deaf-Blind Individuals AGENCY: Federal Communications Commission... Relay Services for Deaf-Blind Individuals, Report and Order, document FCC 11-56, published at 76 FR... Commission to allocate up to $10 million annually from the Interstate Telecommunications Relay Services...

  16. The administration of intermittent parathyroid hormone affects functional recovery from pertrochanteric fractured neck of femur: a protocol for a prospective mixed method pilot study with randomisation of treatment allocation and blinded assessment (FRACTT)

    PubMed Central

    Chesser, Tim; Fox, Rebecca; Harding, Karen; Greenwood, Rosemary; Javaid, Kassim; Barnfield, Steven; Halliday, Ruth; Willett, Keith; Lamb, Sallie

    2014-01-01

    Introduction Pertrochanteric hip fractures occur in an elderly population and cause considerable morbidity and loss of functional ability as the fracture heals. Recently, parathyroid hormone (PTH), which is licensed for the treatment of osteoporosis, has been shown to potentially accelerate bone healing in animal and human studies. If its administration could allow a faster functional recovery after pertrochanteric hip fracture, then a patient's hospital stay may be reduced and rehabilitation could be potentially accelerated. PTH can currently only be administered by subcutaneous injection. The acceptability of this intervention is unknown in this elderly population. The aim of this pilot study is to inform the design of a future powered study comparing the functional recovery after pertrochanteric hip fracture in patients undergoing standard care versus those who undergo administration of subcutaneous injection of PTH. Methods and analysis The study is an open label, prospective, randomised, comparative pilot study with blinded outcomes assessment to establish feasibility of the trial design. Patients will be randomised to receive a 6-week course of PTH or usual treatment. Functional outcomes will be assessed at 6 weeks and 12 weeks. Blinded assessment will be used to minimise the effect of bias of an open label study design. A nested qualitative study will investigate the patient experience of, and expectations following, hip fracture and the patient important aspects of recovery compared with the outcome measures proposed. Results Results will be analysed to establish the potential recruitment, compliance and retention rates using 95% CIs, and trial outcomes quoted with SDs and 95% CIs for the effect size. Ethics and dissemination The study has been approved by the South West 2 Research Ethics committee (reference 10/H0206/34). The findings of this study will be disseminated to the medical community via presentations to orthopaedic, orthogeriatric and

  17. Acute Blindness.

    PubMed

    Meekins, Jessica M

    2015-09-01

    Sudden loss of vision is an ophthalmic emergency with numerous possible causes. Abnormalities may occur at any point within the complex vision pathway, from retina to optic nerve to the visual center in the occipital lobe. This article reviews specific prechiasm (retina and optic nerve) and cerebral cortical diseases that lead to acute blindness. Information regarding specific etiologies, pathophysiology, diagnosis, treatment, and prognosis for vision is discussed.

  18. Congenitally Blind Counselor, Adventitiously Blind Client.

    ERIC Educational Resources Information Center

    Roberts, A. H.

    1994-01-01

    A counselor blind from birth describes personal difficulties in fully understanding the experience of clients who are adventitiously blind. Congenitally blind counselors are urged to recognize that adaptive methods cannot compensate for the panoramic view of the environment provided by vision and that recently blinded individuals need to deal with…

  19. The role of need satisfaction in self-concealment and well-being.

    PubMed

    Uysal, Ahmet; Lin, Helen Lee; Knee, C Raymond

    2010-02-01

    The present research tests a model derived from self-determination theory to explain why self-concealment (the tendency to keep distressing personal information secret) is associated with negative well-being outcomes. Two studies tested a model in which self-concealment predicts the thwarting of basic needs for autonomy, competence, and relatedness, which then results in negative psychological outcomes. Study 1 involved a cross-sectional design. Structural equation modeling analyses revealed that the model provided an acceptable fit to the data. Study 2 involved a multilevel design. Participants completed daily measures of self-concealment, need satisfaction, and well-being over 16 days. Results supported the proposed mediation model. Furthermore, the associations between daily self-concealment, daily need satisfaction, and daily well-being were independent of trait self-concealment. Overall, the findings suggest that concealing personal distressing information is detrimental to the satisfaction of basic psychological needs, which in turn predicts negative well-being.

  20. The nitrogen camera and the detection of concealed explosives

    NASA Astrophysics Data System (ADS)

    Trower, W. P.

    1993-06-01

    The nitrogen camera is an instrument based on a nuclear technique which is capable of imaging nitrogen concentrations with surface densities and amounts typical of currently concealed conventional explosives. Its signal is the totality of high-energy gamma rays detected in the multiscalar mode after the irradiation of a target pixel by a beam from a 50 MeV electron racetrack microtron. The sole interfering signal, from 13C, can be disentangled by two methods. Images of 180 2 × 2 cm 2 pixels, which are shown, eventually will be produced in ˜ 7.2 s. Progress towards an operational nitrogen camera is discussed.

  1. 3-D Imaging of Partly Concealed Targets by Laser Radar

    DTIC Science & Technology

    2005-10-01

    laser in the green wavelength region was used for illumination. 3-D Imaging of Partly Concealed Targets by Laser Radar 11 - 8 RTO-MP-SET-094...acknowledge Marie Carlsson and Ann Charlotte Gustavsson for their assistance in some of the experiments. 7.0 REFERENCES [1] U. Söderman, S. Ahlberg...SPIE Vol. 3707, pp. 432-448, USA, 1999. [14] D. Letalick, H. Larsson, M. Carlsson, and A.-C. Gustavsson , “Laser sensors for urban warfare,” FOI

  2. [Effects of false memories on the Concealed Information Test].

    PubMed

    Zaitsu, Wataru

    2012-10-01

    The effects of false memories on polygraph examinations with the Concealed Information Test (CIT) were investigated by using the Deese-Roediger-McDermott (DRM) paradigm, which allows participants to evoke false memories. Physiological responses to questions consisting of learned, lure, and unlearned items were measured and recorded. The results indicated that responses to lure questions showed critical responses to questions about learned items. These responses included repression of respiration, an increase in electrodermal activity, and a drop in heart rate. These results suggest that critical response patterns are generated in the peripheral nervous system by true and false memories.

  3. Concealed target detection using augmented reality with SIRE radar

    NASA Astrophysics Data System (ADS)

    Saponaro, Philip; Kambhamettu, Chandra; Ranney, Kenneth; Sullivan, Anders

    2013-05-01

    The Synchronous Impulse Reconstruction (SIRE) forward-looking radar, developed by the U.S. Army Research Laboratory (ARL), can detect concealed targets using ultra-wideband synthetic aperture technology. The SIRE radar has been mounted on a Ford Expedition and combined with other sensors, including a pan/tilt/zoom camera, to test its capabilities of concealed target detection in a realistic environment. Augmented Reality (AR) can be used to combine the SIRE radar image with the live camera stream into one view, which provides the user with information that is quicker to assess and easier to understand than each separated. In this paper we present an AR system which utilizes a global positioning system (GPS) and inertial measurement unit (IMU) to overlay a SIRE radar image onto a live video stream. We describe a method for transforming 3D world points in the UTM coordinate system onto the video stream by calibrating for the intrinsic parameters of the camera. This calibration is performed offline to save computation time and achieve real time performance. Since the intrinsic parameters are affected by the zoom of the camera, we calibrate at eleven different zooms and interpolate. We show the results of a real time transformation of the SAR imagery onto the video stream. Finally, we quantify both the 2D error and 3D residue associated with our transformation and show that the amount of error is reasonable for our application.

  4. Separating deceptive and orienting components in a Concealed Information Test.

    PubMed

    Ambach, Wolfgang; Stark, Rudolf; Peper, Martin; Vaitl, Dieter

    2008-11-01

    The Concealed Information Test (CIT) requires the examinee to deceptively deny recognition of known stimuli and to truthfully deny recognition of unknown stimuli. Because deception and orienting are typically coupled, it is unclear how exactly these sub-processes affect the physiological responses measured in the CIT. The present study aimed at separating the effects of deception from those of orienting. In a mock-crime study, using a modified CIT, thirty-six of seventy-two subjects answered truthfully ('truth group'), whereas the other thirty-six concealed their knowledge ('lie group'). Answering was delayed for 4 s after item presentation. Electrodermal activity (EDA), respiration (RLL), and phasic heart rate (HR) were recorded. A decomposition of EDA responses revealed two response components; the response in the first interval was expected to indicate orienting, stimulus evaluation, and answer preparation, whereas the response in the second interval was assumed to reflect answer-related processes. Inconclusively, both EDA components differentiated between 'probe' and 'irrelevant' items in both groups. Phasic HR and RLL differed between item classes only in the 'lie' group, thus reflecting answer-related processes, possibly deception, rather than merely orienting responses. The findings further support the notion that psychophysiological measures elicited by a modified CIT may reflect different mental processes involved in orienting and deception.

  5. Multispectral concealed weapon detection in visible, infrared, and terahertz

    NASA Astrophysics Data System (ADS)

    Kowalski, Marcin; Kastek, Mariusz; Polakowski, Henryk; Palka, Norbert; Piszczek, Marek; Szustakowski, Mieczyslaw

    2014-05-01

    Detection of concealed dangerous objects is a very demanding problem of public safety. So far, the problem of detecting objects hidden under clothing was considered only in the case of airports but it is becoming more and more important for public places like metro stations, and government buildings. The development of imaging devices and exploration of new spectral bands is a chance to introduce new equipment for assuring public safety. It has been proved that objects hidden under clothing can be detected and visualized using terahertz (THz) cameras. However, passive THz cameras still offer too low image resolution for objects recognition. On the other hand new infrared cameras offer sufficient parameters to detect objects covered with fabrics in some conditions, as well as high image quality and big pixel resolutions. The purpose of the studies is to investigate the possibilities of using various cameras operating in different spectral ranges for detection of concealed objects. In the article, we present the measurement setup consisting of medium wavelength infrared (MWIR), long wavelength infrared (LWIR), THz and visible cameras and the initial results of measurements with various types of clothing and test objects.

  6. Concealed by conspicuousness: distractive prey markings and backgrounds

    PubMed Central

    Dimitrova, Marina; Stobbe, Nina; Schaefer, H. Martin; Merilaita, Sami

    2009-01-01

    High-contrast markings, called distractive or dazzle markings, have been suggested to draw and hold the attention of a viewer, thus hindering detection or recognition of revealing prey characteristics, such as the body outline. We tested this hypothesis in a predation experiment with blue tits (Cyanistes caeruleus) and artificial prey. We also tested whether this idea can be extrapolated to the background appearance and whether high-contrast markings in the background would improve prey concealment. We compared search times for a high-contrast range prey (HC-P) and a low-contrast range prey (LC-P) in a high-contrast range background (HC-B) and a low-contrast range background (LC-B). The HC-P was more difficult to detect in both backgrounds, although it did not match the LC-B. Also, both prey types were more difficult to find in the HC-B than in the LC-B, in spite of the mismatch of the LC-P. In addition, the HC-P was more difficult to detect, in both backgrounds, when compared with a generalist prey, not mismatching either background. Thus, we conclude that distractive prey pattern markings and selection of microhabitats with distractive features may provide an effective way to improve camouflage. Importantly, high-contrast markings, both as part of the prey coloration and in the background, can indeed increase prey concealment. PMID:19324754

  7. Concealed Threat Detection at Multiple Frames-per-second

    SciTech Connect

    Chang, J T

    2005-11-08

    In this LDRD project, our research purpose is to investigate the science and technology necessary to enable real-time array imaging as a rapid way to detect hidden threats through obscurants such as smoke, fog, walls, doors, and clothing. The goal of this research is to augment the capabilities of protective forces in concealed threat detection. In the current context, threats include people as well as weapons. In most cases, security personnel must make very fast assessments of a threat based upon limited amount of data. Among other attributes, UWB has been shown and quantified to penetrate and propagate through many materials (wood, some concretes, non-metallic building materials, some soils, etc.) while maintaining high range resolution. We have build collaborations with university partners and government agencies. We have considered the impact of psychometrics on target recognition and identification. Specifically we have formulated images in real-time that will engage the user's vision system in a more active way to enhance image interpretation capabilities. In this project, we are researching the use of real time (field programmable gate arrays) integrated with high resolution (cm scale), ultra wide band (UWB) electromagnetic signals for imaging personnel through smoke and walls. We evaluated the ability of real-time UWB imaging for detecting smaller objects, such as concealed weapons that are carried by the obscured personnel. We also examined the cognitive interpretation process of real time UWB electromagnetic images.

  8. Passive millimeter-wave imaging for concealed article detection

    NASA Astrophysics Data System (ADS)

    Lovberg, John A.; Galliano, Joseph A., Jr.; Clark, Stuart E.

    1997-02-01

    Passive-millimeter-wave imaging (PMI) provides a powerful sensing tool for law enforcement, allowing an unobtrusive means for detecting concealed weapons, explosives, or contraband on persons or in baggage. Natural thermal emissions at millimeter wavelengths from bodies, guns, explosives, and other articles pass easily through clothing or other concealment materials, where they can be detected and converted into conventional 2-dimensional images. A new implementation of PMI has demonstrated a large-area, near- real-time staring capability for personnel inspection at standoff ranges of greater than 10 meters. In this form, PMI does not require operator cuing based on subjective 'profiles' of suspicious appearance or behaviors, which may otherwise be construed as violations of civil rights. To the contrary, PMI detects and images heat generated by any object with no predisposition as to its nature or function (e.g. race or gender of humans). As a totally passive imaging tool, it generates no radio-frequency or other radiation which might raise public health concerns. Specifics of the new PMI architecture are presented along with a host of imaging data representing the current state- of-the-art.

  9. Terahertz imaging system performance model for concealed-weapon identification

    NASA Astrophysics Data System (ADS)

    Murrill, Steven R.; Jacobs, Eddie L.; Moyer, Steven K.; Halford, Carl E.; Griffin, Steven T.; De Lucia, Frank C.; Petkie, Douglas T.; Franck, Charmaine C.

    2008-03-01

    The U.S. Army Night Vision and Electronic Sensors Directorate (NVESD) and the U.S. Army Research Laboratory have developed a terahertz (THz) -band imaging system performance model for detection and identification of concealed weaponry. The MATLAB-based model accounts for the effects of all critical sensor and display components and for the effects of atmospheric attenuation, concealment material attenuation, and active illumination. The model is based on recent U.S. Army NVESD sensor performance modeling technology that couples system design parameters to observer-sensor field performance by using the acquire methodology for weapon identification performance predictions. This THz model has been developed in support of the Defense Advanced Research Project Agencies' Terahertz Imaging Focal-Plane Technology (TIFT) program and is currently being used to guide the design and development of a 0.650 THz active-passive imaging system. This paper will describe the THz model in detail, provide and discuss initial modeling results for a prototype THz imaging system, and outline plans to calibrate and validate the model through human perception testing.

  10. Terahertz imaging system performance model for concealed weapon identification

    NASA Astrophysics Data System (ADS)

    Murrill, Steven R.; Jacobs, Eddie L.; Moyer, Steven K.; Halford, Carl E.; Griffin, Steven T.; De Lucia, Frank C.; Petkie, Douglas T.; Franck, Charmaine C.

    2005-11-01

    The U.S. Army Night Vision and Electronic Sensors Directorate and the U.S. Army Research Laboratory have developed a terahertz-band imaging system performance model for detection and identification of concealed weaponry. The MATLAB-based model accounts for the effects of all critical sensor and display components, and for the effects of atmospheric attenuation, concealment material attenuation, and active illumination. The model is based on recent U.S. Army NVESD sensor performance models that couple system design parameters to observer-sensor field performance using the acquire methodology for weapon identification performance predictions. This THz model has been developed in support of the Defense Advanced Research Project Agencies' Terahertz Imaging Focal-Plane-Array Technology (TIFT) program and is presently being used to guide the design and development of a 0.650 THz active/passive imaging system. This paper will describe the THz model in detail, provide and discuss initial modeling results for a prototype THz imaging system, and outline plans to validate and calibrate the model through human perception testing.

  11. Optical 3D imaging and visualization of concealed objects

    NASA Astrophysics Data System (ADS)

    Berginc, G.; Bellet, J.-B.; Berechet, I.; Berechet, S.

    2016-09-01

    This paper gives new insights on optical 3D imagery. In this paper we explore the advantages of laser imagery to form a three-dimensional image of the scene. 3D laser imaging can be used for three-dimensional medical imaging and surveillance because of ability to identify tumors or concealed objects. We consider the problem of 3D reconstruction based upon 2D angle-dependent laser images. The objective of this new 3D laser imaging is to provide users a complete 3D reconstruction of objects from available 2D data limited in number. The 2D laser data used in this paper come from simulations that are based on the calculation of the laser interactions with the different meshed objects of the scene of interest or from experimental 2D laser images. We show that combining the Radom transform on 2D laser images with the Maximum Intensity Projection can generate 3D views of the considered scene from which we can extract the 3D concealed object in real time. With different original numerical or experimental examples, we investigate the effects of the input contrasts. We show the robustness and the stability of the method. We have developed a new patented method of 3D laser imaging based on three-dimensional reflective tomographic reconstruction algorithms and an associated visualization method. In this paper we present the global 3D reconstruction and visualization procedures.

  12. 3D laser imaging for concealed object identification

    NASA Astrophysics Data System (ADS)

    Berechet, Ion; Berginc, Gérard; Berechet, Stefan

    2014-09-01

    This paper deals with new optical non-conventional 3D laser imaging. Optical non-conventional imaging explores the advantages of laser imaging to form a three-dimensional image of the scene. 3D laser imaging can be used for threedimensional medical imaging, topography, surveillance, robotic vision because of ability to detect and recognize objects. In this paper, we present a 3D laser imaging for concealed object identification. The objective of this new 3D laser imaging is to provide the user a complete 3D reconstruction of the concealed object from available 2D data limited in number and with low representativeness. The 2D laser data used in this paper come from simulations that are based on the calculation of the laser interactions with the different interfaces of the scene of interest and from experimental results. We show the global 3D reconstruction procedures capable to separate objects from foliage and reconstruct a threedimensional image of the considered object. In this paper, we present examples of reconstruction and completion of three-dimensional images and we analyse the different parameters of the identification process such as resolution, the scenario of camouflage, noise impact and lacunarity degree.

  13. Target Speaker Detection with Concealed EEG Around the Ear

    PubMed Central

    Mirkovic, Bojana; Bleichner, Martin G.; De Vos, Maarten; Debener, Stefan

    2016-01-01

    Target speaker identification is essential for speech enhancement algorithms in assistive devices aimed toward helping the hearing impaired. Several recent studies have reported that target speaker identification is possible through electroencephalography (EEG) recordings. If the EEG system could be reduced to acceptable size while retaining the signal quality, hearing aids could benefit from the integration with concealed EEG. To compare the performance of a multichannel around-the-ear EEG system with high-density cap EEG recordings an envelope tracking algorithm was applied in a competitive speaker paradigm. The data from 20 normal hearing listeners were concurrently collected from the traditional state-of-the-art laboratory wired EEG system and a wireless mobile EEG system with two bilaterally-placed around-the-ear electrode arrays (cEEGrids). The results show that the cEEGrid ear-EEG technology captured neural signals that allowed the identification of the attended speaker above chance-level, with 69.3% accuracy, while cap-EEG signals resulted in the accuracy of 84.8%. Further analyses investigated the influence of ear-EEG signal quality and revealed that the envelope tracking procedure was unaffected by variability in channel impedances. We conclude that the quality of concealed ear-EEG recordings as acquired with the cEEGrid array has potential to be used in the brain-computer interface steering of hearing aids. PMID:27512364

  14. Management of a Concealable Stigmatized Identity: A Qualitative Study of Concealment, Disclosure, and Role Flexing Among Young, Resilient Sexual and Gender Minority Individuals.

    PubMed

    Bry, Laura Jane; Mustanski, Brian; Garofalo, Robert; Burns, Michelle Nicole

    2017-01-01

    Disclosure of a sexual or gender minority status has been associated with both positive and negative effects on wellbeing. Few studies have explored the disclosure and concealment process in young people. Interviews were conducted with 10 sexual and/or gender minority individuals, aged 18-22 years, of male birth sex. Data were analyzed qualitatively, yielding determinants and effects of disclosure and concealment. Determinants of disclosure included holding positive attitudes about one's identity and an implicit devaluation of acceptance by society. Coming out was shown to have both positive and negative effects on communication and social support and was associated with both increases and decreases in experiences of stigma. Determinants of concealment included lack of comfort with one's identity and various motivations to avoid discrimination. Concealment was also related to hypervigilance and unique strategies of accessing social support. Results are discussed in light of their clinical implications.

  15. When Concealed Handgun Licensees Break Bad: Criminal Convictions of Concealed Handgun Licensees in Texas, 2001–2009

    PubMed Central

    Nwaiwu, Obioma; McMaughan Moudouni, Darcy K.; Edwards, Rachel; Lin, Szu-hsuan

    2013-01-01

    Objectives. We explored differences in criminal convictions between holders and nonholders of a concealed handgun license (CHL) in Texas. Methods. The Texas Department of Public Safety (DPS) provides annual data on criminal convictions of holders and nonholders of CHLs. We used 2001 to 2009 DPS data to investigate the differences in the distribution of convictions for these 2 groups across 9 types of criminal offenses. We calculated z scores for the differences in the types of crimes for which CHL holders and nonholders were convicted. Results. CHL holders were much less likely than nonlicensees to be convicted of crimes. Most nonholder convictions involved higher-prevalence crimes (burglary, robbery, or simple assault). CHL holders’ convictions were more likely to involve lower-prevalence crimes, such as sexual offenses, gun offenses, or offenses involving a death. Conclusions. Our results imply that expanding the settings in which concealed carry is permitted may increase the risk of specific types of crimes, some quite serious in those settings. These increased risks may be relatively small. Nonetheless, policymakers should consider these risks when contemplating reducing the scope of gun-free zones. PMID:23153139

  16. 27 CFR 447.62 - False statements or concealment of facts.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO... IMPLEMENTS OF WAR Penalties, Seizures and Forfeitures § 447.62 False statements or concealment of facts. Any... fact or fails to state a material fact required to be stated therein or necessary to make...

  17. 27 CFR 447.62 - False statements or concealment of facts.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO... IMPLEMENTS OF WAR Penalties, Seizures and Forfeitures § 447.62 False statements or concealment of facts. Any... fact or fails to state a material fact required to be stated therein or necessary to make...

  18. Repetition blindness is orientation blind.

    PubMed

    Corballis, Michael C; Armstrong, Cole

    2007-03-01

    In identifying rapid sequences of three letters, subjects were worse at identifying the first and third letters when they were the same than when they were different, indicating repetition blindness (RB). This effect occurred regardless of the angular orientations of the letters, but was more pronounced when the orientations of the repeated letters were different than when they were the same. In a second experiment, RB was also evident when the first and third letters were lowercase bs or ds, presented upright or inverted, even though they are differently named when inverted (q and p, respectively). Conversely, a third experiment showed that RB occurred when the letters had the same names but were repeated in different case. These results suggest that the early extraction of letter shape is independent of its orientation and left-right sense, and that RB can occur at the levels of both shape and name.

  19. Worker's refusal to conceal HIV tattoo amounts to misconduct.

    PubMed

    1997-07-25

    [Name removed] was fired in 1994 from his job as a nurse's aide at the Seattle, WA Harborview Medical Center after refusing to cover a tattoo on his left inside forearm that reads HIV POSITIVE. The 9th U.S. Circuit Court of Appeals rejected [name removed]'s arguments that he was terminated because of his HIV status and not the tattoo. He contended that the hospital violated the Americans with Disabilities Act (ADA), the Rehabilitation Act, and his First Amendment right to free speech. The judge agreed with the hospital that [name removed]'s refusal to conceal the tattoo amounted to insubordination. The appeals panel affirmed the granting of summary judgment on [name removed]'s ADA and Rehabilitation Act claims. [Name removed] said he had himself tattooed to help dispel the stigma attached to his infection. The hospital said the tattoo alarmed some patients.

  20. Pathways Between Concealable Stigmatized Identities and Substance Misuse

    PubMed Central

    Talley, Amelia E.; Littlefield, Andrew K.

    2015-01-01

    Individuals with concealable stigmatized identities often possess no obviously devalued attributes, yet are at greater risk for problematic substance use compared to their privileged counterparts. We present a conceptual model, which proposes that identity-relevant content and characteristics have important implications for cognitive, affective, and behavioral consequences of stigma-related stress. In doing so, we synthesize stigma-related models from the extant literature and attempt to integrate these concepts with previous work detailing potential contributors to substance use behaviors specifically. Finally, we ask readers to consider the various ways in which the content and characteristics of an individual’s stigmatized identity might combine with situational and additional individual difference factors to influence the likelihood of substance misuse. PMID:26379766

  1. Self-envy and the concealment of inner resources.

    PubMed

    Berman, A

    1999-01-01

    Self-envy refers to envy of one's own inner resources. This term is an adjunct to the psychodynamic understanding of developmental self-arrest, defined as deliberate and defensive impairment of one's own abilities and accomplishments and the concealment of inner resources. The article suggests possible explanations for the formation of self-envy, emphasizing the formation of envious object representations and the construction of a part of the personality based on these introjections. The effects of self-envy on patient therapist relations are also described, focusing on two particular manifestations: attachment to the therapist as a defense against self-envy and attacking the therapeutic contract as one of the patient's assets. Excerpts from a case study are included.

  2. Geophysical investigations of concealed faults near Yucca Mountain, Southwest Nevada

    USGS Publications Warehouse

    Ponce, D.A.

    1993-01-01

    Detailed gravity and ground magnetic data collected along surveyed traverses across Midway Valley, on the eastern flank of Yucca Mountain, Nevada reveal that these methods can be used to delineate concealed faults. These studies are part of an effort to evaluate faulting in the vicinity of the proposed surface facilities for a potential nuclear waste repository at Yucca Mountain. The largest gravity and magnetic anomaly in the vicinity of Midway Valley is associated with the Paintbrush fault on the west flank of Alice Ridge. Geophysical data infer a vertical offset of about 200 m (650 ft). Another prominent gravity and magnetic anomaly is associated with the Bow Ridge fault in the western part of Midway Valley.

  3. Selection of food patches by sympatric herbivores in response to concealment and distance from a refuge.

    PubMed

    Crowell, Miranda M; Shipley, Lisa A; Camp, Meghan J; Rachlow, Janet L; Forbey, Jennifer S; Johnson, Timothy R

    2016-05-01

    Small herbivores face risks of predation while foraging and are often forced to trade off food quality for safety. Life history, behaviour, and habitat of predator and prey can influence these trade-offs. We compared how two sympatric rabbits (pygmy rabbit, Brachylagus idahoensis; mountain cottontail, Sylvilagus nuttallii) that differ in size, use of burrows, and habitat specialization in the sagebrush-steppe of western North America respond to amount and orientation of concealment cover and proximity to burrow refuges when selecting food patches. We predicted that both rabbit species would prefer food patches that offered greater concealment and food patches that were closer to burrow refuges. However, because pygmy rabbits are small, obligate burrowers that are restricted to sagebrush habitats, we predicted that they would show stronger preferences for greater cover, orientation of concealment, and patches closer to burrow refuges. We offered two food patches to individuals of each species during three experiments that either varied in the amount of concealment cover, orientation of concealment cover, or distance from a burrow refuge. Both species preferred food patches that offered greater concealment, but pygmy rabbits generally preferred terrestrial and mountain cottontails preferred aerial concealment. Only pygmy rabbits preferred food patches closer to their burrow refuge. Different responses to concealment and proximity to burrow refuges by the two species likely reflect differences in perceived predation risks. Because terrestrial predators are able to dig for prey in burrows, animals like pygmy rabbits that rely on burrow refuges might select food patches based more on terrestrial concealment. In contrast, larger habitat generalists that do not rely on burrow refuges, like mountain cottontails, might trade off terrestrial concealment for visibility to detect approaching terrestrial predators. This study suggests that body size and evolutionary adaptations

  4. Microwave-Spectral Signatures Would Reveal Concealed Objects

    NASA Technical Reports Server (NTRS)

    Arndt, G.; Ngo, P.; Carl, J. R.; Byerly, K.; Stolarcyzk, L.

    2004-01-01

    A proposed technique for locating concealed objects (especially small antipersonnel land mines) involves the acquisition and processing of spectral signatures over broad microwave frequency bands. This technique was conceived to overcome the weaknesses of older narrow- band electromagnetic techniques like ground-probing radar and low-frequency electromagnetic induction. Ground-probing radar is susceptible to false detections and/or interference caused by rocks, roots, air pockets, soil inhomogeneities, ice, liquid water, and miscellaneous buried objects other than those sought. Moreover, if the radar frequency happens to be one for which the permittivity of a sought object matches the permittivity of the surrounding soil or there is an unfavorable complex-amplitude addition of the radar reflection at the receiver, then the object is not detected. Low-frequency electromagnetic induction works well for detecting metallic objects, but the amounts of metal in plastic mines are often too small to be detectable. The potential advantage of the proposed technique arises from the fact that wideband spectral signatures generally contain more relevant information than do narrow-band signals. Consequently, spectral signatures could be used to make better decisions regarding whether concealed objects are present and whether they are the ones sought. In some cases, spectral signatures could provide information on the depths, sizes, shapes, and compositions of objects. An apparatus to implement the proposed technique (see Figure 1) could be assembled from equipment already in common use. Typically, such an apparatus would include a radio-frequency (RF) transmitter/receiver, a broad-band microwave antenna, and a fast personal computer loaded with appropriate software. In operation, the counter would be turned on, the antenna would be aimed at the ground or other mass suspected to contain a mine or other sought object, and the operating frequency would be swept over the band of

  5. Channel Allocation Options.

    ERIC Educational Resources Information Center

    Powers, Robert S.

    The Frequency Allocation Subcommittee of the Coordinating Committee for Cable Communication Systems, Institute of Electrical and Electronic Engineers, was formed to produce a background report on the general problems of frequency allocation and assignments in cable television. The present paper, based on the subcommittee's interim report,…

  6. Efficient block error concealment code for image and video transmission

    NASA Astrophysics Data System (ADS)

    Min, Jungki; Chan, Andrew K.

    1999-05-01

    Image and video compression standards such as JPEG, MPEG, H.263 are highly sensitive to error during transmission. Among typical error propagation mechanisms in video compression schemes, loss of block synchronization produces the worst image degradation. Even an error of a single bit in block synchronization may result in data to be placed in wrong positions that is caused by spatial shifts. Our proposed efficient block error concealment code (EBECC) virtually guarantees block synchronization and it improves coding efficiency by several hundred folds over the error resilient entropy code (EREC), proposed by N. G. Kingsbury and D. W. Redmill, depending on the image format and size. In addition, the EBECC produces slightly better resolution on the reconstructed images or video frames than those from the EREC. Another important advantage of the EBECC is that it does not require redundancy contrasting to the EREC that requires 2-3 percent of redundancy. Our preliminary results show the EBECC is 240 times faster than EREC for encoding and 330 times for decoding based on the CIF format of H.263 video coding standard. The EBECC can be used on most of the popular image and video compression schemes such as JPEG, MPEG, and H.263. Additionally, it is especially useful to wireless networks in which the percentage of image and video data is high.

  7. Real-time outdoor concealed-object detection with passive millimeter wave imaging.

    PubMed

    Yeom, Seokwon; Lee, Dong-Su; Son, Jung-Young; Jung, Min-Kyoo; Jang, YuShin; Jung, Sang-Won; Lee, Seok-Jae

    2011-01-31

    Millimeter wave imaging is finding rapid adoption in security applications such as the detection of objects concealed under clothing. A passive imaging system can be realized as a stand-off type sensor that can operate in open spaces, both indoors and outdoors. In this paper, we address real-time outdoor concealed-object detection and segmentation with a radiometric imaging system operating in the W-band. The imaging system is equipped with a dielectric lens and a receiver array operating at around 94 GHz. Images are analyzed by multilevel segmentation to identify a concealed object. Each level of segmentation comprises vector quantization, expectation-maximization, and Bayesian decision making to cluster pixels on the basis of a Gaussian mixture model. In addition, we describe a faster process that adopts only vector quantization for the first level segmentation. Experiments confirm that the proposed methods provide fast and reliable detection and segmentation for a moving human subject carrying a concealed gun.

  8. Concealing Emotions at Work Is Associated with Allergic Rhinitis in Korea.

    PubMed

    Seok, Hongdeok; Yoon, Jin-Ha; Won, Jong-Uk; Lee, Wanhyung; Lee, June-Hee; Jung, Pil Kyun; Roh, Jaehoon

    2016-01-01

    Concealing emotions at work can cause considerable psychological stress. While there is extensive research on the adverse health effects of concealing emotions and the association between allergic diseases and stress, research has not yet investigated whether concealing emotions at work is associated with allergic rhinitis. Allergic rhinitis is a common disease in many industrialized countries, and its prevalence is increasing. Thus, our aim was to determine the strength of this association using data from three years (2007-2009) of the 4th Korean National Health and Nutrition Examination Survey. Participants (aged 20-64) were 8,345 individuals who were economically active and who had completed the questionnaire items on concealing emotions at work. Odds ratio (OR) and 95% confidence intervals (95% CIs) were calculated for allergic rhinitis using logistic regression models. Among all participants, 3,140 subjects (37.6%) reported concealing their emotions at work: 1,661 men and 1,479 women. The OR (95% CIs) for allergic rhinitis among those who concealed emotions at work versus those who did not was 1.318 (1.148-1.512). Stratified by sex, the OR (95% CIs) was 1.307 (1.078-1.585) among men and 1.346 (1.105-1.639) among women. Thus, individuals who concealed their emotions at work were significantly more likely to have a diagnosis of AR in comparison to those who did not. Because concealing emotions at work has adverse health effects, labor policies that aim to reduce this practice are needed.

  9. Color Blindness Simulations

    MedlinePlus

    ... Coordinator Color blindness Simulations Normal Color Vision Deuteranopia Color blindness marked by confusion of purplish red and green Tritanopia A dichromatism in which the spectrum is seen in tones of red and green. ...

  10. Blind Quantum Signature with Blind Quantum Computation

    NASA Astrophysics Data System (ADS)

    Li, Wei; Shi, Ronghua; Guo, Ying

    2017-04-01

    Blind quantum computation allows a client without quantum abilities to interact with a quantum server to perform a unconditional secure computing protocol, while protecting client's privacy. Motivated by confidentiality of blind quantum computation, a blind quantum signature scheme is designed with laconic structure. Different from the traditional signature schemes, the signing and verifying operations are performed through measurement-based quantum computation. Inputs of blind quantum computation are securely controlled with multi-qubit entangled states. The unique signature of the transmitted message is generated by the signer without leaking information in imperfect channels. Whereas, the receiver can verify the validity of the signature using the quantum matching algorithm. The security is guaranteed by entanglement of quantum system for blind quantum computation. It provides a potential practical application for e-commerce in the cloud computing and first-generation quantum computation.

  11. Blind Quantum Signature with Blind Quantum Computation

    NASA Astrophysics Data System (ADS)

    Li, Wei; Shi, Ronghua; Guo, Ying

    2016-12-01

    Blind quantum computation allows a client without quantum abilities to interact with a quantum server to perform a unconditional secure computing protocol, while protecting client's privacy. Motivated by confidentiality of blind quantum computation, a blind quantum signature scheme is designed with laconic structure. Different from the traditional signature schemes, the signing and verifying operations are performed through measurement-based quantum computation. Inputs of blind quantum computation are securely controlled with multi-qubit entangled states. The unique signature of the transmitted message is generated by the signer without leaking information in imperfect channels. Whereas, the receiver can verify the validity of the signature using the quantum matching algorithm. The security is guaranteed by entanglement of quantum system for blind quantum computation. It provides a potential practical application for e-commerce in the cloud computing and first-generation quantum computation.

  12. Blindness and anorexia nervosa.

    PubMed

    McFarlane, A C

    1989-06-01

    Two cases of anorexia nervosa in blind patients are reported. They demonstrate that blind children experience many developmental problems which are thought to be important in the etiology of anorexia nervosa. Similarly, blind children are unusually susceptible to misperceive their body size and weight. The apparent absence of a strong association between congenital blindness and anorexia nervosa challenges the presumed aetiological link between disturbed body image and identity diffusion, and anorexia nervosa.

  13. Impulse radar imaging system for concealed object detection

    NASA Astrophysics Data System (ADS)

    Podd, F. J. W.; David, M.; Iqbal, G.; Hussain, F.; Morris, D.; Osakue, E.; Yeow, Y.; Zahir, S.; Armitage, D. W.; Peyton, A. J.

    2013-10-01

    Electromagnetic systems for imaging concealed objects at checkpoints typically employ radiation at millimetre and terahertz frequencies. These systems have been shown to be effective and provide a sufficiently high resolution image. However there are difficulties and current electromagnetic systems have limitations particularly in accurately differentiating between threat and innocuous objects based on shape, surface emissivity or reflectivity, which are indicative parameters. In addition, water has a high absorption coefficient at millimetre wavelength and terahertz frequencies, which makes it more difficult for these frequencies to image through thick damp clothing. This paper considers the potential of using ultra wideband (UWB) in the low gigahertz range. The application of this frequency band to security screening appears to be a relatively new field. The business case for implementing the UWB system has been made financially viable by the recent availability of low-cost integrated circuits operating at these frequencies. Although designed for the communication sector, these devices can perform the required UWB radar measurements as well. This paper reports the implementation of a 2 to 5 GHz bandwidth linear array scanner. The paper describes the design and fabrication of transmitter and receiver antenna arrays whose individual elements are a type of antipodal Vivaldi antenna. The antenna's frequency and angular response were simulated in CST Microwave Studio and compared with laboratory measurements. The data pre-processing methods of background subtraction and deconvolution are implemented to improve the image quality. The background subtraction method uses a reference dataset to remove antenna crosstalk and room reflections from the dataset. The deconvolution method uses a Wiener filter to "sharpen" the returned echoes which improves the resolution of the reconstructed image. The filter uses an impulse response reference dataset and a signal

  14. Robust identification of concealed dangerous substances using THz imaging spectroscopy

    NASA Astrophysics Data System (ADS)

    Nystad, Helle E.; Haakestad, Magnus W.; van Rheenen, Arthur D.

    2015-05-01

    False alarm rates must be kept sufficiently low if a method to detect and identify objects or substances is to be implemented in real life applications. This is also true when trying to detect and identify dangerous substances such as explosives and drugs that are concealed in packaging materials. THz technology may be suited to detect these substances, especially when imaging and spectroscopy are combined. To achieve reasonable throughput, the detection and identification process must be automated and this implies reliance on algorithms to perform this task, rather than human beings. The identification part of the algorithm must compare spectral features of the unknown substance with those in a library of features and determining the distance, in some sense, between these features. If the distance is less than some defined threshold a match is declared. In this paper we consider two types of spectral characteristic that are derived from measured time-domain signals measured in the THz regime: the absorbance and its derivative. Also, we consider two schemes to measure the distance between the unknown and library characteristics: Spectral Angle Mapping (SAM) and Principal Component Analysis (PCA). Finally, the effect of windowing of the measured time-domain signal on the performance of the algorithms is studied, by varying the Blackman-Harris (B-H) window width. Algorithm performance is quantified by studying the receiver-operating characteristics (ROC). For the data considered in this study we conclude that the best performance is obtained when the derivative of the absorbance is used in combination with a narrow B-H window and SAM. SAM is a more straight-forward method and requires no large training data sets and tweaking.

  15. Auto-concealment of supersymmetry in extra dimensions

    SciTech Connect

    Dimopoulos, Savas; Howe, Kiel; March-Russell, John; Scoville, James

    2015-06-05

    In supersymmetric (SUSY) theories with extra dimensions the visible energy in sparticle decays can be significantly reduced and its energy distribution broadened, thus significantly weakening the present collider limits on SUSY. The mechanism applies when the lightest supersymmetric particle (LSP) is a bulk state — e.g. a bulk modulino, axino, or gravitino — the size of the extra dimensions ≳ 10–14 cm, and for a broad variety of visible sparticle spectra. In such cases the lightest ordinary supersymmetric particle (LOSP), necessarily a brane-localised state, decays to the Kaluza-Klein (KK) discretuum of the LSP. This dynamically realises the compression mechanism for hiding SUSY as decays into the more numerous heavier KK LSP states are favored. We find LHC limits on right-handed slepton LOSPs evaporate, while LHC limits on stop LOSPs weaken to ~350 ÷ 410 GeV compared to ~700 GeV for a stop decaying to a massless LSP. Similarly, for the searches we consider, present limits on direct production of degenerate first and second generation squarks drop to ~450 GeV compared to ~800 GeV for a squark decaying to a massless LSP. Auto-concealment typically works for a fundamental gravitational scale of M* ~10 ÷ 100 TeV, a scale sufficiently high that traditional searches for signatures of extra dimensions are mostly avoided. If superpartners are discovered, their prompt, displaced, or stopped decays can also provide new search opportunities for extra dimensions with the potential to reach M* ~109 GeV. As a result, this mechanism applies more generally than just SUSY theories, pertaining to any theory where there is a discrete quantum number shared by both brane and bulk sectors.

  16. Auto-concealment of supersymmetry in extra dimensions

    DOE PAGES

    Dimopoulos, Savas; Howe, Kiel; March-Russell, John; ...

    2015-06-05

    In supersymmetric (SUSY) theories with extra dimensions the visible energy in sparticle decays can be significantly reduced and its energy distribution broadened, thus significantly weakening the present collider limits on SUSY. The mechanism applies when the lightest supersymmetric particle (LSP) is a bulk state — e.g. a bulk modulino, axino, or gravitino — the size of the extra dimensions ≳ 10–14 cm, and for a broad variety of visible sparticle spectra. In such cases the lightest ordinary supersymmetric particle (LOSP), necessarily a brane-localised state, decays to the Kaluza-Klein (KK) discretuum of the LSP. This dynamically realises the compression mechanism formore » hiding SUSY as decays into the more numerous heavier KK LSP states are favored. We find LHC limits on right-handed slepton LOSPs evaporate, while LHC limits on stop LOSPs weaken to ~350 ÷ 410 GeV compared to ~700 GeV for a stop decaying to a massless LSP. Similarly, for the searches we consider, present limits on direct production of degenerate first and second generation squarks drop to ~450 GeV compared to ~800 GeV for a squark decaying to a massless LSP. Auto-concealment typically works for a fundamental gravitational scale of M* ~10 ÷ 100 TeV, a scale sufficiently high that traditional searches for signatures of extra dimensions are mostly avoided. If superpartners are discovered, their prompt, displaced, or stopped decays can also provide new search opportunities for extra dimensions with the potential to reach M* ~109 GeV. As a result, this mechanism applies more generally than just SUSY theories, pertaining to any theory where there is a discrete quantum number shared by both brane and bulk sectors.« less

  17. [Abortion in unsafe conditions. Concealment, illegality, corruption and negligence].

    PubMed

    Ortiz Ortega, A

    1993-01-01

    "Abortion practiced under conditions of risk" is a phrase used to refer to illegal abortion. The phrase does not highlight the disappearance of risk when legislation changes. Rather, it calls attention to the fact that legal restrictions significantly increase dangers while failing to discourage women determined to terminate pregnancies. The International Planned Parenthood Federation defines abortion under conditions of risk as the use of nonoptimal technology, lack of counseling and services to orient the woman's decision and provide postabortion counseling, and the limitation of freedom to make the decision. The phrase encompasses concealment, illegality, corruption, and negligence. It is designed to impose a reproductive health perspective in response to an unresolved social conflict. Steps have been developed to improve the situation of women undergoing abortion even without a change in its legal status. Such steps include training and purchase of equipment for treatment of incomplete abortions and development of counseling and family planning services. The central difficulty of abortion induced in conditions of risk derives from the laws imposing the need for secrecy. In Mexico, the abortion decision belongs to the government and the society, while individual absorb the consequences of the practice of abortion. Public decision making about abortion is dominated by the concept that the female has an obligation to carry any pregnancy to term. Women who interfere with male descendency and practice a sexuality distinct from reproduction are made to pay a price in health and emotional balance. Resolution of the problem of abortion will require new concepts in terms of legal status, public health issues, and the rights of women. The problem becomes more pressing as abortion becomes more common in a country anxious to advance in the demographic transition. Only a commitment to the reproductive health of women and the full development of their rights as citizens will

  18. Geometry, structure, and concealed lithology of the San Rafael Basin, southeastern Arizona

    USGS Publications Warehouse

    Bultman, Mark W.

    1999-01-01

    The contiguous United States has been well explored for exposed conventional mineral deposits. Therefore, it is likely that many economically viable and strategically significant conventional undiscovered mineral deposits will be found in bedrock concealed beneath basin sediments. Mineral resource assessments must incorporate an understanding of the geometry, structure, and concealed lithology of basins in order to be accurate. This report presents an analysis of the basin geometry and structure of the San Rafael basin in southeastern Arizona. In addition, a new methodology for inferring concealed lithology is presented and applied in the San Rafael basin. Gravity data is used to model the geometry of the basin using recent models of sediment density vs. depth developed in the region. This modeling indicates that the basin has a maximum depth of approximately 1.05 km plus or minus 0.10 km. In the southern portion, the basin can be modeled as an asymmetric graben faulted on the western margin. The northern portion of the basin is structurally more complex and may have high angle faults on the western, northern, and eastern margin. Near-ground closely spaced Earth’s total intensity magnetic field data is used to locate concealed faults within the basin. This data is also used to infer lithology concealed by shallow basin sediments. Airborne Earth’s total intensity magnetic field data is used to help infer concealed lithology in deep portions of the basin. The product of integrating all data and interpretations is a map which presents the geometry of the basin, faults and contacts concealed by basin sediments, and an estimate of the bedrock lithology concealed by basin sediment. Based on basin geometry and concealed lithology, the San Rafael basin has a high potential for concealed mineral deposits on its western and northern margin. In particular, a newly discovered magnetic anomaly in the northern portion of the basin can be modeled as a granitic intrusion with

  19. Giving Eyesight to the Blind: Towards Attention-Aware AIED

    ERIC Educational Resources Information Center

    D'Mello, Sidney K.

    2016-01-01

    There is an inextricable link between attention and learning, yet AIED systems in 2015 are largely blind to learners' attentional states. We argue that next-generation AIED systems should have the ability to monitor and dynamically (re)direct attention in order to optimize allocation of sparse attentional resources. We present some initial ideas…

  20. Global data on blindness.

    PubMed Central

    Thylefors, B.; Négrel, A. D.; Pararajasegaram, R.; Dadzie, K. Y.

    1995-01-01

    Globally, it is estimated that there are 38 million persons who are blind. Moreover, a further 110 million people have low vision and are at great risk of becoming blind. The main causes of blindness and low vision are cataract, trachoma, glaucoma, onchocerciasis, and xerophthalmia; however, insufficient data on blindness from causes such as diabetic retinopathy and age-related macular degeneration preclude specific estimations of their global prevalence. The age-specific prevalences of the major causes of blindness that are related to age indicate that the trend will be for an increase in such blindness over the decades to come, unless energetic efforts are made to tackle these problems. More data collected through standardized methodologies, using internationally accepted (ICD-10) definitions, are needed. Data on the incidence of blindness due to common causes would be useful for calculating future trends more precisely. PMID:7704921

  1. Refractive error blindness.

    PubMed Central

    Dandona, R.; Dandona, L.

    2001-01-01

    Recent data suggest that a large number of people are blind in different parts of the world due to high refractive error because they are not using appropriate refractive correction. Refractive error as a cause of blindness has been recognized only recently with the increasing use of presenting visual acuity for defining blindness. In addition to blindness due to naturally occurring high refractive error, inadequate refractive correction of aphakia after cataract surgery is also a significant cause of blindness in developing countries. Blindness due to refractive error in any population suggests that eye care services in general in that population are inadequate since treatment of refractive error is perhaps the simplest and most effective form of eye care. Strategies such as vision screening programmes need to be implemented on a large scale to detect individuals suffering from refractive error blindness. Sufficient numbers of personnel to perform reasonable quality refraction need to be trained in developing countries. Also adequate infrastructure has to be developed in underserved areas of the world to facilitate the logistics of providing affordable reasonable-quality spectacles to individuals suffering from refractive error blindness. Long-term success in reducing refractive error blindness worldwide will require attention to these issues within the context of comprehensive approaches to reduce all causes of avoidable blindness. PMID:11285669

  2. Exploring the characteristics of the attentional blink paradigm when used to discover concealed knowledge.

    PubMed

    Niziurski, Julie; Andre, Jeffrey

    2015-12-01

    Ganis and Patnaik (Appl Psychophysiol Biofeedback 34:189-196, 2009) reported that the attentional blink paradigm using faces could be used to detect the presence of concealed knowledge. The attentional blink is defined as the inability to successfully detect the second of two target items presented within a short inter-stimulus interval. The present study tested the use of the attentional blink paradigm in a concealed knowledge test by investigating the effect that familiar faces may have on the attentional blink. Participants completed 200 trials where they were told to look for the same familiar target (Target 2; actor Brad Pitt) that was intermixed with neutral face stimuli and one other familiar face (Target 1; actor George Clooney). Target 1 was to act as the concealed knowledge as participants familiar with Target 1 would be distracted by his unannounced presence and report not seeing Target 2 thereby showing an attentional blink. Despite all participants being familiar with Target 2, an attentional blink still occurred, but with higher than normal Target 2 accuracy rates. Overall, we found support for using the AB paradigm with the concealed knowledge test; however, a possible countermeasure to the attentional blink is familiarity with Target 2 as eight of 21 participants who recognized Target 1 (the concealed knowledge) were also able to detect Target 2 on 100 % of the trials where Target 1's presence should have created an attentional blink.

  3. How many more guns?: Estimating the effect of allowing licensed concealed handguns on a college campus.

    PubMed

    Bouffard, Jeffrey A; Nobles, Matt R; Wells, William; Cavanaugh, Michael R

    2012-01-01

    Among other arguments, advocates for lifting bans on carrying concealed handguns on campus propose that this would increase the prevalence of legitimately carried handguns, which might then deter crimes or be used to intervene in campus shooting incidents like the one that took place at Virginia Tech in 2007. Opponents suggest that increased prevalence of concealed handguns would lead to increases in other negative consequences, such as accidental shootings. Little empirical research has examined the potential outcomes of such a policy change, nor has existing research examined the prerequisite issue of whether lifting these bans would result in substantial increases in the prevalence of concealed handguns among students. Using a sample of undergraduate classrooms selected from five academic buildings at a public university in Texas, this study examines the potential impact of lifting the concealed handgun ban on the likelihood that a given classroom would contain at least one legally carried handgun. Results reveal that the impact of potential policy changes in this area vary based on the building under consideration and the measure of potential handgun prevalence. Limitations of the study and implications for future research on the issue of concealed handgun carrying on college campuses are discussed.

  4. Real-time concealed-object detection and recognition with passive millimeter wave imaging.

    PubMed

    Yeom, Seokwon; Lee, Dong-Su; Jang, Yushin; Lee, Mun-Kyo; Jung, Sang-Won

    2012-04-23

    Millimeter wave (MMW) imaging is finding rapid adoption in security applications such as concealed object detection under clothing. A passive MMW imaging system can operate as a stand-off type sensor that scans people in both indoors and outdoors. However, the imaging system often suffers from the diffraction limit and the low signal level. Therefore, suitable intelligent image processing algorithms would be required for automatic detection and recognition of the concealed objects. This paper proposes real-time outdoor concealed-object detection and recognition with a radiometric imaging system. The concealed object region is extracted by the multi-level segmentation. A novel approach is proposed to measure similarity between two binary images. Principal component analysis (PCA) regularizes the shape in terms of translation and rotation. A geometric-based feature vector is composed of shape descriptors, which can achieve scale and orientation-invariant and distortion-tolerant property. Class is decided by minimum Euclidean distance between normalized feature vectors. Experiments confirm that the proposed methods provide fast and reliable recognition of the concealed object carried by a moving human subject.

  5. Segmentation of Concealed Objects in Passive Millimeter-Wave Images Based on the Gaussian Mixture Model

    NASA Astrophysics Data System (ADS)

    Yu, Wangyang; Chen, Xiangguang; Wu, Lei

    2015-04-01

    Passive millimeter wave (PMMW) imaging has become one of the most effective means to detect the objects concealed under clothing. Due to the limitations of the available hardware and the inherent physical properties of PMMW imaging systems, images often exhibit poor contrast and low signal-to-noise ratios. Thus, it is difficult to achieve ideal results by using a general segmentation algorithm. In this paper, an advanced Gaussian Mixture Model (GMM) algorithm for the segmentation of concealed objects in PMMW images is presented. Our work is concerned with the fact that the GMM is a parametric statistical model, which is often used to characterize the statistical behavior of images. Our approach is three-fold: First, we remove the noise from the image using both a notch reject filter and a total variation filter. Next, we use an adaptive parameter initialization GMM algorithm (APIGMM) for simulating the histogram of images. The APIGMM provides an initial number of Gaussian components and start with more appropriate parameter. Bayesian decision is employed to separate the pixels of concealed objects from other areas. At last, the confidence interval (CI) method, alongside local gradient information, is used to extract the concealed objects. The proposed hybrid segmentation approach detects the concealed objects more accurately, even compared to two other state-of-the-art segmentation methods.

  6. Drug Use and Spatial Dynamics of Household Allocation

    PubMed Central

    Dunlap, Eloise; Brown, Emma J

    2016-01-01

    Household space allocation by women who consume drugs in New York and North Florida is depicted to demonstrate the complex character of household space and social relations. Some parents attempt to hide their drug consumption through the allocation space in the household for drug use. Women allocation of space for drug use within their households and the impact of this on the household are relevant issues with implications for therapy and prevention. Objective The use of household space has not been a focus of social scientists. Middle class households have been used by decoration literature to specify space utilization. Modest literature pay attention to the utilization of household space among drug focused households. Analysis herein looks at the lived social relations of drug users to their children through controlling household space. Methods Data presented comes from two studies, New York and Florida. The studies involved a total of 158 participants in 72 families from New York and 26 participants in 23 families in North Florida. Both researches used an ethnographic methodology focusing on a variety of behavior patterns and conduct norms occurring within drug abusing households. Repeated interviews and observations took place in households which were visited at different times and days of the week. Florida study was conducted over a 2-year period; New York study took place over a 5-year period. Results Data suggest parents attempted to conceal their drug use from their offspring by using various strategies. Mental, social, and physical were tied together in space allocation. Household space acquired a different meaning and arose from use practice. Conclusion In urban and rural settings a pattern of household allocation space and drug consumption is emerging. Although drug consumption is still prominent, it is not all consuming or the primary focus in the lives of women who use drugs. These women may have learned to integrate their consumption into their daily

  7. Real-time detection of concealed chemical hazards under ambient light conditions using Raman spectroscopy.

    PubMed

    Cletus, Biju; Olds, William; Fredericks, Peter M; Jaatinen, Esa; Izake, Emad L

    2013-07-01

    Current concerns regarding terrorism and international crime highlight the need for new techniques for detecting unknown and hazardous substances. A novel Raman spectroscopy-based technique, spatially offset Raman spectroscopy (SORS), was recently devised for noninvasively probing the contents of diffusely scattering and opaque containers. Here, we demonstrate a modified portable SORS sensor for detecting concealed substances in-field under different background lighting conditions. Samples including explosive precursors, drugs, and an organophosphate insecticide (chemical warfare agent surrogate) were concealed inside diffusely scattering packaging including plastic, paper, and cloth. Measurements were carried out under incandescent and fluorescent light as well as under daylight to assess the suitability of the probe for different real-life conditions. In each case, it was possible to identify the substances against their reference Raman spectra in less than 1 min. The developed sensor has potential for rapid detection of concealed hazardous substances in airports, mail distribution centers, and customs checkpoints.

  8. Approaches to Resource Allocation

    ERIC Educational Resources Information Center

    Dressel, Paul; Simon, Lou Anna Kimsey

    1976-01-01

    Various budgeting patterns and strategies are currently in use, each with its own particular strengths and weaknesses. Neither cost-benefit analysis nor cost-effectiveness analysis offers any better solution to the allocation problem than do the unsupported contentions of departments or the historical unit costs. An operable model that performs…

  9. Faculty perceptions and practices regarding carrying concealed handguns on university campuses.

    PubMed

    Thompson, Amy; Price, James H; Dake, Joseph; Teeple, Karen

    2013-04-01

    The presence of firearms in an environment significantly increases firearm trauma. So far, four states have passed legislation permitting the carrying of concealed handguns on university campuses and several other states are considering such legislation. The purpose of this study to assess the perceptions and practices of college faculty regarding support for carrying concealed handguns on their campuses. A valid and reliable questionnaire was sent to a random sample of 1,125 faculty at 15 randomly selected state universities in five Great Lakes states. A two wave postal mailing in the Spring of 2012 was conducted to help ensure an adequate response rate. A total of 791 (70 %) of the faculty responded. The vast majority felt safe on their campuses (98 %) and were not supportive of people carrying concealed handguns on their campuses (94 %). Seven of the eight potential disadvantages of carrying concealed handguns on campus were supported by the majority of faculty members. Those who were significantly more likely to perceive there to be disadvantages to carrying concealed handguns on campus were: those who did not own a firearm (OR = 4.89), Democrats (OR = 4.52) or Independents (OR = 2.25), Asians (OR = 2.49), and females (OR = 1.51). The vast majority of faculty felt safe on their campuses and perceived that carrying concealed handguns on campuses create more risks than benefits to the campus environment. Aggressive efforts are needed to help maintain the uniquely safe environment of college campuses.

  10. Time delay signature concealment of optical feedback induced chaos in an external cavity semiconductor laser.

    PubMed

    Wu, Jia-Gui; Xia, Guang-Qiong; Tang, Xi; Lin, Xiao-Dong; Deng, Tao; Fan, Li; Wu, Zheng-Mao

    2010-03-29

    The time delay (TD) signature concealment of optical feedback induced chaos in an external cavity semiconductor laser is experimentally demonstrated. Both the evolution curve and the distribution map of TD signature are obtained in the parameter space of external feedback strength and injection current. The optimum parameter scope of the TD signature concealment is also specified. Furthermore, the approximately periodic evolution relation between TD signature and external cavity length is observed and indicates that the intrinsic relaxation oscillation of semiconductor laser may play an important role during the process of TD signature suppression.

  11. The association between concealing emotions at work and medical utilization in Korea

    PubMed Central

    2014-01-01

    Objectives We aimed to investigate the association between concealing emotions at work and medical utilization. Methods Data from the 2007–2009 4th Korea National Health and Nutrition Examination Survey (KNHANES IV) was used, 7,094 participants (3,837 males, 3,257 females) aged between 20 and 54 who were economically active and completed all necessary questionnaire items were included. Odds ratios (ORs) and 95% confidence intervals (95% CI) for differences in hospitalization, outpatient visits, and pharmaceutical drug use between those who concealed their emotions and those who did not were investigated using logistic regression models with and without gender stratification. Results Among those who concealed their emotions (n = 2,763), 47.4% were females, and 50.1% had chronic disease. In addition, 9.7% of the concealing emotions group had been hospitalized within the last year, 24.8% had been outpatients in the last two weeks, and 28.3% had used pharmaceutical drugs in the last two weeks. All ORs represent the odds of belonging to the concealing emotions group over the non-concealing emotions group. After adjustment for individual, occupational, socioeconomic and disease factors, the adjusted ORs (95% CI) in hospitalization are 1.29 (1.08 ~ 1.53) in the total population, 1.25 (0.98 ~ 1.60) in males and 1.30 (1.02 ~ 1.66) in females, in outpatient visits are 1.15 (1.02 ~ 1.29) in the total population, 1.05 (0.88 ~ 1.24) in males and 1.25 (1.06 ~ 1.47) in females and in pharmaceutical drug use are 1.12 (1.01 ~ 1.25) in the total population, 1.08 (0.92 ~ 1.27) in males and 1.14 (0.98 ~ 1.33) in females. Conclusions Those who concealed their emotions at work were more likely to use medical services. Moreover, the health effects of concealing emotions at work might be more detrimental in women than in men. PMID:25852941

  12. Identifying the location of a concealed object through unintentional eye movements.

    PubMed

    Neuman, Yair; Assaf, Dan; Israeli, Navot

    2015-01-01

    In some investigative and interrogative contexts, the investigator is seeking to identify the location of an object (e.g., implanted bomb) which is known to a given subject (e.g., a terrorist). In this paper, we present a non-intrusive methodology for uncovering the loci of a concealed object by analyzing the subject's eye movements. Using a combination of eye tracking, psychological manipulation and a search algorithm, we have performed two experiments. In the first experiment, we have gained 58% hit rate in identifying the location of the concealed object and in the second experiment 56% hit rate. The pros and cons of the methodology for forensic investigation are discussed.

  13. Blindness and Yoga

    ERIC Educational Resources Information Center

    Heyes, Anthony David

    1974-01-01

    Evidence is presented to support the claims that, among many blind persons, physical inactivity leads to poor physical fitness; that a state of anxiety is often a concomitant of unguided blind mobility; and that Yogic practices offer a solution to both difficulties. (GW)

  14. "Color-Blind" Racism.

    ERIC Educational Resources Information Center

    Carr, Leslie G.

    Examining race relations in the United States from a historical perspective, this book explains how the constitution is racist and how color blindness is actually a racist ideology. It is argued that Justice Harlan, in his dissenting opinion in Plessy v. Ferguson, meant that the constitution and the law must remain blind to the existence of race…

  15. Blindness after intranasal ethmoidectomy.

    PubMed

    Sözeri, B; Ataman, M; Gürsel, B

    1993-06-01

    Orbital haemorrhage is an unusual and frustrating complication of ethmoid surgery. A case of reversible blindness which was due to intra-operative orbital haemorrhage occurring after intranasal ethmoidectomy is presented. Prevention and management of this kind of blindness can be reversed, if treated aggressively.

  16. Change blindness images.

    PubMed

    Ma, Li-Qian; Xu, Kun; Wong, Tien-Tsin; Jiang, Bi-Ye; Hu, Shi-Min

    2013-11-01

    Change blindness refers to human inability to recognize large visual changes between images. In this paper, we present the first computational model of change blindness to quantify the degree of blindness between an image pair. It comprises a novel context-dependent saliency model and a measure of change, the former dependent on the site of the change, and the latter describing the amount of change. This saliency model in particular addresses the influence of background complexity, which plays an important role in the phenomenon of change blindness. Using the proposed computational model, we are able to synthesize changed images with desired degrees of blindness. User studies and comparisons to state-of-the-art saliency models demonstrate the effectiveness of our model.

  17. Constrained control allocation

    NASA Technical Reports Server (NTRS)

    Durham, Wayne C.

    1992-01-01

    This paper addresses the problem of the allocation of several flight controls to the generation of specified body-axis moments. The number of controls is greater than the number of moments being controlled, and the ranges of the controls are constrained to certain limits. The controls are assumed to be individually linear in their effect throughout their ranges of motion, and independent of one another in their effects. The geometries of the subset of the constrained controls and of its image in moment space are examined. A direct method of allocating these several controls is presented, that guarantees the maximum possible moment is generated within the constraints of the controls. The results are illustrated by an example problem involving three controls and two moments.

  18. Myrmics Memory Allocator

    SciTech Connect

    Lymperis, S.

    2011-09-23

    MMA is a stand-alone memory management system for MPI clusters. It implements a shared Partitioned Global Address Space, where multiple MPI processes request objects from the allocator and the latter provides them with system-wide unique memory addresses for each object. It provides applications with an intuitive way of managing the memory system in a unified way, thus enabling easier writing of irregular application code.

  19. Blinded by Irrelevance: Pure Irrelevance Induced "Blindness"

    ERIC Educational Resources Information Center

    Eitam, Baruch; Yeshurun, Yaffa; Hassan, Kinneret

    2013-01-01

    To what degree does our representation of the immediate world depend solely on its relevance to what we are currently doing? We examined whether relevance per se can cause "blindness," even when there is no resource limitation. In a novel paradigm, people looked at a colored circle surrounded by a differently colored ring--the task relevance of…

  20. How "Blind" Are Double-Blind Studies?

    ERIC Educational Resources Information Center

    Margraf, Jurgen; And Others

    1991-01-01

    Compared alprazolam, imipramine, and placebo in the treatment of panic disorder patients (n=59) to investigate concerns about the internal validity of the double-blind design. Found that the great majority of patients and physicians were able to rate accurately whether active drug or placebo had been given and physicians could distinguish between…

  1. A time period study on the efficiency of luminol in the detection of bloodstains concealed by paint on different surfaces.

    PubMed

    Nagesh, Deepthi; Ghosh, Shayani

    2017-02-11

    Forensic Science is the application of science to the criminal and civil laws that are enforced by police agencies in a criminal justice system. It is a science which relies on physical evidence; one of the important physical evidences being blood. The purpose of this research was to determine the efficacy of luminol reagent in detecting bloodstains on different surfaces, concealed by multiple layers of paint, over a period of time and also to compare the intensities of chemiluminescence exhibited by them. In this study, dry wall, wooden planks and metal surfaces were identified as commonly encountered surfaces at crime scenes and hence 25 of each surface were simulated and blood was spattered, which were then concealed by progressive layers of paint specific to each surface. Thereafter, each surface was critically observed for the intensity of chemiluminescence, following the application of luminol and the results were documented as photographs. The research was conducted for duration of 50 days, in order to study the effect of ageing of concealment upon detection of bloodstains using luminol. Varying intensities of chemiluminescence were displayed by all the three simulated surfaces deposited with paint over bloodstains up to three layers of concealment, depending on the nature of the surface which were captured using photography. The highest intensity of chemiluminescence was shown by concealed bloodstains on dry wall and metal surfaces, despite the number of layers of concealment. However, an increase in the number of layers of concealment produced a significant decrease in the intensity of chemiluminescenece displayed by the bloodstains concealed by paint upon reacting with luminol on metal sheets, which was not found to be uniform and consistent on the other surfaces. These findings highlight the fact that bloodstains concealed by paint could be effectively detected by luminol reagent, despite the nature and ageing of concealment and thereby provide a lead to

  2. Novel, ERP-based, concealed information detection: Combining recognition-based and feedback-evoked ERPs.

    PubMed

    Sai, Liyang; Lin, Xiaohong; Rosenfeld, J Peter; Sang, Biao; Hu, Xiaoqing; Fu, Genyue

    2016-02-01

    The present study introduced a novel variant of the concealed information test (CIT), called the feedback-CIT. By providing participants with feedbacks regarding their memory concealment performance during the CIT, we investigated the feedback-related neural activity underlying memory concealment. Participants acquired crime-relevant memories via enacting a lab crime, and were tested with the feedback-CIT while EEGs were recorded. We found that probes (e.g., crime-relevant memories) elicited larger recognition-P300s than irrelevants among guilty participants. Moreover, feedback-related negativity (FRN) and feedback-P300 could also discriminate probes from irrelevants among guilty participants. Both recognition- and feedback-ERPs were highly effective in distinguishing between guilty and innocent participants (recognition-P300: AUC=.73; FRN: AUC=.95; feedback-P300: AUC=.97). This study sheds new light on brain-based memory detection, such that feedback-related neural signals can be employed to detect concealed memories.

  3. The Cost of Question Concealment: Eye-Tracking and MEG Evidence

    ERIC Educational Resources Information Center

    Harris, Jesse; Pylkkanen, Liina; McElree, Brian; Frisson, Steven

    2008-01-01

    Although natural language appears to be largely compositional, the meanings of certain expressions cannot be straightforwardly recovered from the meanings of their parts. This study examined the online processing of one such class of expressions: "concealed questions", in which the meaning of a complex noun phrase ("the proof of the theorem")…

  4. Ego Identity, Social Anxiety, Social Support, and Self-Concealment in Lesbian, Gay, and Bisexual Individuals

    ERIC Educational Resources Information Center

    Potoczniak, Daniel J.; Aldea, Mirela A.; DeBlaere, Cirleen

    2007-01-01

    This study examined a model in which the relationship between social anxiety and two dimensions of ego identity (commitment and exploration) was expected to be mediated by social support and self-concealment for a sample of lesbian, gay, and bisexual individuals (N=347). Statistically significant paths were found from social anxiety to social…

  5. A neighbourhood analysis based technique for real-time error concealment in H.264 intra pictures

    NASA Astrophysics Data System (ADS)

    Beesley, Steven T. C.; Grecos, Christos; Edirisinghe, Eran

    2007-02-01

    H.264s extensive use of context-based adaptive binary arithmetic or variable length coding makes streams highly susceptible to channel errors, a common occurrence over networks such as those used by mobile devices. Even a single bit error will cause a decoder to discard all stream data up to the next fixed length resynchronisation point, the worst scenario is that an entire slice is lost. In cases where retransmission and forward error concealment are not possible, a decoder should conceal any erroneous data in order to minimise the impact on the viewer. Stream errors can often be spotted early in the decode cycle of a macroblock which if aborted can provide unused processor cycles, these can instead be used to conceal errors at minimal cost, even as part of a real time system. This paper demonstrates a technique that utilises Sobel convolution kernels to quickly analyse the neighbourhood surrounding erroneous macroblocks before performing a weighted multi-directional interpolation. This generates significantly improved statistical (PSNR) and visual (IEEE structural similarity) results when compared to the commonly used weighted pixel value averaging. Furthermore it is also computationally scalable, both during analysis and concealment, achieving maximum performance from the spare processing power available.

  6. 36-Month-Olds Conceal Visual and Auditory Information from Others

    ERIC Educational Resources Information Center

    Melis, Alicia P.; Call, Josep; Tomasello, Michael

    2010-01-01

    By three years of age, children are skilled at assessing under which circumstances others can see things. However, nothing is known about whether they can use this knowledge to guide their own deceptive behaviour. Here we investigated 3-year-olds' ability to strategically inhibit or conceal forbidden actions that a nearby adult experimenter could…

  7. Fear Perceptions in Public Parks: Interactions of Environmental Concealment, the Presence of People Recreating, and Gender

    ERIC Educational Resources Information Center

    Jorgensen, Lisa J.; Ellis, Gary D.; Ruddell, Edward

    2013-01-01

    This research examined the effect of concealment (environmental cues), presence or absence of people recreating (social cues), and gender on individuals' fear of crime in a community park setting. Using a 7-point single-item indicator, 732 participants from two samples (540 park visitors and 192 college students) rated their estimates of fear of…

  8. The Effects of Concealing Academic Achievement Information on Adolescents' Self-Concept

    ERIC Educational Resources Information Center

    Zhang, Baoshan; Wang, Mo; Li, Juan; Yu, Guoliang; Bi, Yan-Ling

    2011-01-01

    Using an experimental design, the effect of concealing academic achievement information on adolescents' self-concept was examined in the current study. Specifically, adolescents with low academic achievement and adolescents with average to high academic achievement (N = 129) were randomly assigned to different interview contexts wherein…

  9. Digital image processing in the SECURE concealed-object detection system

    NASA Astrophysics Data System (ADS)

    Smith, Steven W.

    1993-04-01

    A new technology has been developed for detecting explosives and other dangerous objects concealed under persons' clothing. The 'Subambient Exposure, Computer Utilized Reflected Energy' (SECURE) method uses a very low level of back-scattered x-rays in conjunction with digital image processing to produce an image of the person and any concealed objects. Image processing algorithms, used in the system are directed at presenting information to a human operator in the best possible manner for foreign object detection. These algorithms are viewed as being near optimum, and additional development is probably not justified. Algorithm development is needed in the area of automatic threat detection. This has the potential of reducing the invasion of privacy associated with having a security operator view each image. It also has the potential of reducing the serious problem of operator complacency. In one approach, the new algorithm must (1) recognize and isolate objects in the image, (2) discriminate between concealed objects and human anatomy, and (3) discriminate between dangerous and benign concealed objects. The images produced with the SECURE technology are extremely noisy due to the low levels of radiation used. Any algorithm developed must perform well in this noisy environment. Execution of the algorithm must be accomplished in less than a few seconds. Hardware to implement the algorithm must be of a complexity and cost compatible with the commercial SECURE system.

  10. Productive and Inclusive? How Documentation Concealed Racialising Practices in a Diversity Project

    ERIC Educational Resources Information Center

    Miller, Melinda G.

    2014-01-01

    This article examines how documentation concealed racialising practices in a diversity project that was seen to be productive and inclusive. Documentation examples are taken from a doctoral study about embedding Indigenous perspectives in early childhood education curricula in two Australian urban childcare centres. In place of reporting examples…

  11. University Presidents' Perceptions and Practice Regarding the Carrying of Concealed Handguns on College Campuses

    ERIC Educational Resources Information Center

    Price, James H.; Thompson, Amy; Khubchandani, Jagdish; Dake, Joseph; Payton, Erica; Teeple, Karen

    2014-01-01

    Objective: To assess the perceptions and practices of a national sample of college and university presidents regarding their support for concealed handguns being carried on college campuses. Participants: The sample for this study consisted of a national random sample of 900 college or university presidents. Methods: In the spring of 2013, a…

  12. How Many More Guns?: Estimating the Effect of Allowing Licensed Concealed Handguns on a College Campus

    ERIC Educational Resources Information Center

    Bouffard, Jeffrey A.; Nobles, Matt R.; Wells, William; Cavanaugh, Michael R.

    2012-01-01

    Among other arguments, advocates for lifting bans on carrying concealed handguns on campus propose that this would increase the prevalence of legitimately carried handguns, which might then deter crimes or be used to intervene in campus shooting incidents like the one that took place at Virginia Tech in 2007. Opponents suggest that increased…

  13. Leading Causes of Blindness

    MedlinePlus

    ... Cataract. Photo courtesy of National Eye Institute, NIH Cataracts Cataracts are a clouding of the lenses in your ... older people. More than 22 million Americans have cataracts. They are the leading cause of blindness in ...

  14. Vision - night blindness

    MedlinePlus

    ... People with night blindness often have trouble seeing stars on a clear night or walking through a ... certain drugs Vitamin A deficiency (rare) Nontreatable causes: Birth defects Retinitis pigmentosa

  15. Computationally efficient control allocation

    NASA Technical Reports Server (NTRS)

    Durham, Wayne (Inventor)

    2001-01-01

    A computationally efficient method for calculating near-optimal solutions to the three-objective, linear control allocation problem is disclosed. The control allocation problem is that of distributing the effort of redundant control effectors to achieve some desired set of objectives. The problem is deemed linear if control effectiveness is affine with respect to the individual control effectors. The optimal solution is that which exploits the collective maximum capability of the effectors within their individual physical limits. Computational efficiency is measured by the number of floating-point operations required for solution. The method presented returned optimal solutions in more than 90% of the cases examined; non-optimal solutions returned by the method were typically much less than 1% different from optimal and the errors tended to become smaller than 0.01% as the number of controls was increased. The magnitude of the errors returned by the present method was much smaller than those that resulted from either pseudo inverse or cascaded generalized inverse solutions. The computational complexity of the method presented varied linearly with increasing numbers of controls; the number of required floating point operations increased from 5.5 i, to seven times faster than did the minimum-norm solution (the pseudoinverse), and at about the same rate as did the cascaded generalized inverse solution. The computational requirements of the method presented were much better than that of previously described facet-searching methods which increase in proportion to the square of the number of controls.

  16. Out and healthy: Being more "out" about a concealable stigmatized identity may boost the health benefits of social support.

    PubMed

    Weisz, Bradley M; Quinn, Diane M; Williams, Michelle K

    2016-12-01

    This research examined whether the relationship between perceived social support and health would be moderated by level of outness for people living with different concealable stigmatized identities (mental illness, substance abuse, domestic violence, rape, or childhood abuse). A total of 394 people living with a concealable stigmatized identity completed a survey. Consistent with hypotheses, at high levels of outness, social support predicted better health; at low levels of outness, social support was less predictive of health. People concealing a stigmatized identity may only be able to reap the health benefits of social support if they are "out" about the stigmatized identity.

  17. Standard Deviation and Intra Prediction Mode Based Adaptive Spatial Error Concealment (SEC) in H.264/AVC

    NASA Astrophysics Data System (ADS)

    Wang, Jun; Wang, Lei; Ikenaga, Takeshi; Goto, Satoshi

    Transmission of compressed video over error prone channels may result in packet losses or errors, which can significantly degrade the image quality. Therefore an error concealment scheme is applied at the video receiver side to mask the damaged video. Considering there are 3 types of MBs (Macro Blocks) in natural video frame, i. e., Textural MB, Edged MB, and Smooth MB, this paper proposes an adaptive spatial error concealment which can choose 3 different methods for these 3 different MBs. For criteria of choosing appropriate method, 2 factors are taken into consideration. Firstly, standard deviation of our proposed edge statistical model is exploited. Secondly, some new features of latest video compression standard H.264/AVC, i. e., intra prediction mode is also considered for criterion formulation. Compared with previous works, which are only based on deterministic measurement, proposed method achieves the best image recovery. Subjective and objective image quality evaluations in experiments confirmed this.

  18. Identifying the location of a concealed object through unintentional eye movements

    PubMed Central

    Neuman, Yair; Assaf, Dan; Israeli, Navot

    2015-01-01

    In some investigative and interrogative contexts, the investigator is seeking to identify the location of an object (e.g., implanted bomb) which is known to a given subject (e.g., a terrorist). In this paper, we present a non-intrusive methodology for uncovering the loci of a concealed object by analyzing the subject's eye movements. Using a combination of eye tracking, psychological manipulation and a search algorithm, we have performed two experiments. In the first experiment, we have gained 58% hit rate in identifying the location of the concealed object and in the second experiment 56% hit rate. The pros and cons of the methodology for forensic investigation are discussed. PMID:25904879

  19. A mock terrorism application of the P300-based concealed information test.

    PubMed

    Meixner, John B; Rosenfeld, J Peter

    2011-02-01

    Previous studies examining the P300-based concealed information test typically tested for mock crime or autobiographical details, but no studies have used this test in a counterterrorism scenario. Subjects in the present study covertly planned a mock terrorist attack on a major city. They were then given three separate blocks of concealed information testing, examining for knowledge of the location, method, and date of the planned terrorist attack, using the Complex Trial Protocol (Rosenfeld et al., 2008). With prior knowledge of the probe items, we detected 12/12 guilty subjects as having knowledge of the planned terrorist attack with no false positives among 12 innocent subjects. Additionally, we were able to identify 10/12 subjects and among them 20/30 crime-related details with no false positives using restricted a priori knowledge of the crime details, suggesting that the protocol could potentially identify future terrorist activity.

  20. Research on allocation efficiency of the daisy chain allocation algorithm

    NASA Astrophysics Data System (ADS)

    Shi, Jingping; Zhang, Weiguo

    2013-03-01

    With the improvement of the aircraft performance in reliability, maneuverability and survivability, the number of the control effectors increases a lot. How to distribute the three-axis moments into the control surfaces reasonably becomes an important problem. Daisy chain method is simple and easy to be carried out in the design of the allocation system. But it can not solve the allocation problem for entire attainable moment subset. For the lateral-directional allocation problem, the allocation efficiency of the daisy chain can be directly measured by the area of its subset of attainable moments. Because of the non-linear allocation characteristic, the subset of attainable moments of daisy-chain method is a complex non-convex polygon, and it is difficult to solve directly. By analyzing the two-dimensional allocation problems with a "micro-element" idea, a numerical calculation algorithm is proposed to compute the area of the non-convex polygon. In order to improve the allocation efficiency of the algorithm, a genetic algorithm with the allocation efficiency chosen as the fitness function is proposed to find the best pseudo-inverse matrix.

  1. Unraveling the roles of orienting and inhibition in the Concealed Information Test.

    PubMed

    Klein Selle, Nathalie; Verschuere, Bruno; Kindt, Merel; Meijer, Ewout; Ben-Shakhar, Gershon

    2017-04-01

    The Concealed Information Test (CIT) is a well-validated tool for physiological and behavioral detection of concealed knowledge. Two distinct theoretical frameworks have been proposed to explain the differential responses to the concealed critical items: orienting response theory versus arousal inhibition theory. klein Selle, Verschuere, Kindt, Meijer, and Ben-Shakhar (2016), however, argued for a response fractionation model and showed that, while the skin conductance reflects pure orienting, both the respiratory and heart rate measures reflect arousal inhibition. The present study intends to (1) provide a constructive replication of klein Selle et al. (2016) using the autobiographical CIT, and (2) extend their work by testing an additional prediction derived from orienting theory, using an item-salience manipulation. One hundred and nine participants were tested on four high salient and four low salient identity items. Half of the participants were motivated to hide their identity (orienting + arousal inhibition), while the other half were motivated to reveal their identity (orienting only). Confirming earlier findings, the results revealed a fractionation between the different measures: while the skin conductance response (SCR) increased to a similar extent in the two motivational conditions, the respiration line length (RLL) shortened and the heart rate (HR) decelerated solely in the conceal condition. Moreover, while the SCR was larger for high than for low salient critical items, the RLL and HR responses were similar for these two item types. These data led us to conclude that, in the CIT, the skin conductance measure reflects orienting and the respiratory and heart rate measures reflect arousal inhibition.

  2. ARPA/NIJ/Rome Laboratory concealed weapon detection program: an overview

    NASA Astrophysics Data System (ADS)

    Currie, Nicholas C.; Demma, Fred J.; Ferris, David D., Jr.; McMillan, Robert W.; Wicks, Michael C.

    1996-06-01

    Recent advances in passive and active imaging and non- imaging sensor technology offer the potential to detect weapons that are concealed beneath a person's clothing. Sensors that are discussed in this paper are characterized as either non-imaging or imaging. Non-imaging sensors include wide band radar and portal devices such as metal detectors. In general the strength of non-imaging sensors rest with the fact that they are generally inexpensive and can rapidly perform bulk separation between regions where persons are likely to be carrying concealed weapons and those regions that are likely to contain persons who are unarmed. The bulk process is typically accomplished at the expense of false alarm rate. Millimeter-wave (MMW), microwave, x-ray, acoustic, magnetic, and infrared (IR) imaging sensor technologies provide with greater certainty the means to isolate persons within a crowd that are carrying concealed weapons and to identify the weapon type. The increased certainty associated with imaging sensors is accomplished at the expense of cost and bulk surveillance of the crowd. CWD technologies have a variety of military and civilian applications. This technology focus area addresses specific military needs under the Defense Advanced Research Projects Agency's (DARPA) operations other than war/law enforcement (OOTW/LE). Additionally, this technology has numerous civilian law enforcement applications that are being investigated under the National Institute of Justice's (NIJ) Concealed Weapons Detection program. This paper discusses the wide variety of sensors that might be employed in support of a typical scenario, the strengths and weaknesses of each of the sensors relative to the given scenario, and how CWD breadboards will be tested to determine the optimal CWD application. It rapidly becomes apparent that no single sensor will completely satisfy the CWD mission necessitating the fusion of two or more of these sensors.

  3. Fiber Optic Coupled Raman Based Detection of Hazardous Liquids Concealed in Commercial Products

    DTIC Science & Technology

    2012-01-01

    Detecting explosives by portable Raman ana- lyzers: a comparison of 785, 976, 1064 ,and 1550 nm (Retina- Safe) laser excitation,” Spectroscopy, pp...agent (CWA) simulant triethyl phosphate (TEP), hydrogen peroxide, and acetone as representative of toxic industrial compounds (TICs). Fiber optic...distribution is unlimited. Fiber Optic Coupled Raman Based Detection of Hazardous Liquids Concealed in Commercial Products The views, opinions and/or

  4. Detection of concealed information by P3 and frontal EEG asymmetry.

    PubMed

    Matsuda, Izumi; Nittono, Hiroshi; Allen, John J B

    2013-03-14

    Psychophysiological detection of deception has seen increased attention in both research and applied settings. In this field, the most scientifically validated paradigm is the Concealed Information Test (CIT). The CIT does not directly deal with whether a participant is lying, but examines whether a participant recognizes a critical relevant detail, inferred by differences in physiological responses between critical and non-critical items. Although event-related potential (ERP) approaches to the CIT have shown high accuracy, a combination of measures might improve the test's performance. We thus assessed whether a new CIT index, frontal EEG asymmetry that is supposed to reflect differences in approach/withdrawal motivation, would prove useful. Nineteen participants were asked to steal one item in a mock crime, and were then administered two CITs while concealing the stolen item. One CIT included the stolen item (i.e., guilty condition), whereas the other CIT did not (i.e., innocent condition). In the guilty condition, the concealed stolen item elicited greater relative left frontal alpha activity (indicative of relative right frontal cortical activity) as compared to the other items, suggesting that the recognition of the concealed item might have induced withdrawal motivation. Although the discrimination between guilty and innocent conditions by the asymmetry score alone was not as good as that by the ERP P3 index, combining the asymmetry score and P3 improved the detection performance significantly. The results suggest that the frontal EEG asymmetry can be used as a new measure in the CIT that provides additional information beyond that captured by the traditional ERP index.

  5. [Analysis of forensic-medical expert conclusions on rap and concealed rape (data from anonymous questionnaires)].

    PubMed

    Pigolkin, Iu I; Dmitrieva, O A

    2001-01-01

    Specific features of modern cases of raping are analyzed on the basis of the data of forensic medical obstetrical and gynecological expert evaluations carried out in the Primorye territory. Age and risk groups are defined, health status of victims is characterized, and specific injuries of the body and genitals are described. Specific features of concealed sexual violations in Vladivostok are defined and the need in creation of rehabilitation centers for victims of raping is discussed.

  6. Antidromic Atrioventricular Reciprocating Tachycardia Using a Concealed Retrograde Conducting Left Lateral Accessory Pathway.

    PubMed

    Gonzalez, Jaime E; Zipse, Matthew M; Nguyen, Duy T; Sauer, William H

    2016-03-01

    Atrioventricular reciprocating tachycardia is a common cause of undifferentiated supraventricular tachycardia. In patients with manifest or concealed accessory pathways, it is imperative to assess for the presence of other accessory pathways. Multiple accessory pathways are present in 4% to 10% of patients and are more common in patients with structural heart disease. In rare cases, multiple accessory pathways can act as the anterograde and retrograde limbs of the tachycardia.

  7. Epidemiology of blindness in Nepal*

    PubMed Central

    Brilliant, L. B.; Pokhrel, R. P.; Grasset, N. C.; Lepkowski, J. M.; Kolstad, A.; Hawks, W.; Pararajasegaram, R.; Brilliant, G. E.; Gilbert, S.; Shrestha, S. R.; Kuo, J.

    1985-01-01

    This report presents the major findings of the Nepal Blindness Survey, the first nationwide epidemiological survey of blindness, which was conducted in 1979-80. The survey was designed to gather data that could be used to estimate the prevalence and causes of blindness in the country. Ancillary studies were conducted to obtain information on socioeconomic correlates and other risk factors of blinding conditions and patterns of health care utilization. The nationwide blindness prevalence rate is 0.84%. Cataract is the leading cause of blindness, accounting for over 80% of all avoidable blindness. Trachoma is the most prevalent blinding condition, affecting 6.5% of the population. Very few cases of childhood blindness were detected. The implications of the survey findings for programme planning, health manpower development, and health education are discussed. PMID:3874717

  8. Hydrogeological Studies to Identify the Trend of Concealed Section of the North Tabriz Fault (Iran).

    PubMed

    Rajabpour, Hossein; Vaezihir, Abdorreza

    2016-10-17

    The North Tabriz Fault (NTF) is the predominant regional-scale tectonic structure in the northwest of Iran. In the east side of the city of Tabriz, a portion of the fault trend has been completely concealed by recent sediments and urbanization. In this paper, some hydrogeological methods are used to locate the concealed sector. As is clear from the pumping tests results, despite the fact that the northern observation wells were closer to the pumping wells than the southern ones, they have not been affected by pumping. Conversely, all southern wells were affected by pumping and displayed decline of the water table. In addition, obvious differences in groundwater levels combined with clear differences in groundwater quality within a short distance across the probable fault trend are sufficient reasons for the presence of the fault that behaves as a barrier to groundwater lateral flows. Significant change in the elevation of the bedrock base of the aquifer over less than 200 m suggests that the fault has near vertical dip. These results indicate that the inferred trend of the NTF closely conforms to its actual trend. Therefore, the hydrogeological studies can be complementary tools to determine the position and trend of concealed faults.

  9. Active wideband 350GHz imaging system for concealed-weapon detection

    NASA Astrophysics Data System (ADS)

    Sheen, David M.; Hall, Thomas E.; Severtsen, Ronald H.; McMakin, Douglas L.; Hatchell, Brian K.; Valdez, Patrick L. J.

    2009-05-01

    A prototype active wideband 350 GHz imaging system has been developed to address the urgent need for standoff concealed-weapon detection. This system is based on a wideband, heterodyne, frequency-multiplier-based transceiver system coupled to a quasi-optical focusing system and high-speed conical scanner. This system is able to quickly scan personnel for concealed weapons. Additionally, due to the wideband operation, this system provides accurate ranging information, and the images obtained are fully three-dimensional. Waves in the microwave, millimeter-wave, and terahertz (3 GHz to 1 THz) frequency bands are able to penetrate many optical obscurants, and can be used to form the basis of high-resolution imaging systems. Waves in the sub-millimeter-wave band (300 GHz to 1 THz) are particularly interesting for standoff concealed-weapon detection at ranges of 5 - 20+ meters, due to their unique combination of high resolution and clothing penetration. The Pacific Northwest National Laboratory (PNNL) has previously developed portal screening systems that operate at the lower end of the millimeter-wave frequency range around 30 GHz. These systems are well suited for screening within portals; however, increasing the range of these systems would dramatically reduce the resolution due to diffraction at their relatively long wavelength. In this paper, the standoff 350 GHz imaging system is described in detail and numerous imaging results are presented.

  10. Three-Dimensional Millimeter-wave Imaging for Concealed Weapon Detection

    SciTech Connect

    Sheen, David M. ); McMakin, Douglas L. ); Hall, Thomas E. )

    2000-12-01

    Millimeter-wave imaging techniques and systems have been developed at the Pacific Northwest National Laboratory (PNNL) for the detection of concealed weapons and contraband at airports and other secure locations. These techniques were derived from microwave holography techniques which utilize phase and amplitude information recorded over a two-dimensional aperture to reconstruct a focused image of the target. Millimeter-wave imaging is well suited to the detection of concealed weapons or other contraband carried on personnel since millimeter-waves are non-ionizing, readily penetrate common clothing material, and are reflected from the human body and any concealed items. In this paper, a wide-bandwidth, three-dimensional, holographic microwave imaging technique is described. Practical weapon detection systems for airport, or other high-throughput applications, require high-speed scanning on the order of 3 to 10 seconds. To achieve this goal, a prototype imaging system utilizing a 2 7-33 GHz linear sequentially switched array and a high-speed linear scanner has been developed and tested. This system is described in detail along with numerous imaging results.

  11. Preventing shoulder-surfing attack with the concept of concealing the password objects' information.

    PubMed

    Ho, Peng Foong; Kam, Yvonne Hwei-Syn; Wee, Mee Chin; Chong, Yu Nam; Por, Lip Yee

    2014-01-01

    Traditionally, picture-based password systems employ password objects (pictures/icons/symbols) as input during an authentication session, thus making them vulnerable to "shoulder-surfing" attack because the visual interface by function is easily observed by others. Recent software-based approaches attempt to minimize this threat by requiring users to enter their passwords indirectly by performing certain mental tasks to derive the indirect password, thus concealing the user's actual password. However, weaknesses in the positioning of distracter and password objects introduce usability and security issues. In this paper, a new method, which conceals information about the password objects as much as possible, is proposed. Besides concealing the password objects and the number of password objects, the proposed method allows both password and distracter objects to be used as the challenge set's input. The correctly entered password appears to be random and can only be derived with the knowledge of the full set of password objects. Therefore, it would be difficult for a shoulder-surfing adversary to identify the user's actual password. Simulation results indicate that the correct input object and its location are random for each challenge set, thus preventing frequency of occurrence analysis attack. User study results show that the proposed method is able to prevent shoulder-surfing attack.

  12. Concealed neuroanatomy in Michelangelo's Separation of Light From Darkness in the Sistine Chapel.

    PubMed

    Suk, Ian; Tamargo, Rafael J

    2010-05-01

    Michelangelo Buonarroti (1475-1564) was a master anatomist as well as an artistic genius. He dissected cadavers numerous times and developed a profound understanding of human anatomy. From 1508 to 1512, Michelangelo painted the ceiling of the Sistine Chapel in Rome. His Sistine Chapel frescoes are considered one of the monumental achievements of Renaissance art. In the winter of 1511, Michelangelo entered the final stages of the Sistine Chapel project and painted 4 frescoes along the longitudinal apex of the vault, which completed a series of 9 central panels depicting scenes from the Book of Genesis. It is reported that Michelangelo concealed an image of the brain in the first of these last 4 panels, namely, the Creation of Adam. Here we present evidence that he concealed another neuronanatomic structure in the final panel of this series, the Separation of Light From Darkness, specifically a ventral view of the brainstem. The Separation of Light From Darkness is an important panel in the Sistine Chapel iconography because it depicts the beginning of Creation and is located directly above the altar. We propose that Michelangelo, a deeply religious man and an accomplished anatomist, intended to enhance the meaning of this iconographically critical panel and possibly document his anatomic accomplishments by concealing this sophisticated neuroanatomic rendering within the image of God.

  13. Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects' Information

    PubMed Central

    Ho, Peng Foong; Kam, Yvonne Hwei-Syn; Wee, Mee Chin

    2014-01-01

    Traditionally, picture-based password systems employ password objects (pictures/icons/symbols) as input during an authentication session, thus making them vulnerable to “shoulder-surfing” attack because the visual interface by function is easily observed by others. Recent software-based approaches attempt to minimize this threat by requiring users to enter their passwords indirectly by performing certain mental tasks to derive the indirect password, thus concealing the user's actual password. However, weaknesses in the positioning of distracter and password objects introduce usability and security issues. In this paper, a new method, which conceals information about the password objects as much as possible, is proposed. Besides concealing the password objects and the number of password objects, the proposed method allows both password and distracter objects to be used as the challenge set's input. The correctly entered password appears to be random and can only be derived with the knowledge of the full set of password objects. Therefore, it would be difficult for a shoulder-surfing adversary to identify the user's actual password. Simulation results indicate that the correct input object and its location are random for each challenge set, thus preventing frequency of occurrence analysis attack. User study results show that the proposed method is able to prevent shoulder-surfing attack. PMID:24991649

  14. Video inpainting with short-term windows: application to object removal and error concealment.

    PubMed

    Ebdelli, Mounira; Le Meur, Olivier; Guillemot, Christine

    2015-10-01

    In this paper, we propose a new video inpainting method which applies to both static or free-moving camera videos. The method can be used for object removal, error concealment, and background reconstruction applications. To limit the computational time, a frame is inpainted by considering a small number of neighboring pictures which are grouped into a group of pictures (GoP). More specifically, to inpaint a frame, the method starts by aligning all the frames of the GoP. This is achieved by a region-based homography computation method which allows us to strengthen the spatial consistency of aligned frames. Then, from the stack of aligned frames, an energy function based on both spatial and temporal coherency terms is globally minimized. This energy function is efficient enough to provide high quality results even when the number of pictures in the GoP is rather small, e.g. 20 neighboring frames. This drastically reduces the algorithm complexity and makes the approach well suited for near real-time video editing applications as well as for loss concealment applications. Experiments with several challenging video sequences show that the proposed method provides visually pleasing results for object removal, error concealment, and background reconstruction context.

  15. Fixations and eye-blinks allow for detecting concealed crime related memories.

    PubMed

    Peth, Judith; Kim, Johann S C; Gamer, Matthias

    2013-04-01

    The Concealed Information Test (CIT) is a method of forensic psychophysiology that allows for revealing concealed crime related knowledge. Such detection is usually based on autonomic responses but there is a huge interest in other measures that can be acquired unobtrusively. Eye movements and blinks might be such measures but their validity is unclear. Using a mock crime procedure with a manipulation of the arousal during the crime as well as the delay between crime and CIT, we tested whether eye tracking measures allow for detecting concealed knowledge. Guilty participants showed fewer but longer fixations on central crime details and this effect was even present after stimulus offset and accompanied by a reduced blink rate. These ocular measures were partly sensitive for induction of emotional arousal and time of testing. Validity estimates were moderate but indicate that a significant differentiation between guilty and innocent subjects is possible. Future research should further investigate validity differences between gaze measures during a CIT and explore the underlying mechanisms.

  16. Disclosure and Concealment of Sexual Orientation and the Mental Health of Non-Gay-Identified, Behaviorally-Bisexual Men

    PubMed Central

    Schrimshaw, Eric W.; Siegel, Karolynn; Downing, Martin J.; Parsons, Jeffrey T.

    2013-01-01

    Objective Although bisexual men report lower levels of mental health relative to gay men, few studies have examined the factors that contribute to bisexual men’s mental health. Bisexual men are less likely to disclose, and more likely to conceal (i.e., a desire to hide), their sexual orientation than gay men. Theory suggests that this may adversely impact their mental health. This report examined the factors associated with disclosure and with concealment of sexual orientation, the association of disclosure and concealment with mental health, and the potential mediators (i.e., internalized homophobia, social support) of this association with mental health. Method An ethnically-diverse sample of 203 non-gay-identified, behaviorally-bisexual men who do not disclose their same-sex behavior to their female partners were recruited in New York City to complete a single set of self-report measures. Results Concealment was associated with higher income, a heterosexual identification, living with a wife or girlfriend, more frequent sex with women, and less frequent sex with men. Greater concealment, but not disclosure to friends and family, was significantly associated with lower levels of mental health. Multiple mediation analyses revealed that both internalized homophobia and general emotional support significantly mediated the association between concealment and mental health. Conclusions The findings demonstrate that concealment and disclosure are independent constructs among bisexual men. Further, they suggest that interventions addressing concerns about concealment, emotional support, and internalized homophobia may be more beneficial for increasing the mental health of bisexual men than those focused on promoting disclosure. PMID:23276123

  17. Optimal Blind Quantum Computation

    NASA Astrophysics Data System (ADS)

    Mantri, Atul; Pérez-Delgado, Carlos A.; Fitzsimons, Joseph F.

    2013-12-01

    Blind quantum computation allows a client with limited quantum capabilities to interact with a remote quantum computer to perform an arbitrary quantum computation, while keeping the description of that computation hidden from the remote quantum computer. While a number of protocols have been proposed in recent years, little is currently understood about the resources necessary to accomplish the task. Here, we present general techniques for upper and lower bounding the quantum communication necessary to perform blind quantum computation, and use these techniques to establish concrete bounds for common choices of the client’s quantum capabilities. Our results show that the universal blind quantum computation protocol of Broadbent, Fitzsimons, and Kashefi, comes within a factor of (8)/(3) of optimal when the client is restricted to preparing single qubits. However, we describe a generalization of this protocol which requires exponentially less quantum communication when the client has a more sophisticated device.

  18. Meningeal carcinomatosis and blindness

    PubMed Central

    Altrocchi, Paul H.; Eckman, Paul B.

    1973-01-01

    The clinical syndrome of meningeal carcinomatosis includes headache, dementia, radiculopathy, and cranial nerve palsies. Blindness may be the first, or most prominent, symptom. When blindness occurs in adult life, meningeal carcinomatosis should be included in the differential diagnosis, even in the absence of other symptoms and in the absence of known malignancy. Although all pathophysiological mechanisms of the blindness in meningeal carcinomatosis have not yet been elucidated, optic nerve involvement by meningeal tumour-cuffing, by chronic papilloedema, and by direct tumour infiltration represent the likeliest causes. In the neuropathological analysis of such cases, the importance of analysing the intra-orbital portion of the optic nerves, in addition to the portions of the optic nerve and chiasm usually examined at routine necropsy, is emphasized. A case is described to illustrate this point, with the only pathological abnormality in the optic nerves being found within 6 mm of the retina. Images PMID:4708455

  19. Blinded by headlights.

    PubMed

    Stevanovski, Biljana; Oriet, Chris; Jolicoeur, Pierre

    2002-06-01

    Target identification is impaired when targets are presented during the planning or execution of a compatible response (e.g., right-pointing arrow during a right keypress) relative to an incompatible response (Müsseler & Hommel, 1997 a, b). Examinations of this blindness to response-compatible stimuli have typically used arrowheads as targets ("<" and ">"). The importance of the target symbol was examined by manipulating subjects' interpretation of that symbol (i.e., ">" interpreted as a right-pointing arrow or as a headlight shining to the left). Targets were presented at varying times during the planning or execution of a response in order to examine the time-course of the effect. Results showed that the interpretation, and not the physical identity, of the target was important for the blindness effect. Although the blindness effect was largest during the planning and execution of a response, it was not always confined to that temporal interval.

  20. Clothing adjustments for concealed soft body armor during moderate physical exertion.

    PubMed

    Ryan, Greg A; Bishop, Stacy H; Herron, Robert L; Katica, Charles P; Elbon, Bre'anna L; Bosak, Andrew M; Bishop, Phillip

    2015-01-01

    Previous research has studied the impact of Level II concealed soft body armor (SBA) on the augmentation of heat storage in a hot environment simulating a typical summer day in the southeastern United States (wet bulb globe temperature [WBGT] = 30°C) and noted a significant difference between macro- and micro-WBGTs. The purpose of this study was to characterize the microclimate (micro-WBGT) under a concealed Level II SBA during 60 min of moderately intense work at two separate macro-WBGTs (26°C and 30°C), and to establish WBGT corrections to allow prediction of heat strain in an individual wearing a concealed Level II SBA. A single trial was performed with nine volunteers (27 ± 4 years) outfitted with a simulated standard law enforcement uniform and a traditional concealed Level II SBA, in a moderately warm environment (WBGT = 26°C). Each participant performed cycles of 12 min of walking (1.25 L · min(-1)) and 3 min of arm curls (14.3 kg, 0.6 L · min(-1)) with a 5 min rest after every other cycle, for a total of 60 minutes. This trial was compared to an identical previously completed 60-min work bout at 30°C. A two-way repeated measures ANOVA with Post hoc Bonferroni and paired samples t-test analysis was conducted. A greater difference between macro- micro-WBGTs existed at 26°C compared to the 30°C macro-WBGT. Under these conditions, a moderate work in Level II SBA requires a WBGT correction of 8.9°C and 6.2°C at macro-WBGTs of 26°C and 30°C, respectively. A modified simple linear regression prediction model was established for mean Micro-WBGT for each macro-WBGTs after the plateau point at the 30 min mark. The derivation regressions at 26°C (R(2) = 0.99), and 30°C (R(2) = 0.99) indicate that micro-WBGT could be predicted for each 15 minutes time at both macro-WBGTs tested for individuals doing moderate intensity (300 Kcals · hr(-1)) work wearing concealed Level II SBA.

  1. Cognitive Mapping by the Blind.

    ERIC Educational Resources Information Center

    Casey, Steven M.

    1978-01-01

    In an effort to study the cognitive mapping abilities of blind persons, tactile maps of a school campus were made by ten congenitally blind and ten blindfolded partially sighted high school students. (Author)

  2. Sighted Children Learn About Blindness

    ERIC Educational Resources Information Center

    Scheffers, Wenda L.

    1977-01-01

    In a 20-lesson unit, sighted second-to fourth-grade students were taught about the long cane, guide dogs, daily living skills, eye physiology, causes of blindness, eye care, braille, and attitudes toward blindness. (CL)

  3. Overview on Deaf-Blindness

    MedlinePlus

    ... children and youth who are deaf-blind. Monmouth: Teaching Research Division. Wolff Heller, K. & Kennedy, C. (1994). Etiologies and characteristics of deaf-blindness. Monmouth: Teaching Research Publications. Watson, D., & Taff-Watson, M. (Eds.), ( ...

  4. Testing Children for Color Blindness

    MedlinePlus

    ... blindness as soon as age 4, finds Caucasian boys most likely to be color blind among different ... age 4. In addition, researchers found that Caucasian boys have the highest prevalence among four major ethnicities, ...

  5. Resource Balancing Control Allocation

    NASA Technical Reports Server (NTRS)

    Frost, Susan A.; Bodson, Marc

    2010-01-01

    Next generation aircraft with a large number of actuators will require advanced control allocation methods to compute the actuator commands needed to follow desired trajectories while respecting system constraints. Previously, algorithms were proposed to minimize the l1 or l2 norms of the tracking error and of the control effort. The paper discusses the alternative choice of using the l1 norm for minimization of the tracking error and a normalized l(infinity) norm, or sup norm, for minimization of the control effort. The algorithm computes the norm of the actuator deflections scaled by the actuator limits. Minimization of the control effort then translates into the minimization of the maximum actuator deflection as a percentage of its range of motion. The paper shows how the problem can be solved effectively by converting it into a linear program and solving it using a simplex algorithm. Properties of the algorithm are investigated through examples. In particular, the min-max criterion results in a type of resource balancing, where the resources are the control surfaces and the algorithm balances these resources to achieve the desired command. A study of the sensitivity of the algorithms to the data is presented, which shows that the normalized l(infinity) algorithm has the lowest sensitivity, although high sensitivities are observed whenever the limits of performance are reached.

  6. Blinded by Science.

    ERIC Educational Resources Information Center

    Snyder, Tom

    1994-01-01

    Huge infusion of technology is coming into education; nothing can stop it, because so much money is involved. With computer marketers in driver seat instead of teachers, schools risk being blinded by science. Vendors have coopted progressive education buzzwords, including "frontal teaching,""linear thinking," and "computer…

  7. [Blindness and visual rehabilitation].

    PubMed

    Matonti, F; Roux, S; Denis, D; Picaud, S; Chavane, F

    2015-02-01

    Blindness and visual impairment are a major public health problem all over the world and in all societies. A large amount of basic science and clinical research aims to rehabilitate patients and help them become more independent. Various methods are explored from cell and molecular therapy to prosthetic interfaces. We review the various treatment alternatives, describing their results and their limitations.

  8. Blindness in the Toybox

    ERIC Educational Resources Information Center

    Swartz, Edward M.

    1973-01-01

    The author proposes that toys which have been shown to cause blindness (such as dart guns, bows and arrows, peashooters, air guns, and slingshots) be banned, and suggests that government regulatory agencies and the toy industry have been lax in acting on their expressed concern for safety. (DB)

  9. The blind beautiful eye.

    PubMed

    Feinsod, M

    2000-03-01

    Master Jehan Yperman, a medieval surgeon, observed that when the optic nerve is injured, the eye becomes blind and beautiful. This is an attempt to trace the footsteps of this forgotten surgeon and to track the history of the cosmetic use of the belladonna herb, as well as the concept of amaurotic mydriasis.

  10. Homer: The Blind Bard

    ERIC Educational Resources Information Center

    Doorley, Rachelle; King, Judith

    2005-01-01

    This article describes notable cultural, historical, and artistic elements emanating from sculptures originating in ancient Greece. The "blind bard" and its connection to the legendary Greek poet, Homer; Homer's impact on literary history; trends among Roman sculptures; and Roman replication of Greek art are described. Questions to…

  11. Corneal blindness and xenotransplantation.

    PubMed

    Lamm, Vladimir; Hara, Hidetaka; Mammen, Alex; Dhaliwal, Deepinder; Cooper, David K C

    2014-01-01

    Approximately 39 million people are blind worldwide, with an estimated 285 million visually impaired. The developing world shoulders 90% of the world's blindness, with 80% of causative diseases being preventable or treatable. Blindness has a major detrimental impact on the patient, community, and healthcare spending. Corneal diseases are significant causes of blindness, affecting at least 4 million people worldwide. The prevalence of corneal disease varies between parts of the world. Trachoma, for instance, is the second leading cause of blindness in Africa, after cataracts, but is rarely found today in developed nations. When preventive strategies have failed, corneal transplantation is the most effective treatment for advanced corneal disease. The major surgical techniques for corneal transplantation include penetrating keratoplasty (PK), anterior lamellar keratoplasty, and endothelial keratoplasty (EK). Indications for corneal transplantation vary between countries, with Fuchs' dystrophy being the leading indication in the USA and keratoconus in Australia. With the exception of the USA, where EK will soon overtake PK as the most common surgical procedure, PK is the overwhelming procedure of choice. Success using corneal grafts in developing nations, such as Nepal, demonstrates the feasibility of corneal transplantation on a global scale. The number of suitable corneas from deceased human donors that becomes available will never be sufficient, and so research into various alternatives, for example stem cells, amniotic membrane transplantation, synthetic and biosynthetic corneas, and xenotransplantation, is progressing. While each of these has potential, we suggest that xenotransplantation holds the greatest potential for a corneal replacement. With the increasing availability of genetically engineered pigs, pig corneas may alleviate the global shortage of corneas in the near future.

  12. Programs for the Deaf Blind.

    ERIC Educational Resources Information Center

    American Annals of the Deaf, 1987

    1987-01-01

    The directory lists 30 programs for deaf-blind children and youth, the 10 regional offices of the Helen Keller National Center for Deaf-Blind Youths and Adults, and five programs for training teachers of the deaf-blind. Provided for each program is address, director's name, and phone number. (DB)

  13. Resource allocation using risk analysis

    SciTech Connect

    Bott, T. F.; Eisenhawer, S. W.

    2003-01-01

    Allocating limited resources among competing priorities is an important problem in management. In this paper we describe an approach to resource allocation using risk as a metric. We call this approach the Logic-Evolved Decision (LED) approach because we use logic-models to generate an exhaustive set of competing options and to describe the often highly complex model used for evaluating the risk reduction achieved by different resource allocations among these options. The risk evaluation then proceeds using probabilistic or linguistic input data.

  14. Zinc allocation and re-allocation in rice

    PubMed Central

    Stomph, Tjeerd Jan; Jiang, Wen; Van Der Putten, Peter E. L.; Struik, Paul C.

    2014-01-01

    Aims: Agronomy and breeding actively search for options to enhance cereal grain Zn density. Quantifying internal (re-)allocation of Zn as affected by soil and crop management or genotype is crucial. We present experiments supporting the development of a conceptual model of whole plant Zn allocation and re-allocation in rice. Methods: Two solution culture experiments using 70Zn applications at different times during crop development and an experiment on within-grain distribution of Zn are reported. In addition, results from two earlier published experiments are re-analyzed and re-interpreted. Results: A budget analysis showed that plant zinc accumulation during grain filling was larger than zinc allocation to the grains. Isotope data showed that zinc taken up during grain filling was only partly transported directly to the grains and partly allocated to the leaves. Zinc taken up during grain filling and allocated to the leaves replaced zinc re-allocated from leaves to grains. Within the grains, no major transport barrier was observed between vascular tissue and endosperm. At low tissue Zn concentrations, rice plants maintained concentrations of about 20 mg Zn kg−1 dry matter in leaf blades and reproductive tissues, but let Zn concentrations in stems, sheath, and roots drop below this level. When plant zinc concentrations increased, Zn levels in leaf blades and reproductive tissues only showed a moderate increase while Zn levels in stems, roots, and sheaths increased much more and in that order. Conclusions: In rice, the major barrier to enhanced zinc allocation towards grains is between stem and reproductive tissues. Enhancing root to shoot transfer will not contribute proportionally to grain zinc enhancement. PMID:24478788

  15. Collaborative Resource Allocation

    NASA Technical Reports Server (NTRS)

    Wang, Yeou-Fang; Wax, Allan; Lam, Raymond; Baldwin, John; Borden, Chester

    2007-01-01

    Collaborative Resource Allocation Networking Environment (CRANE) Version 0.5 is a prototype created to prove the newest concept of using a distributed environment to schedule Deep Space Network (DSN) antenna times in a collaborative fashion. This program is for all space-flight and terrestrial science project users and DSN schedulers to perform scheduling activities and conflict resolution, both synchronously and asynchronously. Project schedulers can, for the first time, participate directly in scheduling their tracking times into the official DSN schedule, and negotiate directly with other projects in an integrated scheduling system. A master schedule covers long-range, mid-range, near-real-time, and real-time scheduling time frames all in one, rather than the current method of separate functions that are supported by different processes and tools. CRANE also provides private workspaces (both dynamic and static), data sharing, scenario management, user control, rapid messaging (based on Java Message Service), data/time synchronization, workflow management, notification (including emails), conflict checking, and a linkage to a schedule generation engine. The data structure with corresponding database design combines object trees with multiple associated mortal instances and relational database to provide unprecedented traceability and simplify the existing DSN XML schedule representation. These technologies are used to provide traceability, schedule negotiation, conflict resolution, and load forecasting from real-time operations to long-range loading analysis up to 20 years in the future. CRANE includes a database, a stored procedure layer, an agent-based middle tier, a Web service wrapper, a Windows Integrated Analysis Environment (IAE), a Java application, and a Web page interface.

  16. [The blindness in the literature-Jose Saramago: blindness and Albert Bang: the blind witness].

    PubMed

    Permin, H; Norn, M

    2001-01-01

    Two novels with different aspects of blindness seen through the doctors eyes. The Portuguese Nobel-prize winner José Saramago's story of a city struck by an epidemic of "white blindness", where the truth is what we cannot bear to see. The Danish author and unskilled labourer Albert Bang's (synonym with Karl E. Rasmussen) crime novel describes a blind or pretend to be blind butcher, who is a witness to a murder. Both novels are lyric, thought-provoking and insightful.

  17. Face and Voice as Social Stimuli Enhance Differential Physiological Responding in a Concealed Information Test

    PubMed Central

    Ambach, Wolfgang; Assmann, Birthe; Krieg, Bennet; Vaitl, Dieter

    2012-01-01

    Attentional, intentional, and motivational factors are known to influence the physiological responses in a Concealed Information Test (CIT). Although concealing information is essentially a social action closely related to motivation, CIT studies typically rely on testing participants in an environment lacking of social stimuli: subjects interact with a computer while sitting alone in an experimental room. To address this gap, we examined the influence of social stimuli on the physiological responses in a CIT. Seventy-one participants underwent a mock-crime experiment with a modified CIT. In a between-subjects design, subjects were either questioned acoustically by a pre-recorded male voice presented together with a virtual male experimenter’s uniform face or by a text field on the screen, which displayed the question devoid of face and voice. Electrodermal activity (EDA), respiration line length (RLL), phasic heart rate (pHR), and finger pulse waveform length (FPWL) were registered. The Psychopathic Personality Inventory – Revised (PPI-R) was administered in addition. The differential responses of RLL, pHR, and FPWL to probe vs. irrelevant items were greater in the condition with social stimuli than in the text condition; interestingly, the differential responses of EDA did not differ between conditions. No modulatory influence of the PPI-R sum or subscale scores was found. The results emphasize the relevance of social aspects in the process of concealing information and in its detection. Attentional demands as well as the participants’ motivation to avoid detection might be the important links between social stimuli and physiological responses in the CIT. PMID:23293613

  18. Experimental methods of indoor millimeter-wave radiometric imaging for personnel concealed contraband detection

    NASA Astrophysics Data System (ADS)

    Hu, Taiyang; Xiao, Zelong; Li, Hao; Lv, Rongchuan; Lu, Xuan

    2014-11-01

    The increasingly emerging terrorism attacks and violence crimes around the world have posed severe threats to public security, so carrying out relevant research on advanced experimental methods of personnel concealed contraband detection is crucial and meaningful. All of the advantages of imaging covertly, avoidance of interference with other systems, intrinsic property of being safe to persons under screening , and the superior ability of imaging through natural or manmade obscurants, have significantly combined to enable millimeter-wave (MMW) radiometric imaging to offer great potential in personnel concealed contraband detection. Based upon the current research status of MMW radiometric imaging and urgent demands of personnel security screening, this paper mainly focuses on the experimental methods of indoor MMW radiometric imaging. The reverse radiation noise resulting from super-heterodyne receivers seriously affects the image experiments carried out at short range, so both the generation mechanism and reducing methods of this noise are investigated. Then, the benefit of sky illumination no longer exists for the indoor radiometric imaging, and this leads to the decrease in radiometric temperature contrast between target and background. In order to enhance the radiometric temperature contrast for improving indoor imaging performance, the noise illumination technique is adopted in the indoor imaging scenario. In addition, the speed and accuracy of concealed contraband detection from acquired MMW radiometric images are usually restricted to the deficiencies in traditional artificial interpretation by security inspectors, thus an automatic recognition and location algorithm by integrating improved Fuzzy C-means clustering with moment invariants is put forward. A series of original results are also presented to demonstrate the significance and validity of these methods.

  19. Shaeer’s Technique: A Minimally Invasive Procedure for Monsplasty and Revealing the Concealed Penis

    PubMed Central

    2016-01-01

    Background: A concealed penis is a condition where part of the penis is invisible below the surface of the prepubic skin. Dermolipectomy can correct this condition, although it involves a long abdominal crease incision, or infrapubic incision around the base of the penis, and a possibility for genital lymphedema. This study describes Shaeer’s technique, a minimally invasive method for revealing the concealed penis. Methods: A 1- to 2-cm-long incision was cut over the anterior superior iliac spine (ASIS) on either side. A long curved blunt forceps was inserted from one incision, down to the base of the penis and then up to the contralateral ASIS. A 5-mm wide nonabsorbable tape was picked up by the forceps from 1 incision and pulled through to emerge from the other. Pulling on the tape cephalad pulled the mons pubis and revealed the penis. The tape was sutured to the periosteum overlying the ASIS on either side. Patients were followed up for 18 months for penile length, complications, and overall satisfaction. Results: Twenty patients were operated upon. Preoperatively, flaccid visible length was 3 ± 0.9 cm, and erect visible length was 8 ± 4.6 cm. Postoperatively, the flaccid visible length was 7.1 ± 2.1 cm, with a 57.9% improvement in length (P < 0.0001). Erect visible length was 11.8 ± 2.1 cm, with a 32% improvement in length (P < 0.0001). Length gain was maintained for 18 months. Conclusion: Shaeer’s technique is a minimally invasive, short, and simple procedure for monsplasty and revealing the concealed penis. PMID:27622092

  20. Exploiting synthetic aperture radar imagery for retrieving vibration signatures of concealed machinery

    NASA Astrophysics Data System (ADS)

    Pérez, Francisco; Campbell, Justin B.; Jaramillo, Monica; Dunkel, Ralf; Atwood, Thomas; Doerry, Armin; Gerstle, Walter H.; Santhanam, Balu; Hayat, Majeed M.

    2016-05-01

    It has been demonstrated that the instantaneous acceleration associated with vibrating objects that are directly imaged by synthetic aperture radar (SAR) can be estimated through the application of the discrete fractional Fourier transform (DFrFT) using the information contained in the complex SAR image. In general, vibration signatures may include, for example, the number of chirped sinusoids as well as their respective base frequencies and chirp rates. By further processing the DFrFT-processed data for clutter-noise rejection by means of pseudo- subspace methods, has been shown that the SAR-vibrometry method can be reliable as long as the signal-to-noise ratio (SNR) and the signal-to-clutter ratio (SCR) of the slow-time SAR signal at the range-line of interest exceeds 15dB. Meanwhile, the Nyquist theorem dictates that the maximum measurable vibration frequency is limited by half of the pulse-repetition frequency. This paper focuses on the detection and estimation of vibrations generated by machinery concealed within buildings and other structures. This is a challenging task in general because the vibration signatures of the source are typically altered by their housing structure; moreover, the SNR at the surface of the housing structure tends to be reduced. Here, experimental results for three different vibrating targets, including one concealed target, are reported using complex SAR images acquired by the General Atomics Lynx radar at resolutions of 1-ft and 4-in. The concealed vibrating target is actuated by a gear motor with an off-balance weight attached to it, which is enclosed by a wooden housing. The vibrations of the motor are transmitted to a chimney that extends above the housing structure. Using the SAR vibrometry approach, it is shown that it is possible to distinguish among the three vibrating objects based upon their vibration signatures.

  1. Ultra-wide-band 3D microwave imaging scanner for the detection of concealed weapons

    NASA Astrophysics Data System (ADS)

    Rezgui, Nacer-Ddine; Andrews, David A.; Bowring, Nicholas J.

    2015-10-01

    The threat of concealed weapons, explosives and contraband in footwear, bags and suitcases has led to the development of new devices, which can be deployed for security screening. To address known deficiencies of metal detectors and x-rays, an UWB 3D microwave imaging scanning apparatus using FMCW stepped frequency working in the K and Q bands and with a planar scanning geometry based on an x y stage, has been developed to screen suspicious luggage and footwear. To obtain microwave images of the concealed weapons, the targets are placed above the platform and the single transceiver horn antenna attached to the x y stage is moved mechanically to perform a raster scan to create a 2D synthetic aperture array. The S11 reflection signal of the transmitted sweep frequency from the target is acquired by a VNA in synchronism with each position step. To enhance and filter from clutter and noise the raw data and to obtain the 2D and 3D microwave images of the concealed weapons or explosives, data processing techniques are applied to the acquired signals. These techniques include background subtraction, Inverse Fast Fourier Transform (IFFT), thresholding, filtering by gating and windowing and deconvolving with the transfer function of the system using a reference target. To focus the 3D reconstructed microwave image of the target in range and across the x y aperture without using focusing elements, 3D Synthetic Aperture Radar (SAR) techniques are applied to the post-processed data. The K and Q bands, between 15 to 40 GHz, show good transmission through clothing and dielectric materials found in luggage and footwear. A description of the system, algorithms and some results with replica guns and a comparison of microwave images obtained by IFFT, 2D and 3D SAR techniques are presented.

  2. Electromagnetic induction imaging of concealed metallic objects by means of resonating circuits

    NASA Astrophysics Data System (ADS)

    Guilizzoni, R.; Watson, J. C.; Bartlett, P. A.; Renzoni, F.

    2016-05-01

    An electromagnetic induction system, suitable for 2D imaging of metallic samples of different electrical conductivities, has been developed. The system is based on a parallel LCR circuit comprising a ferrite-cored coil (7.8 mm x 9.5 mm, L=680 μH at 1 KHz), a variable resistor and capacitor. The working principle of the system is based on eddy current induction inside a metallic sample when this is introduced into the AC magnetic field created by the coil. The inductance of the LCR circuit is modified due to the presence of the sample, to an extent that depends on its conductivity. Such modification is known to increase when the system is operated at its resonant frequency. Characterizing different metals based on their values of conductivity is therefore possible by utilizing a suitable system operated at resonance. Both imaging and material characterization were demonstrated by means of the proposed electromagnetic induction technique. Furthermore, the choice of using a system with an adjustable resonant frequency made it possible to select resonances that allow magnetic-field penetration through conductive screens. Investigations on the possibility of imaging concealed metals by penetrating such shields have been carried out. A penetration depth of δ~3 mm through aluminium (Al) was achieved. This allowed concealed metallic samples- having conductivities ranging from 0.54 to 59.77 MSm-1 and hidden behind 1.5-mm-thick Al shields- to be imaged. Our results demonstrate that the presence of the concealed metallic objects can be revealed. The technique was thus shown to be a promising detection tool for security applications.

  3. Multispectral illumination and image processing techniques for active millimeter-wave concealed object detection.

    PubMed

    Zhang, Lixiao; Stiens, Johan; Elhawil, Amna; Vounckx, Roger

    2008-12-01

    Active millimeter-wave imaging systems for concealed object detection offer the possibility of much higher image contrast than passive systems, especially in indoor applications. By studying active millimeter-wave images of different test objects derived in the W band, we show that multispectral illumination is critical to the detectability of targets. We also propose to use image change detection techniques, including image differencing, normalized difference vegetation index, and principle component analysis to process the multispectral millimeter-wave images. The results demonstrate that multispectral illumination can significantly reveal the object features hidden by image artifacts and improve the appearance of the objects.

  4. Ambient air cooling for concealed soft body armor in a hot environment.

    PubMed

    Ryan, Greg A; Bishop, Stacy H; Herron, Robert L; Katica, Charles P; Elbon, Bre'anna L; Bosak, Andrew M; Bishop, Phillip

    2014-01-01

    Concealed soft body armor inhibits convective and evaporative heat loss and increases heat storage, especially in hot environments. One option to potentially mitigate heat storage is to promote airflow under the soft body armor. The purpose of this study was to evaluate the effect of ambient air induction (∼100 liters per minute) on heat strain while wearing concealed soft body armor in a hot environment (wet bulb globe temperature = 30°C). A counter-balanced, repeated measures protocol was performed with nine healthy male volunteers. Participants were fitted with either a traditional or modified Level II concealed soft body armor. Participants performed cycles of 12 min of walking (1.25 liters per minute) and 3 min of arm curls (0.6 liters per minute) for a total of 60 min. Two-way repeated measures ANOVA was used to assess the mean differences in physiological measures (rectal temperature, heart rate, micro-environment [temperature and relative humidity]). Post hoc Bonferroni analysis and paired samples t-tests (alpha = 0.01) were conducted on omnibus significant findings. Perceptual measures (perceived exertion, thermal comfort) were analyzed using Wilcoxon Signed Ranks Tests. Modification led to an improvement in perceived exertion at 45 min (MOD: 10 ± 1; CON: 11 ± 2; p ≤ 0.001) and 60 min (MOD: 10 ± 2; CON: 12 ± 2; p ≤ 0.001) and a reduction in micro-environment temperature in MOD (1.0 ± 0.2°C, p = 0.03) compared to CON. Modification did not attenuate change in rectal temperature or heart rate (p < 0.01) during 60-min work bout. Change in rectal temperature approached significance between MOD and CON at the end of the work bout (MOD: 0.4 ± 0.2°C; CON: 0.7 ± 0.3°C; p = 0.048). The slope of rectal temperature was significantly greater (p = 0.04) under CON compared to MOD. These data suggest that air induction may provide small benefits while wearing concealed soft body armor, though improvements are needed to lessen physiological strain.

  5. [Effects of arousal level on the physiological responding on the Concealed Information Test].

    PubMed

    Ogawa, Tokihiro; Tsuruga, Mariko; Kobayashi, Takahiro; Matsuda, Izumi; Hirota, Akihisa; Suzuki, Naoto

    2007-10-01

    This study examined effects of arousal level on the physiological responses in a polygraph examination using the Concealed Information Test (CIT). Thirty-nine healthy college students were tested with or without evaluative observation. Electrodermal activity, blood pressure, heart rate, normalized pulse volume, and respiration were recorded. Observation elevated participants' arousal level, which was manifested in self-reports, high skin conductance level, and low normalized pulse volume (i.e., vasoconstriction). However, differential reactivity to critical and non-critical items on the physiological measures was less affected by observation. These results suggested that participants' arousal level has little effect on differential physiological reactivity on the CIT.

  6. Millimetre wave and terahertz technology for the detection of concealed threats: a review

    NASA Astrophysics Data System (ADS)

    Kemp, Michael C.

    2006-09-01

    There has been intense interest in the use of millimetre wave and terahertz technology for the detection of concealed weapons, explosives and other threats. Electromagnetic waves at these frequencies are safe, penetrate barriers and have short enough wavelengths to allow discrimination between objects. In addition, many solids including explosives have characteristic spectroscopic signatures at terahertz wavelengths which can be used to identify them. This paper reviews the progress which has been made in recent years and identifies the achievements, challenges and prospects for these technologies in checkpoint people screening, stand off detection of improvised explosive devices (IEDs) and suicide bombers as well as more specialized screening tasks.

  7. Standoff concealed weapon detection using a 350 GHz radar imaging system

    SciTech Connect

    Sheen, David M.; Hall, Thomas E.; Severtsen, Ronald H.; McMakin, Douglas L.; Hatchell, Brian K.; Valdez, Patrick LJ

    2010-04-01

    The Pacific Northwest National Laboratory is currently developing a 350 GHz, active, wideband, three-dimensional, radar imaging system to evaluate the feasibility of active sub-mm imaging for standoff concealed weapon detection. The prototype radar imaging system is based on a wideband, heterodyne, frequency-multiplier-based transceiver system coupled to a quasi-optical focusing system and high-speed rotating conical scanner. The wideband operation of this system provides accurate ranging information, and the images obtained are fully three-dimensional. Recent improvements to the system include increased imaging speed using improved balancing techniques, wider bandwidth, and image display techniques.

  8. Gene therapy for blindness.

    PubMed

    Sahel, José-Alain; Roska, Botond

    2013-07-08

    Sight-restoring therapy for the visually impaired and blind is a major unmet medical need. Ocular gene therapy is a rational choice for restoring vision or preventing the loss of vision because most blinding diseases originate in cellular components of the eye, a compartment that is optimally suited for the delivery of genes, and many of these diseases have a genetic origin or genetic component. In recent years we have witnessed major advances in the field of ocular gene therapy, and proof-of-concept studies are under way to evaluate the safety and efficacy of human gene therapies. Here we discuss the concepts and recent advances in gene therapy in the retina. Our review discusses traditional approaches such as gene replacement and neuroprotection and also new avenues such as optogenetic therapies. We conjecture that advances in gene therapy in the retina will pave the way for gene therapies in other parts of the brain.

  9. Postpartum cortical blindness.

    PubMed

    Faiz, Shakeel Ahmed

    2008-09-01

    A 30-years-old third gravida with previous normal pregnancies and an unremarkable prenatal course had an emergency lower segment caesarean section at a periphery hospital for failure of labour to progress. She developed bilateral cortical blindness immediately after recovery from anesthesia due to cerebral angiopathy shown by CT and MR scan as cortical infarct cerebral angiopathy, which is a rare complication of a normal pregnancy.

  10. Blind shaft development

    SciTech Connect

    Fiscor, S.

    2009-02-15

    The article discusses how Shaft Drillers International (SDI) is breaking new ground in shaft development and ground stabilization. Techniques of blind shaft drilling and raise bore shaft development developed by SDI are briefly explained. An associated company, Coastal Drilling East, deals with all types of ground improvement such as pre-grouting work for shafts, grouting of poor soil and water leaks into the mine. 3 photos.

  11. Geometry of blind thrusts

    SciTech Connect

    Kligfield, R.; Geiser, P.; Geiser, J.

    1985-01-01

    Blind thrusts are structures which at no time in their history broke the erosion surface and along which displacement progressively changes upwards. Faults of the stiff layer along which displacement progressively decreases to zero (tip) are one prominent type of blind thrust structure. Shortening above such tips is accommodated entirely by folding whereas shortening below the tip is partitioned between folding and faulting. For these types of faults it is possible to determine the original length of the stiff layer for balancing purposes. A systematic methodology for line length and area restoration is outlined for determining blind thrust geometry. Application of the methodology is particularly suitable for use with microcomputers. If the folded form of the cover is known along with the position of the fault and its tip, then it is possible to locate hanging and footwall cutoffs. If the fault trajectory, tip, and a single hanging wall footwall cutoff pair are known, then the folded form of the cover layer can be determined. In these constructions it is necessary to specify pin lines for balancing purposes. These pin lines may or may not have a zero displacement gradient, depending upon the amount of simple shear deformation. Examples are given from both Laramide structures of the western USA and the Appalachians.

  12. Parasitism rate, parasitoid community composition and host specificity on exposed and semi-concealed caterpillars from a tropical rainforest.

    PubMed

    Hrcek, Jan; Miller, Scott E; Whitfield, James B; Shima, Hiroshi; Novotny, Vojtech

    2013-10-01

    The processes maintaining the enormous diversity of herbivore-parasitoid food webs depend on parasitism rate and parasitoid host specificity. The two parameters have to be evaluated in concert to make conclusions about the importance of parasitoids as natural enemies and guide biological control. We document parasitism rate and host specificity in a highly diverse caterpillar-parasitoid food web encompassing 266 species of lepidopteran hosts and 172 species of hymenopteran or dipteran parasitoids from a lowland tropical forest in Papua New Guinea. We found that semi-concealed hosts (leaf rollers and leaf tiers) represented 84% of all caterpillars, suffered a higher parasitism rate than exposed caterpillars (12 vs. 5%) and their parasitoids were also more host specific. Semi-concealed hosts may therefore be generally more amenable to biological control by parasitoids than exposed ones. Parasitoid host specificity was highest in Braconidae, lower in Diptera: Tachinidae, and, unexpectedly, the lowest in Ichneumonidae. This result challenges the long-standing view of low host specificity in caterpillar-attacking Tachinidae and suggests higher suitability of Braconidae and lower suitability of Ichneumonidae for biological control of caterpillars. Semi-concealed hosts and their parasitoids are the largest, yet understudied component of caterpillar-parasitoid food webs. However, they still remain much closer in parasitism patterns to exposed hosts than to what literature reports on fully concealed leaf miners. Specifically, semi-concealed hosts keep an equally low share of idiobionts (2%) as exposed caterpillars.

  13. Are There Limits to Collectivism? Culture and Children's Reasoning About Lying to Conceal a Group Transgression.

    PubMed

    Sweet, Monica A; Heyman, Gail D; Fu, Genyue; Lee, Kang

    2010-07-01

    This study explored the effects of collectivism on lying to conceal a group transgression. Seven-, 9-, and 11-year-old US and Chinese children (N = 374) were asked to evaluate stories in which protagonists either lied or told the truth about their group's transgression and were then asked about either the protagonist's motivations or justification for their own evaluations. Previous research suggests that children in collectivist societies such as China find lying for one's group to be more acceptable than do children from individualistic societies such as the United States. The current study provides evidence that this is not always the case: Chinese children in this study viewed lies told to conceal a group's transgressions less favourably than did US children. An examination of children's reasoning about protagonists' motivations for lying indicated that children in both countries focused on an impact to self when discussing motivations for protagonists to lie for their group. Overall, results suggest that children living in collectivist societies do not always focus on the needs of the group.

  14. Specific NIST projects in support of the NIJ Concealed Weapon Detection and Imaging Program

    NASA Astrophysics Data System (ADS)

    Paulter, Nicholas G.

    1998-12-01

    The Electricity Division of the National Institute of Standards and Technology is developing revised performance standards for hand-held (HH) and walk-through (WT) metal weapon detectors, test procedures and systems for these detectors, and a detection/imaging system for finding concealed weapons. The revised standards will replace the existing National Institute of Justice (NIJ) standards for HH and WT devices and will include detection performance specifications as well as system specifications (environmental conditions, mechanical strength and safety, response reproducibility and repeatability, quality assurance, test reporting, etc.). These system requirements were obtained from the Law Enforcement and corrections Technology Advisory Council, an advisory council for the NIJ. Reproducible and repeatable test procedures and appropriate measurement systems will be developed for evaluating HH and WT detection performance. A guide to the technology and application of non- eddy-current-based detection/imaging methods (such as acoustic, passive millimeter-wave and microwave, active millimeter-wave and terahertz-wave, x-ray, etc.) Will be developed. The Electricity Division is also researching the development of a high- frequency/high-speed (300 GH to 1 THz) pulse-illuminated, stand- off, video-rate, concealed weapons/contraband imaging system.

  15. Survey of state-of-the-art technology in remote concealed weapon detection

    NASA Astrophysics Data System (ADS)

    Currie, Nicholas C.; Demma, Fred J.; Ferris, David D., Jr.; McMillan, Robert W.; Vannicola, Vincent C.; Wicks, Michael C.

    1995-09-01

    Recent advances in millimeter-wave (MMV), microwave, and infrared (IR) technologies provide the means to detect concealed weapons remotely through clothing and is some cases through walls. Since the developemnt of forward-looking infrared instruments, work has been ongoing in attempting to use these devices for concealed weapon detection based on temperatrue differences between metallic weapons and in the infrared has led to the development of techniques based on lower frequencies. Focal plane arrays operating MMW frequencies are becoming available which eliminate the need for a costly and slow mechanical scanner for generating images. These radiometric sensors also detect temperature differences between weapons and the human body background. Holographic imaging systems operating at both microwave and MMW frequencies have been developed which generate images of near photographic quality through clothing and through thin, nonmetallic walls. Finally, a real- aperture radar is useful for observing people and detecting weapons through walls and in the field under reduced visibility conditions. This paper will review all of these technologies and give examples of images generated by each type of sensor. An assessment of the future of this technology with regard to law enforcement applications will also be given.

  16. Development of a longer range standoff millimetre wave radar concealed threat detector

    NASA Astrophysics Data System (ADS)

    Bowring, Nicholas J.; Southgate, Matthew J.; Andrews, David A.; Rezgui, Nacer D.; Harmer, Stuart W.; O'Reilly, Dean

    2013-05-01

    A millimeter wave (75 - 110 GHz) polarimetric radar system (MiRTLE) has been developed for the detection of threat objects, such as guns, knives, or explosive devices, which have been concealed under clothing upon the human body. The system uses a Gaussian lens antenna to enable operation at stand-off ranges up to 25 meters. By utilizing ultra-wideband Swept Frequency Continuous Wave Radar very high range resolution (~ 10mm) is realized. The system is capable of detecting objects positioned in front of the body and of measuring the range of a target. By interpretation of the scattered waveform, the presence of a wide spectrum of threat items concealed on the human body may be detected. Threat detection is autonomously rendered by application of a neural network to the scattered time domain, polarimetric radar returns and the system may be taught to alarm or reject certain classes of objects; this allows for highly specific or broad spectrum threat detection. The radar system is portable and operator steerable allowing standoff monitoring of moving human targets in real time. Rapid (1ms) sweep times and fast signal acquisition and processing allow decisions to be made at video frame rates (30 fps) and integrated directly to a video feed providing the operator with a field of view and facilitating aiming. Performance parameters for detection of guns and simulated explosive devices are presented for ranges up to 25 meters.

  17. Detection of hazardous liquids concealed in glass, plastic, and aluminum containers

    NASA Astrophysics Data System (ADS)

    Ramirez, Michael L.; Ortiz, William; Ruiz, Orlando; Pacheco-Londoño, Leonardo; Hernández-Rivera, Samuel P.

    2007-04-01

    The use of liquid explosives by terrorists has raised the attention to the use of hazardous liquids as threats to people, buildings and transportation systems. Hazardous liquids such as explosive mixtures, flammables or even chemical warfare agents (CWA) can be concealed in common containers and pass security checks undetected. This work presents three non invasive, non destructive detection approaches that can be used to characterize the content of common liquid containers and detect if the liquid is the intended or a concealed hazardous liquid. Fiber optic coupled Raman spectroscopy and Stand off Raman spectroscopy were used to inspect the content of glass and plastic bottles and thermal conductivity was used to asses the liquid inside aluminum cans. Raman spectroscopy experiments were performed at 532 nm, 488 nm and 785 nm excitation wavelengths. The hazardous liquids under consideration included CWA simulant DMMP, hydrogen peroxide, acetone, cyclohexane, ethanol and nitric acid. These techniques have potential use as a detector for hazardous liquids at a check point or to inspect suspicious bottles from a distance.

  18. Noninvasive detection of concealed explosives: depth profiling through opaque plastics by time-resolved Raman spectroscopy.

    PubMed

    Petterson, Ingeborg E Iping; López-López, María; García-Ruiz, Carmen; Gooijer, Cees; Buijs, Joost B; Ariese, Freek

    2011-11-15

    The detection of explosives concealed behind opaque, diffusely scattering materials is a challenge that requires noninvasive analytical techniques for identification without having to manipulate the package. In this context, this study focuses on the application of time-resolved Raman spectroscopy (TRRS) with a picosecond pulsed laser and an intensified charge-coupled device (ICCD) detector for the noninvasive identification of explosive materials through several millimeters of opaque polymers or plastic packaging materials. By means of a short (250 ps) gate which can be delayed several hundred picoseconds after the laser pulse, the ICCD detector allows for the temporal discrimination between photons from the surface of a sample and those from deeper layers. TRRS was applied for the detection of the two main isomers of dinitrotoluene, 2,4-dinitrotoluene, and 2,6-dinitrotoluene as well as for various other components of explosive mixtures, including akardite II, diphenylamine, and ethyl centralite. Spectra were obtained through different diffuse scattering white polymer materials: polytetrafluoroethylene (PTFE), polyoxymethylene (POM), and polyethylene (PE). Common packaging materials of various thicknesses were also selected, including polystyrene (PS) and polyvinyl chloride (PVC). With the demonstration of the ability to detect concealed, explosives-related compounds through an opaque first layer, this study may have important applications in the security and forensic fields.

  19. Concealing of facial expressions by a wild Barbary macaque (Macaca sylvanus).

    PubMed

    Thunström, Maria; Kuchenbuch, Paul; Young, Christopher

    2014-07-01

    Behavioural research on non-vocal communication among non-human primates and its possible links to the origin of human language is a long-standing research topic. Because human language is under voluntary control, it is of interest whether this is also true for any communicative signals of other species. It has been argued that the behaviour of hiding a facial expression with one's hand supports the idea that gestures might be under more voluntary control than facial expressions among non-human primates, and it has also been interpreted as a sign of intentionality. So far, the behaviour has only been reported twice, for single gorilla and chimpanzee individuals, both in captivity. Here, we report the first observation of concealing of facial expressions by a monkey, a Barbary macaque (Macaca sylvanus), living in the wild. On eight separate occasions between 2009 and 2011 an adult male was filmed concealing two different facial expressions associated with play and aggression ("play face" and "scream face"), 22 times in total. The videos were analysed in detail, including gaze direction, hand usage, duration, and individuals present. This male was the only individual in his group to manifest this behaviour, which always occurred in the presence of a dominant male. Several possible interpretations of the function of the behaviour are discussed. The observations in this study indicate that the gestural communication and cognitive abilities of monkeys warrant more research attention.

  20. Combined illumination cylindrical millimeter-wave imaging technique for concealed weapon detection

    NASA Astrophysics Data System (ADS)

    Sheen, David M.; McMakin, Douglas L.; Hall, Thomas E.

    2000-07-01

    A novel millimeter-wave imaging technique has been developed for personnel surveillance applications, including the detection of concealed weapons, explosives, drugs, and other contraband material. Millimeter-waves are high-frequency radio waves in the frequency band of 30 - 300 GHz, and pose no health threat to humans at moderate power levels. These waves readily penetrate common clothing materials, and are reflected by the human body and by concealed items. The combined illumination cylindrical imaging concept consists of a vertical, high-resolution, millimeter-wave array of antennas which is scanned in a cylindrical manner about the person under surveillance. Using a computer, the data from this scan is mathematically reconstructed into a series of focused 3D images of the person. After reconstruction, the images are combined into a single high-resolution 3D image of the person under surveillance. This combined image is then rendered using 3D computer graphics techniques. The combined cylindrical illumination is critical as it allows the display of information from all angles. This is necessary because millimeter-waves do not penetrate the body. Ultimately, the images displayed to the operate will be icon-based to protect the privacy of the person being screened. Novel aspects of this technique include the cylindrical scanning concept and the image reconstruction algorithm, which was developed specifically for this imaging system. An engineering prototype based on this cylindrical imaging technique has been fabricated and tested. This work has been sponsored by the Federal Aviation Administration.

  1. The etiquette of endometriosis: stigmatisation, menstrual concealment and the diagnostic delay.

    PubMed

    Seear, Kate

    2009-10-01

    Endometriosis is a chronic gynaecological condition of uncertain aetiology characterised by menstrual irregularities. Several studies have previously identified a lengthy delay experienced by patients between the first onset of symptoms and eventual diagnosis. Various explanations have been advanced for the diagnostic delay, with both doctors and women being implicated. Such explanations include that doctors normalise women's menstrual pain and that women might delay in seeking medical advice because they have difficulty distinguishing between 'normal' and 'abnormal' menstruation. It has been suggested that the diagnostic delay could be reduced if women were trained in how to distinguish between 'normal' and 'abnormal' menstrual cycles. In this paper I argue that whilst these may be factors in the diagnostic delay, women's reluctance to disclose problems associated with their menstrual cycle may be a more significant and hitherto neglected factor. I argue women are reluctant to disclose menstrual irregularities because menstruation is a 'discrediting attribute' (Goffman, 1963) and disclosure renders women vulnerable to stigmatisation. Women actively conceal their menstrual irregularities through practices of the 'menstrual etiquette' (Laws, 1990) which involves the strategic concealment of menstrual problems. This argument is supported through an analysis of the experiences of 20 Australian women diagnosed with endometriosis. The ramifications of this analysis for chronic pain conditions more generally and for practical strategies designed to address the endometriosis diagnostic delay are considered.

  2. An edge-based temporal error concealment for MPEG-coded video

    NASA Astrophysics Data System (ADS)

    Huang, Yu-Len; Lien, Hsiu-Yi

    2005-07-01

    When transmitted over unreliable channels, the compressed video can suffer severe degradation. Some strategies were employed to make an acceptable quality of the decoded image sequence. Error concealment (EC) technique is one of effective approaches to diminish the quality degradation. A number of EC algorithms have been developed to combat the transmission errors for MPEG-coded video. These methods always work well to reconstruct the smooth or regular damaged macroblocks. However, for damaged macroblocks were irregular or high-detail, the reconstruction may follow noticeable blurring consequence or not match well with the surrounding macroblocks. This paper proposes an edgebased temporal EC model to conceal the errors. In the proposed method, both the spatial and the temporal contextual features in compressed video are measured by using an edge detector, i.e. Sobel operator. The edge information surrounding a damaged macroblock is utilized to estimate the lost motion vectors based on the boundary matching technique. Next, the estimated motion vectors are used to reconstruct the damaged macroblock by exploiting the information in reference frames. In comparison with traditional EC algorithms, the proposed method provides a significant improvement on both objective peak signal-to-noise ratio (PSNR) measurement and subjective visual quality of MPEG-coded video.

  3. Ultra wide band millimeter wave holographic ``3-D`` imaging of concealed targets on mannequins

    SciTech Connect

    Collins, H.D.; Hall, T.E.; Gribble, R.P.

    1994-08-01

    Ultra wide band (chirp frequency) millimeter wave ``3-D`` holography is a unique technique for imaging concealed targets on human subjects with extremely high lateral and depth resolution. Recent ``3-D`` holographic images of full size mannequins with concealed weapons illustrate the efficacy of this technique for airport security. A chirp frequency (24 GHz to 40 GHz) holographic system was used to construct extremely high resolution images (optical quality) using polyrod antenna in a bi-static configuration using an x-y scanner. Millimeter wave chirp frequency holography can be simply described as a multi-frequency detection and imaging technique where the target`s reflected signals are decomposed into discrete frequency holograms and reconstructed into a single composite ``3-D`` image. The implementation of this technology for security at airports, government installations, etc., will require real-time (video rate) data acquisition and computer image reconstruction of large volumetric data sets. This implies rapid scanning techniques or large, complex ``2-D`` arrays and high speed computing for successful commercialization of this technology.

  4. Decision Makers Use Norms, Not Cost-Benefit Analysis, When Choosing to Conceal or Reveal Unfair Rewards

    PubMed Central

    Heimann, Marco; Girotto, Vittorio; Legrenzi, Paolo; Bonnefon, Jean-François

    2013-01-01

    We introduce the Conceal or Reveal Dilemma, in which individuals receive unfair benefits, and must decide whether to conceal or to reveal this unfair advantage. This dilemma has two important characteristics: it does not lend itself easily to cost-benefit analysis, neither to the application of any strong universal norm. As a consequence, it is ideally suited to the study of interindividual and intercultural variations in moral-economic norms. In this paper we focus on interindividual variations, and we report four studies showing that individuals cannot be swayed by financial incentives to conceal or to reveal, and follow instead fixed, idiosyncratic strategies. We discuss how this result can be extended to individual and cultural variations in the tendency to display or to hide unfair rewards. PMID:24066040

  5. Concealment of time delay signature of chaotic output in a slave semiconductor laser with chaos laser injection

    NASA Astrophysics Data System (ADS)

    Wu, Tianan; Sun, Weiyang; Zhang, Xiaoxu; Zhang, Shenghai

    2016-12-01

    An improved chaotic laser system, which has a slave semiconductor laser (SL) injected by a master SL with double optical feedback (DOF), is proposed, so that the time delay (TD) signature can be successfully concealed from both intensity and phase chaos via choosing appropriate parameters. The TD signature is investigated by employing autocorrelation function (ACF) and mutual information (MI) function. Through analyzing the influence on TD signature in the region of injection current and injection strength for the slave SL, we find that, for both intensity chaos and phase chaos, the TD signature can be easily concealed under weak injection strength. When the injection strength is strong, we can not only successfully conceal TD signature, but also improve the bandwidth of chaotic laser output by choosing the optimal detuning frequency.

  6. Applicability and Limitations of Reliability Allocation Methods

    NASA Technical Reports Server (NTRS)

    Cruz, Jose A.

    2016-01-01

    Reliability allocation process may be described as the process of assigning reliability requirements to individual components within a system to attain the specified system reliability. For large systems, the allocation process is often performed at different stages of system design. The allocation process often begins at the conceptual stage. As the system design develops, more information about components and the operating environment becomes available, different allocation methods can be considered. Reliability allocation methods are usually divided into two categories: weighting factors and optimal reliability allocation. When properly applied, these methods can produce reasonable approximations. Reliability allocation techniques have limitations and implied assumptions that need to be understood by system engineers. Applying reliability allocation techniques without understanding their limitations and assumptions can produce unrealistic results. This report addresses weighting factors, optimal reliability allocation techniques, and identifies the applicability and limitations of each reliability allocation technique.

  7. Collective credit allocation in science.

    PubMed

    Shen, Hua-Wei; Barabási, Albert-László

    2014-08-26

    Collaboration among researchers is an essential component of the modern scientific enterprise, playing a particularly important role in multidisciplinary research. However, we continue to wrestle with allocating credit to the coauthors of publications with multiple authors, because the relative contribution of each author is difficult to determine. At the same time, the scientific community runs an informal field-dependent credit allocation process that assigns credit in a collective fashion to each work. Here we develop a credit allocation algorithm that captures the coauthors' contribution to a publication as perceived by the scientific community, reproducing the informal collective credit allocation of science. We validate the method by identifying the authors of Nobel-winning papers that are credited for the discovery, independent of their positions in the author list. The method can also compare the relative impact of researchers working in the same field, even if they did not publish together. The ability to accurately measure the relative credit of researchers could affect many aspects of credit allocation in science, potentially impacting hiring, funding, and promotion decisions.

  8. Collective credit allocation in science

    PubMed Central

    Shen, Hua-Wei; Barabási, Albert-László

    2014-01-01

    Collaboration among researchers is an essential component of the modern scientific enterprise, playing a particularly important role in multidisciplinary research. However, we continue to wrestle with allocating credit to the coauthors of publications with multiple authors, because the relative contribution of each author is difficult to determine. At the same time, the scientific community runs an informal field-dependent credit allocation process that assigns credit in a collective fashion to each work. Here we develop a credit allocation algorithm that captures the coauthors’ contribution to a publication as perceived by the scientific community, reproducing the informal collective credit allocation of science. We validate the method by identifying the authors of Nobel-winning papers that are credited for the discovery, independent of their positions in the author list. The method can also compare the relative impact of researchers working in the same field, even if they did not publish together. The ability to accurately measure the relative credit of researchers could affect many aspects of credit allocation in science, potentially impacting hiring, funding, and promotion decisions. PMID:25114238

  9. Task allocation in a distributed computing system

    NASA Technical Reports Server (NTRS)

    Seward, Walter D.

    1987-01-01

    A conceptual framework is examined for task allocation in distributed systems. Application and computing system parameters critical to task allocation decision processes are discussed. Task allocation techniques are addressed which focus on achieving a balance in the load distribution among the system's processors. Equalization of computing load among the processing elements is the goal. Examples of system performance are presented for specific applications. Both static and dynamic allocation of tasks are considered and system performance is evaluated using different task allocation methodologies.

  10. Unsupervised Blind Deconvolution

    NASA Astrophysics Data System (ADS)

    Baena-Galle, R.; Kann, L.; Mugnier, L.; Gudimetla, R.; Johnson, R.; Gladysz, S.

    2013-09-01

    "Blind" deconvolution is rarely executed blindly. All available methods have parameters which the user fine-tunes until the most visually-appealing reconstruction is achieved. The "art" of deconvolution is to find constraints which allow for the best estimate of an object to be recovered, but in practice these parameterized constraints often reduce deconvolution to the struggle of trial and error. In the course of AFOSR-sponsored activities we are developing a general maximum a posteriori framework for the problem of imaging through atmospheric turbulence, with the emphasis on multi-frame blind deconvolution. Our aim is to develop deconvolution strategy which is reference-less, i.e. no calibration PSF is required, extendable to longer exposures, and applicable to imaging with adaptive optics. In the first part of the project the focus has been on developing a new theory of statistics of images taken through turbulence, both with-, and without adaptive optics. Images and their Fourier transforms have been described as random phasor sums, their fluctuations controlled by wavefront "cells" and moments of the phase. The models were validated using simulations and real data from the 3.5m telescope at the Starfire Optical Range in New Mexico. Another important ingredient of the new framework is the capability to estimate the average PSF automatically from the target observations. A general approach, applicable to any type of object, has been proposed. Here use is made of an object-cancelling transformation of the image sequence. This transformation yields information about the atmospheric PSF. Currently, the PSF estimation module and the theoretical constraints on PSF variability are being incorporated into multi-frame blind deconvolution. In preliminary simulation tests we obtained significantly sharper images with respect to the starting observations and PSF estimates which closely track the input kernels. Thanks to access to the SOR 3.5m telescope we are now testing

  11. Fighting blindness with microelectronics.

    PubMed

    Zrenner, Eberhart

    2013-11-06

    There is no approved cure for blindness caused by degeneration of the photoreceptor cells of the retina. However, there has been encouraging progress with attempts to restore vision using microelectronic retinal implant devices. Yet many questions remain to be addressed. Where is the best location to implant multielectrode arrays? How can spatial and temporal resolution be improved? What are the best ways to ensure the safety and longevity of these devices? Will color vision be possible? This Perspective discusses the current state of the art of retinal implants and attempts to address some of the outstanding questions.

  12. Brief Report: How Do They Manage Social Interaction? The Influence of Concealing Academic Achievement Information on Self-Monitoring by Adolescents with Low Achievement

    ERIC Educational Resources Information Center

    Zhang, Baoshan; Zhao, Jun-Yan; Yu, Guoliang

    2010-01-01

    During social interactions people self-monitor their behavior at least partially to conceal socially devalued characteristics. This study examined the influences of concealing academic achievement on self-monitoring in an academically-relevant social interaction. An interview paradigm called for school-aged adolescent participants (total N = 86)…

  13. Multiscale image blind denoising.

    PubMed

    Lebrun, Marc; Colom, Miguel; Morel, Jean-Michel

    2015-10-01

    Arguably several thousands papers are dedicated to image denoising. Most papers assume a fixed noise model, mainly white Gaussian or Poissonian. This assumption is only valid for raw images. Yet, in most images handled by the public and even by scientists, the noise model is imperfectly known or unknown. End users only dispose the result of a complex image processing chain effectuated by uncontrolled hardware and software (and sometimes by chemical means). For such images, recent progress in noise estimation permits to estimate from a single image a noise model, which is simultaneously signal and frequency dependent. We propose here a multiscale denoising algorithm adapted to this broad noise model. This leads to a blind denoising algorithm which we demonstrate on real JPEG images and on scans of old photographs for which the formation model is unknown. The consistency of this algorithm is also verified on simulated distorted images. This algorithm is finally compared with the unique state of the art previous blind denoising method.

  14. Deaf, blind or deaf-blind: Is touch enhanced?

    PubMed

    Papagno, Costanza; Cecchetto, Carlo; Pisoni, Alberto; Bolognini, Nadia

    2016-02-01

    When someone looses one type of sensory input, s/he may compensate by using the sensory information conveyed by other senses. To verify whether loosing a sense or two has consequences on a spared sensory modality, namely touch, and whether these consequences depend on the type of sensory loss, we investigated the effects of deafness and blindness on temporal and spatial tactile tasks in deaf, blind and deaf-blind people. Deaf and deaf-blind people performed the spatial tactile task better than the temporal one, while blind and controls showed the opposite pattern. Deaf and deaf-blind participants were impaired in temporal discrimination as compared to controls, while deaf-blind individuals outperformed blind participants in the spatial tactile task. Overall, sensory-deprived participants did not show an enhanced tactile performance. We speculate that discriminative touch is not so relevant in humans, while social touch is. Probably, more complex tactile tasks would have revealed an increased performance in sensory-deprived people.

  15. Task allocation among multiple intelligent robots

    NASA Technical Reports Server (NTRS)

    Gasser, L.; Bekey, G.

    1987-01-01

    Researchers describe the design of a decentralized mechanism for allocating assembly tasks in a multiple robot assembly workstation. Currently, the approach focuses on distributed allocation to explore its feasibility and its potential for adaptability to changing circumstances, rather than for optimizing throughput. Individual greedy robots make their own local allocation decisions using both dynamic allocation policies which propagate through a network of allocation goals, and local static and dynamic constraints describing which robots are elibible for which assembly tasks. Global coherence is achieved by proper weighting of allocation pressures propagating through the assembly plan. Deadlock avoidance and synchronization is achieved using periodic reassessments of local allocation decisions, ageing of allocation goals, and short-term allocation locks on goals.

  16. Corneal blindness: a global perspective.

    PubMed Central

    Whitcher, J. P.; Srinivasan, M.; Upadhyay, M. P.

    2001-01-01

    Diseases affecting the cornea are a major cause of blindness worldwide, second only to cataract in overall importance. The epidemiology of corneal blindness is complicated and encompasses a wide variety of infectious and inflammatory eye diseses that cause corneal scarring, which ultimately leads to functional blindness. In addition, the prevalence of corneal disease varies from country to country and even from one population to another. While cataract is responsible for nearly 20 million of the 45 million blind people in the world, the next major cause is trachoma which blinds 4.9 million individuals, mainly as a result of corneal scarring and vascularization. Ocular trauma and corneal ulceration are significant causes of corneal blindness that are often underreported but may be responsible for 1.5-2.0 million new cases of monocular blindness every year. Causes of childhood blindness (about 1.5 million worldwide with 5 million visually disabled) include xerophthalmia (350,000 cases annually), ophthalmia neonatorum, and less frequently seen ocular diseases such as herpes simplex virus infections and vernal keratoconjunctivitis. Even though the control of onchocerciasis and leprosy are public health success stories, these diseases are still significant causes of blindness--affecting a quarter of a million individuals each. Traditional eye medicines have also been implicated as a major risk factor in the current epidemic of corneal ulceration in developing countries. Because of the difficulty of treating corneal blindness once it has occurred, public health prevention programmes are the most cost-effective means of decreasing the global burden of corneal blindness. PMID:11285665

  17. The Discipline of Asset Allocation.

    ERIC Educational Resources Information Center

    Petzel, Todd E.

    2000-01-01

    Discussion of asset allocation for college/university endowment funds focuses on three levels of risk: (1) the absolute risk of the portfolio (usually leading to asset diversification); (2) the benchmark risk (usually comparison with peer institutions; and (3) personal career risk (which may incline managers toward maximizing short-term returns,…

  18. Administrators' Decisions about Resource Allocation

    ERIC Educational Resources Information Center

    Knight, William E.; Folkins, John W.; Hakel, Milton D.; Kennell, Richard P.

    2011-01-01

    Do academic administrators make decisions about resource allocation differently depending on the discipline receiving the funding? Does an administrator's academic identity influence these decisions? This study explored those questions with a sample of 1,690 academic administrators at doctoral-research universities. Participants used fictional…

  19. Regulating nutrient allocation in plants

    DOEpatents

    Udvardi, Michael; Yang, Jiading; Worley, Eric

    2014-12-09

    The invention provides coding and promoter sequences for a VS-1 and AP-2 gene, which affects the developmental process of senescence in plants. Vectors, transgenic plants, seeds, and host cells comprising heterologous VS-1 and AP-2 genes are also provided. Additionally provided are methods of altering nutrient allocation and composition in a plant using the VS-1 and AP-2 genes.

  20. Resource Allocation: A Participatory Process.

    ERIC Educational Resources Information Center

    Reid, Alban E.

    Whether a participatory process for resource allocation in a public community college setting occurs depends upon several key factors: (1) the leadership style of the institutional chief executive officer; (2) the administrative organizational structure of the institution; (3) the relationship which exists between and among members of the various…

  1. Remote concealed weapon detection in millimeter-wave region: active and passive

    NASA Astrophysics Data System (ADS)

    Stanko, Stephan; Klöppel, Frank; Huck, Johann; Nötel, Denis; Hägelen, Manfred; Briese, Gunnar; Gregor, Alexander; Erukulla, Sreenivas; Fuchs, Hans-Hellmuth; Essen, Helmut; Pagels, Anke

    2006-09-01

    Sensors used for Security purposes have to cover the non-invasive inspection of persons, baggage and letters with the aim to detect weapons, explosives and chemical or biological threat material. Currently, emphasis is placed on system concepts and technologies for this type of applications, employing millimeterwave-, submillimeterwave- and terahertz sensors. This is based on the capability of these frequency bands to look through textiles and the possibility to achieve a geometric resolution which is sufficient to resolve critical items within the necessary range. Using multiple frequencies promises to give more detailed information about the structure of the observed objects. Furthermore, to overcome the limitations of passive millimeter- and submillimeterwave sensors which depend on indirect illumination, systems using miniaturized mmw-radar modules are applied as well. This paper describes two approaches for the detection of concealed weapons, the first using a millimeterwave radiometer on a scanner and the second employing a miniaturized radar module based on a synthetic aperture method.

  2. Joint source coding, transport processing, and error concealment for H.323-based packet video

    NASA Astrophysics Data System (ADS)

    Zhu, Qin-Fan; Kerofsky, Louis

    1998-12-01

    In this paper, we investigate how to adapt different parameters in H.263 source coding, transport processing and error concealment to optimize end-to-end video quality at different bitrates and packet loss rates for H.323-based packet video. First different intra coding patterns are compared and we show that the contiguous rectangle or square block pattern offers the best performance in terms of video quality in the presence of packet loss. Second, the optimal intra coding frequency is found for different bitrates and packet loss rates. The optimal number of GOB headers to be inserted in the source coding is then determined. The effect of transport processing strategies such as packetization and retransmission is also examined. For packetization, the impact of packet size and the effect of macroblock segmentation to picture quality are investigated. Finally, we show that the dejitter buffering delay can be used to the advantage for packet loss recovery with video retransmission without incurring any extra delay.

  3. Management of adult concealed penis using a meshed, split-thickness skin graft

    PubMed Central

    Boonjindasup, Aaron; Pinsky, Michael; Stewart, Carrie; Trost, Landon; Chaffin, Abigail; Jansen, David; Hellstrom, Wayne

    2016-01-01

    Introduction Concealed penis (CP) is a rare problem faced by urologists and plastic surgeons. CP occurs secondary to trauma, obesity, or infection. Surgical treatment is individualized and based on patient and provider variables. We aim to review our recent experience using meshed split-thickness skin grafting (STSG) for CP management. Methods A retrospective review was performed on patients who underwent STSG for CP at our institution. Records were reviewed for demographic, operative, and postoperative variables. Preoperative and postoperative photos were obtained to monitor cosmetic results. Results Eleven patients underwent CP release with meshed STSG placement. All cases showed improved functional phallic length and good cosmetic results, regardless of etiology. Conclusions STSG is a viable option for penile coverage for management of this difficult-to-treat CP population. This primary or salvage modality offers excellent cosmetic results and may be used following prior reconstructive attempts. PMID:28096930

  4. 220GHz wideband 3D imaging radar for concealed object detection technology development and phenomenology studies

    NASA Astrophysics Data System (ADS)

    Robertson, Duncan A.; Macfarlane, David G.; Bryllert, Tomas

    2016-05-01

    We present a 220 GHz 3D imaging `Pathfinder' radar developed within the EU FP7 project CONSORTIS (Concealed Object Stand-Off Real-Time Imaging for Security) which has been built to address two objectives: (i) to de-risk the radar hardware development and (ii) to enable the collection of phenomenology data with ~1 cm3 volumetric resolution. The radar combines a DDS-based chirp generator and self-mixing multiplier technology to achieve a 30 GHz bandwidth chirp with such high linearity that the raw point response is close to ideal and only requires minor nonlinearity compensation. The single transceiver is focused with a 30 cm lens mounted on a gimbal to acquire 3D volumetric images of static test targets and materials.

  5. Event-related potentials increase the discrimination performance of the autonomic-based concealed information test.

    PubMed

    Matsuda, Izumi; Nittono, Hiroshi; Ogawa, Tokihiro

    2011-12-01

    The concealed information test (CIT) assesses an examinee's crime-relevant memory on the basis of physiological differences between crime-relevant and irrelevant items. The CIT based on autonomic measures has been used for criminal investigations, while the CIT based on event-related potentials (ERPs) has been suggested as a useful alternative. To combine these two methods, we developed a quantification method of ERPs measured in the autonomic-based CIT where each item was repeated only 5 times. Results showed that the peak amplitude of the ERP difference wave between crime-relevant and irrelevant items could discriminate between guilty and innocent participants effectively even when only 5 trials were used for averaging. This ERP measure could detect some participants who were missed by the autonomic measures. Combining the ERP and autonomic measures significantly improved the discrimination performance of the autonomic-based CIT.

  6. The concealed information test as an instrument of applied differential psychophysiology: methodological considerations.

    PubMed

    Furedy, John J

    2009-09-01

    In this interpretative paper, I consider four sets of methodological issues that may be relevant to improving the concealed information test (CIT) as an instrument of applied differential psychophysiology. The first set has to do with psychophysiological measurement in the CIT (e.g., specific sensitivity testing in lab vs. field). Secondly, I consider the relationships between the psychological process of deception and the CIT. Thirdly, I consider the problem of laboratory-to-field generalization of the CIT, a consideration that includes a discussion of whether the lab/field differences are merely quantitative or actually qualitative. Finally, I discuss theories concerning the hypothetical mechanisms underlying the CIT, and argue that while the purely cognitive, Sokolovian, orienting response (OR) account is widely accepted as the sole mechanism, there is evidence to suggest that not just motivational, but even emotional mechanisms are also relevant.

  7. Sexual harassment of girls in elementary school: a concealed phenomenon within a heterosexual romantic discourse.

    PubMed

    Gådin, Katja Gillander

    2012-06-01

    The aim of this study was to enhance the understanding of young girls' experiences of peer sexual harassment in elementary school and of normalizing processes of school-related sexualized violence. Six focus group interviews with girls in Grade 1 through 6 were carried out in an elementary school in the northern part of Sweden. A content analyses showed that young girls experienced verbal, nonverbal, and sexual assault behaviors at school. Sexual harassment as a concealed phenomenon and manifest within a romantic discourse were themes found in the analysis. A conclusion is that schools have to acknowledge behaviors related to sexual harassment as a potential problem even in young ages and develop methods to approach the subject also for this age group.

  8. Parenting beliefs and practices of opiate-addicted parents: concealment and taboo.

    PubMed

    Hogan, Diane M

    2003-07-01

    The lifestyle associated with opiate dependence, including drug taking, the buying and selling of drugs, and contact with other drug users, carries potential risks for the safety and well-being of children of drug-using parents. Based on a qualitative interview study conducted with 50 opiate-dependent parents in Dublin, Ireland, the parenting beliefs and practices in relation to children's exposure to drugs and the associated lifestyle are described. Parents saw their lifestyle as potentially risky for their children and their families. The most common strategy adopted by parents was to conceal their drug-related activities and maintain a strict family taboo about these activities. Intervention programmes should be offered to support effective family communication about parental drug dependence.

  9. Overview on Deaf-Blindness

    ERIC Educational Resources Information Center

    Miles, Barbara

    2008-01-01

    It may seem that deaf-blindness refers to a total inability to see or hear. However, in reality deaf-blindness is a condition in which the combination of hearing and visual losses in children cause "such severe communication and other develop mental and educational needs that they cannot be accommodated in special education programs solely for…

  10. Biological Models for Blind Students.

    ERIC Educational Resources Information Center

    Franks, Frank L.; Murr, Marvin J.

    1978-01-01

    In response to an expressed need for inexpensive biological models for blind students, the American Printing House for the Blind has developed a set of 19 plastic models (schematics), which illustrate representative species of the major invertebrate phyla and component structures of flowering plants. (Author)

  11. The human operational sex ratio: effects of marriage, concealed ovulation, and menopause on mate competition.

    PubMed

    Marlowe, Frank W; Berbesque, J Colette

    2012-12-01

    Among mammals, male-male competition for sexual access to females frequently involves fighting. Larger body size gives males an advantage in fighting, which explains why males tend to be larger than females in many species, including anthropoid primates. Mitani et al. derived a formula to measure the operational sex ratio (OSR) to reflect the degree of male-male competition using the number of reproductively available males to females who are cycling and capable of conceiving. The OSR should predict the degree of sexual dimorphism in body mass-at least if male-male competition involves much fighting or threatening. Here, we use hunter-gatherer demographic data and the Mitani et al. formula to calculate the human OSR. We show that humans have a much lower degree of body mass sexual dimorphism than is predicted by our OSR. We suggest this is because human competition rarely involves fighting. In human hunter-gatherer societies, differences in the ages of marriage have an impact on competition in that the age of males at first marriage is younger when there is a lower percentage of married men with two or more wives, and older when there is a higher percentage of married men with two or more wives. We discuss the implications of this for females, along with the effects of two key life history traits that influence the OSR, concealed ovulation and menopause. While menopause decreases the number of reproductively available females to males and thus increases male-male competition, concealed ovulation decreases male-male competition. Finally, we discuss the importance of mostly monogamous mate bonds in human evolution.

  12. Vitamin D and musculoskeletal status in Nova Scotian women who wear concealing clothing.

    PubMed

    Ojah, Rani C I; Welch, Jo M

    2012-05-01

    Bone and muscle weakness due to vitamin D deficiency is common among Muslim women who reside in sunny, equatorial countries. The purpose of this study was to determine if living in a northern maritime location additionally disadvantages women who wear concealing clothes. A cross-sectional matched pair design was used to compare women who habitually wore concealing clothing with women who dressed according to western norms. Each premenopausal hijab-wearing woman (n = 11) was matched by age, height, weight and skin tone with a western-dressed woman. Subjects were tested by hand grip dynamometry to assess muscular strength and by quantitative ultrasound at the calcaneus to assess bone status. Nutritional intake was obtained by 24 h recall. Serum 25-hydroxyvitamin D (s-25(OH)D) status was determined in seven matched pairs. The hijab group had lower s-25(OH)D than women who wore western clothes (40 ± 28 vs. 81 ± 32 nmol/L, p= 0.01). Grip strength in the right hand was lower in the hijab-wearing women (p = 0.05) but this appeared to be due to less participation in intense exercise. Bone status did not differ between groups (p= 0.9). Dietary intake of vitamin D was lower in the hijab-wearers (316 ± 353 vs. 601 ± 341 IU/day, p= 0.001). This pilot study suggests that women living in a northern maritime location appear to be at risk for vitamin D insufficiency and therefore should consider taking vitamin D supplements.

  13. Enhanced terahertz imaging system performance analysis and design tool for concealed weapon identification

    NASA Astrophysics Data System (ADS)

    Murrill, Steven R.; Franck, Charmaine C.; Espinola, Richard L.; Petkie, Douglas T.; De Lucia, Frank C.; Jacobs, Eddie L.

    2011-11-01

    The U.S. Army Research Laboratory (ARL) and the U.S. Army Night Vision and Electronic Sensors Directorate (NVESD) have developed a terahertz-band imaging system performance model/tool for detection and identification of concealed weaponry. The details of the MATLAB-based model which accounts for the effects of all critical sensor and display components, and for the effects of atmospheric attenuation, concealment material attenuation, and active illumination, were reported on at the 2005 SPIE Europe Security & Defence Symposium (Brugge). An advanced version of the base model that accounts for both the dramatic impact that target and background orientation can have on target observability as related to specular and Lambertian reflections captured by an active-illumination-based imaging system, and for the impact of target and background thermal emission, was reported on at the 2007 SPIE Defense and Security Symposium (Orlando). This paper will provide a comprehensive review of an enhanced, user-friendly, Windows-executable, terahertz-band imaging system performance analysis and design tool that now includes additional features such as a MODTRAN-based atmospheric attenuation calculator and advanced system architecture configuration inputs that allow for straightforward performance analysis of active or passive systems based on scanning (single- or line-array detector element(s)) or staring (focal-plane-array detector elements) imaging architectures. This newly enhanced THz imaging system design tool is an extension of the advanced THz imaging system performance model that was developed under the Defense Advanced Research Project Agency's (DARPA) Terahertz Imaging Focal-Plane Technology (TIFT) program. This paper will also provide example system component (active-illumination source and detector) trade-study analyses using the new features of this user-friendly THz imaging system performance analysis and design tool.

  14. Millimeter-wave concealed weapons detection and through-the-wall imaging systems

    NASA Astrophysics Data System (ADS)

    Huguenin, G. Richard

    1997-02-01

    Millimetrix' millimeter wave passive imaging technology offers the opportunity for rapid and remote detection of metallic and non-metallic weapons, plastic explosives, drugs, and other contraband concealed under multiple layers of clothing without the necessity of a direct physical search. The purely passive imaging technique relies solely on the existing natural emissions from the scene objects, does not expose the person to any man-made radiation, and is therefore completely harmless to the person being observed and to all others in the area. Screening can be done remotely and with as much discretion as the situation requires. The passive imaging approach to the detection of concealed weapons and contraband hidden under people's clothing works well at millimeter wavelengths because of a fortunate convergence of a number of key factors: (1) adequate resolution in a reasonable sensor size; (2) high transparency of virtually all clothing; and (3) the extraordinarily high emissivity of human flesh compared to the vast majority of other materials. Longer (microwave) wavelengths are impractical because of sensor size and resolution issues, and shorter (infrared) wavelengths are impractical because of the poor transparency of most clothing. The ability of millimeter wave emissions to penetrate many common building materials permits the remote observation, using active millimeter wave sensors, of people and other objects within a room from outside of that room. The resulting through-the-wall 'live' video images of people and furnishings will indicate their location, posture, and activity within a room which should be valuable knowledge to Special Operations, SWAT, and other military and law enforcement personnel prior to their entering that room. Millimeter wave radar imaging systems based on passive MillivisionR camera technology are being developed by Millimetrix (and other members of the MIRTAC TRP consortium) for through-the-wall imaging system (TWIS) applications.

  15. Analysis of potential dynamic concealed factors in the difficulty of lower third molar extraction

    PubMed Central

    Singh, Pradeep; Ajmera, Deepal-Haresh; Xiao, Shui-Sheng; Liu, Xiong; Peng, Bin

    2016-01-01

    Background The purpose of this study was to identify potential concealed variables associated with the difficulty of lower third molar (M3) extractions. Material and Methods To address the research purpose, we implemented a prospective study and enrolled a sample of subjects presenting for M3 removal. Predictor variables were categorized into Group-I and Group-II, based on predetermined criteria. The primary outcome variable was the difficulty of extraction, measured as extraction time. Appropriate univariate and multivariate statistics were computed using ordinal logistic regression. Results The sample comprised of 1235 subjects with a mean age of 29.49 +/- 8.92 years in Group-I and 26.20 +/- 11.55 years in Group-II subjects. The mean operating time per M3 extraction was 21.24 +/- 12.80 and 20.24 +/- 12.50 minutes for Group-I and Group-II subjects respectively. Three linear parameters including B-M2 height (distance between imaginary point B on the inferior border of mandibular body, and M2), lingual cortical thickness, bone density and one angular parameter including Rc-Cs angle (angle between ramus curvature and curve of spee), in addition to patient’s age, profile type, facial type, cant of occlusal plane, and decreased overbite, were found to be statistically associated (P < or = 0.05) with extraction difficulty under regression models. Conclusions In conclusion, our study indicates that the difficulty of lower M3 extractions is possibly governed by morphological and biomechanical factors with substantial influence of myofunctional factors. Practical Implications: Preoperative evaluation of dynamic concealed factors may not only help in envisaging the difficulty and planning of surgical approach but might also help in better time management in clinical practice. Key words:Third molar, impacted, extraction, mandibular, facial type. PMID:27694781

  16. Brain fingerprinting classification concealed information test detects US Navy military medical information with P300

    PubMed Central

    Farwell, Lawrence A.; Richardson, Drew C.; Richardson, Graham M.; Furedy, John J.

    2014-01-01

    A classification concealed information test (CIT) used the “brain fingerprinting” method of applying P300 event-related potential (ERP) in detecting information that is (1) acquired in real life and (2) unique to US Navy experts in military medicine. Military medicine experts and non-experts were asked to push buttons in response to three types of text stimuli. Targets contain known information relevant to military medicine, are identified to subjects as relevant, and require pushing one button. Subjects are told to push another button to all other stimuli. Probes contain concealed information relevant to military medicine, and are not identified to subjects. Irrelevants contain equally plausible, but incorrect/irrelevant information. Error rate was 0%. Median and mean statistical confidences for individual determinations were 99.9% with no indeterminates (results lacking sufficiently high statistical confidence to be classified). We compared error rate and statistical confidence for determinations of both information present and information absent produced by classification CIT (Is a probe ERP more similar to a target or to an irrelevant ERP?) vs. comparison CIT (Does a probe produce a larger ERP than an irrelevant?) using P300 plus the late negative component (LNP; together, P300-MERMER). Comparison CIT produced a significantly higher error rate (20%) and lower statistical confidences: mean 67%; information-absent mean was 28.9%, less than chance (50%). We compared analysis using P300 alone with the P300 + LNP. P300 alone produced the same 0% error rate but significantly lower statistical confidences. These findings add to the evidence that the brain fingerprinting methods as described here provide sufficient conditions to produce less than 1% error rate and greater than 95% median statistical confidence in a CIT on information obtained in the course of real life that is characteristic of individuals with specific training, expertise, or organizational

  17. Brain fingerprinting classification concealed information test detects US Navy military medical information with P300.

    PubMed

    Farwell, Lawrence A; Richardson, Drew C; Richardson, Graham M; Furedy, John J

    2014-01-01

    A classification concealed information test (CIT) used the "brain fingerprinting" method of applying P300 event-related potential (ERP) in detecting information that is (1) acquired in real life and (2) unique to US Navy experts in military medicine. Military medicine experts and non-experts were asked to push buttons in response to three types of text stimuli. Targets contain known information relevant to military medicine, are identified to subjects as relevant, and require pushing one button. Subjects are told to push another button to all other stimuli. Probes contain concealed information relevant to military medicine, and are not identified to subjects. Irrelevants contain equally plausible, but incorrect/irrelevant information. Error rate was 0%. Median and mean statistical confidences for individual determinations were 99.9% with no indeterminates (results lacking sufficiently high statistical confidence to be classified). We compared error rate and statistical confidence for determinations of both information present and information absent produced by classification CIT (Is a probe ERP more similar to a target or to an irrelevant ERP?) vs. comparison CIT (Does a probe produce a larger ERP than an irrelevant?) using P300 plus the late negative component (LNP; together, P300-MERMER). Comparison CIT produced a significantly higher error rate (20%) and lower statistical confidences: mean 67%; information-absent mean was 28.9%, less than chance (50%). We compared analysis using P300 alone with the P300 + LNP. P300 alone produced the same 0% error rate but significantly lower statistical confidences. These findings add to the evidence that the brain fingerprinting methods as described here provide sufficient conditions to produce less than 1% error rate and greater than 95% median statistical confidence in a CIT on information obtained in the course of real life that is characteristic of individuals with specific training, expertise, or organizational

  18. Disclosure and Concealment of Sexual Orientation and the Mental Health of Non-Gay-Identified, Behaviorally Bisexual Men

    ERIC Educational Resources Information Center

    Schrimshaw, Eric W.; Siegel, Karolynn; Downing, Martin J., Jr.; Parsons, Jeffrey T.

    2013-01-01

    Objective: Although bisexual men report lower levels of mental health relative to gay men, few studies have examined the factors that contribute to bisexual men's mental health. Bisexual men are less likely to disclose, and more likely to conceal (i.e., a desire to hide), their sexual orientation than gay men. Theory suggests that this may…

  19. The incidence and outcome of concealed pregnancies among hospital deliveries: an 11-year population-based study in South Glamorgan.

    PubMed

    Nirmal, D; Thijs, I; Bethel, J; Bhal, P S

    2006-02-01

    Denial of pregnancy has been implicated in potentially jeopardising prenatal care and subsequent safe planned deliveries. This population-based study of hospital deliveries over an 11-year period, reveals that concealed pregnancies have an incidence of one in 2,500 deliveries. Among this cohort, 12% were married and 58% were multiparous with 8% having had a previous caesarean section. Some 20% of women had a medical disorder complicating the antenatal period. There was a preponderance of concealed pregnancies in the winter months compared with booked deliveries (p = 0.02). Mode of delivery was similar between the booked and concealed pregnancies with a low incidence of maternal morbidity in the latter. Prematurity rates (p = 0.0002) were significantly higher in the concealed pregnancy cohort. A total of 20% of infants had depressed Apgar scores at 1 min and 8% at 5 min. There was no documentation of counselling or follow-up in this group. Despite the low incidence of maternal morbidity, these women should be regarded as high-risk labour due to the increased perinatal morbidity. Greater effort needs to be made towards ensuring these women have adequate counselling and follow-up during the postnatal period.

  20. Limitation of tachycardia zone resulting from longitudinal dissociation of the atrioventricular node in concealed pre-excitation.

    PubMed Central

    Littmann, L; Svenson, R H

    1981-01-01

    Two cases with a concealed left-sided accessory atrioventricular bypass tract are described. In both, functional longitudinal dissociation of the atrioventricular node narrowed the range of atrial premature beat coupling intervals which could initiate re-entry using the accessory pathway. In case 1 early premature atrial beats were followed by an atrioventricular nodal re-entrant echo. The atrial echo pre-empted retrograde conduction over the Kent bundle and thus limited the development of paroxysmal supraventricular tachycardia. In case 2 atrioventricular nodal conduction showed typical features ascribed to dual atrioventricular nodal pathways. In addition there was a bradycardia-related retrograde block in the concealed accessory pathway. Early premature atrial beats, because of exclusive "slow pathway" anterograde conduction, arrived at the ventricles during the period of bradycardia-dependent retrograde block and failed to initiate a macro re-entrant tachycardia. This study shows that (1) longitudinal dissociation within the atrioventricular node may limit the ability to initiate tachycardia in patients with concealed pre-excitation; and (2) discontinuous atrioventricular nodal conduction curves occasionally help to reveal bradycardia-related retrograde block in a concealed accessory pathway. PMID:7295423

  1. Self-Concealment, Social Network Sites Usage, Social Appearance Anxiety, Loneliness of High School Students: A Model Testing

    ERIC Educational Resources Information Center

    Dogan, Ugur; Çolak, Tugba Seda

    2016-01-01

    This study was tested a model for explain to social networks sites (SNS) usage with structural equation modeling (SEM). Using SEM on a sample of 475 high school students (35% male, 65% female) students, model was investigated the relationship between self-concealment, social appearance anxiety, loneliness on SNS such as Twitter and Facebook usage.…

  2. Geochemical Data for Samples Collected in 2008 Near the Concealed Pebble Porphyry Cu-Au-Mo Deposit, Southwest Alaska

    USGS Publications Warehouse

    Fey, David L.; Granitto, Matthew; Giles, Stuart A.; Smith, Steven M.; Eppinger, Robert G.; Kelley, Karen D.

    2009-01-01

    In the summer of 2007, the U.S. Geological Survey (USGS) began an exploration geochemical research study over the Pebble porphyry copper-gold-molybdenum deposit. This report presents the analytical data collected in 2008. The Pebble deposit is world class in size, and is almost entirely concealed by tundra, glacial deposits, and post-Cretaceous volcanic rocks. The Pebble deposit was chosen for this study because it is concealed by surficial cover rocks, is relatively undisturbed (except for exploration company drill holes), is a large mineral system, and is fairly well-constrained at depth by the drill hole geology and geochemistry. The goals of this study are to 1) determine whether the concealed deposit can be detected with surface samples, 2) better understand the processes of metal migration from the deposit to the surface, and 3) test and develop methods for assessing mineral resources in similar concealed terrains. The analytical data are presented as an integrated Microsoft Access 2003 database and as separate Excel files.

  3. A different kind of weapon focus: simulated training with ballistic weapons reduces change blindness.

    PubMed

    Taylor, J Eric T; Witt, Jessica K; Pratt, Jay

    2017-01-01

    Attentional allocation is flexibly altered by action-related priorities. Given that tools - and specifically weapons - can affect attentional allocation, we asked whether training with a weapon or holding a weapon during search would affect change detection. In three experiments, participants searched for changes to agents, shootable objects, or environments in the popular flicker paradigm. Participants trained with a simulated weapon or watched a video from the same training perspective and then searched for changes while holding a weapon or a control object. Results show an effect of training, highlighting the importance of sensorimotor experience for the action-relevant allocation of attention, and a possible interaction between training and the object held during search. Simulated training with ballistic weapons reduces change blindness. This result has implications for the interaction between tool use and attentional allocation.

  4. How to Succeed at Being Blind

    ERIC Educational Resources Information Center

    Selvin, Hanan C.

    1976-01-01

    The author, a professional sociologist who lost his sight, provides practical advice and information to people who are becoming blind or who have recently become blind, and others who know or work with blind persons. (Author/IM)

  5. Blind Pilot Decontamination

    NASA Astrophysics Data System (ADS)

    Muller, Ralf R.; Cottatellucci, Laura; Vehkapera, Mikko

    2014-10-01

    A subspace projection to improve channel estimation in massive multi-antenna systems is proposed and analyzed. Together with power-controlled hand-off, it can mitigate the pilot contamination problem without the need for coordination among cells. The proposed method is blind in the sense that it does not require pilot data to find the appropriate subspace. It is based on the theory of large random matrices that predicts that the eigenvalue spectra of large sample covariance matrices can asymptotically decompose into disjoint bulks as the matrix size grows large. Random matrix and free probability theory are utilized to predict under which system parameters such a bulk decomposition takes place. Simulation results are provided to confirm that the proposed method outperforms conventional linear channel estimation if bulk separation occurs.

  6. Load Induced Blindness

    PubMed Central

    Macdonald, James S. P.; Lavie, Nilli

    2008-01-01

    Although the perceptual load theory of attention has stimulated a great deal of research, evidence for the role of perceptual load in determining perception has typically relied on indirect measures that infer perception from distractor effects on reaction times or neural activity (see N. Lavie, 2005d`) was consistently reduced with high, compared to low, perceptual load but was unaffected by the level of working memory load. Because alternative accounts in terms of expectation, memory, response bias, and goal-neglect due to the more strenuous high load task were ruled out, these experiments clearly demonstrate that high perceptual load determines conscious perception, impairing the ability to merely detect the presence of a stimulus—a phenomenon of load induced blindness. PMID:18823196

  7. 10 CFR 455.31 - Allocation formulas.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... DEPARTMENT OF ENERGY ENERGY CONSERVATION GRANT PROGRAMS FOR SCHOOLS AND HOSPITALS AND BUILDINGS OWNED BY... conservation measures, including renewable resource measures, for schools and hospitals, shall be allocated... percent of all amounts allocated in any grant program cycle. No State will be allocated more than...

  8. 42 CFR 457.228 - Cost allocation.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 4 2011-10-01 2011-10-01 false Cost allocation. 457.228 Section 457.228 Public...; Reduction of Federal Medical Payments § 457.228 Cost allocation. A State plan must provide that the single or appropriate CHIP Agency will have an approved cost allocation plan on file with the Department...

  9. 42 CFR 433.34 - Cost allocation.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 4 2011-10-01 2011-10-01 false Cost allocation. 433.34 Section 433.34 Public... Provisions § 433.34 Cost allocation. A State plan under Title XIX of the Social Security Act must provide that the single or appropriate Agency will have an approved cost allocation plan on file with...

  10. 50 CFR 600.517 - Allocations.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 50 Wildlife and Fisheries 12 2014-10-01 2014-10-01 false Allocations. 600.517 Section 600.517 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION... allocation. The burden of ascertaining and accurately transmitting current allocations and status of...

  11. 50 CFR 600.517 - Allocations.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 50 Wildlife and Fisheries 10 2011-10-01 2011-10-01 false Allocations. 600.517 Section 600.517 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION... allocation. The burden of ascertaining and accurately transmitting current allocations and status of...

  12. 50 CFR 600.517 - Allocations.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 50 Wildlife and Fisheries 12 2012-10-01 2012-10-01 false Allocations. 600.517 Section 600.517 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION... allocation. The burden of ascertaining and accurately transmitting current allocations and status of...

  13. 24 CFR 945.203 - Allocation plan.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 24 Housing and Urban Development 4 2014-04-01 2014-04-01 false Allocation plan. 945.203 Section... FAMILIES Application and Approval Procedures § 945.203 Allocation plan. (a) Applicable terminology. (1) As used in this section, the terms “initial allocation plan” refers to the PHA's first submission of...

  14. Communication patterns and allocation strategies.

    SciTech Connect

    Leung, Vitus Joseph; Mache, Jens Wolfgang; Bunde, David P.

    2004-01-01

    Motivated by observations about job runtimes on the CPlant system, we use a trace-driven microsimulator to begin characterizing the performance of different classes of allocation algorithms on jobs with different communication patterns in space-shared parallel systems with mesh topology. We show that relative performance varies considerably with communication pattern. The Paging strategy using the Hilbert space-filling curve and the Best Fit heuristic performed best across several communication patterns.

  15. Minority Transportation Expenditure Allocation Model

    SciTech Connect

    Vyas, Anant D.; Santini, Danilo J.; Marik, Sheri K.

    1993-04-12

    MITRAM (Minority TRansportation expenditure Allocation Model) can project various transportation related attributes of minority (Black and Hispanic) and majority (white) populations. The model projects vehicle ownership, vehicle miles of travel, workers, new car and on-road fleet fuel economy, amount and share of household income spent on gasoline, and household expenditures on public transportation and taxis. MITRAM predicts reactions to sustained fuel price changes for up to 10 years after the change.

  16. Algorithms for optimal redundancy allocation

    SciTech Connect

    Vandenkieboom, J.; Youngblood, R.

    1993-01-01

    Heuristic and exact methods for solving the redundancy allocation problem are compared to an approach based on genetic algorithms. The various methods are applied to the bridge problem, which has been used as a benchmark in earlier work on optimization methods. Comparisons are presented in terms of the best configuration found by each method, and the computation effort which was necessary in order to find it.

  17. Drug user treatment failure blindness?

    PubMed

    Einstein, Stan

    2012-01-01

    An ethnographic case study of a "failed" single goal (abstinence) based individual and group therapy treatment of a New York City, Harlem-based, single, young-adult of color, IDU, mother, which ended in "death by overdose," after a period of abstinence, is presented almost 50 years later, in which complex, multidimensional structural barriers, "normed," consensualized, ideologically-driven preconceptions and an array of contextual, situational and relevant stakeholder factors, which may have resulted in intervention "failure blindness," are reviewed. The need to introduce failure analysis, blindness and management, as well as success analysis, blindness and management, as integral parts of treatment planning, implementation and assessment is raised.

  18. Non-blind acoustic invisibility by dual layers of homogeneous single-negative media.

    PubMed

    Gao, He; Zhu, Yi-Fan; Fan, Xu-Dong; Liang, Bin; Yang, Jing; Cheng, Jian-Chun

    2017-02-14

    Non-blind invisibility cloaks allowing the concealed object to sense the outside world have great application potentials such as in high-precision sensing or underwater camouflage. However the existing designs based on coordinate transformation techniques need complicated spatially-varying negative index or intricate multi-layered configurations, substantially increasing the difficulty in practical realization. Here we report on the non-blind acoustic invisibility for a circular object in free space with simple distribution of cloak parameters. The mechanism is that, instead of utilizing the transformation acoustics technique, we develop the analytical formulae for fast prediction of the scattering from the object and then use an evolutionary optimization to retrieve the desired cloak parameters for minimizing the scattered field. In this way, it is proven possible to break through the fundamental limit of complementary condition that must be satisfied by the effective parameters of the components in transformation acoustics-based cloaks. Numerical results show that the resulting cloak produces a non-bflind invisibility as perfect as in previous designs, but only needs two layers with homogenous single-negative parameters. With full simplification in parameter distribution and broken symmetry in complementary relationship, our scheme opens new route to free-space non-blind invisibility, taking a significant step towards real-world application of cloaking devices.

  19. Non-blind acoustic invisibility by dual layers of homogeneous single-negative media

    NASA Astrophysics Data System (ADS)

    Gao, He; Zhu, Yi-Fan; Fan, Xu-Dong; Liang, Bin; Yang, Jing; Cheng, Jian-Chun

    2017-02-01

    Non-blind invisibility cloaks allowing the concealed object to sense the outside world have great application potentials such as in high-precision sensing or underwater camouflage. However the existing designs based on coordinate transformation techniques need complicated spatially-varying negative index or intricate multi-layered configurations, substantially increasing the difficulty in practical realization. Here we report on the non-blind acoustic invisibility for a circular object in free space with simple distribution of cloak parameters. The mechanism is that, instead of utilizing the transformation acoustics technique, we develop the analytical formulae for fast prediction of the scattering from the object and then use an evolutionary optimization to retrieve the desired cloak parameters for minimizing the scattered field. In this way, it is proven possible to break through the fundamental limit of complementary condition that must be satisfied by the effective parameters of the components in transformation acoustics-based cloaks. Numerical results show that the resulting cloak produces a non-bflind invisibility as perfect as in previous designs, but only needs two layers with homogenous single-negative parameters. With full simplification in parameter distribution and broken symmetry in complementary relationship, our scheme opens new route to free-space non-blind invisibility, taking a significant step towards real-world application of cloaking devices.

  20. Non-blind acoustic invisibility by dual layers of homogeneous single-negative media

    PubMed Central

    Gao, He; Zhu, Yi-fan; Fan, Xu-dong; Liang, Bin; Yang, Jing; Cheng, Jian-Chun

    2017-01-01

    Non-blind invisibility cloaks allowing the concealed object to sense the outside world have great application potentials such as in high-precision sensing or underwater camouflage. However the existing designs based on coordinate transformation techniques need complicated spatially-varying negative index or intricate multi-layered configurations, substantially increasing the difficulty in practical realization. Here we report on the non-blind acoustic invisibility for a circular object in free space with simple distribution of cloak parameters. The mechanism is that, instead of utilizing the transformation acoustics technique, we develop the analytical formulae for fast prediction of the scattering from the object and then use an evolutionary optimization to retrieve the desired cloak parameters for minimizing the scattered field. In this way, it is proven possible to break through the fundamental limit of complementary condition that must be satisfied by the effective parameters of the components in transformation acoustics-based cloaks. Numerical results show that the resulting cloak produces a non-bflind invisibility as perfect as in previous designs, but only needs two layers with homogenous single-negative parameters. With full simplification in parameter distribution and broken symmetry in complementary relationship, our scheme opens new route to free-space non-blind invisibility, taking a significant step towards real-world application of cloaking devices. PMID:28195227

  1. Allocating Variability and Reserve Requirements (Presentation)

    SciTech Connect

    Kirby, B.; King, J.; Milligan, M.

    2011-10-01

    This presentation describes how you could conceivably allocate variability and reserve requirements, including how to allocate aggregation benefits. Conclusions of this presentation are: (1) Aggregation provides benefits because individual requirements are not 100% correlated; (2) Method needed to allocate reduced requirement among participants; (3) Differences between allocation results are subtle - (a) Not immediately obvious which method is 'better'; (b) Many are numerically 'correct', they sum to the physical requirement; (c) Many are not 'fair', Results depend on sub-aggregation and/or the order individuals are included; and (4) Vector allocation method is simple and fair.

  2. Perceptual Repetition Blindness Effects

    NASA Technical Reports Server (NTRS)

    Hochhaus, Larry; Johnston, James C.; Null, Cynthia H. (Technical Monitor)

    1994-01-01

    The phenomenon of repetition blindness (RB) may reveal a new limitation on human perceptual processing. Recently, however, researchers have attributed RB to post-perceptual processes such as memory retrieval and/or reporting biases. The standard rapid serial visual presentation (RSVP) paradigm used in most RB studies is, indeed, open to such objections. Here we investigate RB using a "single-frame" paradigm introduced by Johnston and Hale (1984) in which memory demands are minimal. Subjects made only a single judgement about whether one masked target word was the same or different than a post-target probe. Confidence ratings permitted use of signal detection methods to assess sensitivity and bias effects. In the critical condition for RB a precue of the post-target word was provided prior to the target stimulus (identity precue), so that the required judgement amounted to whether the target did or did not repeat the precue word. In control treatments, the precue was either an unrelated word or a dummy.

  3. Reusable captive blind fastener

    NASA Technical Reports Server (NTRS)

    Peterson, S. A. (Inventor)

    1981-01-01

    A one piece reusable fastener capable of joining materials together from one side (blind backside) comprises a screw driven pin ending in a wedge-shaped expander cone. The cone cooperates within a slotted collar end which has a number of tangs on a cylindrical body. The fastener is set by inserting it through aligned holes in the workpieces to be joined. Turning the pin in one direction draws the cone into the collar, deforming the tangs radially outward to mate with tapered back-tapered hold in the workpiece, thus fastening the two pieces together. Reversing the direction of the pin withdraws the cone from the collar, and allows the tangs to resume their contracted configuration without withdrawing the fastener from the insertion hole. The fastener is capable of joining materials together from only one side with substantial strength in tension and shear over many resue attachment cycles, with no special operations on the main assembly parts other than the tapering of the back end of the insertion hole.

  4. Orthographic repetition blindness.

    PubMed

    Harris, C L; Morris, A L

    2000-11-01

    Repetition blindness (RB) is the failure to report the second occurrence of a repeated word, when words are sequentially and briefly displayed (Kanwisher, 1987). RB is also observed for non-identical words, such as home, dome. Explanations for non-identity RB assume that similarity at the level of the whole word causes the second word to be suppressed ("similarity inhibition"). Three experiments demonstrate that RB is robust for diverse types of orthographic relatedness, including critical words that share only their first initial letter, their last two letters, first three letters, middle three letters, beginning and final letters, three alternating letters, and three non-aligned letters (as in chance hand). The theoretical construct of similarity inhibition may be able to account for these data, although one mechanism previously proposed in the literature, neighbourhood inhibition, is probably not a useful way to explain the data on RB for words sharing only one or two letters. We introduce an alternative explanation for orthographic RB: Only the repeated letters are suppressed, and amount of RB depends on how easily the perceiver can reconstruct the target word from the non-suppressed letters.

  5. Perceptual repetition blindness effects.

    PubMed

    Hochhaus, L; Johnston, J C

    1996-04-01

    Repetition blindness (RB) may reveal a new limitation on human perceptual processing. Recently, however, researchers have attributed RB to postperceptual processes. The standard rapid serial visual presentation (RSVP) paradigm used in most RB studies is open to such objections. The "single-frame" paradigm introduced by J. C. Johnston and B. L. Hale (1984) allowed investigation of RB with minimal memory demands. Participants made a judgment about whether 1 masked target word was the same or different than a posttarget probe. Confidence ratings permitted use of signal detection methods. In the critical condition for RB, a precue of the posttarget word was provided prior to the target stimulus so that the required judgment amounted to whether the target did or did not repeat the precue word. In control treatments, the precue was an unrelated word or a dummy. Results showed that perceptual sensitivity was significantly reduced in the RB condition relative to baseline control conditions. The data showed that RB can be obtained under conditions in which memory problems are minimal and perceptual sensitivity is assessed independently of biases. RB therefore can be a perceptual phenomenon.

  6. Load induced blindness.

    PubMed

    Macdonald, James S P; Lavie, Nilli

    2008-10-01

    Although the perceptual load theory of attention has stimulated a great deal of research, evidence for the role of perceptual load in determining perception has typically relied on indirect measures that infer perception from distractor effects on reaction times or neural activity (see N. Lavie, 2005, for a review). Here we varied the level of perceptual load in a letter-search task and assessed its effect on the conscious perception of a search-irrelevant shape stimulus appearing in the periphery, using a direct measure of awareness (present/absent reports). Detection sensitivity (d') was consistently reduced with high, compared to low, perceptual load but was unaffected by the level of working memory load. Because alternative accounts in terms of expectation, memory, response bias, and goal-neglect due to the more strenuous high load task were ruled out, these experiments clearly demonstrate that high perceptual load determines conscious perception, impairing the ability to merely detect the presence of a stimulus--a phenomenon of load induced blindness.

  7. Concealment, communication and stigma: The perspectives of HIV-positive immigrant Black African men and their partners living in the United Kingdom.

    PubMed

    Owuor, John Oa; Locke, Abigail; Heyman, Bob; Clifton, Andrew

    2016-12-01

    This study explored the perspectives of Black men, originally from East Africa, living in the United Kingdom and their partners on what it means to live with diagnosed HIV. This article reports on concealment of HIV-positive status as a strategy adopted by the affected participants to manage the flow of information about their HIV-positive status. Analysis of the data, collected using in-depth interviews involving 23 participants, found widespread selective concealment of HIV-positive status. However, a few respondents had 'come out' publicly about their condition. HIV prevention initiatives should recognise concealment as a vital strategy in managing communication about one's HIV-positive status.

  8. Vision following extended congenital blindness.

    PubMed

    Ostrovsky, Yuri; Andalman, Aaron; Sinha, Pawan

    2006-12-01

    Animal studies suggest that early visual deprivation can cause permanent functional blindness. However, few human data on this issue exist. Given enough time for recovery, can a person gain visual skills after several years of congenital blindness? In India, we recently had an unusual opportunity to work with an individual whose case history sheds light on this question. S.R.D. was born blind, and remained so until age 12. She then underwent surgery for the removal of dense congenital cataracts. We evaluated her performance on an extensive battery of visual tasks 20 years after surgery. We found that although S.R.D.'s acuity is compromised, she is proficient on mid- and high-level visual tasks. These results suggest that the human brain retains an impressive capacity for visual learning well into late childhood. They have implications for current conceptions of cortical plasticity and provide an argument for treating congenital blindness even in older children.

  9. Laboratory Techniques for the Blind

    ERIC Educational Resources Information Center

    Tombaugh, Dorothy

    1972-01-01

    Describes modifications of laboratory procedures for the BSCS Green Version biology, including dissection, microbiology, animal behavior, physiology, biochemistry, and genetics that make the methods suitable for direct experimentation by blind students. Discusses models as substitutes for microscopy. (AL)

  10. Student Art for Blind Children.

    ERIC Educational Resources Information Center

    Vanda, Kay

    1982-01-01

    Describes a project in which high school student volunteers designed art activities for blind children. Students incorporated the sensation of motion and texture into their designs for toys, puzzles, games, and story illustrations. (AM)

  11. American Foundation for the Blind

    MedlinePlus

    ... and Electronic Materials Webinars and Online Courses Accessible Technology AccessWorld ® : Technology News for People Who Are Blind or Visually Impaired Find Assistive Technology Products Using Technology: Apps, Guides, Video Demonstrations, and ...

  12. 45 CFR 402.31 - Determination of allocations.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... ASSISTANCE GRANTS State Allocations § 402.31 Determination of allocations. (a) Allocation formula. Allocations will be computed according to a formula using the following factors and weights: (1) 50...

  13. What It's Like to Be Color Blind

    MedlinePlus

    ... los dientes Video: Getting an X-ray What It's Like to Be Color Blind KidsHealth > For Kids > What It's Like to Be Color Blind Print A A ... blind. But some people really are color blind. It doesn't mean they can't see any ...

  14. Programs for the Deaf-Blind.

    ERIC Educational Resources Information Center

    American Annals of the Deaf, 1991

    1991-01-01

    This directory lists contact information for programs for the deaf-blind in the United States in 3 categories: (1) programs for deaf-blind children and youth (29 programs listed); (2) Helen Keller National Center for Deaf-Blind Youth and Adults (1 national and 10 regional offices); and (3) programs for training teachers of the deaf-blind (4…

  15. A Perceptual Repetition Blindness Effect

    NASA Technical Reports Server (NTRS)

    Hochhaus, Larry; Johnston, James C.; Null, Cynthia H. (Technical Monitor)

    1994-01-01

    Before concluding Repetition Blindness is a perceptual phenomenon, alternative explanations based on memory retrieval problems and report bias must be rejected. Memory problems were minimized by requiring a judgment about only a single briefly displayed field. Bias and sensitivity effects were empirically measured with an ROC-curve analysis method based on confidence ratings. Results from five experiments support the hypothesis that Repetition Blindness can be a perceptual phenomenon.

  16. ESTIMATED STATISTICS ON BLINDNESS AND VISION PROBLEMS. NATIONAL SOCIETY FOR THE PREVENTION OF BLINDNESS FACT BOOK.

    ERIC Educational Resources Information Center

    HATFIELD, ELIZABETH M.

    CURRENT ESTIMATES AND SOME TREND DATA ARE PRESENTED ON THE FOLLOWING SUBJECTS -- POPULATION GROWTH (1940-1960), PREVALENCE OF LEGAL BLINDNESS, NEW CASES OF LEGAL BLINDNESS, AGE DISTRIBUTION OF LEGALLY BLIND PERSONS, CAUSES OF LEGAL BLINDNESS, CHANGING PATTERNS IN CAUSES OF LEGAL BLINDNESS, CASES OF GLAUCOMA, SCHOOL CHILDREN NEEDING EYE CARE,…

  17. Evaluation of active and passive near-millimeter-wave radiometric imaging techniques for detection of concealed objects

    SciTech Connect

    Reber, E.E.; Foote, F.B.; Schellenbaum, R.L.; Bradley, R.G.

    1981-07-01

    Active and passive radiometric imaging techniques have been used at 1.4- and 3-mm wavelengths (220 and 100 GHz) to evaluate their potential use in detecting concealed objects. An evaluation of the techniques includes a particular study of their potential in detecting shielded nuclear materials and explosives carried covertly by personnel. We have previously reported images of metal objects and nuclear shielding materials that were detected when concealed under clothing. These images appear with the human body as background. Detection of contraband by radiometric imaging techniques depends upon the differences in emissivity and reflectivity of the contraband relative to human tissue. Explosives, unlike metals and metal composites, generally have high emissivities and low reflectivities that closely approximate those of human tissue making explosives difficult to detect. Samples of several common types of explosives (TNT, Detasheet, C4, and several types of water gels) have been examined at the 1.4- and 3-mm wavelengths using active and passive radiometric techniques.

  18. Being white helps: intersections of self-concealment, stigmatization, identity formation, and psychological distress in racial and sexual minority women.

    PubMed

    McIntyre, Shannon L; Antonucci, Erica A; Haden, Sara C

    2014-01-01

    This study had two objectives: (1) examine the impact of self-concealment on identity formation and on degree of psychological distress and (2) examine the impact of perceived stigma on identity formation and on degree of psychological distress. Analyses were conducted on a diverse sample of 166 women, ages 18-32 (white lesbian, non-white lesbian, white heterosexual, and non-white heterosexual). Findings revealed that self-concealment was positively associated with psychological distress in stigmatized women, but unrelated to psychological distress in the non-stigmatized group. Furthermore, although perceived stigma negatively impacted identity formation in the heterosexual groups, it did not impact either group of lesbians. Finally, non-white heterosexual women's perception of stigma was associated with psychological distress. Implications and specific psychological health disparities between groups are discussed.

  19. A new discrimination method for the Concealed Information Test using pretest data and within-individual comparisons.

    PubMed

    Matsuda, Izumi; Hirota, Akihisa; Ogawa, Tokihiro; Takasawa, Noriyoshi; Shigemasu, Kazuo

    2006-08-01

    A latent class discrimination method is proposed for analyzing autonomic responses on the concealed information test. Because there are significant individual differences in autonomic responses, individual response patterns are estimated on the pretest. Then an appropriate discriminant formula for the response pattern of each individual is applied to the CIT test results. The probability that the individual concealed information is calculated by comparing the discriminant formula value of the crime-related item to that of non-crime-related items. The discrimination performance of the latent class discrimination method was higher than those of the logistic regression method and the discriminant analysis method in an experimental demonstration applying the three methods to the same data set.

  20. Detection of contraband concealed on the body using x-ray imaging

    NASA Astrophysics Data System (ADS)

    Smith, Gerald J.

    1997-01-01

    In an effort to avoid detection, smugglers and terrorists are increasingly using the body as a vehicle for transporting illicit drugs, weapons, and explosives. This trend illustrates the natural tendency of traffickers to seek the path of least resistance, as improved interdiction technology and operational effectiveness have been brought to bear on other trafficking avenues such as luggage, cargo, and parcels. In response, improved technology for human inspection is being developed using a variety of techniques. ASE's BodySearch X-ray Inspection Systems uses backscatter x-ray imaging of the human body to quickly, safely, and effectively screen for drugs, weapons, and explosives concealed on the body. This paper reviews the law enforcement and social issues involved in human inspections, and briefly describes the ASE BodySearch systems. Operator training, x-ray image interpretation, and maximizing systems effectiveness are also discussed. Finally, data collected from operation of the BodySearch system in the field is presented, and new law enforcement initiatives which have come about due to recent events are reviewed.

  1. Physiological responses in a Concealed Information Test are determined interactively by encoding procedure and questioning format.

    PubMed

    Ambach, Wolfgang; Dummel, Sebastian; Lüer, Theresa; Vaitl, Dieter

    2011-09-01

    Physiological responses in the Concealed Information Test (CIT) are known to depend on the depth of encoding critical items; CIT questions commonly refer to knowledge about critical items. It is unclear to what extent (1) different modes of item handling in a mock-crime, and (2) alternative questioning formats, e.g. asking about participants' particular actions with the critical items, influence the physiological responses. In the presented mock-crime study with fifty-three participants, two questioning formats, i.e. "Did you see …?" (viewing questioning) and "Did you steal …?" (stealing questioning), were compared between subjects. The mode of encoding, stealing vs. merely viewing the critical objects, was varied within subject. Skin conductance, electrocardiogram, respiration, and finger pulse were recorded. For both questioning formats and each physiological measure, physiological responses to stolen as well as merely viewed objects differed from those to irrelevant objects. Considering viewing questioning, responses to stolen and merely viewed objects did not differ, with the exception of greater phasic decreases of heart rate for stolen objects. Considering stealing questioning, responses to stolen objects exceeded those to merely viewed objects with each physiological measure. The statistically proven interaction between mode of encoding a particular object and questioning format sheds light on the factors influencing the physiological responses in a CIT. The level of subjective significance of a particular item might emerge interactively from the mode of item handling and the questioning format.

  2. Hiding true emotions: micro-expressions in eyes retrospectively concealed by mouth movements.

    PubMed

    Iwasaki, Miho; Noguchi, Yasuki

    2016-02-26

    When we encounter someone we dislike, we may momentarily display a reflexive disgust expression, only to follow-up with a forced smile and greeting. Our daily lives are replete with a mixture of true and fake expressions. Nevertheless, are these fake expressions really effective at hiding our true emotions? Here we show that brief emotional changes in the eyes (micro-expressions, thought to reflect true emotions) can be successfully concealed by follow-up mouth movements (e.g. a smile). In the same manner as backward masking, mouth movements of a face inhibited conscious detection of all types of micro-expressions in that face, even when viewers paid full attention to the eye region. This masking works only in a backward direction, however, because no disrupting effect was observed when the mouth change preceded the eye change. These results provide scientific evidence for everyday behaviours like smiling to dissemble, and further clarify a major reason for the difficulty we face in discriminating genuine from fake emotional expressions.

  3. Mobile TNA system to detect explosives and drugs concealed in cars and trucks

    NASA Astrophysics Data System (ADS)

    Bendahan, Joseph; Gozani, Tsahi

    1998-12-01

    The drug problem in the U.S. is serious and efforts to fight it are constrained by the lack of adequate means to curb the inflow of smuggled narcotics into the country through cargo containers. Also, events such as the disastrous explosion in Oklahoma City, the IRA bombing in London, and the bombing of the U.S. military residence in Dharan make the development of new tools for the detection of explosives and drugs in vehicles imperative. Thermal neutron analysis (TNA) technology, developed for the detection of explosives in suitcases, and detection of landmines and unexploded ordnance is presently being applied to the nonintrusive detection of significant amounts of explosives and drugs concealed in cars, trucks and large cargo containers. TNA technology is based on the analysis of characteristic gamma rays emitted following thermal neutron capture. A TNA system can be used in a variety of operational scenarios, such as inspection before an unloaded cargo container from a spit is moved to temporary storage, inspection of trucks unloaded from a ferry, or inspection of vehicles parked close to Federal building or military bases. This paper will discuss the detection process and operational scenarios, and will present results from recent simulations and measurements.

  4. Ambulatory blood pressure monitoring during pregnancy with a new, small, easily concealed monitor.

    PubMed

    Tape, T G; Rayburn, W F; Bremer, K D; Schnoor, T A

    1994-12-01

    Before establishing the utility of ambulatory blood pressure monitoring during pregnancy, we evaluated the accuracy of a small, easily concealed monitor. The 59 normotensive pregnant patients were between 13 and 26 gestational weeks. For each monitor reading, two trained observers independently and simultaneously recorded blood pressures using a mercury manometer connected to the monitor cuff. Seven readings in three positions (sitting upright, semirecumbent, standing) were performed on each patient. Averaged differences between the observers' and monitor readings varied from -2.2 to -0.9 mm Hg (systolic) and from -2.8 to -0.6 (fifth-phase diastolic), indicating slight but clinically unimportant overestimation by the monitor. Correlations between averaged observers' readings and the monitor ranged from 0.79 to 0.92 (systolic) and from 0.85 to 0.92 (fifth-phase diastolic). Overall, the observers agreed with the monitor within 5 mm Hg on 94% of systolic readings and 99% of fifth-phase diastolic readings. There was no statistically significant difference in accuracy with changes in body position. We conclude that this small, quiet, noninvasive device accurately determined blood pressures during pregnancy.

  5. Effect of Temperature and Moisture on the Development of Concealed Damage in Raw Almonds (Prunus dulcis).

    PubMed

    Rogel-Castillo, Cristian; Zuskov, David; Chan, Bronte Lee; Lee, Jihyun; Huang, Guangwei; Mitchell, Alyson E

    2015-09-23

    Concealed damage (CD) is a brown discoloration of nutmeat that appears only after kernels are treated with moderate heat (e.g., roasting). Identifying factors that promote CD in almonds is of significant interest to the nut industry. Herein, the effect of temperature (35 and 45 °C) and moisture (<5, 8, and 11%) on the composition of volatiles in raw almonds (Prunus dulcis var. Nonpareil) was studied using HS-SPME-GC/MS. A CIE LCh colorimetric method was developed to identify raw almonds with CD. A significant increase in CD was demonstrated in almonds exposed to moisture (8% kernel moisture content) at 45 °C as compared to 35 °C. Elevated levels of volatiles related to lipid peroxidation and amino acid degradation were observed in almonds with CD. These results suggest that postharvest moisture exposure resulting in an internal kernel moisture ≥ 8% is a key factor in the development of CD in raw almonds and that CD is accelerated by temperature.

  6. Instant detection and identification of concealed explosive-related compounds: Induced Stokes Raman versus infrared.

    PubMed

    Elbasuney, Sherif; El-Sherif, Ashraf F

    2017-01-01

    The instant detection of explosives and explosive-related compounds has become an urgent priority in recent years for homeland security and counter-terrorism applications. Modern techniques should offer enhancement in selectivity, sensitivity, and standoff distances. Miniaturisation, portability, and field-ruggedisation are crucial requirements. This study reports on instant and standoff identification of concealed explosive-related compounds using customized Raman technique. Stokes Raman spectra of common explosive-related compounds were generated and spectrally resolved to create characteristic finger print spectra. The scattered Raman emissions over the band 400:2000cm(-1) were compared to infrared absorption using FTIR. It has been demonstrated that the two vibrational spectroscopic techniques were opposite and completing each other. Molecular vibrations with strong absorption in infrared (those involve strong change in dipole moments) induced weak signals in Raman and vice versa. The tailored Raman offered instant detection, high sensitivity, and standoff detection capabilities. Raman demonstrated characteristic fingerprint spectra with stable baseline and sharp intense peaks. Complete correlations of absorption/scattered signals to certain molecular vibrations were conducted to generate an entire spectroscopic profile of explosive-related compounds. This manuscript shades the light on Raman as one of the prevailing technologies for instantaneous detection of explosive-related compounds.

  7. A new approach to analyze data from EEG-based concealed face recognition system.

    PubMed

    Mehrnam, A H; Nasrabadi, A M; Ghodousi, Mahrad; Mohammadian, A; Torabi, Sh

    2017-02-10

    The purpose of this study is to extend a feature set with non-linear features to improve classification rate of guilty and innocent subjects. Non-linear features can provide extra information about phase space. The Event-Related Potential (ERP) signals were recorded from 49 subjects who participated in concealed face recognition test. For feature extraction, at first, several morphological characteristics, frequency bands, and wavelet coefficients (we call them basic-features) are extracted from each single-trial ERP. Recurrence Quantification Analysis (RQA) measures are then computed as non-linear features from each single-trial. We apply Genetic Algorithm (GA) to select the best feature set and this feature set is used for classification of data using Linear Discriminant Analysis (LDA) classifier. Next, we use a new approach to improve classification results based on introducing an adaptive-threshold. Results indicate that our method is able to correctly detect 91.83% of subjects (45 correct detection of 49 subjects) using combination of basic and non-linear features, that is higher than 87.75% for basic and 79.59% for non-linear features. This shows that combination of non-linear and basic- features could improve classification rate.

  8. Detection and classification of concealed weapons using a magnetometer-based portal

    NASA Astrophysics Data System (ADS)

    Kotter, Dale K.; Roybal, Lyle G.; Polk, Robert E.

    2002-08-01

    A concealed weapons detection technology was developed through the support of the National Institute of Justice (NIJ) to provide a non intrusive means for rapid detection, location, and archiving of data (including visual) of potential suspects and weapon threats. This technology, developed by the Idaho National Engineering and Environmental Laboratory (INEEL), has been applied in a portal style weapons detection system using passive magnetic sensors as its basis. This paper will report on enhancements to the weapon detection system to enable weapon classification and to discriminate threats from non-threats. Advanced signal processing algorithms were used to analyze the magnetic spectrum generated when a person passes through a portal. These algorithms analyzed multiple variables including variance in the magnetic signature from random weapon placement and/or orientation. They perform pattern recognition and calculate the probability that the collected magnetic signature correlates to a known database of weapon versus non-weapon responses. Neural networks were used to further discriminate weapon type and identify controlled electronic items such as cell phones and pagers. False alarms were further reduced by analyzing the magnetic detector response by using a Joint Time Frequency Analysis digital signal processing technique. The frequency components and power spectrum for a given sensor response were derived. This unique fingerprint provided additional information to aid in signal analysis. This technology has the potential to produce major improvements in weapon detection and classification.

  9. Event-related brain potentials during the standard autonomic-based concealed information test.

    PubMed

    Matsuda, Izumi; Nittono, Hiroshi; Hirota, Akihisa; Ogawa, Tokihiro; Takasawa, Noriyoshi

    2009-10-01

    The concealed information test (CIT) has been used to detect information that examinees possess by means of their autonomic responses. However, the central activities related to these autonomic responses remain unclear. In this study, we simultaneously recorded 128-ch event-related potentials (ERPs) and various autonomic responses (heart rate, respiratory rate, respiratory amplitude, cutaneous blood flow, and skin conductance response) to a critical item (i.e., the item that participants memorized) and to non-critical items (i.e., items other than the critical item) using the standard protocol of the autonomic-based CIT. A topographic analysis of variance and a temporal-spatial principal component analysis revealed that the critical item elicited a larger negative potential (N2b, 205-298 ms) at central regions and a larger positive potential (positive slow wave, 502-744 ms) at parieto-occipital regions, compared to the non-critical items. Correlation analysis across 21 participants showed a significant correlation between N2b increase and heart rate deceleration in response to critical items compared to non-critical items, but there were no autonomic correlates of the positive slow wave. The results suggest that at least two brain processes are involved in the autonomic-based CIT: The first is an attentional-orienting process that facilitates the processing of critical items, to which heart rate deceleration was linked, and the second is an additional process after the identification of critical items.

  10. Improved method for calculating the respiratory line length in the Concealed Information Test.

    PubMed

    Matsuda, Izumi; Ogawa, Tokihiro

    2011-08-01

    The Concealed Information Test (CIT) assesses an examinee's knowledge about a crime based on response differences between crime-relevant and crime-irrelevant items. One effective measure in the CIT is the respiration line length, which is the average of the moving distances of the respiration curve in a specified time interval after the item onset. However, the moving distance differs between parts of a respiratory cycle. As a result, the calculated respiration line length is biased by how the parts of the respiratory cycles are included in the time interval. To resolve this problem, we propose a weighted average method, which calculates the respiration line length per cycle and weights it with the proportion that the cycle occupies in the time interval. Simulation results indicated that the weighted average method removes the bias of respiration line lengths compared to the original method. The results of experimental CIT data demonstrated that the weighted average method significantly increased the discrimination performance as compared with the original method. The weighted average method is a promising method for assessing respiration changes in response to question items more accurately, which improves the respiration-based discrimination performance of the CIT.

  11. Systematic changes in tonic physiological activities during the Concealed Information Test.

    PubMed

    Ogawa, Tokihiro; Matsuda, Izumi; Hirota, Akihisa; Takasawa, Noriyoshi

    2014-12-01

    Many studies on the Concealed Information Test have focused on phasic physiological changes that are temporally locked to stimulus presentation. However, little is known about changes in tonic, basal physiological levels throughout a stimulus series. This study focused on changes in tonic physiological activities during the CIT. Thirty-nine participants carried out a mock theft and subsequently received a CIT. Skin conductance, heart rate, and normalized pulse volume (NPV) were recorded. The pre-stimulus physiological level of these measures throughout the CIT series was compared across a question series with different serial positions of the relevant item. Results showed that changes in the pre-stimulus level differed depending on the serial position of the relevant item. Skin conductance declined throughout the series, but showed a transient increase after relevant item presentation. Heart rate was relatively constant throughout the series, but decreased after relevant item presentation. NPV continued to decrease until the relevant item, but increased thereafter, indicating a pattern similar to the classic Peak of Tension concept. In addition, the pre-stimulus NPV showed a significant relevant-irrelevant difference. Theoretical and practical implications of these findings are discussed.

  12. [Effects of recollection and familiarity on recognition memory in the Concealed Information Test].

    PubMed

    Zaitsu, Wataru; Shibuya, Yusuke

    2013-08-01

    The effects of recollection and familiarity on recognition memory in the Concealed Information Test (CIT) were investigated. In the learning phase, participants encoded 20 words that were presented in one of four frames on a personal computer screen. Next, in the recognition test, the participants were divided into "Remember judgment (Recollection)" or "Know judgment (Familiarity)" groups, based on their Remember/Know judgment when recognizing learned items. In the CIT phase, physiological responses to questions about learned (i.e., critical) and non-learned (i.e., non-critical) items were measured and recorded. The results indicated that there was a deceleration of respiration speed (RS), an increase in skin conductance response (SCR), and a drop in heart rate in responses to critical items for both groups. Furthermore, the effect sizes of RS and SCR were greater in the "Remember judgment" group compared to the "Know judgment" group. These results suggest that critical response patterns are generated by recollection and familiarity. However, the more vividly participants recognized critical items the larger were the magnitudes of RS and SCR response patterns.

  13. Shall-issue policy and criminal activity among applicants for permits to carry concealed firearms.

    PubMed

    Romero, M; Wintemute, G; Wright, M; Parham, C

    2003-12-01

    Permits to carry concealed firearms in public (CCW permits) remain controversial. A small scale natural experiment with shall-issue CCW permit policy in California, a may-issue state, is reported. During the mid-1990s, the chief of police of the Sacramento County town of Isleton issued permits to all county residents who applied and passed a standard background check. This program received national publicity. The incidence of subsequent criminal activity among 691 persons applying for CCW permits through Isleton's program in 1995 and that in a statewide sample of 965 CCW applicants from 1993-94 were compared. Subjects were followed up for three years from their application dates. The arrest rates for violent crime among Isleton and statewide applicants were 291 and 104 per 100 000 person-years, respectively (relative risk 2.8, 95% confidence interval 0.7 to 11.2, p = 0.18). This suggests that a shall-issue policy for CCW permits may result in higher rates of violent crime among permit holders, but the results do not reach statistical significance; larger studies are needed.

  14. Paternal signature in kin recognition cues of a social insect: concealed in juveniles, revealed in adults.

    PubMed

    Wong, Janine W Y; Meunier, Joël; Lucas, Christophe; Kölliker, Mathias

    2014-10-22

    Kin recognition is a key mechanism to direct social behaviours towards related individuals or avoid inbreeding depression. In insects, recognition is generally mediated by cuticular hydrocarbon (CHC) compounds, which are partly inherited from parents. However, in social insects, potential nepotistic conflicts between group members from different patrilines are predicted to select against the expression of patriline-specific signatures in CHC profiles. Whereas this key prediction in the evolution of insect signalling received empirical support in eusocial insects, it remains unclear whether it can be generalized beyond eusociality to less-derived forms of social life. Here, we addressed this issue by manipulating the number of fathers siring clutches tended by females of the European earwig, Forficula auricularia, analysing the CHC profiles of the resulting juvenile and adult offspring, and using discriminant analysis to estimate the information content of CHC with respect to the maternal and paternal origin of individuals. As predicted, if paternally inherited cues are concealed during family life, increases in mating number had no effect on information content of CHC profiles among earwig juveniles, but significantly decreased the one among adult offspring. We suggest that age-dependent expression of patriline-specific cues evolved to limit the risks of nepotism as family-living juveniles and favour sibling-mating avoidance as group-living adults. These results highlight the role of parental care and social life in the evolution of chemical communication and recognition cues.

  15. Current Research and Potential Applications of the Concealed Information Test: An Overview

    PubMed Central

    Ben-Shakhar, Gershon

    2012-01-01

    Research interest in psychophysiological detection of deception has significantly increased since the September 11 terror attack in the USA. In particular, the concealed information test (CIT), designed to detect memory traces that can connect suspects to a certain crime, has been extensively studied. In this paper I will briefly review several psychophysiological detection paradigms that have been studied, with a focus on the CIT. The theoretical background of the CIT, its strength and weaknesses, its potential applications as well as research finings related to its validity (based on a recent meta-analytic study), will be discussed. Several novel research directions, with a focus on factors that may affect CIT detection in realistic settings (e.g., memory for crime details; the effect of emotional stress during crime execution) will be described. Additionally, research focusing on mal-intentions and attempts to detect terror networks using information gathered from groups of suspects using both the standard CIT and the searching CIT will be reviewed. Finally, implications of current research to the actual application of the CIT will be discussed and several recommendations that can enhance the use of the CIT will be made. PMID:23060826

  16. Hiding true emotions: micro-expressions in eyes retrospectively concealed by mouth movements

    PubMed Central

    Iwasaki, Miho; Noguchi, Yasuki

    2016-01-01

    When we encounter someone we dislike, we may momentarily display a reflexive disgust expression, only to follow-up with a forced smile and greeting. Our daily lives are replete with a mixture of true and fake expressions. Nevertheless, are these fake expressions really effective at hiding our true emotions? Here we show that brief emotional changes in the eyes (micro-expressions, thought to reflect true emotions) can be successfully concealed by follow-up mouth movements (e.g. a smile). In the same manner as backward masking, mouth movements of a face inhibited conscious detection of all types of micro-expressions in that face, even when viewers paid full attention to the eye region. This masking works only in a backward direction, however, because no disrupting effect was observed when the mouth change preceded the eye change. These results provide scientific evidence for everyday behaviours like smiling to dissemble, and further clarify a major reason for the difficulty we face in discriminating genuine from fake emotional expressions. PMID:26915796

  17. 10 CFR 217.53 - Types of allocation orders.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 3 2013-01-01 2013-01-01 false Types of allocation orders. 217.53 Section 217.53 Energy DEPARTMENT OF ENERGY OIL ENERGY PRIORITIES AND ALLOCATIONS SYSTEM Allocation Actions § 217.53 Types of allocation orders. There are three types of allocation orders available for communicating allocation...

  18. Resource allocation for downlink multiuser video transmission over wireless lossy networks.

    PubMed

    Maani, Ehsan; Pahalawatta, Peshala V; Berry, Randall; Pappas, Thrasyvoulos N; Katsaggelos, Aggelos K

    2008-09-01

    Demand for multimedia services, such as video streaming over wireless networks, has grown dramatically in recent years. The downlink transmission of multiple video sequences to multiple users over a shared resource-limited wireless channel, however, is a daunting task. Among the many challenges in this area are the time-varying channel conditions, limited available resources, such as bandwidth and power, and the different transmission requirements of different video content. This work takes into account the time-varying nature of the wireless channels, as well as the importance of individual video packets, to develop a cross-layer resource allocation and packet scheduling scheme for multiuser video streaming over lossy wireless packet access networks. Assuming that accurate channel feedback is not available at the scheduler, random channel losses combined with complex error concealment at the receiver make it impossible for the scheduler to determine the actual distortion of the sequence at the receiver. Therefore, the objective of the optimization is to minimize the expected distortion of the received sequence, where the expectation is calculated at the scheduler with respect to the packet loss probability in the channel. The expected distortion is used to order the packets in the transmission queue of each user, and then gradients of the expected distortion are used to efficiently allocate resources across users. Simulations show that the proposed scheme performs significantly better than a conventional content-independent scheme for video transmission.

  19. Concealed female external genitals: possible morpho-psychological clue to unique emotional and cognitive evolutionary matrix of man.

    PubMed

    Tosevski, Jovo; Tosevski, Dusica Lecic

    2006-05-01

    Despite genetic similarities between man and other anthropoids, the cognitive abilities of man are distinct. Inaccessible and concealed external female genitals are one of the morphological characteristics distinguishing humans from other higher primates. External female sexual organs in subhuman primates are visible and accessible in the habitual quadrupedal and occasional bipedal posture, whereas these organs in the human female are inaccessible and concealed in any posture. A prospective consequence of gradual bipedalism of hominids during evolution was a shifting of the external female genitals in an anterior direction. In the completely bipedal Homo sapiens, this resulted in the vulvo-cryptic phenomenon, i.e. concealed female genitals in humans. The unique morphology of the human female pelvis served as an obstacle to easy access of the male in the process of copulation, necessitating the female's conscious decision for sexual intercourse. This circumstance might have created a psychological basis for female propellant psychosexual manipulation of the male as a natural consequence. Also, through the process of positive selection it could have formed a basis for linking reproductive success with the development of cognitive and emotional capacities. Female consent to copulation is a conscious and complex act that would be impossible without the involvement of highly developed emotional-cognitive and memoric brain systems. Thus the extraordinary evolutionary strategy might imply a teleological link between concealed female genitals and the emotional-cognitive characteristics of man, creating a permanent promoter of further development of emotional and cognitive brain systems with an impact on all domains of everyday life.

  20. The Invisible Work of Closeting: A Qualitative Study About Strategies Used by Lesbian and Gay Persons to Conceal Their Sexual Orientation.

    PubMed

    Malterud, Kirsti; Bjorkman, Mari

    2016-10-01

    The last decades have offered substantial improvement regarding human rights for lesbian and gay (LG) persons. Yet LG persons are often in the closet, concealing their sexual orientation. We present a qualitative study based on 182 histories submitted from 161 LG individuals to a Web site. The aim was to explore experiences of closeting among LG persons in Norway. A broad range of strategies was used for closeting, even among individuals who generally considered themselves to be out of the closet. Concealment was enacted by blunt denial, clever avoidance, or subtle vagueness. Other strategies included changing or eliminating the pronoun or name of the partner in ongoing conversations. Context-dependent concealment, differentiating between persons, situations, or arenas, was repeatedly applied for security or convenience. We propose a shift from "being in the closet" to "situated concealment of sexual orientation."

  1. Allocation of speech in conversation.

    PubMed

    Simon, Carsta; Baum, William M

    2017-03-01

    In a replication and extension of Conger and Killeen's (1974) widely cited demonstration of matching in conversations, we evaluated nine participants' allocation of speech and gaze to two conversational partners. German speakers participated in two 90-min sessions in which confederates uttered approval on independent variable-interval schedules. In one of the sessions, confederates uttered approval contingent upon and contiguous with eye contact whereas in the other session approval was uttered independent of the participant's gaze. Several measures of participants' verbal behavior were taken, including relative duration and rate of speech and gaze. These were compared to confederates' relative rate of approval and relative duration and rate of talk. The generalized matching equation was fitted to the various relations between participants' behavior and confederates' behavior. Conger and Killeen's results were not replicated; participants' response allocation did not show a systematic relation to the confederates' relative rate of approval. The strongest relations were to overall talk, rather than approval. In both conditions, the participant talked more to the confederate who talked less-inverse or antimatching. Participants' gaze showed the same inverse relation to the confederates' talk. Requiring gaze to be directed toward a confederate for delivery of approval made no difference in the results. The absence of a difference combined with prior research suggests that matching or antimatching in conversations is more likely due to induction than to reinforcement.

  2. Constrained Allocation Flux Balance Analysis

    PubMed Central

    Mori, Matteo; Hwa, Terence; Martin, Olivier C.

    2016-01-01

    New experimental results on bacterial growth inspire a novel top-down approach to study cell metabolism, combining mass balance and proteomic constraints to extend and complement Flux Balance Analysis. We introduce here Constrained Allocation Flux Balance Analysis, CAFBA, in which the biosynthetic costs associated to growth are accounted for in an effective way through a single additional genome-wide constraint. Its roots lie in the experimentally observed pattern of proteome allocation for metabolic functions, allowing to bridge regulation and metabolism in a transparent way under the principle of growth-rate maximization. We provide a simple method to solve CAFBA efficiently and propose an “ensemble averaging” procedure to account for unknown protein costs. Applying this approach to modeling E. coli metabolism, we find that, as the growth rate increases, CAFBA solutions cross over from respiratory, growth-yield maximizing states (preferred at slow growth) to fermentative states with carbon overflow (preferred at fast growth). In addition, CAFBA allows for quantitatively accurate predictions on the rate of acetate excretion and growth yield based on only 3 parameters determined by empirical growth laws. PMID:27355325

  3. 20 CFR 416.982 - Blindness under a State plan.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false Blindness under a State plan. 416.982 Section..., BLIND, AND DISABLED Determining Disability and Blindness Blindness § 416.982 Blindness under a State... plan because of your blindness for the month of December 1973; and (c) You continue to be blind...

  4. 20 CFR 416.983 - How we evaluate statutory blindness.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false How we evaluate statutory blindness. 416.983... AGED, BLIND, AND DISABLED Determining Disability and Blindness Blindness § 416.983 How we evaluate statutory blindness. We will find that you are blind if you are statutorily blind within the meaning...

  5. 20 CFR 416.983 - How we evaluate statutory blindness.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false How we evaluate statutory blindness. 416.983... AGED, BLIND, AND DISABLED Determining Disability and Blindness Blindness § 416.983 How we evaluate statutory blindness. We will find that you are blind if you are statutorily blind within the meaning...

  6. 20 CFR 416.982 - Blindness under a State plan.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false Blindness under a State plan. 416.982 Section..., BLIND, AND DISABLED Determining Disability and Blindness Blindness § 416.982 Blindness under a State... plan because of your blindness for the month of December 1973; and (c) You continue to be blind...

  7. 20 CFR 416.983 - How we evaluate statutory blindness.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false How we evaluate statutory blindness. 416.983... AGED, BLIND, AND DISABLED Determining Disability and Blindness Blindness § 416.983 How we evaluate statutory blindness. We will find that you are blind if you are statutorily blind within the meaning...

  8. 20 CFR 416.982 - Blindness under a State plan.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false Blindness under a State plan. 416.982 Section..., BLIND, AND DISABLED Determining Disability and Blindness Blindness § 416.982 Blindness under a State... plan because of your blindness for the month of December 1973; and (c) You continue to be blind...

  9. 20 CFR 416.982 - Blindness under a State plan.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Blindness under a State plan. 416.982 Section..., BLIND, AND DISABLED Determining Disability and Blindness Blindness § 416.982 Blindness under a State... plan because of your blindness for the month of December 1973; and (c) You continue to be blind...

  10. 20 CFR 416.983 - How we evaluate statutory blindness.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false How we evaluate statutory blindness. 416.983... AGED, BLIND, AND DISABLED Determining Disability and Blindness Blindness § 416.983 How we evaluate statutory blindness. We will find that you are blind if you are statutorily blind within the meaning...

  11. 20 CFR 416.983 - How we evaluate statutory blindness.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false How we evaluate statutory blindness. 416.983... AGED, BLIND, AND DISABLED Determining Disability and Blindness Blindness § 416.983 How we evaluate statutory blindness. We will find that you are blind if you are statutorily blind within the meaning...

  12. 20 CFR 416.982 - Blindness under a State plan.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Blindness under a State plan. 416.982 Section..., BLIND, AND DISABLED Determining Disability and Blindness Blindness § 416.982 Blindness under a State... plan because of your blindness for the month of December 1973; and (c) You continue to be blind...

  13. [Aiming for zero blindness].

    PubMed

    Nakazawa, Toru

    2015-03-01

    Glaucoma is the leading cause of acquired blindness in Japan. One reason that it often leads to blindness is that it can continue to worsen even after effective medical reduction of intraocular pressure (IOP), the only evidence-based treatment. The limitations of current treatments make it critical to identify IOP-independent factors that can cause glaucoma and develop new drugs to target these factors. This is a challenging task, as the pathology of glaucoma is thought to be very complex, with different combinations of factors underlying its development and progression in different patients. Additionally, there is a deficiency in methods to efficiently perform clinical evaluations and reliably probe the state of the disease over relatively short periods. In addition, newly developed drugs need to be evaluated with clinical trials, for which human and financial resources are limited, before they can be widely used for treatment. Taking all these issues into consideration, it is evident that there are two urgent issues to consider: the development of methods to classify glaucoma in detail based on its pathology, and the improvement of clinical evaluation methods. In this review, we discuss some of our efforts to develop new neuroprotective agents for glaucoma, with a focus on the following three areas: 1. Clinical research and development of methods to classify glaucoma in detail based on IOP-independent factors, and the exploration of possibilities for the improvement of clinical evaluation of glaucoma. 2. Pathology-based research and development of new drugs for glaucoma, focusing on comprehensive gene expression analysis and the development of molecule-targeting drugs, using murine optic nerve crush as a disease model. 3. Development of next generation in vivo imaging modalities and the establishment of infrastructure enabling "big-data" analysis. First, we discuss our clinical research and the development of methods to classify glaucoma in detail based on IOP

  14. Do the blinds smell better?

    PubMed

    Luers, Jan Christoffer; Mikolajczak, Stefanie; Hahn, Moritz; Wittekindt, Claus; Beutner, Dirk; Hüttenbrink, Karl-Bernd; Damm, Michael

    2014-07-01

    If people lose a sense organ, there is thought to be an increase in the remaining sensory functions. Previous studies showed ambiguous results on this topic. In a prospective matched pair case-control study on 46 blind and 46 normal-sighted subjects, the olfactory performance was examined using the Sniffin' Sticks Test [threshold-discrimination-identification (TDI) test], determining the olfactory threshold, the identification and the discrimination performance. There was no significant difference between the groups. Neither the overall olfactory performance (TDI score) nor any of its subtests did correlate with the vision or with the duration of blindness. The study could not detect any superior smell abilities of blind subjects as compared to sighted subjects.

  15. Nodal recovery, dual pathway physiology, and concealed conduction determine complex AV dynamics in human atrial tachyarrhythmias.

    PubMed

    Masè, Michela; Glass, Leon; Disertori, Marcello; Ravelli, Flavia

    2012-11-15

    The genesis of complex ventricular rhythms during atrial tachyarrhythmias in humans is not fully understood. To clarify the dynamics of atrioventricular (AV) conduction in response to a regular high-rate atrial activation, 29 episodes of spontaneous or pacing-induced atrial flutter (AFL), covering a wide range of atrial rates (cycle lengths from 145 to 270 ms), were analyzed in 10 patients. AV patterns were identified by applying firing sequence and surrogate data analysis to atrial and ventricular activation series, whereas modular simulation with a difference-equation AV node model was used to correlate the patterns with specific nodal properties. AV node response at high atrial rate was characterized by 1) AV patterns of decreasing conduction ratios at the shortening of atrial cycle length (from 236.3 ± 32.4 to 172.6 ± 17.8 ms) according to a Farey sequence ordering (conduction ratio from 0.34 ± 0.12 to 0.23 ± 0.06; P < 0.01); 2) the appearance of high-order alternating Wenckebach rhythms, such as 6:2, 10:2, and 12:2, associated with ventricular interval oscillations of large amplitude (407.7 ± 150.4 ms); and 3) the deterioration of pattern stability at advanced levels of block, with the percentage of stable patterns decreasing from 64.3 ± 35.2% to 28.3 ± 34.5% (P < 0.01). Simulations suggested these patterns to originate from the combined effect of nodal recovery, dual pathway physiology, and concealed conduction. These results indicate that intrinsic nodal properties may account for the wide spectrum of AV block patterns occurring during regular atrial tachyarrhythmias. The characterization of AV nodal function during different AFL forms constitutes an intermediate step toward the understanding of complex ventricular rhythms during atrial fibrillation.

  16. Concealed d-wave pairs in the s± condensate of iron-based superconductors

    PubMed Central

    Ong, Tzen; Coleman, Piers; Schmalian, Jörg

    2016-01-01

    A central question in iron-based superconductivity is the mechanism by which the paired electrons minimize their strong mutual Coulomb repulsion. In most unconventional superconductors, Coulomb repulsion is minimized through the formation of higher angular momentum Cooper pairs, with Fermi surface nodes in the pair wavefunction. The apparent absence of such nodes in the iron-based superconductors has led to a belief they form an s-wave (s±) singlet state, which changes sign between the electron and hole pockets. However, the multiorbital nature of these systems opens an alternative possibility. Here, we propose a new class of s± state containing a condensate of d-wave Cooper pairs, concealed by their entanglement with the iron orbitals. By combining the d-wave (L=2) motion of the pairs with the internal angular momenta I=2 of the iron orbitals to make a singlet (J=L+I=0), an s± superconductor with a nontrivial topology is formed. This scenario allows us to understand the development of octet nodes in potassium-doped Ba1−x KXFe2As2 as a reconfiguration of the orbital and internal angular momentum into a high spin (J=L+I=4) state; the reverse transition under pressure into a fully gapped state can then be interpreted as a return to the low-spin singlet. The formation of orbitally entangled pairs is predicted to give rise to a shift in the orbital content at the Fermi surface, which can be tested via laser-based angle-resolved photoemission spectroscopy. PMID:27140626

  17. Concealed d-wave pairs in the s± condensate of iron-based superconductors.

    PubMed

    Ong, Tzen; Coleman, Piers; Schmalian, Jörg

    2016-05-17

    A central question in iron-based superconductivity is the mechanism by which the paired electrons minimize their strong mutual Coulomb repulsion. In most unconventional superconductors, Coulomb repulsion is minimized through the formation of higher angular momentum Cooper pairs, with Fermi surface nodes in the pair wavefunction. The apparent absence of such nodes in the iron-based superconductors has led to a belief they form an s-wave ([Formula: see text]) singlet state, which changes sign between the electron and hole pockets. However, the multiorbital nature of these systems opens an alternative possibility. Here, we propose a new class of [Formula: see text] state containing a condensate of d-wave Cooper pairs, concealed by their entanglement with the iron orbitals. By combining the d-wave ([Formula: see text]) motion of the pairs with the internal angular momenta [Formula: see text] of the iron orbitals to make a singlet ([Formula: see text]), an [Formula: see text] superconductor with a nontrivial topology is formed. This scenario allows us to understand the development of octet nodes in potassium-doped Ba1-x KXFe2As2 as a reconfiguration of the orbital and internal angular momentum into a high spin ([Formula: see text]) state; the reverse transition under pressure into a fully gapped state can then be interpreted as a return to the low-spin singlet. The formation of orbitally entangled pairs is predicted to give rise to a shift in the orbital content at the Fermi surface, which can be tested via laser-based angle-resolved photoemission spectroscopy.

  18. Subclinical vitamin D deficiency is increased in adolescent girls who wear concealing clothing.

    PubMed

    Hatun, Sukru; Islam, Omer; Cizmecioglu, Filiz; Kara, Bulent; Babaoglu, Kadir; Berk, Fatma; Gökalp, Ayse Sevim

    2005-02-01

    Vitamin D deficiency continues to be a worldwide problem, especially in developing countries. The aim of this study was to investigate potential risk factors for vitamin D deficiency. Girls (n = 89) aged 13 to 17 y were enrolled in the study. Study subjects were stratified into 3 groups: Group I included girls living in a suburban area; Group II girls lived in an urban area, and Group III girls lived in an urban area and wore concealing clothes for religious reasons. At the end of winter (in April) serum 25-hydroxyvitamin D [25(OH)D] levels were measured and dietary data were collected using questionnaires. Vitamin D deficiency was defined as a serum 25(OH)D concentration < 25 nmol/L, and insufficiency as a 25(OH)D concentration between 25 and 50 nmol/L. The lumbar and femur neck bone mineral densities (BMD) were measured using dual X-ray absorptiometry (DEXA). Overall, 39 girls (43.8%) had vitamin D insufficiency and 19 (21.3%) had vitamin D deficiency. In group III (wearing covered dress) the serum 25(OH)D concentrations (28.13 +/- 12.53 nmol/L) were significantly lower than in the other 2 groups, and within this group, 50% of girls were vitamin D deficient. The lumbar and femur neck BMD of girls with lower 25(OH)D levels did not differ from those with adequate vitamin D levels. We conclude that vitamin D deficiency is an important problem in Turkish adolescent girls, especially in those who follow a religious dress code; therefore, vitamin D supplementation appears to be necessary for adolescent girls.

  19. Design of spectrally versatile forward-looking ground-penetrating radar for detection of concealed targets

    NASA Astrophysics Data System (ADS)

    Phelan, Brian R.; Ressler, Marc A.; Mazzaro, Gregory J.; Sherbondy, Kelly D.; Narayanan, Ram M.

    2013-05-01

    The design of high-resolution radars which can operate in theater involves a careful consideration of the radar's radiated spectrum. While a wide bandwidth yields better target detectability and classification, it can also interfere with other devices and/or violate federal and international communication laws. Under the Army Research Laboratory (ARL) Partnerships in Research Transition (PIRT) program, we are developing a Stepped-Frequency Radar (SFR) which allows for manipulation of the radiated spectrum, while still maintaining an effective ultra-wide bandwidth for achieving good range resolution. The SFR is a forward-looking, ultra-wideband (UWB) imaging radar capable of detecting concealed targets. This paper presents the research and analysis undertaken during the design of the SFR which will eventually complement an existing ARL system, the Synchronous Impulse REconstruction (SIRE) radar. The SFR is capable of excising prohibited frequency bands, while maintaining the down-range resolution capability of the original SIRE radar. The SFR has two transmit antennas and a 16-element receive antenna array, and this configuration achieves suitable cross-range resolution for target detection. The SFR, like the SIRE radar, is a vehicle mounted, forward-looking, ground penetrating radar (GPR) capable of using synthetic aperture radar (SAR) technology for the detection of subsurface targets via 3D imaging. Many contradicting design considerations are analyzed in this paper. The selection of system bandwidth, antenna types, number of antennas, frequency synthesizers, digitizers, receive amplifiers, wideband splitters, and many other components are critical to the design of the SFR. Leveraging commercial components and SIRE sub-systems were design factors offering an expedited time to the initial implementation of the radar while reducing overall costs. This SFR design will result in an ARL asset to support obscured target detection such as improvised explosive devices

  20. Using fMRI to decode true thoughts independent of intention to conceal.

    PubMed

    Yang, Zhi; Huang, Zirui; Gonzalez-Castillo, Javier; Dai, Rui; Northoff, Georg; Bandettini, Peter

    2014-10-01

    Multi-variate pattern analysis (MVPA) applied to BOLD-fMRI has proven successful at decoding complicated fMRI signal patterns associated with a variety of cognitive processes. One cognitive process, not yet investigated, is the mental representation of "Yes/No" thoughts that precede the actual overt response to a binary "Yes/No" question. In this study, we focus on examining: (1) whether spatial patterns of the hemodynamic response carry sufficient information to allow reliable decoding of "Yes/No" thoughts; and (2) whether decoding of "Yes/No" thoughts is independent of the intention to respond honestly or dishonestly. To achieve this goal, we conducted two separate experiments. Experiment 1, collected on a 3T scanner, examined the whole brain to identify regions that carry sufficient information to permit significantly above-chance prediction of "Yes/No" thoughts at the group level. In Experiment 2, collected on a 7T scanner, we focused on the regions identified in Experiment 1 to examine the capability of achieving high decoding accuracy at the single subject level. A set of regions--namely right superior temporal gyrus, left supra-marginal gyrus, and left middle frontal gyrus--exhibited high decoding power. Decoding accuracy for these regions increased with trial averaging. When 18 trials were averaged, the median accuracies were 82.5%, 77.5%, and 79.5%, respectively. When trials were separated according to deceptive intentions (set via experimental cues), and classifiers were trained on honest trials, but tested on trials where subjects were asked to deceive, the median accuracies of these regions still reached 66%, 75%, and 78.5%. These results provide evidence that concealed "Yes/No" thoughts are encoded in the BOLD signal, retaining some level of independence from the subject's intentions to answer honestly or dishonestly. These findings also suggest the theoretical possibility for more efficient brain-computer interfaces where subjects only need to think

  1. Computer Reader for the Blind

    NASA Technical Reports Server (NTRS)

    1990-01-01

    Optacon II uses the same basic technique of converting printed information into a tactile image as did Optacon. Optacon II can also be connected directly to a personal computer, which opens up a new range of job opportunities for the blind. Optacon II is not limited to reading printed words, it can convert any graphic image viewed by the camera. Optacon II demands extensive training for blind operators. TSI provides 60-hour training courses at its Mountain View headquarters and at training centers around the world. TeleSensory discontinued production of the Optacon as of December 1996.

  2. Night Blindness and Ancient Remedy

    PubMed Central

    Al Binali, H.A. Hajar

    2014-01-01

    The aim of this article is to briefly review the history of night blindness and its treatment from ancient times until the present. The old Egyptians, the Babylonians, the Greeks and the Arabs used animal liver for treatment and successfully cured the disease. The author had the opportunity to observe the application of the old remedy to a patient. Now we know what the ancients did not know, that night blindness is caused by Vitamin A deficiency and the animal liver is the store house for Vitamin A. PMID:25774260

  3. Constant time worker thread allocation via configuration caching

    DOEpatents

    Eichenberger, Alexandre E; O'Brien, John K. P.

    2014-11-04

    Mechanisms are provided for allocating threads for execution of a parallel region of code. A request for allocation of worker threads to execute the parallel region of code is received from a master thread. Cached thread allocation information identifying prior thread allocations that have been performed for the master thread are accessed. Worker threads are allocated to the master thread based on the cached thread allocation information. The parallel region of code is executed using the allocated worker threads.

  4. 75 FR 18016 - Notice of Allocation Availability (NOAA) Inviting Applications for the CY 2010 Allocation Round...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-08

    ... Community Development Financial Institutions Fund Notice of Allocation Availability (NOAA) Inviting...: Notice of Allocation Availability (NOAA) Inviting Applications for the CY 2010 Allocation Round of the... page, investor letters and organizational charts) in electronic form (see Section IV.D. of this...

  5. Some Effects of Stimulant Medication on Response Allocation: A Double-Blind Analysis

    ERIC Educational Resources Information Center

    Kelley, Michael E.; Fisher, Wayne W.; Lomas, Joanna E.; Sanders, Roy Q.

    2006-01-01

    Children who are diagnosed with attention deficit hyperactivity disorder (or who engage in behavior consistent with such a diagnosis) are often prescribed stimulant medications for hyperactive or inattentive behaviors. However, the mechanisms by which stimulant medications affect individuals' behavior are rarely evaluated. The purpose of the…

  6. 48 CFR 5452.249 - Allocation.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Allocation. 5452.249 Section 5452.249 Federal Acquisition Regulations System DEFENSE LOGISTICS AGENCY, DEPARTMENT OF DEFENSE SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 5452.249 Allocation. The...

  7. Inferential Aspects of Adaptive Allocation Rules.

    ERIC Educational Resources Information Center

    Berry, Donald A.

    In clinical trials, adaptive allocation means that the therapies assigned to the next patient or patients depend on the results obtained thus far in the trial. Although many adaptive allocation procedures have been proposed for clinical trials, few have actually used adaptive assignment, largely because classical frequentist measures of inference…

  8. Rethinking Reinforcement: Allocation, Induction, and Contingency

    ERIC Educational Resources Information Center

    Baum, William M.

    2012-01-01

    The concept of reinforcement is at least incomplete and almost certainly incorrect. An alternative way of organizing our understanding of behavior may be built around three concepts: "allocation," "induction," and "correlation." Allocation is the measure of behavior and captures the centrality of choice: All behavior entails choice and consists of…

  9. 42 CFR 24.2 - Allocation.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 1 2011-10-01 2011-10-01 false Allocation. 24.2 Section 24.2 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES PERSONNEL SENIOR BIOMEDICAL RESEARCH SERVICE § 24.2 Allocation. (a) The Secretary, within the number authorized in the PHS Act, shall determine...

  10. 42 CFR 24.2 - Allocation.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 42 Public Health 1 2014-10-01 2014-10-01 false Allocation. 24.2 Section 24.2 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES PERSONNEL SENIOR BIOMEDICAL RESEARCH SERVICE § 24.2 Allocation. (a) The Secretary, within the number authorized in the PHS Act, shall determine...

  11. 42 CFR 24.2 - Allocation.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Allocation. 24.2 Section 24.2 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES PERSONNEL SENIOR BIOMEDICAL RESEARCH SERVICE § 24.2 Allocation. (a) The Secretary, within the number authorized in the PHS Act, shall determine...

  12. 42 CFR 24.2 - Allocation.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 42 Public Health 1 2013-10-01 2013-10-01 false Allocation. 24.2 Section 24.2 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES PERSONNEL SENIOR BIOMEDICAL RESEARCH SERVICE § 24.2 Allocation. (a) The Secretary, within the number authorized in the PHS Act, shall determine...

  13. 42 CFR 24.2 - Allocation.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 42 Public Health 1 2012-10-01 2012-10-01 false Allocation. 24.2 Section 24.2 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES PERSONNEL SENIOR BIOMEDICAL RESEARCH SERVICE § 24.2 Allocation. (a) The Secretary, within the number authorized in the PHS Act, shall determine...

  14. Projected 1999-2000 Cost Allocation Summary.

    ERIC Educational Resources Information Center

    Wisconsin Technical Coll. System Board, Madison.

    Information contained in this summary was derived from data submitted by Wisconsin technical colleges on their 1999-2000 projected cost allocation schedules. Cost allocation information is used to calculate the distribution of state aids to each college, and prepare financial and enrollment reports including state statistical summaries and reports…

  15. Resource Allocation: Ration, Fashion, or Innovashun?

    ERIC Educational Resources Information Center

    Lourens, Roy

    1986-01-01

    Resource allocation is a key factor in promoting or retarding innovation. In a restrictive economic climate, it is easy to use resource allocation for decremental rationing and to stifle innovative thinking. The technique can also be used to ensure that the institution's human resources are encouraged to identify opportunities for innovation. (MSE)

  16. 45 CFR 98.55 - Cost allocation.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Cost allocation. 98.55 Section 98.55 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION CHILD CARE AND DEVELOPMENT FUND Use of Child Care and Development Funds § 98.55 Cost allocation. (a) The Lead Agency and...

  17. 45 CFR 98.55 - Cost allocation.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 1 2014-10-01 2014-10-01 false Cost allocation. 98.55 Section 98.55 Public Welfare Department of Health and Human Services GENERAL ADMINISTRATION CHILD CARE AND DEVELOPMENT FUND Use of Child Care and Development Funds § 98.55 Cost allocation. (a) The Lead Agency and...

  18. 45 CFR 98.55 - Cost allocation.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 1 2012-10-01 2012-10-01 false Cost allocation. 98.55 Section 98.55 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION CHILD CARE AND DEVELOPMENT FUND Use of Child Care and Development Funds § 98.55 Cost allocation. (a) The Lead Agency and...

  19. 45 CFR 98.55 - Cost allocation.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 1 2011-10-01 2011-10-01 false Cost allocation. 98.55 Section 98.55 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION CHILD CARE AND DEVELOPMENT FUND Use of Child Care and Development Funds § 98.55 Cost allocation. (a) The Lead Agency and...

  20. 45 CFR 98.55 - Cost allocation.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 1 2013-10-01 2013-10-01 false Cost allocation. 98.55 Section 98.55 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION CHILD CARE AND DEVELOPMENT FUND Use of Child Care and Development Funds § 98.55 Cost allocation. (a) The Lead Agency and...

  1. 24 CFR 92.50 - Formula allocation.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Congress appropriates less than $1.5 billion of HOME funds, $335,000 is substituted for $500,000. (4) The... Development HOME INVESTMENT PARTNERSHIPS PROGRAM Allocation Formula § 92.50 Formula allocation. (a... factors. The first and sixth factors are weighted 0.1; the other four factors are weighted 0.2....

  2. 10 CFR 490.503 - Credit allocation.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 3 2013-01-01 2013-01-01 false Credit allocation. 490.503 Section 490.503 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Alternative Fueled Vehicle... described in section 490.507 of this part, DOE shall allocate one credit for each alternative fueled...

  3. 10 CFR 490.503 - Credit allocation.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 3 2010-01-01 2010-01-01 false Credit allocation. 490.503 Section 490.503 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Alternative Fueled Vehicle Credit Program § 490.503 Credit allocation. (a) Based on annual credit activity report information,...

  4. 10 CFR 490.503 - Credit allocation.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 3 2011-01-01 2011-01-01 false Credit allocation. 490.503 Section 490.503 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Alternative Fueled Vehicle... described in section 490.507 of this part, DOE shall allocate one credit for each alternative fueled...

  5. 10 CFR 490.503 - Credit allocation.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 3 2012-01-01 2012-01-01 false Credit allocation. 490.503 Section 490.503 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Alternative Fueled Vehicle... described in section 490.507 of this part, DOE shall allocate one credit for each alternative fueled...

  6. 10 CFR 490.503 - Credit allocation.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 3 2014-01-01 2014-01-01 false Credit allocation. 490.503 Section 490.503 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ALTERNATIVE FUEL TRANSPORTATION PROGRAM Alternative Fueled Vehicle... described in section 490.507 of this part, DOE shall allocate one credit for each alternative fueled...

  7. Projected 1998-99 Cost Allocation Summary.

    ERIC Educational Resources Information Center

    Chin, Edward

    Designed for use in calculating the distribution of state aid to colleges in the Wisconsin Technical College System (WTCS) and in preparing financial and enrollment reports, this document provides a summary of projected cost allocations for the WTCS for 1998-99, derived from data submitted by the colleges on cost allocation schedules. Following a…

  8. 50 CFR 660.55 - Allocations.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... PACIFIC OCEAN PERCH 95 5 WIDOW 91 9 Chilipepper S. of 40°10′ N. lat. 75 25 Splitnose S. of 40°10′ N. lat... rockfish, Pacific Ocean Perch, and widow rockfish, the trawl allocation is further subdivided among the... nonwhiting fishery. (B) Pacific Ocean Perch (POP). Allocate 17 percent or 30 mt, whichever is greater, of...

  9. 50 CFR 660.55 - Allocations.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Sablefish S. of 36° N. lat. 42 58 PACIFIC OCEAN PERCH 95 5 WIDOW 91 9 Chilipepper S. of 40°10′ N. lat. 75 25... rockfish, Pacific Ocean Perch, and widow rockfish, the trawl allocation will be further subdivided among.... For darkblotched rockfish, Pacific Ocean Perch, and widow rockfish, the trawl allocation is...

  10. 50 CFR 660.55 - Allocations.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Sablefish S. of 36° N. lat. 42 58 PACIFIC OCEAN PERCH 95 5 WIDOW 91 9 Chilipepper S. of 40°10′ N. lat. 75 25... rockfish, Pacific Ocean Perch, and widow rockfish, the trawl allocation will be further subdivided among.... For darkblotched rockfish, Pacific Ocean Perch, and widow rockfish, the trawl allocation is...

  11. A Time Allocation Study of University Faculty

    ERIC Educational Resources Information Center

    Link, Albert N.; Swann, Christopher A.; Bozeman, Barry

    2008-01-01

    Many previous time allocation studies treat work as a single activity and examine trade-offs between work and other activities. This paper investigates the at-work allocation of time among teaching, research, grant writing and service by science and engineering faculty at top US research universities. We focus on the relationship between tenure…

  12. 23 CFR 1240.15 - Allocations.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 23 Highways 1 2010-04-01 2010-04-01 false Allocations. 1240.15 Section 1240.15 Highways NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION AND FEDERAL HIGHWAY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION GUIDELINES SAFETY INCENTIVE GRANTS FOR USE OF SEAT BELTS-ALLOCATIONS BASED ON SEAT BELT USE...

  13. 23 CFR 1240.15 - Allocations.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 23 Highways 1 2011-04-01 2011-04-01 false Allocations. 1240.15 Section 1240.15 Highways NATIONAL HIGHWAY TRAFFIC SAFETY ADMINISTRATION AND FEDERAL HIGHWAY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION GUIDELINES SAFETY INCENTIVE GRANTS FOR USE OF SEAT BELTS-ALLOCATIONS BASED ON SEAT BELT USE...

  14. 50 CFR 600.517 - Allocations.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 50 Wildlife and Fisheries 12 2013-10-01 2013-10-01 false Allocations. 600.517 Section 600.517 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE MAGNUSON-STEVENS ACT PROVISIONS Foreign Fishing § 600.517 Allocations. The...

  15. 50 CFR 600.517 - Allocations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 50 Wildlife and Fisheries 8 2010-10-01 2010-10-01 false Allocations. 600.517 Section 600.517 Wildlife and Fisheries FISHERY CONSERVATION AND MANAGEMENT, NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE MAGNUSON-STEVENS ACT PROVISIONS Foreign Fishing § 600.517 Allocations. The...

  16. 50 CFR 660.320 - Allocations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Indian fishery, is divided into limited entry and open access fisheries. Separate allocations for the limited entry and open access fisheries will be established biennially or annually for certain species and... excluding set asides for recreational or tribal Indian fisheries) minus the allocation to the open...

  17. Indiana School for the Blind Visits Goddard

    NASA Video Gallery

    This video shows highlights of the Indiana School for the Blind and Visually Impaired, and the Indian Creek Public High School visit to NASA's Goddard Space Flight Center in June 2011. Both blind a...

  18. Reading Machines for Blind People.

    ERIC Educational Resources Information Center

    Fender, Derek H.

    1983-01-01

    Ten stages of developing reading machines for blind people are analyzed: handling of text material; optics; electro-optics; pattern recognition; character recognition; storage; speech synthesizers; browsing and place finding; computer indexing; and other sources of input. Cost considerations of the final product are emphasized. (CL)

  19. Aquatic Recreation for the Blind.

    ERIC Educational Resources Information Center

    Cordellos, Harry C.

    The sixth in a series of booklets on physical education and recreation for the handicapped describes aquatic activities for blind persons. Written by a partially sighted athlete, the document discusses swimming pool characteristics and special pools for the visually impaired. Qualities of swimming instructors are reviewed, and suggestions for…

  20. Piagetian Reasoning and the Blind.

    ERIC Educational Resources Information Center

    Hatwell, Yvette

    Available for the first time in an English translation, the book reports the results of a series of studies undertaken in the early 1960s on the cognitive development of children with congenital blindness. Chapters one and two review the literaure on such topics as the concept of sensory compensation and the nature of tactual space and provide…

  1. Repetition Blindness for Rotated Objects

    ERIC Educational Resources Information Center

    Hayward, William G.; Zhou, Guomei; Man, Wai-Fung; Harris, Irina M.

    2010-01-01

    Repetition blindness (RB) is the finding that observers often miss the repetition of an item within a rapid stream of words or objects. Recent studies have shown that RB for objects is largely unaffected by variations in viewpoint between the repeated items. In 5 experiments, we tested RB under different axes of rotation, with different types of…

  2. Repetition Blindness Occurs in Nonwords

    ERIC Educational Resources Information Center

    Harris, Catherine L.; Morris, Alison L.

    2004-01-01

    Theorists have predicted that repetition blindness (RB) should be absent for nonwords because they do not activate preexisting mental types. The authors hypothesized that RB would be observed for nonwords because RB can occur at a sublexical level. Four experiments showed that RB is observed for word-nonword pairs (noon noof), orthographically…

  3. The Blind Learning Aptitude Test.

    ERIC Educational Resources Information Center

    Newland, T. Ernest

    A Blind Learning Aptitude Test (BLAT) was developed on the basis of sense of touch rather than on conventional experience, fine sensory discrimination, or verbal competency. From a pool of about 350 items, most of them used in testing intelligence in the sighted, a pool of 94 was selected and embossed after the manner of braille. A residual pool…

  4. Metro Navigation for the Blind

    ERIC Educational Resources Information Center

    Sanchez, Jaime; Saenz, Mauricio

    2010-01-01

    This study evaluates the impact of using the software program AudioMetro, a tool that supports the orientation and mobility of people who are blind in the Metro system of Santiago de Chile. A quasi-experimental study considering experimental and control groups and using the paired Student's t in a two sample test analysis (pretest-posttest) was…

  5. Vision 2020: moving beyond blindness.

    PubMed

    Lewallen, Susan; Lansingh, Van; Thulasiraj, R D

    2014-09-01

    Most industrialized countries and many emerging economies have chosen to define 'blindness' at a visual acuity above that which WHO uses. This reflects the increasing visual demands of modern society for tasks such as driving or using cell phones. Meeting these demands will require more highly skilled health workers using more sophisticated equipment than has generally been considered sufficient for primary eye care.

  6. Are outcome-adaptive allocation trials ethical?

    PubMed

    Hey, Spencer Phillips; Kimmelman, Jonathan

    2015-04-01

    Randomization is firmly established as a cornerstone of clinical trial methodology. Yet, the ethics of randomization continues to generate controversy. The default, and most efficient, allocation scheme randomizes patients equally (1:1) across all arms of study. However, many randomized trials are using outcome-adaptive allocation schemes, which dynamically adjust the allocation ratio in favor of the better performing treatment arm. Advocates of outcome-adaptive allocation contend that it better accommodates clinical equipoise and promotes informed consent, since such trials limit patient-subject exposure to sub-optimal care. In this essay, we argue that this purported ethical advantage of outcome-adaptive allocation does not stand up to careful scrutiny in the setting of two-armed studies and/or early-phase research.

  7. Partially Blind Signatures Based on Quantum Cryptography

    NASA Astrophysics Data System (ADS)

    Cai, Xiao-Qiu; Niu, Hui-Fang

    2012-12-01

    In a partially blind signature scheme, the signer explicitly includes pre-agreed common information in the blind signature, which can improve the availability and performance. We present a new partially blind signature scheme based on fundamental properties of quantum mechanics. In addition, we analyze the security of this scheme, and show it is not possible to forge valid partially blind signatures. Moreover, the comparisons between this scheme and those based on public-key cryptography are also discussed.

  8. 49 CFR 33.54 - Elements of an allocation order.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 1 2013-10-01 2013-10-01 false Elements of an allocation order. 33.54 Section 33.54 Transportation Office of the Secretary of Transportation TRANSPORTATION PRIORITIES AND ALLOCATION SYSTEM Allocation Actions § 33.54 Elements of an allocation order. Each allocation order must include:...

  9. 10 CFR 217.54 - Elements of an allocation order.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 3 2013-01-01 2013-01-01 false Elements of an allocation order. 217.54 Section 217.54 Energy DEPARTMENT OF ENERGY OIL ENERGY PRIORITIES AND ALLOCATIONS SYSTEM Allocation Actions § 217.54 Elements of an allocation order. Each allocation order must include: (a) A detailed description of...

  10. 10 CFR 217.54 - Elements of an allocation order.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 3 2014-01-01 2014-01-01 false Elements of an allocation order. 217.54 Section 217.54 Energy DEPARTMENT OF ENERGY OIL ENERGY PRIORITIES AND ALLOCATIONS SYSTEM Allocation Actions § 217.54 Elements of an allocation order. Each allocation order must include: (a) A detailed description of...

  11. 49 CFR 33.54 - Elements of an allocation order.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 1 2012-10-01 2012-10-01 false Elements of an allocation order. 33.54 Section 33.54 Transportation Office of the Secretary of Transportation TRANSPORTATION PRIORITIES AND ALLOCATION SYSTEM Allocation Actions § 33.54 Elements of an allocation order. Each allocation order must include:...

  12. 10 CFR 217.54 - Elements of an allocation order.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 3 2012-01-01 2012-01-01 false Elements of an allocation order. 217.54 Section 217.54 Energy DEPARTMENT OF ENERGY OIL ENERGY PRIORITIES AND ALLOCATIONS SYSTEM Allocation Actions § 217.54 Elements of an allocation order. Each allocation order must include: (a) A detailed description of...

  13. 49 CFR 33.54 - Elements of an allocation order.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 1 2014-10-01 2014-10-01 false Elements of an allocation order. 33.54 Section 33.54 Transportation Office of the Secretary of Transportation TRANSPORTATION PRIORITIES AND ALLOCATION SYSTEM Allocation Actions § 33.54 Elements of an allocation order. Each allocation order must include:...

  14. 7 CFR 761.205 - Computing the formula allocation.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 7 2011-01-01 2011-01-01 false Computing the formula allocation. 761.205 Section 761... Funds to State Offices § 761.205 Computing the formula allocation. (a) The formula allocation for FO, CL... program that the National Office allocates to a State Office. formula allocation = (amount available...

  15. Poverty and blindness in Africa.

    PubMed

    Naidoo, Kovin

    2007-11-01

    Africa carries a disproportionate responsibility in terms of blindness and visual impairment. With approximately 10 per cent of the world's population, Africa has 19 per cent of the world's blindness. It is no surprise that this reality also mirrors the situation in terms of the burden of world poverty. There is an increasing recognition of the need to highlight the link between poverty, development and health care. Blindness, disabling visual impairment and the overall lack of eye-care services are too often the result of social, economic and developmental challenges of the developing world. The state of eye care in Africa stands in alarming contrast to that in the rest of the world. Poor practitioner-to-patient ratios, absence of eye-care personnel, inadequate facilities, poor state funding and a lack of educational programs are the hallmarks of eye care in Africa, with preventable and treatable conditions being the leading cause of blindness. Eye diseases causing preventable blindness are often the result of a combination of factors such as poverty, lack of education and inadequate health-care services. The challenge that Vision 2020 has set itself in Africa is enormous. Africa is not a homogenous entity, the inter- and intra-country differences in economic development, prevalence of disease, delivery infrastructure and human resources amplify the challenges of meeting eye-care needs. The successful implementation of Vision 2020 programs will be hindered without the development of a comprehensive, co-ordinated strategy that is cognisant of the differences that exist and the need for comprehensive solutions that are rooted in the economic and political realities of the continent as well as the individual countries and regions within countries. This strategy should recognise the need for economic growth that results in greater state funded eye-care services that focus on health promotion to ensure the prevention of eye disease, the development of eye clinics in

  16. Carbon allocation and accumulation in conifers

    SciTech Connect

    Gower, S.T.; Isebrands, J.G.; Sheriff, D.W.

    1995-07-01

    Forests cover approximately 33% of the land surface of the earth, yet they are responsible for 65% of the annual carbon (C) accumulated by all terrestrial biomes. In general, total C content and net primary production rates are greater for forests than for other biomes, but C budgets differ greatly among forests. Despite several decades of research on forest C budgets, there is still an incomplete understanding of the factors controlling C allocation. Yet, if we are to understand how changing global events such as land use, climate change, atmospheric N deposition, ozone, and elevated atmospheric CO{sub 2} affect the global C budget, a mechanistic understanding of C assimilation, partitioning, and allocation is necessary. The objective of this chapter is to review the major factors that influence C allocation and accumulation in conifer trees and forests. In keeping with the theme of this book, we will focus primarily on evergreen conifers. However, even among evergreen conifers, leaf, canopy, and stand-level C and nutrient allocation patterns differ, often as a function of leaf development and longevity. The terminology related to C allocation literature is often inconsistent, confusing and inadequate for understanding and integrating past and current research. For example, terms often used synonymously to describe C flow or movement include translocation, transport, distribution, allocation, partitioning, apportionment, and biomass allocation. A common terminology is needed because different terms have different meanings to readers. In this paper we use C allocation, partitioning, and accumulation according to the definitions of Dickson and Isebrands (1993). Partitioning is the process of C flow into and among different chemical, storage, and transport pools. Allocation is the distribution of C to different plant parts within the plant (i.e., source to sink). Accumulation is the end product of the process of C allocation.

  17. Psychomotor Development for the Deaf-Blind.

    ERIC Educational Resources Information Center

    Sherrill, Claudine

    The stages of psychomotor development in deaf blind children and youth are reviewed, and educational principles to guide psychomotor development programs for the deaf blind are outlined. Etiological factors which contribute to the psychomotor development of deaf blind persons are discussed including nonambulation and sensory deprivation, heart…

  18. Deaf-Blind Perspectives, 1997-1998.

    ERIC Educational Resources Information Center

    Deaf-Blind Perspectives, 1998

    1998-01-01

    This one-year collection of three serial issues focuses on problem solving skills for children with deaf-blindness, the history and change in the education of children who are deaf-blind since the rubella epidemic of the 1960's, and early identification of infants who are deaf-blind. Specific articles include: (1) "Research to Practice Focus…

  19. 45 CFR 233.70 - Blindness.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 2 2012-10-01 2012-10-01 false Blindness. 233.70 Section 233.70 Public Welfare... FINANCIAL ASSISTANCE PROGRAMS § 233.70 Blindness. (a) State plan requirements. A State plan under title X or XVI of the Social Security Act must: (1) Contain a definition of blindness in terms of...

  20. What It's Like to Be Color Blind

    MedlinePlus

    ... a green leaf might look tan or gray. Color Blindness Is Passed Down Color blindness is almost always an inherited (say: in-HER- ... Eye doctors (and some school nurses) test for color blindness by showing a picture made up of different ...

  1. Introduction to Deaf-Blindness Workshop.

    ERIC Educational Resources Information Center

    Rhodes, Larry

    This document presents the agenda and materials distributed at a 1-day introductory workshop on deaf-blindness. Introductory material explains the workshop's purpose and rules. A short test contrasts facts and myths about deaf-blindness. A handout presents information on the dynamics of deaf-blindness, etiologies in the adult deaf-blind…

  2. Model Deaf/Blind Prevocational Training Project.

    ERIC Educational Resources Information Center

    Stoddard, Denis W.; And Others

    Presented is a report of a 4-month project designed to review literature on projects pertaining to deaf-blind prevocational training, to implement a model prevocational program for six severely handicapped deaf-blind students (10 years old), and to conduct two workshops in the area of prevocational training for deaf-blind students. Provided in…

  3. Programs for the Deaf-Blind.

    ERIC Educational Resources Information Center

    American Annals of the Deaf, 1990

    1990-01-01

    The directory lists 28 state or multistate programs for deaf blind children and youth, the national center and 10 regional offices of the Helen Keller National Center for Deaf-Blind Youths and Adults, and 4 programs for training teachers of the deaf-blind. Information usually provided includes, address, director's name, and phone number. (DB)

  4. Detection of concealed substances in sealed opaque plastic and coloured glass containers using SORS

    NASA Astrophysics Data System (ADS)

    Bloomfield, Matthew; Loeffen, Paul W.; Matousek, Pavel

    2010-10-01

    The reliable detection of concealed substances in sealed opaque plastic and coloured glass containers, with low falsealarm rate, is a problem in numerous areas of security. For example, in aviation security, there is no reliable methodology for alarm resolution of substances with high chemical specificity unless the substances are in optically transparent containers. We present a recently developed method called Spatially Offset Raman Spectroscopy (SORS) which enables the discrimination of the Raman spectrum of the content substance from the Raman spectrum of the container material with no prior knowledge of either, thereby allowing unambiguous identification of the container contents. The method is effective with coloured plastic containers that are several millimetres thick and which are not see-through to the eye and also for coloured glass bottles. Such cases do not typically yield to conventional backscatter Raman spectroscopy (or have poor false-alarm rates) since the content signal is often overwhelmed by the signal from the container, which may in addition have a strong interfering fluorescence background. SORS measurement can be performed in a few seconds by shining a laser light onto the container and then measuring the Raman signal at the excitation point but also at one or more offset positions. Each measurement has different relative orthogonal contributions from the container and contents Raman spectra, so that, with no prior knowledge, the pure spectra of both the container and contents can be extracted - either by scaled subtraction or via multivariate statistical methods. The content spectrum can then be compared to a reference library of pure materials to give a threat evaluation with a confidence level not compromised by interfering signals originating from the container wall. In this paper, we describe the methods and their optimization, and characterize their performance in practical screening applications. The study shows that there is

  5. An Efficient Shared Adaptive Packet Loss Concealment Scheme through 1-Port Gateway System for Internet Telephony Service

    NASA Astrophysics Data System (ADS)

    Kim, Jinsul; Lee, Hyunwoo; Ryu, Won; Lee, Byungsun; Hahn, Minsoo

    In this letter, we propose a shared adaptive packet loss concealment scheme for the high quality guaranteed Internet telephony service which connects multiple users. In order to recover packet loss efficiently in the all-IP based convergence environment, we provide a robust signal recovery scheme which is based on the shared adaptive both-side information utilization. This scheme is provided according to the average magnitude variation across the frames and the pitch period replication on the 1-port gateway (G/W) system. The simulated performance demonstrates that the proposed scheme has the advantages of low processing times and high recovery rates in the all-IP based ubiquitous environment.

  6. Using pretest data to screen low-reactivity individuals in the autonomic-based concealed information test.

    PubMed

    Matsuda, Izumi; Ogawa, Tokihiro; Tsuneoka, Michiko; Verschuere, Bruno

    2015-03-01

    The concealed information test (CIT) can be used to assess whether an individual possesses crime-related information. However, its discrimination performance has room for improvement. We examined whether screening out participants who do not respond distinctively on a pretest improves the diagnosticity of a mock-crime CIT. Before conducting the CIT, we gave a pretest to 152 participants, 80 of whom were assigned as guilty. Pretest screening significantly improved the diagnostic value of the mock-crime CIT; however, it also led to a substantial number of undiagnosed participants (33.6%). Pretest screening holds promise, but its application would benefit from dedicated measures for screening out participants.

  7. Imaging the concealed section of the Whakatane fault below Whakatane city, New Zealand, with a shear wave land streamer system

    NASA Astrophysics Data System (ADS)

    Polom, Ulrich; Mueller, Christof; Krawczyk, CharLotte M.

    2016-04-01

    The Mw 7.1 Darfield Earthquake in September 2010 ruptured the surface along the Greendale Fault that was not known prior to the earthquake. The subsequent Mw 6.3 Christchurch earthquake in February 2011 demonstrated that concealed active faults have a significant risk potential for urban infrastructure and human life in New Zealand if they are located beneath or close to such areas. Mapping exposures and analysis of active faults incorporated into the National Seismic Hazard Model (NSHM) suggests that several thousands of these active structures are yet to be identified and have the potential to generate moderate to large magnitude earthquakes (i.e. magnitudes >5). Geological mapping suggests that active faults pass beneath, or within many urban areas in New Zealand, including Auckland, Blenheim, Christchurch, Hastings/Napier, Nelson, Rotorua, Taupo, Wellington, and Whakatane. Since no established methodology for routinely locating and assessing the earthquake hazard posed by concealed active faults is available, the principal objective of the presented study was to evaluate the usefulness of high-resolution shear wave seismic reflection profiling using a land streamer to locate buried faults in urban areas of New Zealand. During the survey carried out in the city of Whakatane in February 2015, the method was first tested over a well known surface outcrop of the Edgecumbe Fault 30 km south-west of Whakatane city. This allowed further to investigate the principle shear wave propagation characteristics in the unknown sediments, consisting mainly of effusive rock material of the Taupo volcanic zone mixed with marine transgression units. Subsequently the survey was continued within Whakatane city using night operation time slots to reduce the urban noise. In total, 11 profiles of 5.7 km length in high data quality were acquired, which clearly show concealed rupture structures of obviously different age in the shallow sediments down to 100 m depth. Subject to depth

  8. Control Allocation with Load Balancing

    NASA Technical Reports Server (NTRS)

    Bodson, Marc; Frost, Susan A.

    2009-01-01

    Next generation aircraft with a large number of actuators will require advanced control allocation methods to compute the actuator commands needed to follow desired trajectories while respecting system constraints. Previously, algorithms were proposed to minimize the l1 or l2 norms of the tracking error and of the actuator deflections. The paper discusses the alternative choice of the l(infinity) norm, or sup norm. Minimization of the control effort translates into the minimization of the maximum actuator deflection (min-max optimization). The paper shows how the problem can be solved effectively by converting it into a linear program and solving it using a simplex algorithm. Properties of the algorithm are also investigated through examples. In particular, the min-max criterion results in a type of load balancing, where the load is th desired command and the algorithm balances this load among various actuators. The solution using the l(infinity) norm also results in better robustness to failures and to lower sensitivity to nonlinearities in illustrative examples.

  9. Time allocation of disabled individuals.

    PubMed

    Pagán, Ricardo

    2013-05-01

    Although some studies have analysed the disability phenomenon and its effect on, for example, labour force participation, wages, job satisfaction, or the use of disability pension, the empirical evidence on how disability steals time (e.g. hours of work) from individuals is very scarce. This article examines how disabled individuals allocate their time to daily activities as compared to their non-disabled counterparts. Using time diary information from the Spanish Time Use Survey (last quarter of 2002 and the first three quarters of 2003), we estimate the determinants of time (minutes per day) spent on four aggregate categories (market work, household production, tertiary activities and leisure) for a sample of 27,687 non-disabled and 5250 disabled individuals and decompose the observed time differential by using the Oaxaca-Blinder methodology. The results show that disabled individuals devote less time to market work (especially females), and more time to household production (e.g. cooking, cleaning, child care), tertiary activities (e.g., sleeping, personal care, medical treatment) and leisure activities. We also find a significant effect of age on the time spent on daily activities and important differences by gender and disability status. The results are consistent with the hypothesis that disability steals time, and reiterate the fact that more public policies are needed to balance working life and health concerns among disabled individuals.

  10. Dynamic Allocation of Sugars in Barley

    NASA Astrophysics Data System (ADS)

    Cumberbatch, L. C.; Crowell, A. S.; Fallin, B. A.; Howell, C. R.; Reid, C. D.; Weisenberger, A. G.; Lee, S. J.; McKisson, J. E.

    2014-03-01

    Allocation of carbon and nitrogen is a key factor for plant productivity. Measurements are carried out by tracing 11C-tagged sugars using positron emission tomography and coincidence counting. We study the mechanisms of carbon allocation and transport from carbohydrate sources (leaves) to sinks (stem, shoot, roots) under various environmental conditions such as soil nutrient levels and atmospheric CO2 concentration. The data are analyzed using a transfer function analysis technique to model transport and allocation in barley plants. The experimental technique will be described and preliminary results presented. This work was supported in part by USDOE Grant No. DE-FG02-97-ER41033 and DE-SC0005057.

  11. Demonstration of blind quantum computing.

    PubMed

    Barz, Stefanie; Kashefi, Elham; Broadbent, Anne; Fitzsimons, Joseph F; Zeilinger, Anton; Walther, Philip

    2012-01-20

    Quantum computers, besides offering substantial computational speedups, are also expected to preserve the privacy of a computation. We present an experimental demonstration of blind quantum computing in which the input, computation, and output all remain unknown to the computer. We exploit the conceptual framework of measurement-based quantum computation that enables a client to delegate a computation to a quantum server. Various blind delegated computations, including one- and two-qubit gates and the Deutsch and Grover quantum algorithms, are demonstrated. The client only needs to be able to prepare and transmit individual photonic qubits. Our demonstration is crucial for unconditionally secure quantum cloud computing and might become a key ingredient for real-life applications, especially when considering the challenges of making powerful quantum computers widely available.

  12. Mobility aid for the blind

    NASA Technical Reports Server (NTRS)

    1982-01-01

    A project to develop an effective mobility aid for blind pedestrians which acquires consecutive images of the scenes before a moving pedestrian, which locates and identifies the pedestrian's path and potential obstacles in the path, which presents path and obstacle information to the pedestrian, and which operates in real-time is discussed. The mobility aid has three principal components: an image acquisition system, an image interpretation system, and an information presentation system. The image acquisition system consists of a miniature, solid-state TV camera which transforms the scene before the blind pedestrian into an image which can be received by the image interpretation system. The image interpretation system is implemented on a microprocessor which has been programmed to execute real-time feature extraction and scene analysis algorithms for locating and identifying the pedestrian's path and potential obstacles. Identity and location information is presented to the pedestrian by means of tactile coding and machine-generated speech.

  13. Change blindness and eyewitness testimony.

    PubMed

    Davies, Graham; Hine, Sarah

    2007-07-01

    The authors explored the relevance of research on change blindness to eyewitness identification and testimony under intentional and incidental memory conditions. Participants (N = 80, 40 men and 40 women) viewed a video enactment of a burglary in which the identity of the burglar changed at the halfway point of the film. Half of participants were briefed to remember the content, and the other half were not. All were tested for the recall of the content, awareness of the change, and ability to identify either or both of the burglars. Some 61% of participants did not notice the identity change. Rates of detection were significantly higher in participants in the intentional condition, who also recalled significantly more detail from the film. Awareness of change was also significantly related to content recall scores and accuracy of identification of both burglars. The results illustrate the interrelation between the eyewitness and change blindness literatures.

  14. A Concealed Intracranial Aneurysm Detected after Recanalization of an Occluded Vessel: A Case Report and Literature Review

    PubMed Central

    Torikoshi, Sadaharu; Akiyama, Yoshinori

    2016-01-01

    Background Based on the results of several randomized controlled trials, acute endovascular thrombectomy is strongly recommended for patients with acute ischemic stroke due to large artery occlusion (LAO). The incidence of an intracranial aneurysm has been reported to be approximately 5% in the general population. Therefore, the possibility of the coincidence of LAO and an intracranial aneurysm at the distal part of an occluded vessel should be considered. Summary A 74-year-old female patient presented with the sudden onset of consciousness disturbance and left-sided weakness. Neuroimages demonstrated an acute infarction due to right middle cerebral artery occlusion. The occlusion was successfully treated, and an aneurysm was incidentally detected at the occluded artery. We reviewed the literature and identified 11 cases in 8 reports, which were similar to our case. Among the 11 cases, aneurysms ruptured during endovascular therapy in 2 cases. In the present report, we discussed the prediction of concealed aneurysms and avoidance of their rupture during endovascular intervention. Key Message The presence of an aneurysm concealed behind an embolus should be carefully assessed on preoperative and intraoperative neuroimages. The important findings for suspecting such an aneurysm are a hyperdense nodular sign on preoperative computed tomography and unusual motion of the microwire during the endovascular intervention. Even if there is no finding indicative of an aneurysm, the catheter and thrombectomy devices should be more carefully advanced than usual, especially at the common sites of aneurysms, and the devices should be appropriately chosen. PMID:27051404

  15. Ultra wide band detection of on body concealed weapons using the out of plane polarized late time response

    NASA Astrophysics Data System (ADS)

    Harmer, Stuart; Andrews, David; Bowring, Nicholas; Rezgui, Nacer; Southgate, Matthew

    2009-09-01

    A method of detecting concealed handguns and knives, both on and off body, has been developed. The method utilizes aspect-independent natural, complex resonances (poles) excited by illuminating the target with frequency swept, ultrawide band microwaves in the range 0.5 - 18 GHz. These natural resonances manifest as a Late Time Response (LTR) that extends significantly (~ 5 ns) beyond the direct reflections from the human body (the Early Time Response) and are of the form of a superposition of exponentially decaying sinusoidal waveforms. Two handguns are examined, both on the human body and in isolation, by the established methodology of applying the Generalised-Pencil-Of-Function to the late time response data of the target. These poles allow the weapon to be effectively classified. Out of plane polarized (cross-polarized) scattered response is used here as this gives improved discrimination between the early and late time responses. Determination of the presence or absence of particular weapons concealed under clothing, on the human body, is demonstrated. A novel bow-tie slot antenna is described which has good pulse and frequency response over the range 0.3-1 GHz and which is suitable for excitation of the fundamental natural resonances.

  16. A functional analysis of deception detection of a mock crime using infrared thermal imaging and the Concealed Information Test

    PubMed Central

    Park, Kevin K.; Suk, Hye Won; Hwang, Heungsun; Lee, Jang-Han

    2013-01-01

    The purpose of this study was to utilize thermal imaging and the Concealed Information Test to detect deception in participants who committed a mock crime. A functional analysis using a functional ANOVA and a functional discriminant analysis was conducted to decrease the variation in the physiological data collected through the thermal imaging camera. Participants chose between a non-crime mission (Innocent Condition: IC), or a mock crime (Guilty Condition: GC) of stealing a wallet in a computer lab. Temperature in the periorbital region of the face was measured while questioning participants regarding mock crime details. Results revealed that the GC showed significantly higher temperatures when responding to crime relevant items compared to irrelevant items, while the IC did not. The functional ANOVA supported the initial results that facial temperatures of the GC elevated when responding to crime relevant items, demonstrating an interaction between group (guilty/innocent) and relevance (relevant/irrelevant). The functional discriminant analysis revealed that answering crime relevant items can be used to discriminate guilty from innocent participants. These results suggest that measuring facial temperatures in the periorbital region while conducting the Concealed Information Test is able to differentiate the GC from the IC. PMID:23470924

  17. Pixel-level Matching Based Multi-hypothesis Error Concealment Modes for Wireless 3D H.264/MVC Communication

    NASA Astrophysics Data System (ADS)

    El-Shafai, Walid

    2015-09-01

    3D multi-view video (MVV) is multiple video streams shot by several cameras around a single scene simultaneously. Therefore it is an urgent task to achieve high 3D MVV compression to meet future bandwidth constraints while maintaining a high reception quality. 3D MVV coded bit-streams that are transmitted over wireless network can suffer from error propagation in the space, time and view domains. Error concealment (EC) algorithms have the advantage of improving the received 3D video quality without any modifications in the transmission rate or in the encoder hardware or software. To improve the quality of reconstructed 3D MVV, we propose an efficient adaptive EC algorithm with multi-hypothesis modes to conceal the erroneous Macro-Blocks (MBs) of intra-coded and inter-coded frames by exploiting the spatial, temporal and inter-view correlations between frames and views. Our proposed algorithm adapts to 3D MVV motion features and to the error locations. The lost MBs are optimally recovered by utilizing motion and disparity matching between frames and views on pixel-by-pixel matching basis. Our simulation results show that the proposed adaptive multi-hypothesis EC algorithm can significantly improve the objective and subjective 3D MVV quality.

  18. Alkylating antitumor drug mechlorethamine conceals a structured PrP domain and inhibits in vitro prion amplification.

    PubMed

    Zhou, Xiaochen; Bi, Hao; Wong, Justin; Shimoji, Miyuki; Wang, Yifan; Yuan, Jue; Xiao, Xiangzhu; Wang, Gong-Xian; Zou, Wen-Quan

    2011-01-01

    Prion diseases are a group of incurable transmissible neurodegenerative disorders. The key molecular event in the pathogenesis of prion diseases is the conversion of the cellular prion protein (PrP(C)) into its pathological isoform (PrP(Sc)), accompanied by a conformational transition of α-helix into β-sheet structure involving the structured α-helix 1 domain from residues 144-154 of the protein (PrP144-154). Blocking the accessibility of PrP144-152 with anti-PrP antibody 6H4 was found to prevent PrP conversion and even to cure prion infection in cell models ( Enari et al. 2001 ). Previously, Yuan et al. (2005 ) demonstrated that the reduction and alkylation of PrP induced concealment of the 6H4 epitope. This study examined the ability of mechlorethamine (MCT), an alkylating antitumor drug, to conceal the 6H4 epitope and block PrP conversion in the presence of a reducing reagent. Mechlorethamine treatment significantly decreased in vitro amplification of PrP(Sc) in the highly efficient protein misfolding cyclic amplification system. Our findings suggest that MCT may serve as a potential therapeutic agent for prion diseases.

  19. Electron beam injected into ground generates subsoil x-rays that may deactivate concealed electronics used to trigger explosive devices

    NASA Astrophysics Data System (ADS)

    Retsky, Michael

    2008-04-01

    Explosively formed projectiles (EFP) are a major problem in terrorism and asymmetrical warfare. EFPs are often triggered by ordinary infrared motion detectors. A potential weak link is that such electronics are not hardened to ionizing radiation and can latch-up or enter other inoperative states after exposure to a single short event of ionizing radiation. While these can often be repaired with a power restart, they also can produce shorts and permanent damage. A problem of course is that we do not want to add radiation exposure to the long list of war related hazards. Biological systems are highly sensitive to integrated dosage but show no particular sensitivity to short pulses. There may be a way to generate short pulsed subsoil radiation to deactivate concealed electronics without introducing radiation hazards to military personnel and civilian bystanders. Electron beams of 30 MeV that can be produced by portable linear accelerators (linacs) propagate >20 m in air and 10-12 cm in soil. X-radiation is produced by bremsstrahlung and occurs subsoil beneath the point of impact and is mostly forward directed. Linacs 1.5 m long can produce 66 MWatt pulses of subsoil x-radiation 1 microsecond or less in duration. Untested as yet, such a device could be mounted on a robotic vehicle that precedes a military convoy and deactivates any concealed electronics within 10-20 meters on either side of the road.

  20. A functional analysis of deception detection of a mock crime using infrared thermal imaging and the Concealed Information Test.

    PubMed

    Park, Kevin K; Suk, Hye Won; Hwang, Heungsun; Lee, Jang-Han

    2013-01-01

    The purpose of this study was to utilize thermal imaging and the Concealed Information Test to detect deception in participants who committed a mock crime. A functional analysis using a functional ANOVA and a functional discriminant analysis was conducted to decrease the variation in the physiological data collected through the thermal imaging camera. Participants chose between a non-crime mission (Innocent Condition: IC), or a mock crime (Guilty Condition: GC) of stealing a wallet in a computer lab. Temperature in the periorbital region of the face was measured while questioning participants regarding mock crime details. Results revealed that the GC showed significantly higher temperatures when responding to crime relevant items compared to irrelevant items, while the IC did not. The functional ANOVA supported the initial results that facial temperatures of the GC elevated when responding to crime relevant items, demonstrating an interaction between group (guilty/innocent) and relevance (relevant/irrelevant). The functional discriminant analysis revealed that answering crime relevant items can be used to discriminate guilty from innocent participants. These results suggest that measuring facial temperatures in the periorbital region while conducting the Concealed Information Test is able to differentiate the GC from the IC.

  1. Joint Adaptive Pre-processing Resilience and Post-processing Concealment Schemes for 3D Video Transmission

    NASA Astrophysics Data System (ADS)

    El-Shafai, Walid

    2015-03-01

    3D video transmission over erroneous networks is still a considerable issue due to restricted resources and the presence of severe channel errors. Efficiently compressing 3D video with low transmission rate, while maintaining a high quality of received 3D video, is very challenging. Since it is not plausible to re-transmit all the corrupted macro-blocks (MBs) due to real time applications and limited resources. Thus it is mandatory to retrieve the lost MBs at the decoder side using sufficient post-processing schemes, such as error concealment (EC). In this paper, we propose an adaptive multi-mode EC (AMMEC) algorithm at the decoder based on utilizing pre-processing flexible macro-block ordering error resilience (FMO-ER) technique at the encoder; to efficiently conceal the erroneous MBs of intra and inter coded frames of 3D video. Experimental simulation results show that the proposed FMO-ER/AMMEC schemes can significantly improve the objective and subjective 3D video quality.

  2. Clinical trial design in chronic obstructive pulmonary disease: current perspectives and considerations with regard to blinding of tiotropium

    PubMed Central

    2012-01-01

    Randomised, double-blind, controlled trials are considered the gold standard for evaluating a pharmacological agent, as they minimise any potential bias. However, it is not always possible to perform double-blind trials, particularly for medications delivered via specific devices, e.g. inhalers. In such cases, open-label studies can be employed instead. Methods used to minimise any potential bias introduced by open-label study design include randomisation, crossover study design, and objective measurements of primary efficacy and safety variables. Concise reviews analysing the effect of blinding procedures of comparator drugs on outcomes in respiratory trials are limited. Here, we compare data from different chronic obstructive pulmonary disease trials with once-daily indacaterol versus a blinded or non-blinded comparator. The clinical trial programme for indacaterol, a once-daily, long-acting β2-agonist, used tiotropium as a comparator either in an open-label or blinded fashion. Data from these studies showed that the effects of tiotropium were consistent for forced expiratory volume in 1 second, an objective measure, across blinded and non-blinded studies. The data were consistent with previous studies of double-blind tiotropium, suggesting that the open-label use of tiotropium did not introduce treatment bias. The effect of tiotropium on subjective measures (St George’s Respiratory Questionnaire; transition dyspnoea index) varied slightly across blinded and non-blinded studies, indicating that minimal bias was introduced by using open-label tiotropium. Importantly, the studies used randomised, open-label tiotropium patients to treatment allocation, a method shown to minimise bias to a greater degree than blinding. In conclusion, it is important when reporting a clinical trial to be transparent about who was blinded and how the blinding was performed; if the design is open-label, additional efforts must be made to minimise risk of bias. If these

  3. 50 CFR 679.62 - Inshore sector cooperative allocation program.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... pollock cooperative permit. (3) Conversion of quota share percentage to TAC allocations. (Effective April... that subarea. Each cooperative's annual pollock TAC allocation may be published in the proposed...

  4. Justifications shape ethical blind spots.

    PubMed

    Pittarello, Andrea; Leib, Margarita; Gordon-Hecker, Tom; Shalvi, Shaul

    2015-06-01

    To some extent, unethical behavior results from people's limited attention to ethical considerations, which results in an ethical blind spot. Here, we focus on the role of ambiguity in shaping people's ethical blind spots, which in turn lead to their ethical failures. We suggest that in ambiguous settings, individuals' attention shifts toward tempting information, which determines the magnitude of their lies. Employing a novel ambiguous-dice paradigm, we asked participants to report the outcome of the die roll appearing closest to the location of a previously presented fixation cross on a computer screen; this outcome would determine their pay. We varied the value of the die second closest to the fixation cross to be either higher (i.e., tempting) or lower (i.e., not tempting) than the die closest to the fixation cross. Results of two experiments revealed that in ambiguous settings, people's incorrect responses were self-serving. Tracking participants' eye movements demonstrated that people's ethical blind spots are shaped by increased attention toward tempting information.

  5. Blind Identification of Graph Filters

    NASA Astrophysics Data System (ADS)

    Segarra, Santiago; Mateos, Gonzalo; Marques, Antonio G.; Ribeiro, Alejandro

    2017-03-01

    Network processes are often represented as signals defined on the vertices of a graph. To untangle the latent structure of such signals, one can view them as outputs of linear graph filters modeling underlying network dynamics. This paper deals with the problem of joint identification of a graph filter and its input signal, thus broadening the scope of classical blind deconvolution of temporal and spatial signals to the less-structured graph domain. Given a graph signal $\\mathbf{y}$ modeled as the output of a graph filter, the goal is to recover the vector of filter coefficients $\\mathbf{h}$, and the input signal $\\mathbf{x}$ which is assumed to be sparse. While $\\mathbf{y}$ is a bilinear function of $\\mathbf{x}$ and $\\mathbf{h}$, the filtered graph signal is also a linear combination of the entries of the lifted rank-one, row-sparse matrix $\\mathbf{x} \\mathbf{h}^T$. The blind graph-filter identification problem can thus be tackled via rank and sparsity minimization subject to linear constraints, an inverse problem amenable to convex relaxations offering provable recovery guarantees under simplifying assumptions. Numerical tests using both synthetic and real-world networks illustrate the merits of the proposed algorithms, as well as the benefits of leveraging multiple signals to aid the blind identification task.

  6. Intractable paroxysmal tachycardia caused by a concealed retrogradely conducting Kent bundle. Demonstration by epicardial mapping and cure of tachycardias by surgical interruption of the His bundle.

    PubMed Central

    Denes, P; Wyndham, C R; Rosen, K M

    1976-01-01

    Electrophysiological and epicardial mapping studies are described in a patient without pre-excitation who had intractable recurrent paroxysmal supraventricular tachycardia. Electrophysiological studies revealed fixed VA conduction times during both rapid ventricular pacing and coupled ventricular stimulation. Catheter mapping of atrial activation during retrograde conduction and during induced paroxysmal supraventricular tachycardia revealed early distal coronary sinus activation (posterior left atrium) relative to the low septal, low lateral, and high lateral right atrium. These studies suggested the presence of a concealed left-sided bypass tract. The patient underwent surgical interruption of the His bundle for control of paroxysmal supraventricular tachycardia. Epicardial mapping of the atria (during ventricular pacing) confirmed the presence of a concealed left-sided bypass tract. Surgery produced antegrade av block (while retrograde conduction was maintained) and total cure of paroxysmal supraventricular tachycardia. This is the first reported case of a concealed retrograde extranodal pathway documented by epicardial mapping. Images PMID:973901

  7. Geophysical and geochemical data from the area of the Pebble Cu-Au-Mo porphyry deposit, southwestern Alaska: Contributions to assessment techniques for concealed mineral resources

    USGS Publications Warehouse

    Anderson, E.D.; Smith, S.M.; Giles, S.A.; Granitto, Matthew; Eppinger, R.G.; Bedrosian, P.A.; Shah, A.K.; Kelley, K.D.; Fey, D.L.; Minsley, B.J.; Brown, P.J.

    2011-01-01

    In 2007, the U.S. Geological Survey began a multidisciplinary study in southwest Alaska to investigate the setting and detectability of mineral deposits in concealed volcanic and glacial terranes. The study area hosts the world-class Pebble porphyry Cu-Au-Mo deposit, and through collaboration with the Pebble Limited Partnership, a range of geophysical and geochemical investigations was carried out in proximity to the deposit. The deposit is almost entirely concealed by tundra, glacial deposits, and post-mineralization volcanic rocks. The discovery of mineral resources beneath cover is becoming more important because most of the mineral resources at the surface have already been discovered. Research is needed to identify ways in which to assess for concealed mineral resources. This report presents the uninterpreted geophysical measurements and geochemical and mineralogical analytical data from samples collected during the summer field seasons from 2007 to 2010, and makes the data available in a single Geographic Information System (GIS) database.

  8. CDC Allocates $184 Million for Zika Protection

    MedlinePlus

    ... fullstory_162694.html CDC Allocates $184 Million for Zika Protection Funds are earmarked for states, territories, local ... million has been earmarked to protect Americans against Zika virus infection, the U.S. Centers for Disease Control ...

  9. Spatial Allocator for air quality modeling

    EPA Pesticide Factsheets

    The Spatial Allocator is a set of tools that helps users manipulate and generate data files related to emissions and air quality modeling without requiring the use of a commercial Geographic Information System.

  10. Fund allocation using capacitated vehicle routing problem

    NASA Astrophysics Data System (ADS)

    Mamat, Nur Jumaadzan Zaleha; Jaaman, Saiful Hafizah; Ahmad, Rokiah Rozita; Darus, Maslina

    2014-09-01

    In investment fund allocation, it is unwise for an investor to distribute his fund into several assets simultaneously due to economic reasons. One solution is to allocate the fund into a particular asset at a time in a sequence that will either maximize returns or minimize risks depending on the investor's objective. The vehicle routing problem (VRP) provides an avenue to this issue. VRP answers the question on how to efficiently use the available fleet of vehicles to meet a given service demand, subjected to a set of operational requirements. This paper proposes an idea of using capacitated vehicle routing problem (CVRP) to optimize investment fund allocation by employing data of selected stocks in the FTSE Bursa Malaysia. Results suggest that CRVP can be applied to solve the issue of investment fund allocation and increase the investor's profit.

  11. Allocation of Scarce Resources: Some Problems

    PubMed Central

    Secundy, Marian G.

    1981-01-01

    This paper presents an overview of current philosophical perspectives and societal trends in relation to allocation of scarce resources. An analysis and comparative assessment of various positions of current philosophers, theologians, and bioethicists is provided. Currently proposed cost containment measures at the federal level require that black health professionals particularly pay attention to these proposals specifically as related to allocation of resources. The ways in which cost containment and/ or modification of resource allocation will affect health care delivery, specifically for the black community, must be carefully examined. This article may suggest some approaches for individual and group response to the continuing dialogue and to the allocation process itself. The equitable distribution of health care, particularly scarce new technologies, will be one of the greatest problems facing society in the next 20 years. PMID:7265284

  12. Optimal dynamic bandwidth allocation for complex networks

    NASA Astrophysics Data System (ADS)

    Jiang, Zhong-Yuan; Liang, Man-Gui; Li, Qian; Guo, Dong-Chao

    2013-03-01

    Traffic capacity of one network strongly depends on the link’s bandwidth allocation strategy. In previous bandwidth allocation mechanisms, once one link’s bandwidth is allocated, it will be fixed throughout the overall traffic transmission process. However, the traffic load of every link changes from time to time. In this paper, with finite total bandwidth resource of the network, we propose to dynamically allocate the total bandwidth resource in which each link’s bandwidth is proportional to the queue length of the output buffer of the link per time step. With plenty of data packets in the network, the traffic handling ability of all links of the network achieves full utilization. The theoretical analysis and the extensive simulation results on complex networks are consistent. This work is valuable for network service providers to improve network performance or to do reasonable network design efficiently.

  13. 15 CFR 923.110 - Allocation formula.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...) NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE OCEAN AND COASTAL RESOURCE MANAGEMENT COASTAL ZONE MANAGEMENT PROGRAM REGULATIONS Allocation of Section 306 Program Administration... to any coastal state for the purpose of administering that state's management program, if the...

  14. Optimality versus stability in water resource allocation.

    PubMed

    Read, Laura; Madani, Kaveh; Inanloo, Bahareh

    2014-01-15

    Water allocation is a growing concern in a developing world where limited resources like fresh water are in greater demand by more parties. Negotiations over allocations often involve multiple groups with disparate social, economic, and political status and needs, who are seeking a management solution for a wide range of demands. Optimization techniques for identifying the Pareto-optimal (social planner solution) to multi-criteria multi-participant problems are commonly implemented, although often reaching agreement for this solution is difficult. In negotiations with multiple-decision makers, parties who base decisions on individual rationality may find the social planner solution to be unfair, thus creating a need to evaluate the willingness to cooperate and practicality of a cooperative allocation solution, i.e., the solution's stability. This paper suggests seeking solutions for multi-participant resource allocation problems through an economics-based power index allocation method. This method can inform on allocation schemes that quantify a party's willingness to participate in a negotiation rather than opt for no agreement. Through comparison of the suggested method with a range of distance-based multi-criteria decision making rules, namely, least squares, MAXIMIN, MINIMAX, and compromise programming, this paper shows that optimality and stability can produce different allocation solutions. The mismatch between the socially-optimal alternative and the most stable alternative can potentially result in parties leaving the negotiation as they may be too dissatisfied with their resource share. This finding has important policy implications as it justifies why stakeholders may not accept the socially optimal solution in practice, and underlies the necessity of considering stability where it may be more appropriate to give up an unstable Pareto-optimal solution for an inferior stable one. Authors suggest assessing the stability of an allocation solution as an

  15. Allocating petroleum products during oil supply disruptions.

    PubMed

    Bezdek, R H; Taylor, W B

    1981-06-19

    Four options for allocating a long-term, severe shortfall of petroleum imports are analyzed: oil price and allocation controls, coupon gasoline rationing, variable gasoline tax and rebate, and no oil price controls with partial rebates. Each of these options is evaluated in terms of four criteria: microeconomic effects, macroeconomic effects, equity, and practical problems. The implications of this analysis for energy contingency planning are discussed.

  16. Frequency allocations accommodate new commercial applications

    NASA Astrophysics Data System (ADS)

    Stiglitz, Martin R.; Blanchard, Christine

    1992-07-01

    An overview is presented of the 1992 World Administrative Radio Frequency Conference whose principal responsibility is to review and update the International Radio Regulations, including the International Table of Frequency Allocations and the procedures for utilizing the allocations. Consideration is given to the earth exploration-satellite service, the space research space operation, general-satellite service, and wind profiler radar. Attention is given to shortwave or HF broadcasting, mobile and mobile-satellite services and future public land mobile telecommunications systems.

  17. Allocation Games: Addressing the Ill-Posed Nature of Allocation in Life-Cycle Inventories.

    PubMed

    Hanes, Rebecca J; Cruze, Nathan B; Goel, Prem K; Bakshi, Bhavik R

    2015-07-07

    Allocation is required when a life cycle contains multi-functional processes. One approach to allocation is to partition the embodied resources in proportion to a criterion, such as product mass or cost. Many practitioners apply multiple partitioning criteria to avoid choosing one arbitrarily. However, life cycle results from different allocation methods frequently contradict each other, making it difficult or impossible for the practitioner to draw any meaningful conclusions from the study. Using the matrix notation for life-cycle inventory data, we show that an inventory that requires allocation leads to an ill-posed problem: an inventory based on allocation is one of an infinite number of inventories that are highly dependent upon allocation methods. This insight is applied to comparative life-cycle assessment (LCA), in which products with the same function but different life cycles are compared. Recently, there have been several studies that applied multiple allocation methods and found that different products were preferred under different methods. We develop the Comprehensive Allocation Investigation Strategy (CAIS) to examine any given inventory under all possible allocation decisions, enabling us to detect comparisons that are not robust to allocation, even when the comparison appears robust under conventional partitioning methods. While CAIS does not solve the ill-posed problem, it provides a systematic way to parametrize and examine the effects of partitioning allocation. The practical usefulness of this approach is demonstrated with two case studies. The first compares ethanol produced from corn stover hydrolysis, corn stover gasification, and corn grain fermentation. This comparison was not robust to allocation. The second case study compares 1,3-propanediol (PDO) produced from fossil fuels and from biomass, which was found to be a robust comparison.

  18. Advances in liver transplantation allocation systems.

    PubMed

    Schilsky, Michael L; Moini, Maryam

    2016-03-14

    With the growing number of patients in need of liver transplantation, there is a need for adopting new and modifying existing allocation policies that prioritize patients for liver transplantation. Policy should ensure fair allocation that is reproducible and strongly predictive of best pre and post transplant outcomes while taking into account the natural history of the potential recipients liver disease and its complications. There is wide acceptance for allocation policies based on urgency in which the sickest patients on the waiting list with the highest risk of mortality receive priority. Model for end-stage liver disease and Child-Turcotte-Pugh scoring system, the two most universally applicable systems are used in urgency-based prioritization. However, other factors must be considered to achieve optimal allocation. Factors affecting pre-transplant patient survival and the quality of the donor organ also affect outcome. The optimal system should have allocation prioritization that accounts for both urgency and transplant outcome. We reviewed past and current liver allocation systems with the aim of generating further discussion about improvement of current policies.

  19. Advances in liver transplantation allocation systems

    PubMed Central

    Schilsky, Michael L; Moini, Maryam

    2016-01-01

    With the growing number of patients in need of liver transplantation, there is a need for adopting new and modifying existing allocation policies that prioritize patients for liver transplantation. Policy should ensure fair allocation that is reproducible and strongly predictive of best pre and post transplant outcomes while taking into account the natural history of the potential recipients liver disease and its complications. There is wide acceptance for allocation policies based on urgency in which the sickest patients on the waiting list with the highest risk of mortality receive priority. Model for end-stage liver disease and Child-Turcotte-Pugh scoring system, the two most universally applicable systems are used in urgency-based prioritization. However, other factors must be considered to achieve optimal allocation. Factors affecting pre-transplant patient survival and the quality of the donor organ also affect outcome. The optimal system should have allocation prioritization that accounts for both urgency and transplant outcome. We reviewed past and current liver allocation systems with the aim of generating further discussion about improvement of current policies. PMID:26973389

  20. Blindness

    MedlinePlus

    ... Courier services use: Rockville, MD 20852) 301-451-2020 Research at NEI Office of the Scientific Director ... Eye Disease Education Program Glaucoma Education Program Low Vision Education Program Hispanic/Latino Program Vision and Aging ...

  1. A Rare Hydrocephalus Complication: Cortical Blindness.

    PubMed

    Ünal, Emre; Göçmen, Rahşan; Işıkay, Ayşe İlksen; Tekşam, Özlem

    2015-01-01

    Cortical blindness related to bilateral occipital lobe infarction is an extremely rare complication of hydrocephalus. Compression of the posterior cerebral artery, secondary to tentorial herniation, is the cause of occipital infarction. Particularly in children and mentally ill patients, cortical blindness may be missed. Therefore, early diagnosis and treatment of hydrocephalus is important. We present herein a child of ventricular shunt malfunction complicated by cortical blindness.

  2. Blindness. [prosthetic devices and sensory aids

    NASA Technical Reports Server (NTRS)

    Pudenz, R. H.

    1974-01-01

    The possibilities are considered that modern electronics and engineering have to offer the individual with a damaged or disordered nervous system, especially the blind person. Discussed are the incidence and principal causes of blindness, past research activities, and a capsule review of some of the more interesting programs designed to provide the blind with the ability to be mobile in their environment and to read printed matter.

  3. Do perceptions of blindness affect care?

    PubMed

    Orticio, L P

    1994-01-01

    1. Delivery of health care/services is influenced by society's perceptions of blindness. 2. Health care professionals may not be equipped to address inevitable blindness because they may not have been taught how. This lack of preparation during training is a need that must be addressed. 3. The challenge to change inaccurate societal perceptions should start with health professionals--especially those who work with fervor to fight blindness.

  4. 24 CFR 982.101 - Allocation of funding.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 4 2013-04-01 2013-04-01 false Allocation of funding. 982.101... DEVELOPMENT SECTION 8 TENANT-BASED ASSISTANCE: HOUSING CHOICE VOUCHER PROGRAM Funding and PHA Application for Funding § 982.101 Allocation of funding. (a) Allocation of funding. HUD allocates available...

  5. 24 CFR 982.101 - Allocation of funding.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 4 2012-04-01 2012-04-01 false Allocation of funding. 982.101... DEVELOPMENT SECTION 8 TENANT BASED ASSISTANCE: HOUSING CHOICE VOUCHER PROGRAM Funding and PHA Application for Funding § 982.101 Allocation of funding. (a) Allocation of funding. HUD allocates available...

  6. 24 CFR 791.404 - Field Office allocation planning.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Field Office allocation planning... Allocation of Budget Authority for Housing Assistance § 791.404 Field Office allocation planning. (a) General objective. The allocation planning process should provide for the equitable distribution of available...

  7. 26 CFR 1.141-6 - Allocation and accounting rules.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 26 Internal Revenue 2 2012-04-01 2012-04-01 false Allocation and accounting rules. 1.141-6 Section... Allocation and accounting rules. (a) Allocation of proceeds to expenditures. For purposes of §§ 1.141-1.... Thus, allocations generally may be made using any reasonable, consistently applied accounting...

  8. 26 CFR 1.141-6 - Allocation and accounting rules.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 26 Internal Revenue 2 2014-04-01 2014-04-01 false Allocation and accounting rules. 1.141-6 Section... Allocation and accounting rules. (a) Allocation of proceeds to expenditures. For purposes of §§ 1.141-1.... Thus, allocations generally may be made using any reasonable, consistently applied accounting...

  9. 26 CFR 1.141-6 - Allocation and accounting rules.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 26 Internal Revenue 2 2013-04-01 2013-04-01 false Allocation and accounting rules. 1.141-6 Section... Allocation and accounting rules. (a) Allocation of proceeds to expenditures. For purposes of §§ 1.141-1.... Thus, allocations generally may be made using any reasonable, consistently applied accounting...

  10. 24 CFR 791.404 - Field Office allocation planning.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 4 2012-04-01 2012-04-01 false Field Office allocation planning... Allocation of Budget Authority for Housing Assistance § 791.404 Field Office allocation planning. (a) General... authority, consistent with the relative housing needs of each allocation area within the field...

  11. 24 CFR 791.404 - Field Office allocation planning.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 24 Housing and Urban Development 4 2014-04-01 2014-04-01 false Field Office allocation planning... Allocation of Budget Authority for Housing Assistance § 791.404 Field Office allocation planning. (a) General... authority, consistent with the relative housing needs of each allocation area within the field...

  12. 24 CFR 791.404 - Field Office allocation planning.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 24 Housing and Urban Development 4 2011-04-01 2011-04-01 false Field Office allocation planning... Allocation of Budget Authority for Housing Assistance § 791.404 Field Office allocation planning. (a) General... authority, consistent with the relative housing needs of each allocation area within the field...

  13. 24 CFR 791.404 - Field Office allocation planning.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 4 2013-04-01 2013-04-01 false Field Office allocation planning... Allocation of Budget Authority for Housing Assistance § 791.404 Field Office allocation planning. (a) General... authority, consistent with the relative housing needs of each allocation area within the field...

  14. 47 CFR 2.106 - Table of Frequency Allocations.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 1 2011-10-01 2011-10-01 false Table of Frequency Allocations. 2.106 Section 2.106 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL FREQUENCY ALLOCATIONS AND RADIO TREATY MATTERS; GENERAL RULES AND REGULATIONS Allocation, Assignment, and Use of Radio Frequencies § 2.106 Table of Frequency Allocations. Editorial...

  15. 47 CFR 2.106 - Table of Frequency Allocations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Table of Frequency Allocations. 2.106 Section 2.106 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL FREQUENCY ALLOCATIONS AND RADIO TREATY MATTERS; GENERAL RULES AND REGULATIONS Allocation, Assignment, and Use of Radio Frequencies § 2.106 Table of Frequency Allocations. Editorial...

  16. 26 CFR 26.2632-1 - Allocation of GST exemption.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... effect on the application of the automatic allocation rules applicable after the transferor's death under... a Form 709 for calendar year 2008). (d) Allocations after the transferor's death—(1) Allocation by... negligible. (2) Automatic allocation after death. A decedent's unused GST exemption is...

  17. 26 CFR 26.2632-1 - Allocation of GST exemption.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... effect on the application of the automatic allocation rules applicable after the transferor's death under... a Form 709 for calendar year 2008). (d) Allocations after the transferor's death—(1) Allocation by... negligible. (2) Automatic allocation after death. A decedent's unused GST exemption is...

  18. 26 CFR 26.2632-1 - Allocation of GST exemption.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... effect on the application of the automatic allocation rules applicable after the transferor's death under... a Form 709 for calendar year 2008). (d) Allocations after the transferor's death—(1) Allocation by... negligible. (2) Automatic allocation after death. A decedent's unused GST exemption is...

  19. 26 CFR 26.2632-1 - Allocation of GST exemption.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... effect on the application of the automatic allocation rules applicable after the transferor's death under... a Form 709 for calendar year 2008). (d) Allocations after the transferor's death—(1) Allocation by... negligible. (2) Automatic allocation after death. A decedent's unused GST exemption is...

  20. 47 CFR 64.903 - Cost allocation manuals.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Cost allocation manuals. 64.903 Section 64.903... RULES RELATING TO COMMON CARRIERS Allocation of Costs § 64.903 Cost allocation manuals. (a) Each... mid-sized incumbent local exchange carriers is required to file a cost allocation manual...

  1. The Use of Different Rules to Allocate Reward and Punishment.

    ERIC Educational Resources Information Center

    Mueller, Charles W.

    Much research has been conducted about how and when individuals allocate rewards, yet little research exists concerning the allocation of punishment. The process of allocating negative outcomes may be different from the decision making process for positive outcomes. To examine the decision making process for allocating rewards and punishment,…

  2. Congenital color blindness in young Turkish men.

    PubMed

    Citirik, Mehmet; Acaroglu, Golge; Batman, Cosar; Zilelioglu, Orhan

    2005-04-01

    We investigated a healthy population of men from different regions of Turkey for the presence of congenital red-green color blindness. Using Ishihara pseudoisochromatic plates, 941 healthy men from the Turkish army were tested for congenital red-green color blindness. The prevalence of red-green color blindness was 7.33 +/- 0.98% (5.10% protans and 2.23% deutans). These ratios were higher than other reported samples from Mediterranean Europe. Higher percentages of color blindness were found in regions with a lower education level and more consanguineous marriages.

  3. An Analysis and Allocation System for Library Collections Budgets: The Comprehensive Allocation Process (CAP)

    ERIC Educational Resources Information Center

    Lyons, Lucy Eleonore; Blosser, John

    2012-01-01

    The "Comprehensive Allocation Process" (CAP) is a reproducible decision-making structure for the allocation of new collections funds, for the reallocation of funds within stagnant budgets, and for budget cuts in the face of reduced funding levels. This system was designed to overcome common shortcomings of current methods. Its philosophical…

  4. 76 FR 32392 - Notice of Allocation Availability (NOAA) Inviting Applications for the CY 2011 Allocation Round...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-06

    ... Community Development Financial Institutions Fund Notice of Allocation Availability (NOAA) Inviting... (see Section IV.D. of this NOAA for more details). Applications must meet all eligibility and other requirements and deadlines, as applicable, set forth in this NOAA. Allocation applicants that are not...

  5. Lead isotopes in iron and manganese oxide coatings and their use as an exploration guide for concealed mineralization

    USGS Publications Warehouse

    Gulson, B.L.; Church, S.E.; Mizon, K.J.; Meier, A.L.

    1992-01-01

    Lead isotopes from Fe and Mn oxides that coat stream pebbles from around the Mount Emmons porphyry molybdenum deposit in Colorado were studied to assess the feasibility of using Pb isotopes to detect concealed mineral deposits. The Fe/Mn oxide coatings were analyzed to determine their elemental concentrations using ICP-AES. The Pb isotope compositions of solutions from a selected suite of samples were measured, using both thermal ionization and ICP mass spectrometry, to compare results determined by the two analytical methods. Heavy mineral concentrates from the same sites were also analyzed to compare the Pb isotope compositions of the Fe/Mn coatings with those found in panned concentrates. The Fe/Mn and 206Pb/204Pb ratios of the oxide coatings are related to the lithology of the host rocks; Fe/Mn oxide coatings on pebbles of black shale have higher Fe/Mn values than do the coatings on either sandstone or igneous rocks. The shale host rocks have a more radiogenic signature (e.g. higher 206Pb/ 204Pb) than the sandstone or igneous host rocks. The Pb isotope data from sandstone and igneous hosts can detect concealed mineralized rock on both a regional and local scale, even though there are contributions from: (1) metals from the main-stage molybdenite ore deposit; (2) metals from the phyllic alteration zone which has a more radiogenic Pb isotope signature reflecting hydrothermal leaching of Pb from the Mancos Shale; (3) Pb-rich base metal veins with a highly variable Pb isotope signature; and (4) sedimentary country rocks which have a more radiogenic Pb isotope signature. An investigation of within-stream variation shows that the Pb isotope signature of the molybdenite ore zone is retained in the Fe/Mn oxide coatings and is not camouflaged by contributions from Pb-rich base-metal veins that crop out upstream. In another traverse, the Pb isotope data from Fe/Mn oxide coatings reflect a complex mixing of Pb from the molybdenite ore zone and its hornfels margin, Pb

  6. The impact of prior knowledge from participant instructions in a mock crime P300 Concealed Information Test.

    PubMed

    Winograd, Michael R; Rosenfeld, J Peter

    2014-12-01

    In P300-Concealed Information Tests used with mock crime scenarios, the amount of detail revealed to a participant prior to the commission of the mock crime can have a serious impact on a study's validity. We predicted that exposure to crime details through instructions would bias detection rates toward enhanced sensitivity. In a 2 × 2 factorial design, participants were either informed (through mock crime instructions) or naïve as to the identity of a to-be-stolen item, and then either committed (guilty) or did not commit (innocent) the crime. Results showed that prior knowledge of the stolen item was sufficient to cause 69% of innocent-informed participants to be incorrectly classified as guilty. Further, we found a trend toward enhanced detection rate for guilty-informed participants over guilty-naïve participants. Results suggest that revealing details to participants through instructions biases detection rates in the P300-CIT toward enhanced sensitivity.

  7. Discovery of a concealed geothermal resource in the Alturas Basin, and its implications for further exploration in northeastern California

    SciTech Connect

    Bohm, B.; Juncal, R.W.

    1995-12-31

    In 1988 a so far unknown geothermal resource was drilled into under the City of Alturas in northeastern California. A fracture was tapped below 2300 feet, in cemented fine-grained tuffs and mudflows, producing 182{degrees}F water. The well has been used since 1990 to heat the local high school. A second well was drilled in 1991, producing about 250 gpm 182{degrees}F water from a fracture below 1893 ft. Well productivities and artesian pressures are variable, depending on distance from a major fault zone and local hydrologic regime. It appears as if the wells produce from deep reaching fractures in a caprock, that may conceal a 300 to 400{degrees}F resource between 4000 and 6000 feet depth. The results have important implications for geothermal exploration in northeastern California, i.e. just because there are no surface manifestations in a basin, it does not necessarily mean there is no geothermal resource at depth.

  8. Geochemical Data for Samples Collected in 2007 Near the Concealed Pebble Porphyry Cu-Au-Mo Deposit, Southwest Alaska

    USGS Publications Warehouse

    Fey, David L.; Granitto, Matthew; Giles, Stuart A.; Smith, Steven M.; Eppinger, Robert G.; Kelley, Karen D.

    2008-01-01

    In the summer of 2007, the U.S. Geological Survey (USGS) began an exploration geochemical research study over the Pebble porphyry copper-gold-molydenum (Cu-Au-Mo) deposit in southwest Alaska. The Pebble deposit is extremely large and is almost entirely concealed by tundra, glacial deposits, and post-Cretaceous volcanic and volcaniclastic rocks. The deposit is presently being explored by Northern Dynasty Minerals, Ltd., and Anglo-American LLC. The USGS undertakes unbiased, broad-scale mineral resource assessments of government lands to provide Congress and citizens with information on national mineral endowment. Research on known deposits is also done to refine and better constrain methods and deposit models for the mineral resource assessments. The Pebble deposit was chosen for this study because it is concealed by surficial cover rocks, it is relatively undisturbed (except for exploration company drill holes), it is a large mineral system, and it is fairly well constrained at depth by the drill hole geology and geochemistry. The goals of the USGS study are (1) to determine whether the concealed deposit can be detected with surface samples, (2) to better understand the processes of metal migration from the deposit to the surface, and (3) to test and develop methods for assessing mineral resources in similar concealed terrains. This report presents analytical results for geochemical samples collected in 2007 from the Pebble deposit and surrounding environs. The analytical data are presented digitally both as an integrated Microsoft 2003 Access? database and as Microsoft 2003 Excel? files. The Pebble deposit is located in southwestern Alaska on state lands about 30 km (18 mi) northwest of the village of Illiamna and 320 km (200 mi) southwest of Anchorage (fig. 1). Elevations in the Pebble area range from 287 m (940 ft) at Frying Pan Lake just south of the deposit to 1146 m (3760 ft) on Kaskanak Mountain about 5 km (5 mi) to the west. The deposit is in an area of

  9. Healthcare resource allocation decisions affecting uninsured services

    PubMed Central

    Harrison, Krista Lyn; Taylor, Holly A.

    2017-01-01

    Purpose Using the example of community access programs (CAPs), the purpose of this paper is to describe resource allocation and policy decisions related to providing health services for the uninsured in the USA and the organizational values affecting these decisions. Design/methodology/approach The study used comparative case study methodology at two geographically diverse sites. Researchers collected data from program documents, meeting observations, and interviews with program stakeholders. Findings Five resource allocation or policy decisions relevant to providing healthcare services were described at each site across three categories: designing the health plan, reacting to funding changes, and revising policies. Organizational values of access to care and stewardship most frequently affected resource allocation and policy decisions, while economic and political pressures affect the relative prioritization of values. Research limitations/implications Small sample size, the potential for social desirability or recall bias, and the exclusion of provider, member or community perspectives beyond those represented among participating board members. Practical implications Program directors or researchers can use this study to assess the extent to which resource allocation and policy decisions align with organizational values and mission statements. Social implications The description of how healthcare decisions are actually made can be matched with literature that describes how healthcare resource decisions ought to be made, in order to provide a normative grounding for future decisions. Originality/value This study addresses a gap in literature regarding how CAPs actually make resource allocation decisions that affect access to healthcare services. PMID:27934550

  10. Hidden from health: structural stigma, sexual orientation concealment, and HIV across 38 countries in the European MSM Internet Survey

    PubMed Central

    Pachankis, John E.; Hatzenbuehler, Mark L.; Hickson, Ford; Weatherburn, Peter; Berg, Rigmor C.; Marcus, Ulrich; Schmidt, Axel J.

    2016-01-01

    Objective Substantial country-level variation exists in prejudiced attitudes towards male homosexuality and in the extent to which countries promote the unequal treatment of MSM through discriminatory laws. The impact and underlying mechanisms of country-level stigma on odds of diagnosed HIV, sexual opportunities, and experience of HIV-prevention services, needs and behaviours have rarely been examined, however. Design Data come from the European MSM Internet Survey (EMIS), which was administered between June and August 2010 across 38 European countries (N =174 209). Methods Country-level stigma was assessed using a combination of national laws and policies affecting sexual minorities and a measure of attitudes held by the citizens of each country. We also assessed concealment, HIV status, number of past 12-month male sex partners, and eight HIV-preventive services, knowledge, and behavioural outcomes. Results MSM living in countries with higher levels of stigma had reduced odds of diagnosed HIV and fewer partners but higher odds of sexual risk behaviour, unmet prevention needs, not using testing services, and not discussing their sexuality in testing services. Sexual orientation concealment mediated associations between country-level stigma and these outcomes. Conclusion Country-level stigma may have historically limited HIV transmission opportunities among MSM, but by restricting MSM’s public visibility, it also reduces MSM’s ability to access HIV-preventive services, knowledge and precautionary behaviours. These findings suggest that MSM in European countries with high levels of stigma are vulnerable to HIV infection. Although they have less opportunity to identify and contact other MSM, this might change with emerging technologies. PMID:26035323

  11. Mental Health Stigma, Self-Concealment, and Help-Seeking Attitudes among Asian American and European American College Students with No Help-Seeking Experience

    ERIC Educational Resources Information Center

    Masuda, Akihiko; Boone, Matthew S.

    2011-01-01

    The present study examined whether mental health stigma (i.e., negative attitudes toward people with a psychological disorder) and self-concealment are unique predictors of help-seeking attitudes in Asian American and European American college students with no history of seeking professional psychological services. The Asian American group had…

  12. Mental Health Stigma and Self-Concealment as Predictors of Help-Seeking Attitudes among Latina/o College Students in the United States

    ERIC Educational Resources Information Center

    Mendoza, Hadrian; Masuda, Akihiko; Swartout, Kevin M.

    2015-01-01

    The study examined whether mental health stigma and self-concealment are uniquely related to various dimensions of attitudes toward seeking professional psychological services (i.e., help-seeking attitudes) in Latina/o college students. Data from 129 Latina/o undergraduates (76% female) were used in the analysis. Results revealed that mental…

  13. Attitudes toward Face-to-Face and Online Counseling: Roles of Self-Concealment, Openness to Experience, Loss of Face, Stigma, and Disclosure Expectations among Korean College Students

    ERIC Educational Resources Information Center

    Bathje, Geoff J.; Kim, Eunha; Rau, Ellen; Bassiouny, Muhammad Adam; Kim, Taehoon

    2014-01-01

    This study examined attitudes toward face-to-face (f2f) and online counseling among 228 Korean college students. In addition, it tested a hypothesized model proposing that general propensities (i.e., self-concealment, openness to experience, and loss of face) would influence counseling-specific expectations (i.e., self-stigma and disclosure…

  14. Non-Linear Control Allocation Using Piecewise Linear Functions

    DTIC Science & Technology

    2003-08-01

    A novel method is presented for the solution of the non- linear control allocation problem. Historically, control allocation has been performed by... linear control allocation problem to be cast as a piecewise linear program. The piecewise linear program is ultimately cast as a mixed-integer linear...piecewise linear control allocation method is shown to be markedly improved when compared to the performance of a more traditional control allocation approach that assumes linearity.

  15. Difference Blindness/Blindness Difference: Student Explorations of "Disability" over the Internet.

    ERIC Educational Resources Information Center

    Murphy, Kelly; And Others

    This case study describes the Internet correspondence using MOO, a multiuser, object-oriented site, that was developed between six third-grade girls and TCC, an adult with blindness. The changes from the students' original attitudes toward blindness, that blindness posed a barrier to communication and relationship-building, into their acceptance…

  16. Definition of blindness under National Programme for Control of Blindness: Do we need to revise it?

    PubMed

    Vashist, Praveen; Senjam, Suraj Singh; Gupta, Vivek; Gupta, Noopur; Kumar, Atul

    2017-02-01

    A review appropriateness of the current definition of blindness under National Programme for Control of Blindness (NPCB), Government of India. Online search of peer-reviewed scientific published literature and guidelines using PubMed, the World Health Organization (WHO) IRIS, and Google Scholar with keywords, namely blindness and visual impairment, along with offline examination of reports of national and international organizations, as well as their cross-references was done until December 2016, to identify relevant documents on the definition of blindness. The evidence for the historical and currently adopted definition of blindness under the NPCB, the WHO, and other countries was reviewed. Differences in the NPCB and WHO definitions were analyzed to assess the impact on the epidemiological status of blindness and visual impairment in India. The differences in the criteria for blindness under the NPCB and the WHO definitions cause an overestimation of the prevalence of blindness in India. These variations are also associated with an over-representation of refractive errors as a cause of blindness and an under-representation of other causes under the NPCB definition. The targets for achieving elimination of blindness also become much more difficult to achieve under the NPCB definition. Ignoring differences in definitions when comparing the global and Indian prevalence of blindness will cause erroneous interpretations. We recommend that the appropriate modifications should be made in the NPCB definition of blindness to make it consistent with the WHO definition.

  17. Astronomy with the color blind

    NASA Astrophysics Data System (ADS)

    Smith, Donald A.; Melrose, Justyn

    2014-12-01

    The standard method to create dramatic color images in astrophotography is to record multiple black and white images, each with a different color filter in the optical path, and then tint each frame with a color appropriate to the corresponding filter. When combined, the resulting image conveys information about the sources of emission in the field, although one should be cautious in assuming that such an image shows what the subject would "really look like" if a person could see it without the aid of a telescope. The details of how the eye processes light have a significant impact on how such images should be understood, and the step from perception to interpretation is even more problematic when the viewer is color blind. We report here on an approach to manipulating stacked tricolor images that, while abandoning attempts to portray the color distribution "realistically," do result in enabling those suffering from deuteranomaly (the most common form of color blindness) to perceive color distinctions they would otherwise not be able to see.

  18. Glycoprotein Degradation in the Blind Loop Syndrome

    PubMed Central

    Prizont, Roberto

    1981-01-01

    Contents obtained from jejunum of normal controls, self-emptying and self-filling blind loop rats were analyzed for the presence of glycoprotein-degrading glycosidases. The blind loop syndrome was documented by the increased fat excretion and slower growth rate of self-filling blind loop rats 6 wk after surgery. With p-nitrophenylglycosides as substrate, the specific activity of α-N-acetylgalactosaminidase, a potential blood group A destroying glycosidase, was 0.90±0.40 mU/mg of protein. This level was 23-fold higher than the specific activity of normal controls. In partially purified self-filling blind loop contents, the activity of α-N-acetylgalactosaminidase was 9- to 70-fold higher than activities of self-emptying and normal controls. Antibiotic treatment with chloromycetin and polymyxin decreased 24-fold the glycosidase levels in self-filling blind loops. In experiments with natural substrate, the blood group A titer of a20,000g supernate from normal jejunal homogenates decreased 128-fold after 24-h incubation with blind loop contents. Normal contents failed to diminish the blood group reactivity of the natural substrate. Furthermore, blind loop contents markedly decreased the blood group A titer of isolated brush borders. Incubation between blind loop bacteria and mucosal homogenates or isolated brush borders labeled with d-[U-14C]glucosamine revealed increased production of labeled ether extractable organic acids. Likewise, intraperitoneal injection of d-[U-14C]glucosamine into self-filling blind loop rats resulted in incorporation of the label into luminal short chain fatty acids. These results suggest that glycosidases may provide a mechanism by which blind loop bacteria obtain sugars from intestinal glycoproteins. The released sugars are used and converted by bacteria into energy and organic acids. This use of the host's glycoproteins would allow blind loop bacteria to grow and survive within the lumen independent of exogenous sources. PMID:6257760

  19. Task mapping for non-contiguous allocations.

    SciTech Connect

    Leung, Vitus Joseph; Bunde, David P.; Ebbers, Johnathan; Price, Nicholas W.; Swank, Matthew.; Feer, Stefan P.; Rhodes, Zachary D.

    2013-02-01

    This paper examines task mapping algorithms for non-contiguously allocated parallel jobs. Several studies have shown that task placement affects job running time for both contiguously and non-contiguously allocated jobs. Traditionally, work on task mapping either uses a very general model where the job has an arbitrary communication pattern or assumes that jobs are allocated contiguously, making them completely isolated from each other. A middle ground between these two cases is the mapping problem for non-contiguous jobs having a specific communication pattern. We propose several task mapping algorithms for jobs with a stencil communication pattern and evaluate them using experiments and simulations. Our strategies improve the running time of a MiniApp by as much as 30% over a baseline strategy. Furthermore, this improvement increases markedly with the job size, demonstrating the importance of task mapping as systems grow toward exascale.

  20. Resource allocation for efficient environmental management.

    PubMed

    McCarthy, Michael A; Thompson, Colin J; Hauser, Cindy; Burgman, Mark A; Possingham, Hugh P; Moir, Melinda L; Tiensin, Thanawat; Gilbert, Marius

    2010-10-01

    Environmental managers must decide how to invest available resources. Researchers have previously determined how to allocate conservation resources among regions, design nature reserves, allocate funding to species conservation programs, design biodiversity surveys and monitoring programs, manage species and invest in greenhouse gas mitigation schemes. However, these issues have not been addressed with a unified theory. Furthermore, uncertainty is prevalent in environmental management, and needs to be considered to manage risks. We present a theory for optimal environmental management, synthesizing previous approaches to the topic and incorporating uncertainty. We show that the theory solves a diverse range of important problems of resource allocation, including distributing conservation resources among the world's biodiversity hotspots; surveillance to detect the highly pathogenic avian influenza H5N1 virus in Thailand; and choosing survey methods for the insect order Hemiptera. Environmental management decisions are similar to decisions about financial investments, with trade-offs between risk and reward.

  1. Biomass Resource Allocation among Competing End Uses

    SciTech Connect

    Newes, E.; Bush, B.; Inman, D.; Lin, Y.; Mai, T.; Martinez, A.; Mulcahy, D.; Short, W.; Simpkins, T.; Uriarte, C.; Peck, C.

    2012-05-01

    The Biomass Scenario Model (BSM) is a system dynamics model developed by the U.S. Department of Energy as a tool to better understand the interaction of complex policies and their potential effects on the biofuels industry in the United States. However, it does not currently have the capability to account for allocation of biomass resources among the various end uses, which limits its utilization in analysis of policies that target biomass uses outside the biofuels industry. This report provides a more holistic understanding of the dynamics surrounding the allocation of biomass among uses that include traditional use, wood pellet exports, bio-based products and bioproducts, biopower, and biofuels by (1) highlighting the methods used in existing models' treatments of competition for biomass resources; (2) identifying coverage and gaps in industry data regarding the competing end uses; and (3) exploring options for developing models of biomass allocation that could be integrated with the BSM to actively exchange and incorporate relevant information.

  2. Competing Principles for Allocating Health Care Resources.

    PubMed

    Carter, Drew; Gordon, Jason; Watt, Amber M

    2016-10-01

    We clarify options for conceptualizing equity, or what we refer to as justice, in resource allocation. We do this by systematically differentiating, expounding, and then illustrating eight different substantive principles of justice. In doing this, we compare different meanings that can be attributed to "need" and "the capacity to benefit" (CTB). Our comparison is sharpened by two analytical tools. First, quantification helps to clarify the divergent consequences of allocations commended by competing principles. Second, a diagrammatic approach developed by economists Culyer and Wagstaff offers a visual and conceptual aid. Of the eight principles we illustrate, only two treat as relevant both a person's initial health state and a person's CTB per resource unit expended: (1) allocate resources so as to most closely equalize final health states and (2) allocate resources so as to equally restore health states to population norms. These allocative principles ought to be preferred to the alternatives if one deems relevant both a person's initial health state and a person's CTB per resource unit expended. Finally, we examine some possibilities for conceptualizing benefits as relative to how badly off someone is, extending Parfit's thought on Prioritarianism (a prioritizing of the worst off). Questions arise as to how much intervention effects accruing to the worse off count for more and how this changes with improving health. We explicate some recent efforts to answer these questions, including in Dutch and British government circles. These efforts can be viewed as efforts to operationalize need as an allocative principle. Each effort seeks to maximize in the aggregate quanta of effect that are differentially valued in favor of the worst off. In this respect, each effort constitutes one type of Prioritarianism, which Parfit failed to differentiate from other types.

  3. ‘I am doing fine only because I have not told anyone’: the necessity of concealment in the lives of people living with HIV in India

    PubMed Central

    George, Mathew Sunil; Lambert, Helen

    2015-01-01

    In HIV prevention and care programmes, disclosure of status by HIV-positive individuals is generally encouraged to contain the infection and provide adequate support to the person concerned. Lack of disclosure is generally framed as a barrier to preventive behaviours and accessing support. The assumption that disclosure is beneficial is also reflected in studies that aim to identify determinants of disclosure and recommend individual-level measures to promote disclosure. However, in contexts where HIV infection is stigmatised and there is fear of rejection and discrimination among those living with HIV, concealment of status becomes a way to try and regain as much as possible the life that was disrupted by the discovery of HIV infection. In this study of HIV-positive women and children in India, concealment was considered essential by individuals and families of those living with HIV to re-establish and maintain their normal lives in an environment where stigma and discrimination were prevalent. This paper describes why women and care givers of children felt the need to conceal HIV status, the various ways in which people tried to do so and the implications for treatment of people living with HIV. We found that while women were generally willing to disclose their status to their husband or partner, they were very keen to conceal their status from all others, including family members. Parents and carers with an HIV-positive child were not willing to disclose this status to the child or to others. Understanding the different rationales for concealment would help policy makers and programme managers to develop more appropriate care management strategies and train care providers to assist clients in accessing care and support without disrupting their lives. PMID:25706959

  4. Allocation Rules for Sequential Clinical Trials.

    DTIC Science & Technology

    1982-07-01

    AD-AIN 354 STANFORD UNIV CA DEPT OF STATISTICS F/V 12/1 ALLOCATION RULES FOR SEQUENTIAL CLINICAL TRIALS .(U) JUL 82 D SIEGMUND N00V11577-C-V306...UNCLASSIFIED TR 18 NL ALLOCATION RULES FOR SEQUENTIAL CLINICAL TRIALS BY D. SIEGMUND TECHNICAL REPORT NO. 18 JULY 1982 PREPARED UNDER CONTRACT N00014-77-C...at all. Rere me. discuss (I) and (11) or mes"s 9f a Monte Carlo experiment. The advantages of randomization in clinical trials has been discussed at

  5. The Allocation of Federal Expenditures Among States

    NASA Technical Reports Server (NTRS)

    Lee, Maw Lin

    1967-01-01

    This study explores factors associated with the allocation offederal expenditures by states and examines the implications of theseexpenditures on the state by state distribution of incomes. Theallocation of federal expenditures is functionally oriented toward theobjectives for which various government programs are set up. Thegeographical distribution of federal expenditures, therefore, washistorically considered to be a problem incidental to governmentactivity. Because of this, relatively little attention was given tothe question of why some states receive more federal allocation thanothers. In addition, the implications of this pattern of allocationamong the several states have not been intensively investigated.

  6. New Identity-Based Blind Signature and Blind Decryption Scheme in the Standard Model

    NASA Astrophysics Data System (ADS)

    Phong, Le Trieu; Ogata, Wakaha

    We explicitly describe and analyse blind hierachical identity-based encryption (blind HIBE) schemes, which are natural generalizations of blind IBE schemes [20]. We then uses the blind HIBE schemes to construct: (1) An identity-based blind signature scheme secure in the standard model, under the computational Diffie-Hellman (CDH) assumption, and with much shorter signature size and lesser communication cost, compared to existing proposals. (2) A new mechanism supporting a user to buy digital information over the Internet without revealing what he/she has bought, while protecting the providers from cheating users.

  7. Deaf-Blind Perspectives, 2000-2001.

    ERIC Educational Resources Information Center

    Malloy, Peggy, Ed.

    2001-01-01

    These three issues of "Deaf-Blind Perspectives" feature the following articles: (1) "A Group for Students with Usher Syndrome in South Louisiana" (Faye Melancon); (2) "Simply Emily," which discusses a budding friendship between a girl with deaf-blindness and a peer; (3) "Intervener Update" (Peggy Malloy and…

  8. Public-Facilities Locator For The Blind

    NASA Technical Reports Server (NTRS)

    Moore, Kevin D.

    1988-01-01

    Proposed optoelectronic system guides blind people to important locations in public buildings, With system, sightless person easily determines directions and distances of restrooms, water fountains, stairways, emergency exits, and elevators. Circuitry uncomplicated and inexpensive, in both transmitter and receiver. Readily-available light-emitting diodes, photodiodes, and integrated-circuit chips used to build locator aid for the blind.

  9. Individual Differences in Susceptibility to Inattentional Blindness

    ERIC Educational Resources Information Center

    Seegmiller, Janelle K.; Watson, Jason M.; Strayer, David L.

    2011-01-01

    Inattentional blindness refers to the finding that people do not always see what appears in their gaze. Though inattentional blindness affects large percentages of people, it is unclear if there are individual differences in susceptibility. The present study addressed whether individual differences in attentional control, as reflected by…

  10. Mentoring Transition-Age Youth with Blindness

    ERIC Educational Resources Information Center

    Bell, Edward C.

    2012-01-01

    This article reports on a mentoring project designed for transition-age youth (ages 16-26) who are persons with legal blindness. Youth were matched with adult mentors who were also persons with blindness but who have achieved academic and career success. Results demonstrate that youth who participated in the project for 2 years had significant…

  11. Vision Science: Can Rhodopsin Cure Blindness?

    PubMed

    Van Gelder, Russell N; Kaur, Kuldeep

    2015-08-17

    Outer retinal degeneration is the leading cause of blindness in the developed world. A new study now demonstrates that ectopic expression of human rhodopsin in the inner retina, mediated by viral gene therapy, can restore light sensitivity and some vision to mice blind from outer retinal degeneration.

  12. Blind Children's Concepts of How People See.

    ERIC Educational Resources Information Center

    Bigelow, A.

    1988-01-01

    The concepts of two totally blind children, ages four and five, concerning how people see, were evaluated by asking them to show objects to either sighted people or each other. Their performance indicated they understood that blind people need to feel objects but sighted persons do not. (Author/DB)

  13. Semantic and Phonemic Verbal Fluency in Blinds

    ERIC Educational Resources Information Center

    Nejati, Vahid; Asadi, Anoosh

    2010-01-01

    A person who has suffered the total loss of a sensory system has, indirectly, suffered a brain lesion. Semantic and phonologic verbal fluency are used for evaluation of executive function and language. The aim of this study is evaluation and comparison of phonemic and semantic verbal fluency in acquired blinds. We compare 137 blinds and 124…

  14. Genetics Home Reference: autosomal dominant congenital stationary night blindness

    MedlinePlus

    ... stationary night blindness autosomal dominant congenital stationary night blindness Enable Javascript to view the expand/collapse boxes. ... Close All Description Autosomal dominant congenital stationary night blindness is a disorder of the retina , which is ...

  15. Subcortical functional reorganization due to early blindness.

    PubMed

    Coullon, Gaelle S L; Jiang, Fang; Fine, Ione; Watkins, Kate E; Bridge, Holly

    2015-04-01

    Lack of visual input early in life results in occipital cortical responses to auditory and tactile stimuli. However, it remains unclear whether cross-modal plasticity also occurs in subcortical pathways. With the use of functional magnetic resonance imaging, auditory responses were compared across individuals with congenital anophthalmia (absence of eyes), those with early onset (in the first few years of life) blindness, and normally sighted individuals. We find that the superior colliculus, a "visual" subcortical structure, is recruited by the auditory system in congenital and early onset blindness. Additionally, auditory subcortical responses to monaural stimuli were altered as a result of blindness. Specifically, responses in the auditory thalamus were equally strong to contralateral and ipsilateral stimulation in both groups of blind subjects, whereas sighted controls showed stronger responses to contralateral stimulation. These findings suggest that early blindness results in substantial reorganization of subcortical auditory responses.

  16. Blind Braille readers mislocate tactile stimuli.

    PubMed

    Sterr, Annette; Green, Lisa; Elbert, Thomas

    2003-05-01

    In a previous experiment, we observed that blind Braille readers produce errors when asked to identify on which finger of one hand a light tactile stimulus had occurred. With the present study, we aimed to specify the characteristics of this perceptual error in blind and sighted participants. The experiment confirmed that blind Braille readers mislocalised tactile stimuli more often than sighted controls, and that the localisation errors occurred significantly more often at the right reading hand than at the non-reading hand. Most importantly, we discovered that the reading fingers showed the smallest error frequency, but the highest rate of stimulus attribution. The dissociation of perceiving and locating tactile stimuli in the blind suggests altered tactile information processing. Neuroplasticity, changes in tactile attention mechanisms as well as the idea that blind persons may employ different strategies for tactile exploration and object localisation are discussed as possible explanations for the results obtained.

  17. Continuous-Variable Blind Quantum Computation

    NASA Astrophysics Data System (ADS)

    Morimae, Tomoyuki

    2012-12-01

    Blind quantum computation is a secure delegated quantum computing protocol where Alice, who does not have sufficient quantum technology at her disposal, delegates her computation to Bob, who has a fully fledged quantum computer, in such a way that Bob cannot learn anything about Alice’s input, output, and algorithm. Protocols of blind quantum computation have been proposed for several qudit measurement-based computation models, such as the graph state model, the Affleck-Kennedy-Lieb-Tasaki model, and the Raussendorf-Harrington-Goyal topological model. Here, we consider blind quantum computation for the continuous-variable measurement-based model. We show that blind quantum computation is possible for the infinite squeezing case. We also show that the finite squeezing causes no additional problem in the blind setup apart from the one inherent to the continuous-variable measurement-based quantum computation.

  18. Efficient Universal Blind Quantum Computation

    NASA Astrophysics Data System (ADS)

    Giovannetti, Vittorio; Maccone, Lorenzo; Morimae, Tomoyuki; Rudolph, Terry G.

    2013-12-01

    We give a cheat sensitive protocol for blind universal quantum computation that is efficient in terms of computational and communication resources: it allows one party to perform an arbitrary computation on a second party’s quantum computer without revealing either which computation is performed, or its input and output. The first party’s computational capabilities can be extremely limited: she must only be able to create and measure single-qubit superposition states. The second party is not required to use measurement-based quantum computation. The protocol requires the (optimal) exchange of O(Jlog⁡2(N)) single-qubit states, where J is the computational depth and N is the number of qubits needed for the computation.

  19. Efficient universal blind quantum computation.

    PubMed

    Giovannetti, Vittorio; Maccone, Lorenzo; Morimae, Tomoyuki; Rudolph, Terry G

    2013-12-06

    We give a cheat sensitive protocol for blind universal quantum computation that is efficient in terms of computational and communication resources: it allows one party to perform an arbitrary computation on a second party's quantum computer without revealing either which computation is performed, or its input and output. The first party's computational capabilities can be extremely limited: she must only be able to create and measure single-qubit superposition states. The second party is not required to use measurement-based quantum computation. The protocol requires the (optimal) exchange of O(Jlog2(N)) single-qubit states, where J is the computational depth and N is the number of qubits needed for the computation.

  20. Auditory display for the blind

    NASA Technical Reports Server (NTRS)

    Fish, R. M. (Inventor)

    1974-01-01

    A system for providing an auditory display of two-dimensional patterns as an aid to the blind is described. It includes a scanning device for producing first and second voltages respectively indicative of the vertical and horizontal positions of the scan and a further voltage indicative of the intensity at each point of the scan and hence of the presence or absence of the pattern at that point. The voltage related to scan intensity controls transmission of the sounds to the subject so that the subject knows that a portion of the pattern is being encountered by the scan when a tone is heard, the subject determining the position of this portion of the pattern in space by the frequency and interaural difference information contained in the tone.