Sample records for computer character credibility

  1. Would a madman have been so wise as this?" The effects of source credibility and message credibility on validation.

    PubMed

    Foy, Jeffrey E; LoCasto, Paul C; Briner, Stephen W; Dyar, Samantha

    2017-02-01

    Readers rapidly check new information against prior knowledge during validation, but research is inconsistent as to whether source credibility affects validation. We argue that readers are likely to accept highly plausible assertions regardless of source, but that high source credibility may boost acceptance of claims that are less plausible based on general world knowledge. In Experiment 1, participants read narratives with assertions for which the plausibility varied depending on the source. For high credibility sources, we found that readers were faster to read information confirming these assertions relative to contradictory information. We found the opposite patterns for low credibility characters. In Experiment 2, readers read claims from the same high or low credibility sources, but the claims were always plausible based on general world knowledge. Readers consistently took longer to read contradictory information, regardless of source. In Experiment 3, participants read modified versions of "The Tell-Tale Heart," which was narrated entirely by an unreliable source. We manipulated the plausibility of a target event, as well as whether high credibility characters within the story provided confirmatory or contradictory information about the narrator's description of the target event. Though readers rated the narrator as being insane, they were more likely to believe the narrator's assertions about the target event when it was plausible and corroborated by other characters. We argue that sourcing research would benefit from focusing on the relationship between source credibility, message credibility, and multiple sources within a text.

  2. Enhancing Student Perceptions of Fairness: The Relationship between Instructor Credibility and Classroom Justice

    ERIC Educational Resources Information Center

    Chory, Rebecca M.

    2007-01-01

    The present study investigated the relationships between college students' perceptions of instructor credibility (competence, character, and caring) and their perceptions of classroom justice (distributive, procedural, and interactional justice). Results indicate that perceptions of instructor credibility positively predicted perceptions of…

  3. The Importance of Being…Social? Instructor Credibility and the Millennials

    ERIC Educational Resources Information Center

    Gerhardt, Megan W.

    2016-01-01

    Using the framework of generational identity, the current study explores how a range of characteristics impact Millennial perceptions of instructor credibility. Millennial Generation student ratings of the impact of competence, character, and sociability on instructor credibility were compared to faculty ratings of the same characteristics.…

  4. Mapping wilderness character in Denali National Park and Preserve

    Treesearch

    Rob Burrows; James Tricker; Dan Abbe; Peter Landres; Jon Paynter; David Schirokauer; Philip Hooge

    2016-01-01

    The recent development of an interagency strategy to monitor wilderness character allows on-the-ground managers and decision-makers to assess whether stewardship actions for an individual wilderness are fulfilling the legislative mandate to "preserve wilderness character." By using credible data that are consistently collected, one can assess how wilderness...

  5. User Demographics for Embodiment Customization

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cowell, Andrew J.; Stanney, Kay M.

    Attempts at interface agent personalization are usually aimed at helping the user perform a task or service. For example,scheduling of appointments, inspection of messages, discovering items of interest and different forms of negotiation. While this is very noble undertaking, it makes assumptions about the level of trust and credibility a user may place in such an agent in a realworld setting. If Microsoft's experiments in social user interfaces teach us anything, it is that a ''one size fits all'' solution does not truly engage the user and encourage reuse. This ''relationship management'' between the user and the character begins whenmore » the two first meet. As with human-human relationships, first impressions are essential. Instead of looking at the functional aspects of the relationship, we believe the characters embodiment is the best place to start the personalization process. We describe a study in which participants from several different age ranges,genders and ethnic groups were asked their preference of anthropomorphic character, based on a cooperative computer task. We found that participants generally selected characters from the same ethic group as themselves and that almost all participants selected a young character (instead of a middle aged or elderly character). No significant preference was found for character gender.« less

  6. Three common faults in current practice that influence the validity of data obtained from electronic air pollution instrumentation.

    PubMed

    Dowd, G; Thomas, R S; Monkman, J L

    1975-01-01

    Instrumental development is now entering a more logical era, where the former artistic character of electronics is being replaced by cold technology. Because of this, one should be expect more reliability; however, there still exist many weak links in practical application. Digital readout systems and computer processing induce a false sense of security. In reality, it is the sample-measurement relationship that determines an instrument's credibility and not the number of digits on its meter. In describing three faulty practices that greatly influence an instrument's performance, it is hoped that measurement may be more closely related to the sample!

  7. Predictors of premature termination from psychotherapy for anorexia nervosa: Low treatment credibility, early therapy alliance, and self-transcendence.

    PubMed

    Jordan, Jennifer; McIntosh, Virginia V W; Carter, Frances A; Joyce, Peter R; Frampton, Christopher M A; Luty, Suzanne E; McKenzie, Janice M; Carter, Janet D; Bulik, Cynthia M

    2017-08-01

    Failure to complete treatment for anorexia nervosa (AN) is- common, clinically concerning but difficult to predict. This study examines whether therapy-related factors (patient-rated pretreatment credibility and early therapeutic alliance) predict subsequent premature termination of treatment (PTT) alongside self-transcendence (a previously identified clinical predictor) in women with AN. 56 women aged 17-40 years participating in a randomized outpatient psychotherapy trial for AN. Treatment completion was defined as attending 15/20 planned sessions. Measures were the Treatment Credibility, Temperament and Character Inventory, Vanderbilt Therapeutic Alliance Scale and the Vanderbilt Psychotherapy Process Scale. Statistics were univariate tests, correlations, and logistic regression. Treatment credibility and certain early patient and therapist alliance/process subscales predicted PTT. Lower self-transcendence and lower early process accounted for 33% of the variance in predicting PTT. Routine assessment of treatment credibility and early process (comprehensively assessed from multiple perspectives) may help clinicians reduce PTT thereby enhancing treatment outcomes. © 2017 Wiley Periodicals, Inc.

  8. How jurors use and misuse character evidence.

    PubMed

    Hunt, Jennifer S; Budesheim, Thomas Lee

    2004-04-01

    The Federal Rules of Evidence allow defendants to offer testimony about their good character, but that testimony can be impeached with cross-examination or a rebuttal witness. It is assumed that jurors use the defense's character evidence (CE) to form guilt and conviction judgments but use impeachment evidence only to assess the character witness's credibility. Two experiments tested these assumptions by presenting mock jurors with various forms of CE and impeachment. Participants made trait ratings for the character witness and defendant and guilt and conviction judgments. Positive CE did not affect guilt or conviction judgments, but cross-examination caused a backlash in which judgments were harsher than when no CE was given. Using path analysis, the authors tested a model of the process by which CE and impeachment affect defendant and witness impressions and guilt and conviction judgments. Implications for juror decision making are discussed.

  9. Big Mysteries: Extra Dimensions

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lincoln, Don

    2014-06-10

    The weakness of gravity compared to the other subatomic forces is a real mystery. While nobody knows the answer, one credible solution is that gravity has access to more spatial dimensions than the other three known forces. In this video, Fermilab's Dr. Don Lincoln describes this idea, with the help of some very urbane characters.

  10. Big Mysteries: Extra Dimensions

    ScienceCinema

    Lincoln, Don

    2018-01-16

    The weakness of gravity compared to the other subatomic forces is a real mystery. While nobody knows the answer, one credible solution is that gravity has access to more spatial dimensions than the other three known forces. In this video, Fermilab's Dr. Don Lincoln describes this idea, with the help of some very urbane characters.

  11. Web Site Credibility: Why Do People Believe What They Believe?

    ERIC Educational Resources Information Center

    Iding, Marie K.; Crosby, Martha E.; Auernheimer, Brent; Klemm, E. Barbara

    2009-01-01

    This research investigates university students' determinations of credibility of information on Web sites, confidence in their determinations, and perceptions of Web site authors' vested interests. In Study 1, university-level computer science and education students selected Web sites determined to be credible and Web sites that exemplified…

  12. Professionalism in Computer Forensics

    NASA Astrophysics Data System (ADS)

    Irons, Alastair D.; Konstadopoulou, Anastasia

    The paper seeks to address the need to consider issues regarding professionalism in computer forensics in order to allow the discipline to develop and to ensure the credibility of the discipline from the differing perspectives of practitioners, the criminal justice system and in the eyes of the public. There is a need to examine and develop professionalism in computer forensics in order to promote the discipline and maintain the credibility of the discipline.

  13. Credibility and Accountability in Academic Discourse: Increasing the Awareness of Ghanaian Graduate Students

    ERIC Educational Resources Information Center

    Adika, Gordon S. K.

    2015-01-01

    Drawing from a social constructionist perspective to written scholarly communication, this paper argues that training in academic writing for students in higher education especially in second language contexts should go beyond emphasis on grammatical correctness and paragraphing strategies, and also focus on the rhetorical character of academic…

  14. Philosopher to Moderator: The Shifting Paradigm of "Ethos" in Education.

    ERIC Educational Resources Information Center

    Raign, Kathryn Rosser

    The classical concept of "ethos" (the establishing of the speaker or writer's credibility, his or her moral character) has acquired many meanings over the centuries and has played an important role in determining the many shifting perceptions of the teacher's role, both in the classical period and the modern period. The issue can be…

  15. Credibility Assessment of Deterministic Computational Models and Simulations for Space Biomedical Research and Operations

    NASA Technical Reports Server (NTRS)

    Mulugeta, Lealem; Walton, Marlei; Nelson, Emily; Myers, Jerry

    2015-01-01

    Human missions beyond low earth orbit to destinations, such as to Mars and asteroids will expose astronauts to novel operational conditions that may pose health risks that are currently not well understood and perhaps unanticipated. In addition, there are limited clinical and research data to inform development and implementation of health risk countermeasures for these missions. Consequently, NASA's Digital Astronaut Project (DAP) is working to develop and implement computational models and simulations (M&S) to help predict and assess spaceflight health and performance risks, and enhance countermeasure development. In order to effectively accomplish these goals, the DAP evaluates its models and simulations via a rigorous verification, validation and credibility assessment process to ensure that the computational tools are sufficiently reliable to both inform research intended to mitigate potential risk as well as guide countermeasure development. In doing so, DAP works closely with end-users, such as space life science researchers, to establish appropriate M&S credibility thresholds. We will present and demonstrate the process the DAP uses to vet computational M&S for space biomedical analysis using real M&S examples. We will also provide recommendations on how the larger space biomedical community can employ these concepts to enhance the credibility of their M&S codes.

  16. The aerospace plane design challenge: Credible computational fluid dynamics results

    NASA Technical Reports Server (NTRS)

    Mehta, Unmeel B.

    1990-01-01

    Computational fluid dynamics (CFD) is necessary in the design processes of all current aerospace plane programs. Single-stage-to-orbit (STTO) aerospace planes with air-breathing supersonic combustion are going to be largely designed by means of CFD. The challenge of the aerospace plane design is to provide credible CFD results to work from, to assess the risk associated with the use of those results, and to certify CFD codes that produce credible results. To establish the credibility of CFD results used in design, the following topics are discussed: CFD validation vis-a-vis measurable fluid dynamics (MFD) validation; responsibility for credibility; credibility requirement; and a guide for establishing credibility. Quantification of CFD uncertainties helps to assess success risk and safety risks, and the development of CFD as a design tool requires code certification. This challenge is managed by designing the designers to use CFD effectively, by ensuring quality control, and by balancing the design process. For designing the designers, the following topics are discussed: how CFD design technology is developed; the reasons Japanese companies, by and large, produce goods of higher quality than the U.S. counterparts; teamwork as a new way of doing business; and how ideas, quality, and teaming can be brought together. Quality control for reducing the loss imparted to the society begins with the quality of the CFD results used in the design process, and balancing the design process means using a judicious balance of CFD and MFD.

  17. Magnetohydrodynamic Simulation of a Streamer Beside a Realistic Coronal Hole

    NASA Technical Reports Server (NTRS)

    Suess, S. T.; Wu, S. T.; Wang, A. H.; Poletto, G.

    1994-01-01

    Existing models of coronal streamers establish their credibility and act as the initial state for transients. The models have produced satisfactory streamer simulations, but unsatisfactory coronal hole simulations. This is a consequence of the character of the models and the boundary conditions. The models all have higher densities in the magnetically open regions than occur in coronal holes (Noci, et al., 1993).

  18. NATOs Deterrence Strategy is Failing. The Enhanced Forward Presence: Delusion or Renewal

    DTIC Science & Technology

    2018-04-20

    can credibly deter Russia. NATO, Enhanced Forward Presence, Deterrence, Multi -Domain Battle, Russia, Baltics Unclassified Unclassified Unclassified...Strategy. The contents of this paper reflect my own personal views and are not necessarily endorsed by the Joint Forces Staff College or the Department... multi -domain capabilities . . . [and] control information,”5 but in response, NATO has struggled to convincingly adjust to this changing character

  19. Credibility, Replicability, and Reproducibility in Simulation for Biomedicine and Clinical Applications in Neuroscience

    PubMed Central

    Mulugeta, Lealem; Drach, Andrew; Erdemir, Ahmet; Hunt, C. A.; Horner, Marc; Ku, Joy P.; Myers Jr., Jerry G.; Vadigepalli, Rajanikanth; Lytton, William W.

    2018-01-01

    Modeling and simulation in computational neuroscience is currently a research enterprise to better understand neural systems. It is not yet directly applicable to the problems of patients with brain disease. To be used for clinical applications, there must not only be considerable progress in the field but also a concerted effort to use best practices in order to demonstrate model credibility to regulatory bodies, to clinics and hospitals, to doctors, and to patients. In doing this for neuroscience, we can learn lessons from long-standing practices in other areas of simulation (aircraft, computer chips), from software engineering, and from other biomedical disciplines. In this manuscript, we introduce some basic concepts that will be important in the development of credible clinical neuroscience models: reproducibility and replicability; verification and validation; model configuration; and procedures and processes for credible mechanistic multiscale modeling. We also discuss how garnering strong community involvement can promote model credibility. Finally, in addition to direct usage with patients, we note the potential for simulation usage in the area of Simulation-Based Medical Education, an area which to date has been primarily reliant on physical models (mannequins) and scenario-based simulations rather than on numerical simulations. PMID:29713272

  20. Credibility, Replicability, and Reproducibility in Simulation for Biomedicine and Clinical Applications in Neuroscience.

    PubMed

    Mulugeta, Lealem; Drach, Andrew; Erdemir, Ahmet; Hunt, C A; Horner, Marc; Ku, Joy P; Myers, Jerry G; Vadigepalli, Rajanikanth; Lytton, William W

    2018-01-01

    Modeling and simulation in computational neuroscience is currently a research enterprise to better understand neural systems. It is not yet directly applicable to the problems of patients with brain disease. To be used for clinical applications, there must not only be considerable progress in the field but also a concerted effort to use best practices in order to demonstrate model credibility to regulatory bodies, to clinics and hospitals, to doctors, and to patients. In doing this for neuroscience, we can learn lessons from long-standing practices in other areas of simulation (aircraft, computer chips), from software engineering, and from other biomedical disciplines. In this manuscript, we introduce some basic concepts that will be important in the development of credible clinical neuroscience models: reproducibility and replicability; verification and validation; model configuration; and procedures and processes for credible mechanistic multiscale modeling. We also discuss how garnering strong community involvement can promote model credibility. Finally, in addition to direct usage with patients, we note the potential for simulation usage in the area of Simulation-Based Medical Education, an area which to date has been primarily reliant on physical models (mannequins) and scenario-based simulations rather than on numerical simulations.

  1. Computer-Mediated Materials for Chinese Character Learning.

    ERIC Educational Resources Information Center

    Hsu, Hui-Mei; Gao, Liwei

    2002-01-01

    Reviews four sets of computer-mediated materials for Chinese character learning. These include the following: Write Chinese, Chinese Characters Primer, Animated Chinese Characters, and USC Chinese Character Page. (Author/VWL)

  2. The Communicative Function of Sad Facial Expressions.

    PubMed

    Reed, Lawrence Ian; DeScioli, Peter

    2017-01-01

    What are the communicative functions of sad facial expressions? Research shows that people feel sadness in response to losses but it's unclear whether sad expressions function to communicate losses to others and if so, what makes these signals credible. Here we use economic games to test the hypothesis that sad expressions lend credibility to claims of loss. Participants play the role of either a proposer or recipient in a game with a fictional backstory and real monetary payoffs. The proposers view a (fictional) video of the recipient's character displaying either a neutral or sad expression paired with a claim of loss. The proposer then decided how much money to give to the recipient. In three experiments, we test alternative theories by using situations in which the recipient's losses were uncertain (Experiment 1), the recipient's losses were certain (Experiment 2), or the recipient claims failed gains rather than losses (Experiment 3). Overall, we find that participants gave more money to recipients who displayed sad expressions compared to neutral expressions, but only under conditions of uncertain loss. This finding supports the hypothesis that sad expressions function to increase the credibility of claims of loss.

  3. The Effects of Teacher Self-Disclosure via "Facebook" on Teacher Credibility

    ERIC Educational Resources Information Center

    Mazer, Joseph P.; Murphy, Richard E.; Simonds, Cheri J.

    2009-01-01

    Research suggests that teachers who personalize their teaching through the use of humor, stories, enthusiasm, and self-disclosure are perceived by their students to be effective in explaining course content. This experimental study examined the effects of computer-mediated teacher self-disclosure on perceptions of teacher credibility. Participants…

  4. Pals in power armor: attribution of human-like emotions to video game characters in an ingroup/outgroup situation.

    PubMed

    Besmann, Anna; Rios, Kimberly

    2012-08-01

    Previous research has demonstrated the tendency for humans to anthropomorphize computers-that is, to react to computers as social actors, despite knowing that the computers are mere machines. In the present research, we examined the attribution of both primary (non-uniquely human) and secondary (human-like) emotions to ingroup (teammate) and outgroup (opponent) computer-controlled characters in a video game. We found that participants perceived the teammate character as experiencing more secondary emotions than the opponent character, but that they perceived the teammate and opponent character as experiencing equal levels of primary emotions. Thus, participants anthropomorphized the ingroup character to a greater extent than the outgroup character. These results imply that computers' "emotions" are treated with a similar ingroup/outgroup social regard as the emotions of actual humans.

  5. Integration of individual and social information for decision-making in groups of different sizes.

    PubMed

    Park, Seongmin A; Goïame, Sidney; O'Connor, David A; Dreher, Jean-Claude

    2017-06-01

    When making judgments in a group, individuals often revise their initial beliefs about the best judgment to make given what others believe. Despite the ubiquity of this phenomenon, we know little about how the brain updates beliefs when integrating personal judgments (individual information) with those of others (social information). Here, we investigated the neurocomputational mechanisms of how we adapt our judgments to those made by groups of different sizes, in the context of jury decisions for a criminal. By testing different theoretical models, we showed that a social Bayesian inference model captured changes in judgments better than 2 other models. Our results showed that participants updated their beliefs by appropriately weighting individual and social sources of information according to their respective credibility. When investigating 2 fundamental computations of Bayesian inference, belief updates and credibility estimates of social information, we found that the dorsal anterior cingulate cortex (dACC) computed the level of belief updates, while the bilateral frontopolar cortex (FPC) was more engaged in individuals who assigned a greater credibility to the judgments of a larger group. Moreover, increased functional connectivity between these 2 brain regions reflected a greater influence of group size on the relative credibility of social information. These results provide a mechanistic understanding of the computational roles of the FPC-dACC network in steering judgment adaptation to a group's opinion. Taken together, these findings provide a computational account of how the human brain integrates individual and social information for decision-making in groups.

  6. Editorial: Logos, Ethos and Pathos: Whither academia and public health in a post-truth world?

    PubMed

    Robinson, Peter G

    2018-01-01

    Rhetoric tells us there are three approaches to persuasive argument; logos, ethos and pathos (Bernanke, 2010). Logos is the appeal to logic by use of facts, data and analogies. Ethos is ethical appeal, focusing on the author's credibility or character with allied use of audience appropriate language and grammar. Pathos relates to emotional appeal by invoking sympathy, fear and anger. Copyright© 2018 Dennis Barber Ltd.

  7. Excess Claims and Data Trimming in the Context of Credibility Rating Procedures,

    DTIC Science & Technology

    1981-11-01

    Triining in the Context of Credibility Rating Procedures by Hans BShlmann, Alois Gisler, William S. Jewell* 1. Motivation In Ratemaking and in Experience...work on the ETH computer. __.1: " Zen * ’ ’ II / -2- 2. The Basic Model Throughout the paper we work with the most simple model in the credibility...additional structure are summed up by stating that the density -3- f 8 (x) has the following form 1) fe(x) -(1-r)po (x/e) + rape(x) 3. The Basic Problem As

  8. Credibility judgments in web page design - a brief review.

    PubMed

    Selejan, O; Muresanu, D F; Popa, L; Muresanu-Oloeriu, I; Iudean, D; Buzoianu, A; Suciu, S

    2016-01-01

    Today, more than ever, knowledge that interfaces appearance analysis is a crucial point in human-computer interaction field has been accepted. As nowadays virtually anyone can publish information on the web, the credibility role has grown increasingly important in relation to the web-based content. Areas like trust, credibility, and behavior, doubled by overall impression and user expectation are today in the spotlight of research compared to the last period, when other pragmatic areas such as usability and utility were considered. Credibility has been discussed as a theoretical construct in the field of communication in the past decades and revealed that people tend to evaluate the credibility of communication primarily by the communicator's expertise. Other factors involved in the content communication process are trustworthiness and dynamism as well as various other criteria but to a lower extent. In this brief review, factors like web page aesthetics, browsing experiences and user experience are considered.

  9. Credibility judgments in web page design – a brief review

    PubMed Central

    Selejan, O; Muresanu, DF; Popa, L; Muresanu-Oloeriu, I; Iudean, D; Buzoianu, A; Suciu, S

    2016-01-01

    Today, more than ever, knowledge that interfaces appearance analysis is a crucial point in human-computer interaction field has been accepted. As nowadays virtually anyone can publish information on the web, the credibility role has grown increasingly important in relation to the web-based content. Areas like trust, credibility, and behavior, doubled by overall impression and user expectation are today in the spotlight of research compared to the last period, when other pragmatic areas such as usability and utility were considered. Credibility has been discussed as a theoretical construct in the field of communication in the past decades and revealed that people tend to evaluate the credibility of communication primarily by the communicator’s expertise. Other factors involved in the content communication process are trustworthiness and dynamism as well as various other criteria but to a lower extent. In this brief review, factors like web page aesthetics, browsing experiences and user experience are considered. PMID:27453738

  10. A mixed methods evaluation of televised health promotion advertisements targeted at older adults

    PubMed Central

    Berry, Tanya R.; Spence, John C.; Plotnikoff, Ronald C.; Bauman, Adrian; McCargar, Linda; Witcher, Chad; Clark, Marianne; Stolp, Sean

    2016-01-01

    The purpose of this research was to evaluate television advertisements targeted at 55–70-year olds that promoted physical activity and fruit and vegetable consumption. Awareness of the campaign, perceived credibility of the source, intentions to visit a promoted website, and intentions to perform the healthy behaviors were evaluated using mixed methods research. Results from a population level survey (n = 1600) showed low unprompted and prompted awareness of the campaign and no differences in intentions or behaviors among those who were aware of the campaign. Unprompted recall resulted in a very wide range of responses including the citation of many commercial advertisers. Qualitative themes that emerged from the focus groups included neutral, positive, and negative comments about the advertisements, source credibility, website considerations specific to seniors, and suggestions about appropriate advertising for older adults. This research showed that the increased attention paid to the advertisements was due in a large part to negative reactions to the character used in the advertisements. Another important finding was the government was not considered to be a credible source of health information. Finally, health promoters should be cautious about websites as the primary source of information, particularly for older adults. PMID:19493572

  11. Constructing Stylish Characters on Computer Graphics Systems.

    ERIC Educational Resources Information Center

    Goldman, Gary S.

    1980-01-01

    Computer graphics systems typically produce a single, machine-like character font. At most, these systems enable the user to (1) alter the aspect ratio (height-to-width ratio) of the characters, (2) specify a transformation matrix to slant the characters, and (3) define a virtual pen table to change the lineweight of the plotted characters.…

  12. Uncertainty quantification's role in modeling and simulation planning, and credibility assessment through the predictive capability maturity model

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rider, William J.; Witkowski, Walter R.; Mousseau, Vincent Andrew

    2016-04-13

    The importance of credible, trustworthy numerical simulations is obvious especially when using the results for making high-consequence decisions. Determining the credibility of such numerical predictions is much more difficult and requires a systematic approach to assessing predictive capability, associated uncertainties and overall confidence in the computational simulation process for the intended use of the model. This process begins with an evaluation of the computational modeling of the identified, important physics of the simulation for its intended use. This is commonly done through a Phenomena Identification Ranking Table (PIRT). Then an assessment of the evidence basis supporting the ability to computationallymore » simulate these physics can be performed using various frameworks such as the Predictive Capability Maturity Model (PCMM). There were several critical activities that follow in the areas of code and solution verification, validation and uncertainty quantification, which will be described in detail in the following sections. Here, we introduce the subject matter for general applications but specifics are given for the failure prediction project. In addition, the first task that must be completed in the verification & validation procedure is to perform a credibility assessment to fully understand the requirements and limitations of the current computational simulation capability for the specific application intended use. The PIRT and PCMM are tools used at Sandia National Laboratories (SNL) to provide a consistent manner to perform such an assessment. Ideally, all stakeholders should be represented and contribute to perform an accurate credibility assessment. PIRTs and PCMMs are both described in brief detail below and the resulting assessments for an example project are given.« less

  13. Integration of individual and social information for decision-making in groups of different sizes

    PubMed Central

    Goïame, Sidney; O'Connor, David A.; Dreher, Jean-Claude

    2017-01-01

    When making judgments in a group, individuals often revise their initial beliefs about the best judgment to make given what others believe. Despite the ubiquity of this phenomenon, we know little about how the brain updates beliefs when integrating personal judgments (individual information) with those of others (social information). Here, we investigated the neurocomputational mechanisms of how we adapt our judgments to those made by groups of different sizes, in the context of jury decisions for a criminal. By testing different theoretical models, we showed that a social Bayesian inference model captured changes in judgments better than 2 other models. Our results showed that participants updated their beliefs by appropriately weighting individual and social sources of information according to their respective credibility. When investigating 2 fundamental computations of Bayesian inference, belief updates and credibility estimates of social information, we found that the dorsal anterior cingulate cortex (dACC) computed the level of belief updates, while the bilateral frontopolar cortex (FPC) was more engaged in individuals who assigned a greater credibility to the judgments of a larger group. Moreover, increased functional connectivity between these 2 brain regions reflected a greater influence of group size on the relative credibility of social information. These results provide a mechanistic understanding of the computational roles of the FPC-dACC network in steering judgment adaptation to a group’s opinion. Taken together, these findings provide a computational account of how the human brain integrates individual and social information for decision-making in groups. PMID:28658252

  14. C-CAT: a computer software used to analyze and select Chinese characters and character components for psychological research.

    PubMed

    Lo, Ming; Hue, Chih-Wei

    2008-11-01

    The Character-Component Analysis Toolkit (C-CAT) software was designed to assist researchers in constructing experimental materials using traditional Chinese characters. The software package contains two sets of character stocks: one suitable for research using literate adults as subjects and one suitable for research using schoolchildren as subjects. The software can identify linguistic properties, such as the number of strokes contained, the character-component pronunciation regularity, and the arrangement of character components within a character. Moreover, it can compute a character's linguistic frequency, neighborhood size, and phonetic validity with respect to a user-selected character stock. It can also search the selected character stock for similar characters or for character components with user-specified linguistic properties.

  15. Scene text detection via extremal region based double threshold convolutional network classification

    PubMed Central

    Zhu, Wei; Lou, Jing; Chen, Longtao; Xia, Qingyuan

    2017-01-01

    In this paper, we present a robust text detection approach in natural images which is based on region proposal mechanism. A powerful low-level detector named saliency enhanced-MSER extended from the widely-used MSER is proposed by incorporating saliency detection methods, which ensures a high recall rate. Given a natural image, character candidates are extracted from three channels in a perception-based illumination invariant color space by saliency-enhanced MSER algorithm. A discriminative convolutional neural network (CNN) is jointly trained with multi-level information including pixel-level and character-level information as character candidate classifier. Each image patch is classified as strong text, weak text and non-text by double threshold filtering instead of conventional one-step classification, leveraging confident scores obtained via CNN. To further prune non-text regions, we develop a recursive neighborhood search algorithm to track credible texts from weak text set. Finally, characters are grouped into text lines using heuristic features such as spatial location, size, color, and stroke width. We compare our approach with several state-of-the-art methods, and experiments show that our method achieves competitive performance on public datasets ICDAR 2011 and ICDAR 2013. PMID:28820891

  16. Computer-Generated, Three-Dimensional Character Animation: A Report and Analysis.

    ERIC Educational Resources Information Center

    Kingsbury, Douglas Lee

    This master's thesis details the experience gathered in the production "Snoot and Muttly," a short character animation with 3-D computer generated images, and provides an analysis of the computer-generated 3-D character animation system capabilities. Descriptions are provided of the animation environment at the Ohio State University…

  17. The Misplaced Ruse: Strategic Military Deception as a Tool in Low-Intensity Conflict

    DTIC Science & Technology

    2016-05-20

    potential in not just low-intensity conflict but in warfare in general. Levels of War Tactical 6 JP 1-02, Department of Defense (DoD) Dictionary of...number of other objects and “ pocket litter” that would lend credibility and legitimacy to the character and identity of the body. These things...included a ticket stub from a movie theater, receipts from various stores, and other personal belongings that one may have in their pocket and forget

  18. Verification, Validation and Credibility Assessment of a Computational Model of the Advanced Resistive Exercise Device (ARED)

    NASA Technical Reports Server (NTRS)

    Werner, C. R.; Humphreys, B. T.; Mulugeta, L.

    2014-01-01

    The Advanced Resistive Exercise Device (ARED) is the resistive exercise device used by astronauts on the International Space Station (ISS) to mitigate bone loss and muscle atrophy due to extended exposure to microgravity (micro g). The Digital Astronaut Project (DAP) has developed a multi-body dynamics model of biomechanics models for use in spaceflight exercise physiology research and operations. In an effort to advance model maturity and credibility of the ARED model, the DAP performed verification, validation and credibility (VV and C) assessment of the analyses of the model in accordance to NASA-STD-7009 'Standards for Models and Simulations'.

  19. Feasibility Study of an Interactive Multimedia Electronic Problem Solving Treatment Program for Depression: A Preliminary Uncontrolled Trial

    PubMed Central

    Berman, Margit I.; Jr., Jay C. Buckey; Hull, Jay G.; Linardatos, Eftihia; Song, Sueyoung L.; McLellan, Robert K.; Hegel, Mark T.

    2014-01-01

    Computer-based depression interventions lacking live therapist support have difficulty engaging users. This study evaluated the usability, acceptability, credibility, therapeutic alliance and efficacy of a stand-alone multimedia, interactive, computer-based Problem Solving Treatment program (ePST™) for depression. The program simulated live treatment from an expert PST therapist, and delivered 6 ePST™ sessions over 9 weeks. Twenty-nine participants with moderate-severe symptoms received the intervention; 23 completed a mini mally adequate dose of ePST™ (at least 4 sessions). Program usability, acceptability, credibility, and therapeutic alliance were assessed at treatment midpoint and endpoint. Depressive symptoms and health-related functioning were assessed at baseline, treatment midpoint (4 weeks), and study endpoint (10 weeks). Depression outcomes and therapeutic alliance ratings were also compared to previously published research on live PST and computer-based depression therapy. Participants rated the program as highly usable, acceptable, and credible, and reported a therapeutic alliance with the program comparable to that observed in live therapy. Depressive symptoms improved significantly over time. These findings also provide preliminary evidence that ePST™ may be effective as a depression treatment. Larger clinical trials with diverse samples are indicated. PMID:24680231

  20. Being There in the Midst of the Story: How Immersive Journalism Affects Our Perceptions and Cognitions.

    PubMed

    Sundar, S Shyam; Kang, Jin; Oprean, Danielle

    2017-11-01

    Immersive journalism in the form of virtual reality (VR) headsets and 360°-video is becoming more mainstream and is much touted for inducing greater "presence" than traditional text. But, does this presence influence psychological outcomes of reading news, such as memory for story content, perceptions of credibility, and empathy felt toward story characters? We propose that two key technological affordances of VR (modality and interactivity) are responsible for triggering three presence-related cognitive heuristics (being-there, interaction, and realism), which influence news readers' memory and their perceptions of credibility, empathy, and story-sharing intentions. We report a 3 (storytelling medium: VR vs. 360°-video vs. Text) × 2 (story: "The displaced" and "The click effect") mixed-factorial experiment, in which participants (N = 129) experienced two New York Times stories (that differed in their emotional intensity) using one of the three mediums (VR, 360°-video, Text). Participants who experienced the stories using VR and 360°-video outperformed those who read the same stories using text with pictures, not only on such presence-related outcomes as being-there, interaction, and realism, but also on perceived source credibility, story-sharing intention, and feelings of empathy. Moreover, we found that senses of being-there, interaction, and realism mediated the relationship between storytelling medium and reader perceptions of credibility, story recall, and story-sharing intention. These findings have theoretical implications for the psychology of virtual reality, and practical applications for immersive journalism in particular and interactive media in general.

  1. Computer System Performance Measurement Techniques for ARTS III Computer Systems

    DOT National Transportation Integrated Search

    1973-12-01

    The potential contribution of direct system measurement in the evolving ARTS 3 Program is discussed and software performance measurement techniques are comparatively assessed in terms of credibility of results, ease of implementation, volume of data,...

  2. Uppercase and lowercase computer printout increases readability

    NASA Technical Reports Server (NTRS)

    Hand, W. W.; Jonsberg, M. B.

    1965-01-01

    Print chain of 120 characters facilitates production of computer printout in both uppercase and lowercase characters. Although the output speed is reduced, the use of the print chain increases the computer printout readability.

  3. Computer-Generated, Three-Dimensional Character Animation.

    ERIC Educational Resources Information Center

    Van Baerle, Susan Lynn

    This master's thesis begins by discussing the differences between 3-D computer animation of solid three-dimensional, or monolithic, objects, and the animation of characters, i.e., collections of movable parts with soft pliable surfaces. Principles from two-dimensional character animation that can be transferred to three-dimensional character…

  4. Validation and Trustworthiness of Multiscale Models of Cardiac Electrophysiology

    PubMed Central

    Pathmanathan, Pras; Gray, Richard A.

    2018-01-01

    Computational models of cardiac electrophysiology have a long history in basic science applications and device design and evaluation, but have significant potential for clinical applications in all areas of cardiovascular medicine, including functional imaging and mapping, drug safety evaluation, disease diagnosis, patient selection, and therapy optimisation or personalisation. For all stakeholders to be confident in model-based clinical decisions, cardiac electrophysiological (CEP) models must be demonstrated to be trustworthy and reliable. Credibility, that is, the belief in the predictive capability, of a computational model is primarily established by performing validation, in which model predictions are compared to experimental or clinical data. However, there are numerous challenges to performing validation for highly complex multi-scale physiological models such as CEP models. As a result, credibility of CEP model predictions is usually founded upon a wide range of distinct factors, including various types of validation results, underlying theory, evidence supporting model assumptions, evidence from model calibration, all at a variety of scales from ion channel to cell to organ. Consequently, it is often unclear, or a matter for debate, the extent to which a CEP model can be trusted for a given application. The aim of this article is to clarify potential rationale for the trustworthiness of CEP models by reviewing evidence that has been (or could be) presented to support their credibility. We specifically address the complexity and multi-scale nature of CEP models which makes traditional model evaluation difficult. In addition, we make explicit some of the credibility justification that we believe is implicitly embedded in the CEP modeling literature. Overall, we provide a fresh perspective to CEP model credibility, and build a depiction and categorisation of the wide-ranging body of credibility evidence for CEP models. This paper also represents a step toward the extension of model evaluation methodologies that are currently being developed by the medical device community, to physiological models. PMID:29497385

  5. 75 FR 79035 - Nationally Recognized Testing Laboratories; Supplier's Declaration of Conformity

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-17

    ... statistic, however, covers only a narrow subset of ICT equipment, and excludes laptop computers and computer... between 2003 and March of 2009 shows a total of 60 product recalls, including laptop computers, scanners..., statistical or similar data and studies, of a credible nature, supporting any claims made by commenters.'' (73...

  6. Learner Perceptions of Realism and Magic in Computer Simulations.

    ERIC Educational Resources Information Center

    Hennessy, Sara; O'Shea, Tim

    1993-01-01

    Discusses the possible lack of credibility in educational interactive computer simulations. Topics addressed include "Shopping on Mars," a collaborative adventure game for arithmetic calculation that uses direct manipulation in the microworld; the Alternative Reality Kit, a graphical animated environment for creating interactive…

  7. Educational Impact of Digital Visualization Tools on Digital Character Production Computer Science Courses

    ERIC Educational Resources Information Center

    van Langeveld, Mark Christensen

    2009-01-01

    Digital character production courses have traditionally been taught in art departments. The digital character production course at the University of Utah is centered, drawing uniformly from art and engineering disciplines. Its design has evolved to include a synergy of computer science, functional art and human anatomy. It gives students an…

  8. Computer Program To Transliterate Into Arabic

    NASA Technical Reports Server (NTRS)

    Stephan, E.

    1986-01-01

    Conceptual program for TRS-80, Model 12 (or equivalent) computer transliterates from English letters of computer keyboard to Arabic characters in output of associated printer. Program automatically changes character sequence from left-to-right of English to right-to-left of Arabic.

  9. Trust and Credibility in Web-Based Health Information: A Review and Agenda for Future Research

    PubMed Central

    2017-01-01

    Background Internet sources are becoming increasingly important in seeking health information, such that they may have a significant effect on health care decisions and outcomes. Hence, given the wide range of different sources of Web-based health information (WHI) from different organizations and individuals, it is important to understand how information seekers evaluate and select the sources that they use, and more specifically, how they assess their credibility and trustworthiness. Objective The aim of this study was to review empirical studies on trust and credibility in the use of WHI. The article seeks to present a profile of the research conducted on trust and credibility in WHI seeking, to identify the factors that impact judgments of trustworthiness and credibility, and to explore the role of demographic factors affecting trust formation. On this basis, it aimed to identify the gaps in current knowledge and to propose an agenda for future research. Methods A systematic literature review was conducted. Searches were conducted using a variety of combinations of the terms WHI, trust, credibility, and their variants in four multi-disciplinary and four health-oriented databases. Articles selected were published in English from 2000 onwards; this process generated 3827 unique records. After the application of the exclusion criteria, 73 were analyzed fully. Results Interest in this topic has persisted over the last 15 years, with articles being published in medicine, social science, and computer science and originating mostly from the United States and the United Kingdom. Documents in the final dataset fell into 3 categories: (1) those using trust or credibility as a dependent variable, (2) those using trust or credibility as an independent variable, and (3) studies of the demographic factors that influence the role of trust or credibility in WHI seeking. There is a consensus that website design, clear layout, interactive features, and the authority of the owner have a positive effect on trust or credibility, whereas advertising has a negative effect. With regard to content features, authority of the author, ease of use, and content have a positive effect on trust or credibility formation. Demographic factors influencing trust formation are age, gender, and perceived health status. Conclusions There is considerable scope for further research. This includes increased clarity of the interaction between the variables associated with health information seeking, increased consistency on the measurement of trust and credibility, a greater focus on specific WHI sources, and enhanced understanding of the impact of demographic variables on trust and credibility judgments. PMID:28630033

  10. Emphasizing the only character: emphasis, attention and contrast.

    PubMed

    Chen, Lijing; Yang, Yufang

    2015-03-01

    In conversations, pragmatic information such as emphasis is important for identifying the speaker's/writer's intention. The present research examines the cognitive processes involved in emphasis processing. Participants read short discourses that introduced one or two character(s), with the character being emphasized or non-emphasized in subsequent texts. Eye movements showed that: (1) early processing of the emphasized word was facilitated, which may have been due to increased attention allocation, whereas (2) late integration of the emphasized character was inhibited when the discourse involved only this character. These results indicate that it is necessary to include other characters as contrastive characters to facilitate the integration of an emphasized character, and support the existence of a relationship between Emphasis and Contrast computation. Taken together, our findings indicate that both attention allocation and contrast computation are involved in emphasis processing, and support the incremental nature of sentence processing and the importance of contrast in discourse comprehension. Copyright © 2014 Elsevier B.V. All rights reserved.

  11. Tse computers. [Chinese pictograph character binary image processor design for high speed applications

    NASA Technical Reports Server (NTRS)

    Strong, J. P., III

    1973-01-01

    Tse computers have the potential of operating four or five orders of magnitude faster than present digital computers. The computers of the new design use binary images as their basic computational entity. The word 'tse' is the transliteration of the Chinese word for 'pictograph character.' Tse computers are large collections of devices that perform logical operations on binary images. The operations on binary images are to be performed over the entire image simultaneously.

  12. Mistaking Identities: Challenging Representations of Language, Gender, and Race in High Tech Television Programs.

    ERIC Educational Resources Information Center

    Voithofer, R. J.

    Television programs are increasingly featuring information technologies like computers as significant narrative devices, including the use of computer-based technologies as virtual worlds or environments in which characters interact, the use of computers as tools in problem solving and confronting conflict, and characters that are part human, part…

  13. Micro-Energy Rates for Damage Tolerance and Durability of Composite Structures

    NASA Technical Reports Server (NTRS)

    Chamis, Christos C.; Minnetyan, Levon

    2006-01-01

    In this paper, the adhesive bond strength of lap-jointed graphite/aluminum composites is examined by computational simulation. Computed micro-stress level energy release rates are used to identify the damage mechanisms associated with the corresponding acoustic emission (AE) signals. Computed damage regions are similarly correlated with ultrasonically scanned damage regions. Results show that computational simulation can be used with suitable NDE methods for credible in-service monitoring of composites.

  14. Ubiquitous Computing--Are We Crazy? Point/Counterpoint

    ERIC Educational Resources Information Center

    DeWitt, Scott W.; Horn, Patricia S.

    2005-01-01

    The push for ubiquitous computing (UC) relies on an understandable and well-intentioned belief that teaching and schooling need to be transformed. This view appears credible based on large-scale criteria, such as test scores relative to other countries, drop-out rates, and economic changes. And the use of technology to achieve this goal is…

  15. Indexing and retrieving motions of characters in close contact.

    PubMed

    Ho, Edmond S L; Komura, Taku

    2009-01-01

    Human motion indexing and retrieval are important for animators due to the need to search for motions in the database which can be blended and concatenated. Most of the previous researches of human motion indexing and retrieval compute the Euclidean distance of joint angles or joint positions. Such approaches are difficult to apply for cases in which multiple characters are closely interacting with each other, as the relationships of the characters are not encoded in the representation. In this research, we propose a topology-based approach to index the motions of two human characters in close contact. We compute and encode how the two bodies are tangled based on the concept of rational tangles. The encoded relationships, which we define as TangleList, are used to determine the similarity of the pairs of postures. Using our method, we can index and retrieve motions such as one person piggy-backing another, one person assisting another in walking, and two persons dancing / wrestling. Our method is useful to manage a motion database of multiple characters. We can also produce motion graph structures of two characters closely interacting with each other by interpolating and concatenating topologically similar postures and motion clips, which are applicable to 3D computer games and computer animation.

  16. Trainable multiscript orientation detection

    NASA Astrophysics Data System (ADS)

    Van Beusekom, Joost; Rangoni, Yves; Breuel, Thomas M.

    2010-01-01

    Detecting the correct orientation of document images is an important step in large scale digitization processes, as most subsequent document analysis and optical character recognition methods assume upright position of the document page. Many methods have been proposed to solve the problem, most of which base on ascender to descender ratio computation. Unfortunately, this cannot be used for scripts having no descenders nor ascenders. Therefore, we present a trainable method using character similarity to compute the correct orientation. A connected component based distance measure is computed to compare the characters of the document image to characters whose orientation is known. This allows to detect the orientation for which the distance is lowest as the correct orientation. Training is easily achieved by exchanging the reference characters by characters of the script to be analyzed. Evaluation of the proposed approach showed accuracy of above 99% for Latin and Japanese script from the public UW-III and UW-II datasets. An accuracy of 98.9% was obtained for Fraktur on a non-public dataset. Comparison of the proposed method to two methods using ascender / descender ratio based orientation detection shows a significant improvement.

  17. Trust and Credibility in Web-Based Health Information: A Review and Agenda for Future Research.

    PubMed

    Sbaffi, Laura; Rowley, Jennifer

    2017-06-19

    Internet sources are becoming increasingly important in seeking health information, such that they may have a significant effect on health care decisions and outcomes. Hence, given the wide range of different sources of Web-based health information (WHI) from different organizations and individuals, it is important to understand how information seekers evaluate and select the sources that they use, and more specifically, how they assess their credibility and trustworthiness. The aim of this study was to review empirical studies on trust and credibility in the use of WHI. The article seeks to present a profile of the research conducted on trust and credibility in WHI seeking, to identify the factors that impact judgments of trustworthiness and credibility, and to explore the role of demographic factors affecting trust formation. On this basis, it aimed to identify the gaps in current knowledge and to propose an agenda for future research. A systematic literature review was conducted. Searches were conducted using a variety of combinations of the terms WHI, trust, credibility, and their variants in four multi-disciplinary and four health-oriented databases. Articles selected were published in English from 2000 onwards; this process generated 3827 unique records. After the application of the exclusion criteria, 73 were analyzed fully. Interest in this topic has persisted over the last 15 years, with articles being published in medicine, social science, and computer science and originating mostly from the United States and the United Kingdom. Documents in the final dataset fell into 3 categories: (1) those using trust or credibility as a dependent variable, (2) those using trust or credibility as an independent variable, and (3) studies of the demographic factors that influence the role of trust or credibility in WHI seeking. There is a consensus that website design, clear layout, interactive features, and the authority of the owner have a positive effect on trust or credibility, whereas advertising has a negative effect. With regard to content features, authority of the author, ease of use, and content have a positive effect on trust or credibility formation. Demographic factors influencing trust formation are age, gender, and perceived health status. There is considerable scope for further research. This includes increased clarity of the interaction between the variables associated with health information seeking, increased consistency on the measurement of trust and credibility, a greater focus on specific WHI sources, and enhanced understanding of the impact of demographic variables on trust and credibility judgments. ©Laura Sbaffi, Jennifer Rowley. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 19.06.2017.

  18. A smart sensor architecture based on emergent computation in an array of outer-totalistic cells

    NASA Astrophysics Data System (ADS)

    Dogaru, Radu; Dogaru, Ioana; Glesner, Manfred

    2005-06-01

    A novel smart-sensor architecture is proposed, capable to segment and recognize characters in a monochrome image. It is capable to provide a list of ASCII codes representing the recognized characters from the monochrome visual field. It can operate as a blind's aid or for industrial applications. A bio-inspired cellular model with simple linear neurons was found the best to perform the nontrivial task of cropping isolated compact objects such as handwritten digits or characters. By attaching a simple outer-totalistic cell to each pixel sensor, emergent computation in the resulting cellular automata lattice provides a straightforward and compact solution to the otherwise computationally intensive problem of character segmentation. A simple and robust recognition algorithm is built in a compact sequential controller accessing the array of cells so that the integrated device can provide directly a list of codes of the recognized characters. Preliminary simulation tests indicate good performance and robustness to various distortions of the visual field.

  19. Computer-Mediated Word-of-Mouth Communication: The Influence of Mixed Reviews on Student Perceptions of Instructors and Courses

    ERIC Educational Resources Information Center

    Edwards, Autumn; Edwards, Chad

    2013-01-01

    The purpose of this experiment was to test the influence of mixed reviews appearing as computer-mediated word-of-mouth communication (WOM) on student perceptions of instructors (attractiveness and credibility) and attitudes toward learning course content (affective learning and state motivation). Using the heuristic-systematic processing model, it…

  20. The visual attention saliency map for movie retrospection

    NASA Astrophysics Data System (ADS)

    Rogalska, Anna; Napieralski, Piotr

    2018-04-01

    The visual saliency map is becoming important and challenging for many scientific disciplines (robotic systems, psychophysics, cognitive neuroscience and computer science). Map created by the model indicates possible salient regions by taking into consideration face presence and motion which is essential in motion pictures. By combining we can obtain credible saliency map with a low computational cost.

  1. Beyond 1984: The Positive and Negative Potential of Computer Supported School Focused Information Systems.

    ERIC Educational Resources Information Center

    Klein, Susan S.

    Although educators' use of computers to track student and school information with the attendant positive and negative outcomes is still in an early stage of development, accessible data from such systems could improve the objective rationality of educational and instructional decision-making as long as no one places unwarranted credibility in the…

  2. A Bayesian Interpretation of Data Trimming to Remove Excess Claims. Excess Claims and Data Trimming in the Context of Credibility Rating Procedures.

    DTIC Science & Technology

    1981-12-01

    Gisler, William S. Jewell* 1. Motivation In Ratemaking and in Experience Rating one is often confronted with the dileina of whether or not to fully...are greatly indebted to R. Schnieper who did all the numerical work on the ETE computer. 4 -, -2- 2. The Basic Model Throughout the paper we work...l )~1) f - (1-i0)po (xl) + ipe(X) 3. The Basic Problem As always in the credibility context our aim is to estimate ua(s) based on the observations of

  3. Optical Character Recognition.

    ERIC Educational Resources Information Center

    Converso, L.; Hocek, S.

    1990-01-01

    This paper describes computer-based optical character recognition (OCR) systems, focusing on their components (the computer, the scanner, the OCR, and the output device); how the systems work; and features to consider in selecting a system. A list of 26 questions to ask to evaluate systems for potential purchase is included. (JDD)

  4. [Eye movement study in multiple object search process].

    PubMed

    Xu, Zhaofang; Liu, Zhongqi; Wang, Xingwei; Zhang, Xin

    2017-04-01

    The aim of this study is to investigate the search time regulation of objectives and eye movement behavior characteristics in the multi-objective visual search. The experimental task was accomplished with computer programming and presented characters on a 24 inch computer display. The subjects were asked to search three targets among the characters. Three target characters in the same group were of high similarity degree while those in different groups of target characters and distraction characters were in different similarity degrees. We recorded the search time and eye movement data through the whole experiment. It could be seen from the eye movement data that the quantity of fixation points was large when the target characters and distraction characters were similar. There were three kinds of visual search patterns for the subjects including parallel search, serial search, and parallel-serial search. In addition, the last pattern had the best search performance among the three search patterns, that is, the subjects who used parallel-serial search pattern spent shorter time finding the target. The order that the targets presented were able to affect the search performance significantly; and the similarity degree between target characters and distraction characters could also affect the search performance.

  5. Cultural tailoring and feasibility assessment of a sexual health middle school curriculum: a pilot test in Puerto Rico.

    PubMed

    Escobar-Chaves, Soledad Liliana; Shegog, Ross; Moscoso-Alvarez, Margarita R; Markham, Christine; Tortolero-Luna, Guillermo; Peskin, Melissa; Tortolero, Susan

    2011-08-01

    To assess the need for cultural tailoring of an effective sexual health middle school curriculum, "It's Your Game: Keep It Real" (IYG), prior to implementation in Puerto Rican (PR) middle schools. Seventy-three seventh-grade bilingual students participated in IYG curriculum activities (both group-based and computer-based) in two 2-hour testing sessions in spring 2008. Rating scales of acceptability, understandability, credibility, ease of use, and motivational appeal and qualitative feedback via open-ended responses and group process provided insight into needed surface and deep structure cultural tailoring. Students rated IYG highly on cultural tailoring and motivational parameters and were highly engaged by the lesson content. School personnel rated IYG as a feasible strategy for use in PR middle schools. While surface cultural elements (eg, characters, attire, body language) were identified as important foci for adaptation, content related to deeper cultural elements such as core behaviors, risky situations, attitudes, and specific skills were considered as relevant to PR youth as to their US counterparts. Effective human immunodeficiency virus, sexually transmitted disease, and pregnancy skills training prevention programs such as IYG that are developed for minority US youth may offer a feasible option for international implementation when extensive cultural adaptation is not a viable option. © 2011, American School Health Association.

  6. Hamlet on the Macintosh: An Experimental Seminar That Worked.

    ERIC Educational Resources Information Center

    Strange, William C.

    1987-01-01

    Describes experimental college Shakespeare seminar that used Macintosh computers and software called ELIZA and ADVENTURE to develop character dialogs and adventure games based on Hamlet's characters and plots. Programming languages are examined, particularly their relationship to metaphor, and the use of computers in humanities is discussed. (LRW)

  7. Quantum-Limited Image Recognition

    DTIC Science & Technology

    1989-12-01

    J. S. Bomba ,’Alpha-numeric character recognition using local operations,’ Fall Joint Comput. Conf., 218-224 (1959). 53. D. Barnea and H. Silverman...for Chapter 6 1. J. S. Bomba ,’Alpha-numeric character recognition using local operations,’ Fall Joint Comput. Conf., 218-224 (1959). 2. D. Bamea and H

  8. The Influence of Computer-Mediated Word-of-Mouth Communication on Student Perceptions of Instructors and Attitudes toward Learning Course Content

    ERIC Educational Resources Information Center

    Edwards, Chad; Edwards, Autumn; Qing, Qingmei; Wahl, Shawn T.

    2007-01-01

    The purpose of this study was to experimentally test the influence of computer-mediated word-of-mouth communication (WOM) on student perceptions of instructors (attractiveness and credibility) and on student attitudes toward learning course content (affective learning and state motivation). It was hypothesized that students who receive positive…

  9. Learning Motion Features for Example-Based Finger Motion Estimation for Virtual Characters

    NASA Astrophysics Data System (ADS)

    Mousas, Christos; Anagnostopoulos, Christos-Nikolaos

    2017-09-01

    This paper presents a methodology for estimating the motion of a character's fingers based on the use of motion features provided by a virtual character's hand. In the presented methodology, firstly, the motion data is segmented into discrete phases. Then, a number of motion features are computed for each motion segment of a character's hand. The motion features are pre-processed using restricted Boltzmann machines, and by using the different variations of semantically similar finger gestures in a support vector machine learning mechanism, the optimal weights for each feature assigned to a metric are computed. The advantages of the presented methodology in comparison to previous solutions are the following: First, we automate the computation of optimal weights that are assigned to each motion feature counted in our metric. Second, the presented methodology achieves an increase (about 17%) in correctly estimated finger gestures in comparison to a previous method.

  10. Displaying Special Characters and Symbols in Computer-Controlled Reaction Time Experiments.

    ERIC Educational Resources Information Center

    Friel, Brian M.; Kennison, Shelia M.

    A procedure for using MEL2 (Version 2.0 of Microcomputer Experimental Laboratory) and FontWINDOW to present special characters and symbols in computer-controlled reaction time experiments is described. The procedure permits more convenience and flexibility than in tachistocopic and projection techniques. FontWINDOW allows researchers to design…

  11. The association between semantic dementia and surface dyslexia in Japanese.

    PubMed

    Fushimi, Takao; Komori, Kenjiro; Ikeda, Manabu; Lambon Ralph, Matthew A; Patterson, Karalyn

    2009-03-01

    One theory about reading suggests that producing the correct pronunciations of written words, particularly less familiar words with an atypical spelling-sound relationship, relies in part on knowledge of the word's meaning. This hypothesis has been supported by reports of surface dyslexia in large case-series studies of English-speaking/reading patients with semantic dementia (SD), but would have increased credibility if it applied to other languages and writing systems as well. The hypothesis predicts that, of the two systems used to write Japanese, SD patients should be unimpaired at oral reading of kana because of its invariant relationship between orthography and phonology. By contrast, oral reading of kanji should be impaired in a graded fashion depending on the consistency characteristics of the kanji target words, with worst performance on words whose component characters take 'minority' (atypical) pronunciations, especially if the words are of lower frequency. Errors in kanji reading should primarily reflect assignment of more typical readings to the component characters in these atypical words. In the largest-ever-reported case series of Japanese patients with semantic dementia, we tested and confirmed this hypothesis.

  12. A million dollar exit from the anarchic slum-world: Slumdog Millionaire's hollow idioms of social justice.

    PubMed

    Sengupta, Mitu

    2010-01-01

    This article contests the characterisation of the popular and acclaimed film, Slumdog Millionaire, as a realistic portrayal of India's urban poverty that will ultimately serve as a tool of advocacy for India's urban poor. It argues that the film's reductive view of slum-spaces will more probably reinforce negative attitudes towards slum-dwellers, lending credibility to the sorts of policies that have historically dispossessed them of power and dignity. By drawing attention to the film's celebration of characters and spaces that symbolise Western culture and Northern trajectories of 'development', the article also critically engages with some of the issues raised by the film's enormous success.

  13. The CBT Advisor: An Expert System Program for Making Decisions about CBT.

    ERIC Educational Resources Information Center

    Kearsley, Greg

    1985-01-01

    Discusses structure, credibility, and use of the Computer Based Training (CBT) Advisor, an expert system designed to help managers make judgements about course selection, system selection, cost/benefits, development effort, and probable success of CBT projects. (MBR)

  14. Quantitative Prediction of Computational Quality (so the S and C Folks will Accept it)

    NASA Technical Reports Server (NTRS)

    Hemsch, Michael J.; Luckring, James M.; Morrison, Joseph H.

    2004-01-01

    Our choice of title may seem strange but we mean each word. In this talk, we are not going to be concerned with computations made "after the fact", i.e. those for which data are available and which are being conducted for explanation and insight. Here we are interested in preventing S&C design problems by finding them through computation before data are available. For such a computation to have any credibility with those who absorb the risk, it is necessary to quantitatively PREDICT the quality of the computational results.

  15. Prepositioning emergency supplies under uncertainty: a parametric optimization method

    NASA Astrophysics Data System (ADS)

    Bai, Xuejie; Gao, Jinwu; Liu, Yankui

    2018-07-01

    Prepositioning of emergency supplies is an effective method for increasing preparedness for disasters and has received much attention in recent years. In this article, the prepositioning problem is studied by a robust parametric optimization method. The transportation cost, supply, demand and capacity are unknown prior to the extraordinary event, which are represented as fuzzy parameters with variable possibility distributions. The variable possibility distributions are obtained through the credibility critical value reduction method for type-2 fuzzy variables. The prepositioning problem is formulated as a fuzzy value-at-risk model to achieve a minimum total cost incurred in the whole process. The key difficulty in solving the proposed optimization model is to evaluate the quantile of the fuzzy function in the objective and the credibility in the constraints. The objective function and constraints can be turned into their equivalent parametric forms through chance constrained programming under the different confidence levels. Taking advantage of the structural characteristics of the equivalent optimization model, a parameter-based domain decomposition method is developed to divide the original optimization problem into six mixed-integer parametric submodels, which can be solved by standard optimization solvers. Finally, to explore the viability of the developed model and the solution approach, some computational experiments are performed on realistic scale case problems. The computational results reported in the numerical example show the credibility and superiority of the proposed parametric optimization method.

  16. Study on Cloud Security Based on Trust Spanning Tree Protocol

    NASA Astrophysics Data System (ADS)

    Lai, Yingxu; Liu, Zenghui; Pan, Qiuyue; Liu, Jing

    2015-09-01

    Attacks executed on Spanning Tree Protocol (STP) expose the weakness of link layer protocols and put the higher layers in jeopardy. Although the problems have been studied for many years and various solutions have been proposed, many security issues remain. To enhance the security and credibility of layer-2 network, we propose a trust-based spanning tree protocol aiming at achieving a higher credibility of LAN switch with a simple and lightweight authentication mechanism. If correctly implemented in each trusted switch, the authentication of trust-based STP can guarantee the credibility of topology information that is announced to other switch in the LAN. To verify the enforcement of the trusted protocol, we present a new trust evaluation method of the STP using a specification-based state model. We implement a prototype of trust-based STP to investigate its practicality. Experiment shows that the trusted protocol can achieve security goals and effectively avoid STP attacks with a lower computation overhead and good convergence performance.

  17. Character Sets for PLATO/NovaNET: An Expository Catalog.

    ERIC Educational Resources Information Center

    Gilpin, John B.

    The PLATO and NovaNET computer-based instructional systems use a fixed system character set ("normal font") and an author-definable character set ("alternate font"). The alternate font lets the author construct his own symbols and bitmapped pictures. This expository catalog allows users to determine quickly (1) whether there is…

  18. HRP's Healthcare Spin-Offs Through Computational Modeling and Simulation Practice Methodologies

    NASA Technical Reports Server (NTRS)

    Mulugeta, Lealem; Walton, Marlei; Nelson, Emily; Peng, Grace; Morrison, Tina; Erdemir, Ahmet; Myers, Jerry

    2014-01-01

    Spaceflight missions expose astronauts to novel operational and environmental conditions that pose health risks that are currently not well understood, and perhaps unanticipated. Furthermore, given the limited number of humans that have flown in long duration missions and beyond low Earth-orbit, the amount of research and clinical data necessary to predict and mitigate these health and performance risks are limited. Consequently, NASA's Human Research Program (HRP) conducts research and develops advanced methods and tools to predict, assess, and mitigate potential hazards to the health of astronauts. In this light, NASA has explored the possibility of leveraging computational modeling since the 1970s as a means to elucidate the physiologic risks of spaceflight and develop countermeasures. Since that time, substantial progress has been realized in this arena through a number of HRP funded activates such as the Digital Astronaut Project (DAP) and the Integrated Medical Model (IMM). Much of this success can be attributed to HRP's endeavor to establish rigorous verification, validation, and credibility (VV&C) processes that ensure computational models and simulations (M&S) are sufficiently credible to address issues within their intended scope. This presentation summarizes HRP's activities in credibility of modeling and simulation, in particular through its outreach to the community of modeling and simulation practitioners. METHODS: The HRP requires all M&S that can have moderate to high impact on crew health or mission success must be vetted in accordance to NASA Standard for Models and Simulations, NASA-STD-7009 (7009) [5]. As this standard mostly focuses on engineering systems, the IMM and DAP have invested substantial efforts to adapt the processes established in this standard for their application to biological M&S, which is more prevalent in human health and performance (HHP) and space biomedical research and operations [6,7]. These methods have also generated substantial interest by the broader medical community though institutions like the National Institutes of Health (NIH) and the Food and Drug Administration (FDA) to develop similar standards and guidelines applicable to the larger medical operations and research community. DISCUSSION: Similar to NASA, many leading government agencies, health institutions and medical product developers around the world are recognizing the potential of computational M&S to support clinical research and decision making. In this light, substantial investments are being made in computational medicine and notable discoveries are being realized [8]. However, there is a lack of broadly applicable practice guidance for the development and implementation of M&S in clinical care and research in a manner that instills confidence among medical practitioners and biological researchers [9,10]. In this presentation, we will give an overview on how HRP is working with the NIH's Interagency Modeling and Analysis Group (IMAG), the FDA and the American Society of Mechanical Engineers (ASME) to leverage NASA's biomedical VV&C processes to establish a new regulatory standard for Verification and Validation in Computational Modeling of Medical Devices, and Guidelines for Credible Practice of Computational Modeling and Simulation in Healthcare.

  19. Computational Design of Animated Mechanical Characters

    NASA Astrophysics Data System (ADS)

    Coros, Stelian; Thomaszewski, Bernhard; DRZ Team Team

    2014-03-01

    A factor key to the appeal of modern CG movies and video-games is that the virtual worlds they portray place no bounds on what can be imagined. Rapid manufacturing devices hold the promise of bringing this type of freedom to our own world, by enabling the fabrication of physical objects whose appearance, deformation behaviors and motions can be precisely specified. In order to unleash the full potential of this technology however, computational design methods that create digital content suitable for fabrication need to be developed. In recent work, we presented a computational design system that allows casual users to create animated mechanical characters. Given an articulated character as input, the user designs the animated character by sketching motion curves indicating how they should move. For each motion curve, our framework creates an optimized mechanism that reproduces it as closely as possible. The resulting mechanisms are attached to the character and then connected to each other using gear trains, which are created in a semi-automated fashion. The mechanical assemblies generated with our system can be driven with a single input driver, such as a hand-operated crank or an electric motor, and they can be fabricated using rapid prototyping devices.

  20. Real-time physics-based 3D biped character animation using an inverted pendulum model.

    PubMed

    Tsai, Yao-Yang; Lin, Wen-Chieh; Cheng, Kuangyou B; Lee, Jehee; Lee, Tong-Yee

    2010-01-01

    We present a physics-based approach to generate 3D biped character animation that can react to dynamical environments in real time. Our approach utilizes an inverted pendulum model to online adjust the desired motion trajectory from the input motion capture data. This online adjustment produces a physically plausible motion trajectory adapted to dynamic environments, which is then used as the desired motion for the motion controllers to track in dynamics simulation. Rather than using Proportional-Derivative controllers whose parameters usually cannot be easily set, our motion tracking adopts a velocity-driven method which computes joint torques based on the desired joint angular velocities. Physically correct full-body motion of the 3D character is computed in dynamics simulation using the computed torques and dynamical model of the character. Our experiments demonstrate that tracking motion capture data with real-time response animation can be achieved easily. In addition, physically plausible motion style editing, automatic motion transition, and motion adaptation to different limb sizes can also be generated without difficulty.

  1. Optical character recognition based on nonredundant correlation measurements.

    PubMed

    Braunecker, B; Hauck, R; Lohmann, A W

    1979-08-15

    The essence of character recognition is a comparison between the unknown character and a set of reference patterns. Usually, these reference patterns are all possible characters themselves, the whole alphabet in the case of letter characters. Obviously, N analog measurements are highly redundant, since only K = log(2)N binary decisions are enough to identify one out of N characters. Therefore, we devised K reference patterns accordingly. These patterns, called principal components, are found by digital image processing, but used in an optical analog computer. We will explain the concept of principal components, and we will describe experiments with several optical character recognition systems, based on this concept.

  2. Document Form and Character Recognition using SVM

    NASA Astrophysics Data System (ADS)

    Park, Sang-Sung; Shin, Young-Geun; Jung, Won-Kyo; Ahn, Dong-Kyu; Jang, Dong-Sik

    2009-08-01

    Because of development of computer and information communication, EDI (Electronic Data Interchange) has been developing. There is OCR (Optical Character Recognition) of Pattern recognition technology for EDI. OCR contributed to changing many manual in the past into automation. But for the more perfect database of document, much manual is needed for excluding unnecessary recognition. To resolve this problem, we propose document form based character recognition method in this study. Proposed method is divided into document form recognition part and character recognition part. Especially, in character recognition, change character into binarization by using SVM algorithm and extract more correct feature value.

  3. A character string scanner

    NASA Technical Reports Server (NTRS)

    Enison, R. L.

    1971-01-01

    A computer program called Character String Scanner (CSS), is presented. It is designed to search a data set for any specified group of characters and then to flag this group. The output of the CSS program is a listing of the data set being searched with the specified group of characters being flagged by asterisks. Therefore, one may readily identify specific keywords, groups of keywords or specified lines of code internal to a computer program, in a program output, or in any other specific data set. Possible applications of this program include the automatic scan of an output data set for pertinent keyword data, the editing of a program to change the appearance of a certain word or group of words, and the conversion of a set of code to a different set of code.

  4. Master of Puppets: An Animation-by-Demonstration Computer Puppetry Authoring Framework

    NASA Astrophysics Data System (ADS)

    Cui, Yaoyuan; Mousas, Christos

    2018-03-01

    This paper presents Master of Puppets (MOP), an animation-by-demonstration framework that allows users to control the motion of virtual characters (puppets) in real time. In the first step, the user is asked to perform the necessary actions that correspond to the character's motions. The user's actions are recorded, and a hidden Markov model is used to learn the temporal profile of the actions. During the runtime of the framework, the user controls the motions of the virtual character based on the specified activities. The advantage of the MOP framework is that it recognizes and follows the progress of the user's actions in real time. Based on the forward algorithm, the method predicts the evolution of the user's actions, which corresponds to the evolution of the character's motion. This method treats characters as puppets that can perform only one motion at a time. This means that combinations of motion segments (motion synthesis), as well as the interpolation of individual motion sequences, are not provided as functionalities. By implementing the framework and presenting several computer puppetry scenarios, its efficiency and flexibility in animating virtual characters is demonstrated.

  5. Electronic Manipulation Endangers Credibility.

    ERIC Educational Resources Information Center

    Schaub, Laura

    1998-01-01

    Argues that technological advances with digital photo enhancement computer programs raise serious questions concerning ethics in student publications, and that instructors and advisers have an obligation to teach students about the appropriate, ethical use of these programs. Outlines specific issues and reminds students that it is wrong to enhance…

  6. A mathematical model of “Gone with the Wind”

    NASA Astrophysics Data System (ADS)

    Rinaldi, Sergio; Della Rossa, Fabio; Landi, Pietro

    2013-08-01

    We develop a mathematical model for mimicking the love story between Scarlett and Rhett described in “Gone with the Wind”. In line with tradition in classical physics, the model is composed of two Ordinary Differential Equations, one for Scarlett and one for Rhett, which encapsulate their main psycho-physical characteristics. The two lovers are described as so-called insecure individuals because they respond very strongly to small involvements of the partner but then attenuate their reaction when the pressure exerted by the partner becomes too high. These characteristics of Scarlett and Rhett clearly emerge during the first part of the film and are sufficient to develop a model that perfectly predicts the complex evolution and the dramatic end of the love story. Since the predicted evolution of the romantic relationship is a direct consequence of the characters of the two individuals, the agreement between the model and the film supports the high credibility of the story. Although credibility of a fictitious story is not necessary from a purely artistic point of view, in most cases it is very appreciated, at the point of being essential in making the film popular. In conclusion, we can say that we have explained with a scientific approach why “Gone with the Wind” has become one of the most successful films of all times.

  7. Field observations of display placement requirements and character size for presbyopic and prepresbyopic computer users.

    PubMed

    Bartha, Michael C; Allie, Paul; Kokot, Douglas; Roe, Cynthia Purvis

    2015-01-01

    Computer users continue to report eye and upper body discomfort even as workstation flexibility has improved. Research shows a relationship between character size, viewing distance, and reading performance. Few reports exist regarding text height viewed under normal office work conditions and eye discomfort. This paper reports self-selected computer display placement, text characteristics, and subjective comfort for older and younger computer workers under real-world conditions. Computer workers were provided with monitors and adjustable display support(s). In Study 1, older workers wearing progressive-addition lenses (PALs) were observed. In study 2, older workers wearing multifocal lenses and younger workers were observed. Workers wearing PALs experienced less eye and body discomfort with adjustable displays, and less eye and neck discomfort for text visual angles near or greater than ergonomic recommendations. Older workers wearing multifocal correction positioned displays much lower than younger workers. In general, computer users did not adjust character size to ensure that fovial images of text fell within the recommended range. Ergonomic display placement recommendations should be different for computer users wearing multifocal correction for presbyopia. Ergonomic training should emphasize adjusting text size for user comfort.

  8. An Assessment of the Dyna-Metric Inventory Model during Initial Provisioning.

    DTIC Science & Technology

    1986-09-01

    model for computing initial spares levels. Currently, Air Force 3 policy for the provisioning of initial spares and repair parts requires that "all...Force inventory. The key to an effective inventory policy , and a credible defense posture in times of a constrained budget, is to maximize the repair... policy and procedures for deciding which items qualify for stockage, and for computing new requirements for all types of initially provisioned items

  9. Character-marked furniture: potential for lumber yield increase in crosscut-first rough mills

    Treesearch

    Urs Buehlmann; Janice K. Wiedenbeck; E. Earl Kline; E. Earl Kline

    1999-01-01

    Including character marks in dimension parts of the furniture, cabinet, and dimension industries offers an opportunity to increase lumber yield substantially. However, little quantitative knowledge exists as to how the incorporation of character marks in parts influences yield when processing lumber in a crosscut-first rough mill. Using computer simulation, this study...

  10. Analysis of Compression Pad Cavities for the Orion Heatshield

    NASA Technical Reports Server (NTRS)

    Thompson, Richard A.; Lessard, Victor R.; Jentink, Thomas N.; Zoby, Ernest V.

    2009-01-01

    Current results of a program for analysis of the compression pad cavities on the Orion heatshield are reviewed. The program was supported by experimental tests, engineering modeling, and applied computations with an emphasis on the latter presented in this paper. The computational tools and approach are described along with calculated results for wind tunnel and flight conditions. Correlations of the computed results are shown which can produce a credible prediction of heating augmentation due to cavity disturbances. The models developed for use in preliminary design of the Orion heatshield are presented.

  11. The Weyl-Lanczos equations and the Lanczos wave equation in four dimensions as systems in involution

    NASA Astrophysics Data System (ADS)

    Dolan, P.; Gerber, A.

    2003-07-01

    The Weyl-Lanczos equations in four dimensions form a system in involution. We compute its Cartan characters explicitly and use Janet-Riquier theory to confirm the results in the case of all space-times with a diagonal metric tensor and for the plane wave limit of space-times. We write the Lanczos wave equation as an exterior differential system and, with assistance from Janet-Riquier theory, we compute its Cartan characters and find that it forms a system in involution. We compare these Cartan characters with those of the Weyl-Lanczos equations. All results hold for the real analytic case.

  12. Effects of Typographic Variables on Eye-Movement Measures in Reading Chinese from a Screen

    ERIC Educational Resources Information Center

    Yen, Nai-Shing; Tsai, Jie-Li; Chen, Pei-Ling; Lin, Hsuan-Yu; Chen, Arbee L. P.

    2011-01-01

    To investigate the most efficient way to represent text in reading Chinese on computer displays, three typographic variables, character size (41[feet] arc/24 pixels and 60[feet] arc/32 pixels), character spacing (1/4 and 1/8 character width) and font type (Kai and Ming), were manipulated. Results showed that the reading speed for Chinese…

  13. A new taxonomy for distributed computer systems based upon operating system structure

    NASA Technical Reports Server (NTRS)

    Foudriat, E. C.

    1985-01-01

    Characteristics of the resource structure found in the operating system are considered as a mechanism for classifying distributed computer systems. Since the operating system resources, themselves, are too diversified to provide a consistent classification, the structure upon which resources are built and shared are examined. The location and control character of this indivisibility provides the taxonomy for separating uniprocessors, computer networks, network computers (fully distributed processing systems or decentralized computers) and algorithm and/or data control multiprocessors. The taxonomy is important because it divides machines into a classification that is relevant or important to the client and not the hardware architect. It also defines the character of the kernel O/S structure needed for future computer systems. What constitutes an operating system for a fully distributed processor is discussed in detail.

  14. Flashing characters with famous faces improves ERP-based brain-computer interface performance

    NASA Astrophysics Data System (ADS)

    Kaufmann, T.; Schulz, S. M.; Grünzinger, C.; Kübler, A.

    2011-10-01

    Currently, the event-related potential (ERP)-based spelling device, often referred to as P300-Speller, is the most commonly used brain-computer interface (BCI) for enhancing communication of patients with impaired speech or motor function. Among numerous improvements, a most central feature has received little attention, namely optimizing the stimulus used for eliciting ERPs. Therefore we compared P300-Speller performance with the standard stimulus (flashing characters) against performance with stimuli known for eliciting particularly strong ERPs due to their psychological salience, i.e. flashing familiar faces transparently superimposed on characters. Our results not only indicate remarkably increased ERPs in response to familiar faces but also improved P300-Speller performance due to a significant reduction of stimulus sequences needed for correct character classification. These findings demonstrate a promising new approach for improving the speed and thus fluency of BCI-enhanced communication with the widely used P300-Speller.

  15. Examining the Use of Computers in Writing by Learners of Japanese as a Foreign Language: Analysis of Kanji in the Handwritten and Typed Domains

    ERIC Educational Resources Information Center

    Dixon, Michael

    2012-01-01

    This study compares second-year Japanese university students' strategies to write kanji by hand with their strategies to produce the kanji characters on a computer, taking into account factors such as accuracy in writing, the amount of kanji used, the complexity of the kanji used, as well as how the characters used compare with the sequence…

  16. Iconographic dental typography. A dental character font for computer graphics.

    PubMed

    McCormack, J

    1991-06-08

    The recent massive increase in available memory for microcomputers now allows multiple font faces to be stored in computer RAM memory for instant access to the screen and for printed output. Fonts can be constructed in which the characters are not just letters or numbers, but are miniature graphic icons--in this instance pictures of teeth. When printed on an appropriate laser printer, this produces printed graphics of publishing quality.

  17. Computational electromagnetics: the physics of smooth versus oscillatory fields.

    PubMed

    Chew, W C

    2004-03-15

    This paper starts by discussing the difference in the physics between solutions to Laplace's equation (static) and Maxwell's equations for dynamic problems (Helmholtz equation). Their differing physical characters are illustrated by how the two fields convey information away from their source point. The paper elucidates the fact that their differing physical characters affect the use of Laplacian field and Helmholtz field in imaging. They also affect the design of fast computational algorithms for electromagnetic scattering problems. Specifically, a comparison is made between fast algorithms developed using wavelets, the simple fast multipole method, and the multi-level fast multipole algorithm for electrodynamics. The impact of the physical characters of the dynamic field on the parallelization of the multi-level fast multipole algorithm is also discussed. The relationship of diagonalization of translators to group theory is presented. Finally, future areas of research for computational electromagnetics are described.

  18. Distributed Computation and TENEX-Related Activities

    DTIC Science & Technology

    1975-02-01

    A new echo rr ode, viz., echo non -wakeup characters and do not echo wakeup characters, was defined; and the assignments of four control characters...operations and, with certain controllers e.g. 3339 equivalent , simultaneous rotational positioning. Prior to installing tnis feature, BBN’s lyscem C... Control and Accounting System 3 B. RSEXEC Program Execution Environment 5 C. Management of Distributed Data Bases 6 III. TENEX RELATED ACTIVITIES

  19. A method of neighbor classes based SVM classification for optical printed Chinese character recognition.

    PubMed

    Zhang, Jie; Wu, Xiaohong; Yu, Yanmei; Luo, Daisheng

    2013-01-01

    In optical printed Chinese character recognition (OPCCR), many classifiers have been proposed for the recognition. Among the classifiers, support vector machine (SVM) might be the best classifier. However, SVM is a classifier for two classes. When it is used for multi-classes in OPCCR, its computation is time-consuming. Thus, we propose a neighbor classes based SVM (NC-SVM) to reduce the computation consumption of SVM. Experiments of NC-SVM classification for OPCCR have been done. The results of the experiments have shown that the NC-SVM we proposed can effectively reduce the computation time in OPCCR.

  20. Computer access security code system

    NASA Technical Reports Server (NTRS)

    Collins, Earl R., Jr. (Inventor)

    1990-01-01

    A security code system for controlling access to computer and computer-controlled entry situations comprises a plurality of subsets of alpha-numeric characters disposed in random order in matrices of at least two dimensions forming theoretical rectangles, cubes, etc., such that when access is desired, at least one pair of previously unused character subsets not found in the same row or column of the matrix is chosen at random and transmitted by the computer. The proper response to gain access is transmittal of subsets which complete the rectangle, and/or a parallelepiped whose opposite corners were defined by first groups of code. Once used, subsets are not used again to absolutely defeat unauthorized access by eavesdropping, and the like.

  1. An extended Kalman filter approach to non-stationary Bayesian estimation of reduced-order vocal fold model parameters.

    PubMed

    Hadwin, Paul J; Peterson, Sean D

    2017-04-01

    The Bayesian framework for parameter inference provides a basis from which subject-specific reduced-order vocal fold models can be generated. Previously, it has been shown that a particle filter technique is capable of producing estimates and associated credibility intervals of time-varying reduced-order vocal fold model parameters. However, the particle filter approach is difficult to implement and has a high computational cost, which can be barriers to clinical adoption. This work presents an alternative estimation strategy based upon Kalman filtering aimed at reducing the computational cost of subject-specific model development. The robustness of this approach to Gaussian and non-Gaussian noise is discussed. The extended Kalman filter (EKF) approach is found to perform very well in comparison with the particle filter technique at dramatically lower computational cost. Based upon the test cases explored, the EKF is comparable in terms of accuracy to the particle filter technique when greater than 6000 particles are employed; if less particles are employed, the EKF actually performs better. For comparable levels of accuracy, the solution time is reduced by 2 orders of magnitude when employing the EKF. By virtue of the approximations used in the EKF, however, the credibility intervals tend to be slightly underpredicted.

  2. Aircraft Survivability. Susceptibility Reduction. Fall 2010

    DTIC Science & Technology

    2010-01-01

    limits flexibility when issues are encountered during development. Once a program enters Engineering, Manufacturing, and Development (EMD), the...using a flexible , efficient computational environment based on a credible set of components. Unfortunately, current survivability codes contain many...approach limits flexibility when issues are encountered during development. Once a program enters Engineering Manufacturing and Development (EMD), the

  3. A Novel Rules Based Approach for Estimating Software Birthmark

    PubMed Central

    Binti Alias, Norma; Anwar, Sajid

    2015-01-01

    Software birthmark is a unique quality of software to detect software theft. Comparing birthmarks of software can tell us whether a program or software is a copy of another. Software theft and piracy are rapidly increasing problems of copying, stealing, and misusing the software without proper permission, as mentioned in the desired license agreement. The estimation of birthmark can play a key role in understanding the effectiveness of a birthmark. In this paper, a new technique is presented to evaluate and estimate software birthmark based on the two most sought-after properties of birthmarks, that is, credibility and resilience. For this purpose, the concept of soft computing such as probabilistic and fuzzy computing has been taken into account and fuzzy logic is used to estimate properties of birthmark. The proposed fuzzy rule based technique is validated through a case study and the results show that the technique is successful in assessing the specified properties of the birthmark, its resilience and credibility. This, in turn, shows how much effort will be required to detect the originality of the software based on its birthmark. PMID:25945363

  4. Replaying evolutionary transitions from the dental fossil record

    PubMed Central

    Harjunmaa, Enni; Seidel, Kerstin; Häkkinen, Teemu; Renvoisé, Elodie; Corfe, Ian J.; Kallonen, Aki; Zhang, Zhao-Qun; Evans, Alistair R.; Mikkola, Marja L.; Salazar-Ciudad, Isaac; Klein, Ophir D.; Jernvall, Jukka

    2014-01-01

    The evolutionary relationships of extinct species are ascertained primarily through the analysis of morphological characters. Character inter-dependencies can have a substantial effect on evolutionary interpretations, but the developmental underpinnings of character inter-dependence remain obscure because experiments frequently do not provide detailed resolution of morphological characters. Here we show experimentally and computationally how gradual modification of development differentially affects characters in the mouse dentition. We found that intermediate phenotypes could be produced by gradually adding ectodysplasin A (EDA) protein in culture to tooth explants carrying a null mutation in the tooth-patterning gene Eda. By identifying development-based character interdependencies, we show how to predict morphological patterns of teeth among mammalian species. Finally, in vivo inhibition of sonic hedgehog signalling in Eda null teeth enabled us to reproduce characters deep in the rodent ancestry. Taken together, evolutionarily informative transitions can be experimentally reproduced, thereby providing development-based expectations for character state transitions used in evolutionary studies. PMID:25079326

  5. Anthropomorphism influences perception of computer-animated characters’ actions

    PubMed Central

    Hodgins, Jessica; Kawato, Mitsuo

    2007-01-01

    Computer-animated characters are common in popular culture and have begun to be used as experimental tools in social cognitive neurosciences. Here we investigated how appearance of these characters’ influences perception of their actions. Subjects were presented with different characters animated either with motion data captured from human actors or by interpolating between poses (keyframes) designed by an animator, and were asked to categorize the motion as biological or artificial. The response bias towards ‘biological’, derived from the Signal Detection Theory, decreases with characters’ anthropomorphism, while sensitivity is only affected by the simplest rendering style, point-light displays. fMRI showed that the response bias correlates positively with activity in the mentalizing network including left temporoparietal junction and anterior cingulate cortex, and negatively with regions sustaining motor resonance. The absence of significant effect of the characters on the brain activity suggests individual differences in the neural responses to unfamiliar artificial agents. While computer-animated characters are invaluable tools to investigate the neural bases of social cognition, further research is required to better understand how factors such as anthropomorphism affect their perception, in order to optimize their appearance for entertainment, research or therapeutic purposes. PMID:18985142

  6. Study on the characters of control valve for ammonia injection in selective catalytic reduction (SCR) system of coal-fired power plant

    NASA Astrophysics Data System (ADS)

    Yao, Che; Li, Tao; Zhang, Hong; Zhou, Yanming

    2017-08-01

    In this paper, the characters of two control valves used for ammonia injection in SCR system are discussed. The linear/quadratic character between pressure drop/outlet flow rate and valve opening/dynamic pressure inlet are investigated using computational fluid dynamic (CFD) and response surface analysis (RSA) methods. The results show that the linear character of brake valve is significantly better than butterfly valve, which means that the brake valve is more suitable for ammonia injection adjustment than the butterfly valve.

  7. Good initialization model with constrained body structure for scene text recognition

    NASA Astrophysics Data System (ADS)

    Zhu, Anna; Wang, Guoyou; Dong, Yangbo

    2016-09-01

    Scene text recognition has gained significant attention in the computer vision community. Character detection and recognition are the promise of text recognition and affect the overall performance to a large extent. We proposed a good initialization model for scene character recognition from cropped text regions. We use constrained character's body structures with deformable part-based models to detect and recognize characters in various backgrounds. The character's body structures are achieved by an unsupervised discriminative clustering approach followed by a statistical model and a self-build minimum spanning tree model. Our method utilizes part appearance and location information, and combines character detection and recognition in cropped text region together. The evaluation results on the benchmark datasets demonstrate that our proposed scheme outperforms the state-of-the-art methods both on scene character recognition and word recognition aspects.

  8. Geonames Processing System Functional Design Specification. Volume 5. Performance Specifications.

    DTIC Science & Technology

    1985-03-01

    Chinese, Japanese , and Thai are the important ideographies to consider for electronic names processing. Chinese and Japanese character sets are...was no written Japanese language. Chinese characters are called Kanji by the Japanese . There are approximately 55(X) Chinese characters of common...Kanji was taken from A.V. Hershey, "Calligraphy for Computers," U.S. Naval Weapons Laboratory, Dahlgren, VA, August 1967. AD (-2398. C-1 Japanese

  9. EEG character identification using stimulus sequences designed to maximize mimimal hamming distance.

    PubMed

    Fukami, Tadanori; Shimada, Takamasa; Forney, Elliott; Anderson, Charles W

    2012-01-01

    In this study, we have improved upon the P300 speller Brain-Computer Interface paradigm by introducing a new character encoding method. Our concept in detection of the intended character is not based on a classification of target and nontarget responses, but based on an identifaction of the character which maximize the difference between P300 amplitudes in target and nontarget stimuli. Each bit included in the code corresponds to flashing character, '1', and non-flashing, '0'. Here, the codes were constructed in order to maximize the minimum hamming distance between the characters. Electroencephalography was used to identify the characters using a waveform calculated by adding and subtracting the response of the target and non-target stimulus according the codes respectively. This stimulus presentation method was applied to a 3×3 character matrix, and the results were compared with that of a conventional P300 speller of the same size. Our method reduced the time until the correct character was obtained by 24%.

  10. Visual Similarity of Words Alone Can Modulate Hemispheric Lateralization in Visual Word Recognition: Evidence From Modeling Chinese Character Recognition.

    PubMed

    Hsiao, Janet H; Cheung, Kit

    2016-03-01

    In Chinese orthography, the most common character structure consists of a semantic radical on the left and a phonetic radical on the right (SP characters); the minority, opposite arrangement also exists (PS characters). Recent studies showed that SP character processing is more left hemisphere (LH) lateralized than PS character processing. Nevertheless, it remains unclear whether this is due to phonetic radical position or character type frequency. Through computational modeling with artificial lexicons, in which we implement a theory of hemispheric asymmetry in perception but do not assume phonological processing being LH lateralized, we show that the difference in character type frequency alone is sufficient to exhibit the effect that the dominant type has a stronger LH lateralization than the minority type. This effect is due to higher visual similarity among characters in the dominant type than the minority type, demonstrating the modulation of visual similarity of words on hemispheric lateralization. Copyright © 2015 Cognitive Science Society, Inc.

  11. Message propagation in the network based on node credibility

    NASA Astrophysics Data System (ADS)

    Nian, Fuzhong; Dang, Zhongkai

    2018-04-01

    In the propagation efficiency point of view, the node credibility is introduced in this paper. For the message receiver, the node would partially believe the message according to the credibility of the propagator. For a node, the credibility is variable. The more the true message spread, the higher the credibility, and vice versa, the credibility becomes smaller. Based on the idea, a new network was established with the node credibility. Finally, a comparing experiment between the fully trusted network and the network with the node credibility was implemented. The results indicate that the spread effect of messages is better in the network with the node credibility.

  12. reCAPTCHA: human-based character recognition via Web security measures.

    PubMed

    von Ahn, Luis; Maurer, Benjamin; McMillen, Colin; Abraham, David; Blum, Manuel

    2008-09-12

    CAPTCHAs (Completely Automated Public Turing test to tell Computers and Humans Apart) are widespread security measures on the World Wide Web that prevent automated programs from abusing online services. They do so by asking humans to perform a task that computers cannot yet perform, such as deciphering distorted characters. Our research explored whether such human effort can be channeled into a useful purpose: helping to digitize old printed material by asking users to decipher scanned words from books that computerized optical character recognition failed to recognize. We showed that this method can transcribe text with a word accuracy exceeding 99%, matching the guarantee of professional human transcribers. Our apparatus is deployed in more than 40,000 Web sites and has transcribed over 440 million words.

  13. The use of tags and tag clouds to discern credible content in online health message forums.

    PubMed

    O'Grady, Laura; Wathen, C Nadine; Charnaw-Burger, Jill; Betel, Lisa; Shachak, Aviv; Luke, Robert; Hockema, Stephen; Jadad, Alejandro R

    2012-01-01

    Web sites with health-oriented content are potentially harmful if inaccurate or inappropriate medical information is used to make health-related decisions. Checklists, rating systems and guidelines have been developed to help people determine what is credible, but recent Internet technologies emphasize applications that are collaborative in nature, including tags and tag clouds, where site users 'tag' or label online content, each using their own labelling system. Concepts such as the date, reference, author, testimonial and quotations are considered predictors of credible content. An understanding of these descriptive tools, how they relate to the depiction of credibility and how this relates to overall efforts to label data in relation to the semantic web has yet to emerge. This study investigates how structured (pre-determined) and unstructured (user-generated) tags and tag clouds with a multiple word search feature are used by participants to assess credibility of messages posted in online message forums. The targeted respondents were those using web sites message forums for disease self-management. We also explored the relevancy of our findings to the labelling or indexing of data in the context of the semantic web. Diabetes was chosen as the content area in this study, since (a) this is a condition with increasing prevalence and (b) diabetics have been shown to actively use the Internet to manage their condition. From January to March 2010 participants were recruited using purposive sampling techniques. A screening instrument was used to determine eligibility. The study consisted of a demographic and computer usage survey, a series of usability tests and an interview. We tested participants (N=22) on two scenarios, each involving tasks that assessed their ability to tag content and search using a tag cloud that included six structured credibility terms (statistics, date, reference, author, testimonial and quotations). MORAE Usability software (version 3.1) was employed to record participants' use of the study environment. The surveys were analyzed using SPSS version 17. Interviews with participants were transcribed, coded and analyzed using thematic text analysis with the aid of NVivo8. Most participants had experience with Internet resources. However, less than one quarter of this sample had seen or used tags or a tag clouds. The ways in which participants used tags to label the content posted in the message forums varied. Some participants were tagging the information for their own subsequent use, whereas others viewed this process from the perspective of others: they tagged the content in ways that they thought other users would find beneficial. Many participants did not use the structured credibility tags when asked to search for credible content. The interviews corroborated these findings by confirming participants were not considering credibility foremost when tagging. Many participants in this study focused on assessing whether the information was relevant to their current circumstances, after which they would proceed to determine its credibility by corroborating with other sources. The use of structured tags to label information may not be a useful way to encourage the use of tagging, or to indicate credibility in this context. Current applications used in the semantic web automate this process. Therefore it may be useful to engage consumers of online content, in particular health-related content, to be more directly involved in the annotation of this content. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.

  14. A randomised controlled pilot trial evaluating feasibility and acceptability of a computer-based tool to identify and reduce harmful and hazardous drinking among adolescents with alcohol-related presentations in Canadian pediatric emergency departments.

    PubMed

    Newton, Amanda S; Dow, Nadia; Dong, Kathryn; Fitzpatrick, Eleanor; Cameron Wild, T; Johnson, David W; Ali, Samina; Colman, Ian; Rosychuk, Rhonda J

    2017-08-11

    This study piloted procedures and obtained data on intervention acceptability to determine the feasibility of a definitive randomised controlled trial (RCT) of the effectiveness of a computer-based brief intervention in the emergency department (ED). Two-arm, multi-site, pilot RCT. Adolescents aged 12-17 years presenting to three Canadian pediatric EDs from July 2010 to January 2013 for an alcohol-related complaint. Standard medical care plus computer-based screening and personalised assessment feedback (experimental group) or standard care plus computer-based sham (control group). ED and research staff, and adolescents were blinded to allocation. Main: change in alcohol consumption from baseline to 1- and 3 months post-intervention. Secondary: recruitment and retention rates, intervention acceptability and feasibility, perception of group allocation among ED and research staff, and change in health and social services utilisation. Of the 340 adolescents screened, 117 adolescents were eligible and 44 participated in the study (37.6% recruitment rate). Adolescents allocated to the intervention found it easy, quick and informative, but were divided on the credibility of the feedback provided (agreed it was credible: 44.4%, disagreed: 16.7%, unsure: 16.7%, no response: 22.2%). We found no evidence of a statistically significant relationship between which interventions adolescents were allocated to and which interventions staff thought they received. Alcohol consumption, and health and social services data were largely incomplete due to modest study retention rates of 47.7% and 40.9% at 1- and 3 months post-intervention, respectively. A computer-based intervention was acceptable to adolescents and delivery was feasible in the ED in terms of time to use and ease of use. However, adjustments are needed to the intervention to improve its credibility. A definitive RCT will be feasible if protocol adjustments are made to improve recruitment and retention rates; and increase the number of study sites and research staff. clinicaltrials.gov NCT01146665. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  15. Drug information resources used by nurse practitioners and collaborating physicians at the point of care in Nova Scotia, Canada: a survey and review of the literature

    PubMed Central

    Murphy, Andrea L; Fleming, Mark; Martin-Misener, Ruth; Sketris, Ingrid S; MacCara, Mary; Gass, David

    2006-01-01

    Background Keeping current with drug therapy information is challenging for health care practitioners. Technologies are often implemented to facilitate access to current and credible drug information sources. In the Canadian province of Nova Scotia, legislation was passed in 2002 to allow nurse practitioners (NPs) to practice collaboratively with physician partners. The purpose of this study was to determine the current utilization patterns of information technologies by these groups of practitioners. Methods Nurse practitioners and their collaborating physician partners in Nova Scotia were sent a survey in February 2005 to determine the frequency of use, usefulness, accessibility, credibility, and current/timeliness of personal digital assistant (PDA), computer, and print drug information resources. Two surveys were developed (one for PDA users and one for computer users) and revised based on a literature search, stakeholder consultation, and pilot-testing results. A second distribution to nonresponders occurred two weeks following the first. Data were entered and analysed with SPSS. Results Twenty-seven (14 NPs and 13 physicians) of 36 (75%) recipients responded. 22% (6) returned personal digital assistant (PDA) surveys. Respondents reported print, health professionals, and online/electronic resources as the most to least preferred means to access drug information, respectively. 37% and 35% of respondents reported using "both print and electronic but print more than electronic" and "print only", respectively, to search monograph-related drug information queries whereas 4% reported using "PDA only". Analysis of respondent ratings for all resources in the categories print, health professionals and other, and online/electronic resources, indicated that the Compendium of Pharmaceuticals and Specialties and pharmacists ranked highly for frequency of use, usefulness, accessibility, credibility, and current/timeliness by both groups of practitioners. Respondents' preferences and resource ratings were consistent with self-reported methods for conducting drug information queries. Few differences existed between NP and physician rankings of resources. Conclusion The use of computers and PDAs remains limited, which is also consistent with preferred and frequent use of print resources. Education for these practitioners regarding available electronic drug information resources may facilitate future computer and PDA use. Further research is needed to determine methods to increase computer and PDA use and whether these technologies affect prescribing and patient outcomes. PMID:16822323

  16. Primary care physicians' perspectives on computer-based health risk assessment tools for chronic diseases: a mixed methods study.

    PubMed

    Voruganti, Teja R; O'Brien, Mary Ann; Straus, Sharon E; McLaughlin, John R; Grunfeld, Eva

    2015-09-24

    Health risk assessment tools compute an individual's risk of developing a disease. Routine use of such tools by primary care physicians (PCPs) is potentially useful in chronic disease prevention. We sought physicians' awareness and perceptions of the usefulness, usability and feasibility of performing assessments with computer-based risk assessment tools in primary care settings. Focus groups and usability testing with a computer-based risk assessment tool were conducted with PCPs from both university-affiliated and community-based practices. Analysis was derived from grounded theory methodology. PCPs (n = 30) were aware of several risk assessment tools although only select tools were used routinely. The decision to use a tool depended on how use impacted practice workflow and whether the tool had credibility. Participants felt that embedding tools in the electronic medical records (EMRs) system might allow for health information from the medical record to auto-populate into the tool. User comprehension of risk could also be improved with computer-based interfaces that present risk in different formats. In this study, PCPs chose to use certain tools more regularly because of usability and credibility. Despite there being differences in the particular tools a clinical practice used, there was general appreciation for the usefulness of tools for different clinical situations. Participants characterised particular features of an ideal tool, feeling strongly that embedding risk assessment tools in the EMR would maximise accessibility and use of the tool for chronic disease management. However, appropriate practice workflow integration and features that facilitate patient understanding at point-of-care are also essential.

  17. A security mechanism based on evolutionary game in fog computing.

    PubMed

    Sun, Yan; Lin, Fuhong; Zhang, Nan

    2018-02-01

    Fog computing is a distributed computing paradigm at the edge of the network and requires cooperation of users and sharing of resources. When users in fog computing open their resources, their devices are easily intercepted and attacked because they are accessed through wireless network and present an extensive geographical distribution. In this study, a credible third party was introduced to supervise the behavior of users and protect the security of user cooperation. A fog computing security mechanism based on human nervous system is proposed, and the strategy for a stable system evolution is calculated. The MATLAB simulation results show that the proposed mechanism can reduce the number of attack behaviors effectively and stimulate users to cooperate in application tasks positively.

  18. The development of computer ethics: contributions from business ethics and medical ethics.

    PubMed

    Wong, K; Steinke, G

    2000-04-01

    In this essay, we demonstrate that the field of computer ethics shares many core similarities with two other areas of applied ethics. Academicians writing and teaching in the area of computer ethics, along with practitioners, must address ethical issues that are qualitatively similar in nature to those raised in medicine and business. In addition, as academic disciplines, these three fields also share some similar concerns. For example, all face the difficult challenge of maintaining a credible dialogue with diverse constituents such as academicians of various disciplines, professionals, policymakers, and the general public. Given these similarities, the fields of bioethics and business ethics can serve as useful models for the development of computer ethics.

  19. Reliability of visual acuity measurements taken with a notebook and a tablet computer in participants who were illiterate to Roman characters.

    PubMed

    Ruamviboonsuk, Paisan; Sudsakorn, Napitchareeya; Somkijrungroj, Thanapong; Engkagul, Chayanee; Tiensuwan, Montip

    2012-03-01

    Electronic measurement of visual acuity (VA) has been proposed and adopted as a method of determining VA scores in clinical research. Characters (optotypes) are displayed on a monitor screen and the examinee selects a match and inputs his choice to another electronic device. Unfortunately, the optotypes, called Sloan letters, in the standard protocol are 10 Roman characters. This limits their practicabilityfor measuring VA of patients who are illiterate to these characters. The authors introduced a method of displaying the Sloan letters one by one on a notebook and all 10 Sloan letters on a tablet computer screen. The former is for testing the patients whereas the latter is for them to input their responses by tapping on a letter that matches the one on the notebook screen. To assess test-retest reliability of VA scores determined with this method. Participants without ocular abnormality were recruited to have their right eyes measured with the same VA measurement method twice, one week apart. Those who were illiterate to Roman characters were enrolled for the aforementioned method for measuring their VA (Tablet group). A 15-inch display notebook computer and a 9-inch display tablet computer (iPad) communicated via a local wireless data network provided by a Wi-Fi router. Those who understood Roman characters were enrolled to have measurements with a 17-inch desktop computer and an infrared wireless keyboard (Keyboard group). Both methods used the same protocols and software for VA measurements. Reliability of VA scores obtained from each group was assessed by the confidence interval (CI) of the difference of the scores from the test and retest. The t test was used to analyze differences in mean VA scores between the test and retest in each group with p < 0.05 determined as statistically significant. There were 49 and 50 participants in the Tablet and Keyboard group respectively. The 95% CI of the difference between the scores from the test and retest in each group was 2 letters. Approximately 95% of participants in each group had an absolute difference of the scores between the test and retest of 7 letters. The mean of VA scores from the first test was significantly different from that of the second test in the Keyboard group (one-letter difference, p = 0.049); there was no significant difference between these scores in the Tablet group (0.1-letter difference, p = 0.86). Tablet computers may be used to assist patients who are illiterate to Roman characters in having their VA measured with the standard electronic protocol. This preliminary study suggested that the proposed method should be useful for reliable measuring VA outcome in multicenter international clinical trials without encountering a language barrier

  20. A Method of Neighbor Classes Based SVM Classification for Optical Printed Chinese Character Recognition

    PubMed Central

    Zhang, Jie; Wu, Xiaohong; Yu, Yanmei; Luo, Daisheng

    2013-01-01

    In optical printed Chinese character recognition (OPCCR), many classifiers have been proposed for the recognition. Among the classifiers, support vector machine (SVM) might be the best classifier. However, SVM is a classifier for two classes. When it is used for multi-classes in OPCCR, its computation is time-consuming. Thus, we propose a neighbor classes based SVM (NC-SVM) to reduce the computation consumption of SVM. Experiments of NC-SVM classification for OPCCR have been done. The results of the experiments have shown that the NC-SVM we proposed can effectively reduce the computation time in OPCCR. PMID:23536777

  1. Teach Your Computer to Read: Scanners and Optical Character Recognition.

    ERIC Educational Resources Information Center

    Marsden, Jim

    1993-01-01

    Desktop scanners can be used with a software technology called optical character recognition (OCR) to convert the text on virtually any paper document into an electronic form. OCR offers educators new flexibility in incorporating text into tests, lesson plans, and other materials. (MLF)

  2. Neural Network--OCR/ICR Recognology: Theory and Applications.

    ERIC Educational Resources Information Center

    Schantz, Herbert F.

    1993-01-01

    Explains the value of neurocomputing as a unique and effective new technological concept for information processing and optical character recognition. Comparisons are made to digital computing and examples of applications such as recognizing handprinted characters are addressed. Products available from various companies are described. (Contains…

  3. Development of a hybrid mental speller combining EEG-based brain-computer interface and webcam-based eye-tracking.

    PubMed

    Lee, Jun-Hak; Lim, Jeong-Hwan; Hwang, Han-Jeong; Im, Chang-Hwan

    2013-01-01

    The main goal of this study was to develop a hybrid mental spelling system combining a steady-state visual evoked potential (SSVEP)-based brain-computer interface (BCI) technology and a webcam-based eye-tracker, which utilizes information from the brain electrical activity and eye gaze direction at the same time. In the hybrid mental spelling system, a character decoded using SSVEP was not typed if the position of the selected character was not matched with the eye direction information ('left' or 'right') obtained from the eye-tracker. Thus, the users did not need to correct a misspelled character using a 'BACKSPACE' key. To verify the feasibility of the developed hybrid mental spelling system, we conducted online experiments with ten healthy participants. Each participant was asked to type 15 English words consisting of 68 characters. As a result, 16.6 typing errors could be prevented on average, demonstrating that the implemented hybrid mental spelling system could enhance the practicality of our mental spelling system.

  4. Career Planning Modules for the Officer Career Information and Planning System.

    ERIC Educational Resources Information Center

    Phillips, Susan D.; And Others

    This discussion of the modules in an experimental computer-aided system for officer career information and planning system (OCIPS) includes the reasons for its development, a description of the seven modules, and the findings of a preliminary test of four of the modules for feasibility and credibility. Initially developed in response to a need…

  5. Credibility analysis of risk classes by generalized linear model

    NASA Astrophysics Data System (ADS)

    Erdemir, Ovgucan Karadag; Sucu, Meral

    2016-06-01

    In this paper generalized linear model (GLM) and credibility theory which are frequently used in nonlife insurance pricing are combined for reliability analysis. Using full credibility standard, GLM is associated with limited fluctuation credibility approach. Comparison criteria such as asymptotic variance and credibility probability are used to analyze the credibility of risk classes. An application is performed by using one-year claim frequency data of a Turkish insurance company and results of credible risk classes are interpreted.

  6. Character feature integration of Chinese calligraphy and font

    NASA Astrophysics Data System (ADS)

    Shi, Cao; Xiao, Jianguo; Jia, Wenhua; Xu, Canhui

    2013-01-01

    A framework is proposed in this paper to effectively generate a new hybrid character type by means of integrating local contour feature of Chinese calligraphy with structural feature of font in computer system. To explore traditional art manifestation of calligraphy, multi-directional spatial filter is applied for local contour feature extraction. Then the contour of character image is divided into sub-images. The sub-images in the identical position from various characters are estimated by Gaussian distribution. According to its probability distribution, the dilation operator and erosion operator are designed to adjust the boundary of font image. And then new Chinese character images are generated which possess both contour feature of artistical calligraphy and elaborate structural feature of font. Experimental results demonstrate the new characters are visually acceptable, and the proposed framework is an effective and efficient strategy to automatically generate the new hybrid character of calligraphy and font.

  7. An eye movement study for identification of suitable font characters for presentation on a computer screen.

    PubMed

    Banerjee, Jayeeta; Majumdar, Dhurjati; Majumdar, Deepti; Pal, Madhu Sudan

    2010-06-01

    We are experiencing a shifting of media: from the printed paper to the computer screen. This transition is modifying the process of how we read and understand a text. It is very difficult to conclude on suitability of font characters based upon subjective evaluation method only. Present study evaluates the effect of font type on human cognitive workload during perception of individual alphabets on a computer screen. Twenty six young subjects volunteered for this study. Here, subjects have been shown individual characters of different font types and their eye movements have been recorded. A binocular eye movement recorder was used for eye movement recording. The results showed that different eye movement parameters such as pupil diameter, number of fixations, fixation duration were less for font type Verdana. The present study recommends the use of font type Verdana for presentation of individual alphabets on various electronic displays in order to reduce cognitive workload.

  8. Morphological and molecular phylogenetic context of the angiosperms: contrasting the 'top-down' and 'bottom-up' approaches used to infer the likely characteristics of the first flowers.

    PubMed

    Bateman, Richard M; Hilton, Jason; Rudall, Paula J

    2006-01-01

    Recent attempts to address the long-debated 'origin' of the angiosperms depend on a phylogenetic framework derived from a matrix of taxa versus characters; most assume that empirical rigour is proportional to the size of the matrix. Sequence-based genotypic approaches increase the number of characters (nucleotides and indels) in the matrix but are confined to the highly restricted spectrum of extant species, whereas morphology-based approaches increase the number of phylogenetically informative taxa (including fossils) at the expense of accessing only a restricted spectrum of phenotypic characters. The two approaches are currently delivering strongly contrasting hypotheses of relationship. Most molecular studies indicate that all extant gymnosperms form a natural group, suggesting surprisingly early divergence of the lineage that led to angiosperms, whereas morphology-only phylogenies indicate that a succession of (mostly extinct) gymnosperms preceded a later angiosperm origin. Causes of this conflict include: (i) the vast phenotypic and genotypic lacuna, largely reflecting pre-Cenozoic extinctions, that separates early-divergent living angiosperms from their closest relatives among the living gymnosperms; (ii) profound uncertainty regarding which (a) extant and (b) extinct angiosperms are most closely related to gymnosperms; and (iii) profound uncertainty regarding which (a) extant and (b) extinct gymnosperms are most closely related to angiosperms, and thus best serve as 'outgroups' dictating the perceived evolutionary polarity of character transitions among the early-divergent angiosperms. These factors still permit a remarkable range of contrasting, yet credible, hypotheses regarding the order of acquisition of the many phenotypic characters, reproductive and vegetative, that distinguish 'classic' angiospermy from 'classic' gymnospermy. The flower remains ill-defined and its mode (or modes) of origin remains hotly disputed; some definitions and hypotheses of evolutionary relationships preclude a role for the flower in delimiting the angiosperms. We advocate maintenance of parallel, reciprocally illuminating programmes of morphological and molecular phylogeny reconstruction, respectively supported by homology testing through additional taxa (especially fossils) and evolutionary-developmental genetic studies that explore genes potentially responsible for major phenotypic transitions.

  9. An Evaluation of PC-Based Optical Character Recognition Systems.

    ERIC Educational Resources Information Center

    Schreier, E. M.; Uslan, M. M.

    1991-01-01

    The review examines six personal computer-based optical character recognition (OCR) systems designed for use by blind and visually impaired people. Considered are OCR components and terms, documentation, scanning and reading, command structure, conversion, unique features, accuracy of recognition, scanning time, speed, and cost. (DB)

  10. Comparison of credible patients of very low intelligence and non-credible patients on neurocognitive performance validity indicators.

    PubMed

    Smith, Klayton; Boone, Kyle; Victor, Tara; Miora, Deborah; Cottingham, Maria; Ziegler, Elizabeth; Zeller, Michelle; Wright, Matthew

    2014-01-01

    The purpose of this archival study was to identify performance validity tests (PVTs) and standard IQ and neurocognitive test scores, which singly or in combination, differentiate credible patients of low IQ (FSIQ ≤ 75; n = 55) from non-credible patients. We compared the credible participants against a sample of 74 non-credible patients who appeared to have been attempting to feign low intelligence specifically (FSIQ ≤ 75), as well as a larger non-credible sample (n = 383) unselected for IQ. The entire non-credible group scored significantly higher than the credible participants on measures of verbal crystallized intelligence/semantic memory and manipulation of overlearned information, while the credible group performed significantly better on many processing speed and memory tests. Additionally, credible women showed faster finger-tapping speeds than non-credible women. The credible group also scored significantly higher than the non-credible subgroup with low IQ scores on measures of attention, visual perceptual/spatial tasks, processing speed, verbal learning/list learning, and visual memory, and credible women continued to outperform non-credible women on finger tapping. When cut-offs were selected to maintain approximately 90% specificity in the credible group, sensitivity rates were highest for verbal and visual memory measures (i.e., TOMM trials 1 and 2; Warrington Words correct and time; Rey Word Recognition Test total; RAVLT Effort Equation, Trial 5, total across learning trials, short delay, recognition, and RAVLT/RO discriminant function; and Digit Symbol recognition), followed by select attentional PVT scores (i.e., b Test omissions and time to recite four digits forward). When failure rates were tabulated across seven most sensitive scores, a cut-off of ≥ 2 failures was associated with 85.4% specificity and 85.7% sensitivity, while a cut-off of ≥ 3 failures resulted in 95.1% specificity and 66.0% sensitivity. Results are discussed in light of extant literature and directions for future research.

  11. Interaction of external conditions with the internal flowfield in liquid rocket engines - A computational study

    NASA Technical Reports Server (NTRS)

    Trinh, H. P.; Gross, K. W.

    1989-01-01

    Computational studies have been conducted to examine the capability of a CFD code by simulating the steady state thrust chamber internal flow. The SSME served as the sample case, and significant parameter profiles are presented and discussed. Performance predictions from TDK, the recommended JANNAF reference computer program, are compared with those from PHOENICS to establish the credibility of its results. The investigation of an overexpanded nozzle flow is particularly addressed since it plays an important role in the area ratio selection of future rocket engines. Experience gained during this uncompleted flow separation study and future steps are outlined.

  12. Spelling is Just a Click Away - A User-Centered Brain-Computer Interface Including Auto-Calibration and Predictive Text Entry.

    PubMed

    Kaufmann, Tobias; Völker, Stefan; Gunesch, Laura; Kübler, Andrea

    2012-01-01

    Brain-computer interfaces (BCI) based on event-related potentials (ERP) allow for selection of characters from a visually presented character-matrix and thus provide a communication channel for users with neurodegenerative disease. Although they have been topic of research for more than 20 years and were multiply proven to be a reliable communication method, BCIs are almost exclusively used in experimental settings, handled by qualified experts. This study investigates if ERP-BCIs can be handled independently by laymen without expert support, which is inevitable for establishing BCIs in end-user's daily life situations. Furthermore we compared the classic character-by-character text entry against a predictive text entry (PTE) that directly incorporates predictive text into the character-matrix. N = 19 BCI novices handled a user-centered ERP-BCI application on their own without expert support. The software individually adjusted classifier weights and control parameters in the background, invisible to the user (auto-calibration). All participants were able to operate the software on their own and to twice correctly spell a sentence with the auto-calibrated classifier (once with PTE, once without). Our PTE increased spelling speed and, importantly, did not reduce accuracy. In sum, this study demonstrates feasibility of auto-calibrating ERP-BCI use, independently by laymen and the strong benefit of integrating predictive text directly into the character-matrix.

  13. Spelling is Just a Click Away – A User-Centered Brain–Computer Interface Including Auto-Calibration and Predictive Text Entry

    PubMed Central

    Kaufmann, Tobias; Völker, Stefan; Gunesch, Laura; Kübler, Andrea

    2012-01-01

    Brain–computer interfaces (BCI) based on event-related potentials (ERP) allow for selection of characters from a visually presented character-matrix and thus provide a communication channel for users with neurodegenerative disease. Although they have been topic of research for more than 20 years and were multiply proven to be a reliable communication method, BCIs are almost exclusively used in experimental settings, handled by qualified experts. This study investigates if ERP–BCIs can be handled independently by laymen without expert support, which is inevitable for establishing BCIs in end-user’s daily life situations. Furthermore we compared the classic character-by-character text entry against a predictive text entry (PTE) that directly incorporates predictive text into the character-matrix. N = 19 BCI novices handled a user-centered ERP–BCI application on their own without expert support. The software individually adjusted classifier weights and control parameters in the background, invisible to the user (auto-calibration). All participants were able to operate the software on their own and to twice correctly spell a sentence with the auto-calibrated classifier (once with PTE, once without). Our PTE increased spelling speed and, importantly, did not reduce accuracy. In sum, this study demonstrates feasibility of auto-calibrating ERP–BCI use, independently by laymen and the strong benefit of integrating predictive text directly into the character-matrix. PMID:22833713

  14. Biogeography of the Malagasy Celastraceae: Multiple independent origins followed by widespread dispersal of genera from Madagascar.

    PubMed

    Bacon, Christine D; Simmons, Mark P; Archer, Robert H; Zhao, Liang-Cheng; Andriantiana, Jacky

    2016-01-01

    Of the 97 currently recognized genera of Celastraceae, 19 are native to Madagascar, including six endemics. In this study we conducted the most thorough phylogenetic analysis of Celastraceae yet completed with respect to both character and taxon sampling, and include representatives of five new endemic genera. Fifty-one new accessions, together with 328 previously used accessions of Celastrales, were sampled for morphological characters, two rDNA gene regions, and two plastid gene regions. The endemic Malagasy genera are resolved in two separate lineages-Xenodrys by itself and all other endemic genera in a clade that also includes four lineages inferred to have dispersed from Madagascar: Brexia madagascariensis (Mascarene Islands, coastal Africa), Elaeodendron (West Indies, Africa to New Caledonia), and Pleurostylia (Africa to New Caledonia). Of the 12 extant Malagasy Celastraceae lineages identified, eight are clearly of African origin. The origins of the remaining four lineages are less clear, but reasonable possibilities include America, Eurasia, Africa, southern India, Malesia, and Australia. Based on 95% credible age intervals from fossil-calibrated molecular dating, all 12 extant Malagasy Celastraceae lineages appear to have arisen following dispersal after the separation of Madagascar from other landmasses within the last 70 million years. Copyright © 2015 Elsevier Inc. All rights reserved.

  15. Methods for calculating confidence and credible intervals for the residual between-study variance in random effects meta-regression models

    PubMed Central

    2014-01-01

    Background Meta-regression is becoming increasingly used to model study level covariate effects. However this type of statistical analysis presents many difficulties and challenges. Here two methods for calculating confidence intervals for the magnitude of the residual between-study variance in random effects meta-regression models are developed. A further suggestion for calculating credible intervals using informative prior distributions for the residual between-study variance is presented. Methods Two recently proposed and, under the assumptions of the random effects model, exact methods for constructing confidence intervals for the between-study variance in random effects meta-analyses are extended to the meta-regression setting. The use of Generalised Cochran heterogeneity statistics is extended to the meta-regression setting and a Newton-Raphson procedure is developed to implement the Q profile method for meta-analysis and meta-regression. WinBUGS is used to implement informative priors for the residual between-study variance in the context of Bayesian meta-regressions. Results Results are obtained for two contrasting examples, where the first example involves a binary covariate and the second involves a continuous covariate. Intervals for the residual between-study variance are wide for both examples. Conclusions Statistical methods, and R computer software, are available to compute exact confidence intervals for the residual between-study variance under the random effects model for meta-regression. These frequentist methods are almost as easily implemented as their established counterparts for meta-analysis. Bayesian meta-regressions are also easily performed by analysts who are comfortable using WinBUGS. Estimates of the residual between-study variance in random effects meta-regressions should be routinely reported and accompanied by some measure of their uncertainty. Confidence and/or credible intervals are well-suited to this purpose. PMID:25196829

  16. Electronic problem-solving treatment: description and pilot study of an interactive media treatment for depression.

    PubMed

    Cartreine, James Albert; Locke, Steven E; Buckey, Jay C; Sandoval, Luis; Hegel, Mark T

    2012-09-25

    Computer-automated depression interventions rely heavily on users reading text to receive the intervention. However, text-delivered interventions place a burden on persons with depression and convey only verbal content. The primary aim of this project was to develop a computer-automated treatment for depression that is delivered via interactive media technology. By using branching video and audio, the program simulates the experience of being in therapy with a master clinician who provides six sessions of problem-solving therapy. A secondary objective was to conduct a pilot study of the program's usability, acceptability, and credibility, and to obtain an initial estimate of its efficacy. The program was produced in a professional multimedia production facility and incorporates video, audio, graphics, animation, and text. Failure analyses of patient data are conducted across sessions and across problems to identify ways to help the user improve his or her problem solving. A pilot study was conducted with persons who had minor depression. An experimental group (n = 7) used the program while a waitlist control group (n = 7) was provided with no treatment for 6 weeks. All of the experimental group participants completed the trial, whereas 1 from the control was lost to follow-up. Experimental group participants rated the program high on usability, acceptability, and credibility. The study was not powered to detect clinical improvement, although these pilot data are encouraging. Although the study was not powered to detect treatment effects, participants did find the program highly usable, acceptable, and credible. This suggests that the highly interactive and immersive nature of the program is beneficial. Further clinical trials are warranted. ClinicalTrials.gov NCT00906581; http://clinicaltrials.gov/ct2/show/NCT00906581 (Archived by WebCite at http://www.webcitation.org/6A5Ni5HUp).

  17. Comparative implementation of Handwritten and Machine written Gurmukhi text utilizing appropriate parameters

    NASA Astrophysics Data System (ADS)

    Kaur, Jaswinder; Jagdev, Gagandeep, Dr.

    2018-01-01

    Optical character recognition is concerned with the recognition of optically processed characters. The recognition is done offline after the writing or printing has been completed, unlike online recognition where the computer has to recognize the characters instantly as they are drawn. The performance of character recognition depends upon the quality of scanned documents. The preprocessing steps are used for removing low-frequency background noise and normalizing the intensity of individual scanned documents. Several filters are used for reducing certain image details and enabling an easier or faster evaluation. The primary aim of the research work is to recognize handwritten and machine written characters and differentiate them. The language opted for the research work is Punjabi Gurmukhi and tool utilized is Matlab.

  18. On Developing HyperCard Stacks for the Study of Chinese Characters: KanjiCard.

    ERIC Educational Resources Information Center

    Nakajima, Kazuko

    1988-01-01

    Describes "KanjiCard," an interactive self-tutorial program for beginning students of Japanese to learn Kanji, Chinese characters used in the Japanese language. The Macintosh-developed approach uses "HyperCard" technology, computer-assisted animation, and voice digitizing to achieve enhanced graphic presentation. (Author/CB)

  19. Effects on Learning Logographic Character Formation in Computer-Assisted Handwriting Instruction

    ERIC Educational Resources Information Center

    Tsai, Chen-hui; Kuo, Chin-Hwa; Horng, Wen-Bing; Chen, Chun-Wen

    2012-01-01

    This paper reports on a study that investigates how different learning methods might affect the learning process of character handwriting among beginning college learners of Chinese, as measured by tests of recognition, approximate production, precise production, and awareness of conventional stroke sequence. Two methodologies were examined during…

  20. Constructing "Nerdiness": Characterisation in "The Big Bang Theory"

    ERIC Educational Resources Information Center

    Bednarek, Monika

    2012-01-01

    This paper analyses the linguistic construction of the televisual character Sheldon--the "main nerd" in the sitcom "The Big Bang Theory" (CBS, 2007-), approaching this construction of character through both computerised and "manual" linguistic analysis. More specifically, a computer analysis of dialogue (using concordances and keyword analysis) in…

  1. Redefining the magic square on numerical characters

    NASA Astrophysics Data System (ADS)

    Nasution, M. K. M.; Sawaluddin

    2018-02-01

    As a number system, the magic square is different from the others. Characteristic depends not only on size but also depends on numerical character in computation. This paper has redefined the term of magic square formally, by exposing the inductive general characteristics of cases to numerical ordering of numbers.

  2. Building confidence and credibility amid growing model and computing complexity

    NASA Astrophysics Data System (ADS)

    Evans, K. J.; Mahajan, S.; Veneziani, C.; Kennedy, J. H.

    2017-12-01

    As global Earth system models are developed to answer an ever-wider range of science questions, software products that provide robust verification, validation, and evaluation must evolve in tandem. Measuring the degree to which these new models capture past behavior, predict the future, and provide the certainty of predictions is becoming ever more challenging for reasons that are generally well known, yet are still challenging to address. Two specific and divergent needs for analysis of the Accelerated Climate Model for Energy (ACME) model - but with a similar software philosophy - are presented to show how a model developer-based focus can address analysis needs during expansive model changes to provide greater fidelity and execute on multi-petascale computing facilities. A-PRIME is a python script-based quick-look overview of a fully-coupled global model configuration to determine quickly if it captures specific behavior before significant computer time and expense is invested. EVE is an ensemble-based software framework that focuses on verification of performance-based ACME model development, such as compiler or machine settings, to determine the equivalence of relevant climate statistics. The challenges and solutions for analysis of multi-petabyte output data are highlighted from the aspect of the scientist using the software, with the aim of fostering discussion and further input from the community about improving developer confidence and community credibility.

  3. Televised entertainment-education to prevent adolescent alcohol use: perceived realism, enjoyment, and impact.

    PubMed

    van Leeuwen, Lonneke; Renes, Reint Jan; Leeuwis, Cees

    2013-04-01

    Alcohol use among adolescents is a concern in the Netherlands because of its high prevalence and risks. To discourage adolescents from drinking alcohol, a televised entertainment-education (E-E) intervention was developed. This study investigated responses of adolescents on perceived realism and enjoyment of the E-E intervention, as well as its impact on alcohol drinking behavior. Viewers perceived the E-E narratives to be credible and enjoyable but did not relate to the characters in the narratives. However, exposure to the E-E intervention predicted desired changes in alcohol drinking behavior, intentions to decrease alcohol use, and perceived normative pressure, especially in less educated viewers. These findings demonstrate that E-E is a promising strategy to target adolescent alcohol use. Future research will focus on the individual processes and story elements that account for the positive results.

  4. Heredity as transmission of information: Butlerian 'Intelligent Design.'.

    PubMed

    Forsdyke, Donald R

    2006-01-01

    In the 1870s, Ewald Hering and Samuel Butler provided what was, for that time, a scientifically coherent foundation for the Lamarckist view that positive adaptations to the environment acquired during an individual's lifetime can be transmitted to the offspring. Observing that heredity was a form of memory (involving stored information), they distinguished what are now known as genotype and phenotype and proposed that cognitive abilities present in the the most elementary organisms might mediate a transmission of acquired adaptations. While compatible with the then-available facts of evolution, this Butlerian version of 'intelligent design' was rendered less credible by subsequent appreciations of the discrete (discontinuous) inheritance of many phenotypic characters (Mendelism) and of the separation of germ line from soma (Weismanism). However, it can now be seen that 21st-century bioinformatics has 19th-century roots.

  5. Photojournalism Issues for the 1990s: Concerns for All Teachers of Journalism Courses.

    ERIC Educational Resources Information Center

    Lester, Paul

    Journalism instructors are concerned that the credibility of images and consequently of words will suffer if the image content, as the photographer took the picture at the time, is altered by a computer operator far removed from the actual scene. Any discussion of picture manipulation ethics must take into account where and why a picture was…

  6. Tsunami Impact in Morocco due to Most Credible Tsunami Scenarios in the Gulf of Cadiz.

    NASA Astrophysics Data System (ADS)

    Omira, R.; Baptista, M. A.; Miranda, J. M.; Toto, E. A.

    2009-04-01

    In the Gulf of Cadiz, the tsunami risk should be considered major due to the peculiar geological context close to the Nubia-Eurasia plate boundary and also to the high vulnerability of the coastlines in the region. The extensive occupation of coastal areas in the surrounding countries - Portugal, Spain and Morocco, the enormous influxes of tourists during high season and the large economic value of harbors and other coastal facilities increase considerably the vulnerability to tsunami impact. In order to establish the Most Credible Tsunami Scenarios we used the earthquake scenarios in the Gulf of Cadiz area. Each scenario has an associated typical fault/or faults and a set of fault parameters that are used as input to compute the sea bottom deformation using Okada's equations. Tsunami propagation uses COMCOT-LX, modified version of the COMCOT Cornnell University code. Maximum wave height (MWH) and tsunami energy direction are computed, for each tsunamigenic scenario for the north Atlantic coast of Morocco. Finally we selected the harbor of Casablanca for the production of inundation maps for Casablanca This research was funded by NEAREST and TRANSFER, 6FP-European Union.

  7. Communication Aid with Human Eyes Only

    NASA Astrophysics Data System (ADS)

    Arai, Kohei; Yajima, Kenro

    A communication aid with human eyes only is proposed. A set of candidate character is displayed onto computer screen of relatively small and light Head Mount Display: HMD that is mounted on glasses of which user wears on. When user looks at a candidate character with his/hers left eye while right eye picture is taken with small and light web camera that also is mounted on the glasses. The proposed system can selects 81 characters with two layers of 9 by 9 character candidate image. Other than these there is another selective image including control keys and frequently use of sentences. By using image matching between previously acquired template image for each candidate character and the currently acquired image, the proposed system realizes that which character in the candidates is selected. By using blinking and fix one's eye on combine together, the proposed system recognizes that user determines the selected key from the candidates. The blinking detection method employs a morphologic filter to avoid misunderstanding of dark eye detection due to eyebrows and shadows. Thus user can input sentences. User also may edit the sentences and then the sentences are read with Text to Speech: TTS software tool. Thus the system allows support conversations between handicapped and disabled persons without voice and the others peoples because only the function required for conversation is human eyes. Also the proposed system can be used as an input system for wearable computing systems. Test results by the 6 different able persons show that the proposed system does work with acceptable speed, around 1.5 second / character.

  8. Measuring Credibility Perceptions in CSR Communication: A Scale Development to Test Readers’ Perceived Credibility of CSR Reports

    PubMed Central

    Lock, Irina; Seele, Peter

    2017-01-01

    Credibility is central to communication but often jeopardized by “credibility gaps.” This is especially true for communication about corporate social responsibility (CSR). To date, no tool has been available to analyze stakeholders’ credibility perceptions of CSR communication. This article presents a series of studies conducted to develop a scale to assess the perceived credibility of CSR reports, one of CSR communication’s most important tools. The scale provides a novel operationalization of credibility using validity claims of Habermas’s ideal speech situation as subdimensions. The scale development process, carried out in five studies including a literature review, a Delphi study, and three validation studies applying confirmatory factor analysis, resulted in the 16-item Perceived Credibility (PERCRED) scale. The scale shows convergent, discriminant, concurrent, and nomological validity and is the first validated measure for analyzing credibility perceptions of CSR reports. PMID:29278260

  9. Measuring Credibility Perceptions in CSR Communication: A Scale Development to Test Readers' Perceived Credibility of CSR Reports.

    PubMed

    Lock, Irina; Seele, Peter

    2017-11-01

    Credibility is central to communication but often jeopardized by "credibility gaps." This is especially true for communication about corporate social responsibility (CSR). To date, no tool has been available to analyze stakeholders' credibility perceptions of CSR communication. This article presents a series of studies conducted to develop a scale to assess the perceived credibility of CSR reports, one of CSR communication's most important tools. The scale provides a novel operationalization of credibility using validity claims of Habermas's ideal speech situation as subdimensions. The scale development process, carried out in five studies including a literature review, a Delphi study, and three validation studies applying confirmatory factor analysis, resulted in the 16-item Perceived Credibility (PERCRED) scale. The scale shows convergent, discriminant, concurrent, and nomological validity and is the first validated measure for analyzing credibility perceptions of CSR reports.

  10. Source Credibility in Tobacco Control Messaging

    PubMed Central

    Schmidt, Allison M.; Ranney, Leah M.; Pepper, Jessica K.; Goldstein, Adam O.

    2016-01-01

    Objectives Perceived credibility of a message’s source can affect persuasion. This paper reviews how beliefs about the source of tobacco control messages may encourage attitude and behavior change. Methods We conducted a series of searches of the peer-reviewed literature using terms from communication and public health fields. We reviewed research on source credibility, its underlying concepts, and its relation to the persuasiveness of tobacco control messages. Results We recommend an agenda for future research to bridge the gaps between communication literature on source credibility and tobacco control research. Our recommendations are to study the impact of source credibility on persuasion with long-term behavior change outcomes, in different populations and demographic groups, by developing new credibility measures that are topic- and organization-specific, by measuring how credibility operates across media platforms, and by identifying factors that enhance credibility and persuasion. Conclusions This manuscript reviews the state of research on source credibility and identifies gaps that are maximally relevant to tobacco control communication. Knowing first whether a source is perceived as credible, and second, how to enhance perceived credibility, can inform the development of future tobacco control campaigns and regulatory communications. PMID:27525298

  11. The Entangled Histories of Physics and Computation

    NASA Astrophysics Data System (ADS)

    Rodriguez, Cesar

    2007-03-01

    The history of physics and computation intertwine in a fascinating manner that is relevant to the field of quantum computation. This talk focuses of the interconnections between both by examining their rhyming philosophies, recurrent characters and common themes. Leibniz not only was one of the lead figures of calculus, but also left his footprint in physics and invented the concept of a universal computational language. This last idea was further developed by Boole, Russell, Hilbert and G"odel. Physicists such as Boltzmann and Maxwell also established the foundation of the field of information theory later developed by Shannon. The war efforts of von Neumann and Turing can be juxtaposed to the Manhattan Project. Professional and personal connections of these characters to the development of physics will be emphasized. Recently, new cryptographic developments lead to a reexamination of the fundamentals of quantum mechanics, while quantum computation is discovering a new perspective on the nature of information itself.

  12. Motion Planning and Synthesis of Human-Like Characters in Constrained Environments

    NASA Astrophysics Data System (ADS)

    Zhang, Liangjun; Pan, Jia; Manocha, Dinesh

    We give an overview of our recent work on generating naturally-looking human motion in constrained environments with multiple obstacles. This includes a whole-body motion planning algorithm for high DOF human-like characters. The planning problem is decomposed into a sequence of low dimensional sub-problems. We use a constrained coordination scheme to solve the sub-problems in an incremental manner and a local path refinement algorithm to compute collision-free paths in tight spaces and satisfy the statically stable constraint on CoM. We also present a hybrid algorithm to generate plausible motion by combing the motion computed by our planner with mocap data. We demonstrate the performance of our algorithm on a 40 DOF human-like character and generate efficient motion strategies for object placement, bending, walking, and lifting in complex environments.

  13. The function of credibility in information processing for risk perception.

    PubMed

    Trumbo, Craig W; McComas, Katherine A

    2003-04-01

    This study examines how credibility affects the way people process information and how they subsequently perceive risk. Three conceptual areas are brought together in this analysis: the psychometric model of risk perception, Eagly and Chaiken's heuristic-systematic information processing model, and Meyer's credibility index. Data come from a study of risk communication in the circumstance of state health department investigations of suspected cancer clusters (five cases, N = 696). Credibility is assessed for three information sources: state health departments, citizen groups, and industries involved in each case. Higher credibility for industry and the state directly predicts lower risk perception, whereas high credibility for citizen groups predicts greater risk perception. A path model shows that perceiving high credibility for industry and state-and perceiving low credibility for citizen groups-promotes heuristic processing, which in turn is a strong predictor of lower risk perception. Alternately, perceiving industry and the state to have low credibility also promotes greater systematic processing, which consistently leads to perception of greater risk. Between a one-fifth and one-third of the effect of credibility on risk perception is shown to be indirectly transmitted through information processing.

  14. Improving computer security for authentication of users: influence of proactive password restrictions.

    PubMed

    Proctor, Robert W; Lien, Mei-Ching; Vu, Kim-Phuong L; Schultz, E Eugene; Salvendy, Gavriel

    2002-05-01

    Entering a username-password combination is a widely used procedure for identification and authentication in computer systems. However, it is a notoriously weak method, in that the passwords adopted by many users are easy to crack. In an attempt to improve security, proactive password checking may be used, in which passwords must meet several criteria to be more resistant to cracking. In two experiments, we examined the influence of proactive password restrictions on the time that it took to generate an acceptable password and to use it subsequently to long in. The required length was a minimum of five characters in Experiment 1 and eight characters in Experiment 2. In both experiments, one condition had only the length restriction, and the other had additional restrictions. The additional restrictions greatly increased the time it took to generate the password but had only a small effect on the time it took to use it subsequently to long in. For the five-character passwords, 75% were cracked when no other restrictions were imposed, and this was reduced to 33% with the additional restrictions. For the eight-character passwords, 17% were cracked with no other restrictions, and 12.5% with restrictions. The results indicate that increasing the minimum character length reduces crackability and increases security, regardless of whether additional restrictions are imposed.

  15. One approach to design of speech emotion database

    NASA Astrophysics Data System (ADS)

    Uhrin, Dominik; Chmelikova, Zdenka; Tovarek, Jaromir; Partila, Pavol; Voznak, Miroslav

    2016-05-01

    This article describes a system for evaluating the credibility of recordings with emotional character. Sound recordings form Czech language database for training and testing systems of speech emotion recognition. These systems are designed to detect human emotions in his voice. The emotional state of man is useful in the security forces and emergency call service. Man in action (soldier, police officer and firefighter) is often exposed to stress. Information about the emotional state (his voice) will help to dispatch to adapt control commands for procedure intervention. Call agents of emergency call service must recognize the mental state of the caller to adjust the mood of the conversation. In this case, the evaluation of the psychological state is the key factor for successful intervention. A quality database of sound recordings is essential for the creation of the mentioned systems. There are quality databases such as Berlin Database of Emotional Speech or Humaine. The actors have created these databases in an audio studio. It means that the recordings contain simulated emotions, not real. Our research aims at creating a database of the Czech emotional recordings of real human speech. Collecting sound samples to the database is only one of the tasks. Another one, no less important, is to evaluate the significance of recordings from the perspective of emotional states. The design of a methodology for evaluating emotional recordings credibility is described in this article. The results describe the advantages and applicability of the developed method.

  16. The effect of top-level domains and advertisements on health web-site credibility.

    PubMed

    Walther, Joseph B; Wang, Zuoming; Loh, Tracy

    2004-09-03

    Concerns over health information on the Internet have generated efforts to enhance credibility markers; yet how users actually assess the credibility of online health information is largely unknown. This study set out to (1) establish a parsimonious and valid questionnaire instrument to measure credibility of Internet health information by drawing on various previous measures of source, news, and other credibility scales; and (2) to identify the effects of Web-site domains and advertising on credibility perceptions. Respondents (N = 156) examined one of 12 Web-site mock-ups and completed credibility scales in a 3 x 2 x 2 between-subjects experimental design. Factor analysis and validity checks were used for item reduction, and analysis of variance was employed for hypothesis testing of Web-site features' effects. In an attempt to construct a credibility instrument, three dimensions of credibility (safety, trustworthiness, and dynamism) were retained, reflecting traditional credibility sub-themes, but composed of items from disparate sources. When testing the effect of the presence or absence of advertising on a Web site on credibility, we found that this depends on the site's domain, with a trend for advertisements having deleterious effects on the credibility of sites with .org domain, but positive effects on sites with .com or .edu domains. Health-information Web-site providers should select domains purposefully when they can, especially if they must accept on-site advertising. Credibility perceptions may not be invariant or stable, but rather are sensitive to topic and context. Future research may employ these findings in order to compare other forms of health-information delivery to optimal Web-site features.

  17. Printed Arabic optical character segmentation

    NASA Astrophysics Data System (ADS)

    Mohammad, Khader; Ayyesh, Muna; Qaroush, Aziz; Tumar, Iyad

    2015-03-01

    A considerable progress in recognition techniques for many non-Arabic characters has been achieved. In contrary, few efforts have been put on the research of Arabic characters. In any Optical Character Recognition (OCR) system the segmentation step is usually the essential stage in which an extensive portion of processing is devoted and a considerable share of recognition errors is attributed. In this research, a novel segmentation approach for machine Arabic printed text with diacritics is proposed. The proposed method reduces computation, errors, gives a clear description for the sub-word and has advantages over using the skeleton approach in which the data and information of the character can be lost. Both of initial evaluation and testing of the proposed method have been developed using MATLAB and shows 98.7% promising results.

  18. A revised cranial description of Massospondylus carinatus Owen (Dinosauria: Sauropodomorpha) based on computed tomographic scans and a review of cranial characters for basal Sauropodomorpha

    PubMed Central

    2018-01-01

    Massospondylus carinatus is a basal sauropodomorph dinosaur from the early Jurassic Elliot Formation of South Africa. It is one of the best-represented fossil dinosaur taxa, known from hundreds of specimens including at least 13 complete or nearly complete skulls. Surprisingly, the internal cranial anatomy of M. carinatus has never been described using computed tomography (CT) methods. Using CT scans and 3D digital representations, we digitally reconstruct the bones of the facial skeleton, braincase, and palate of a complete, undistorted cranium of M. carinatus (BP/1/5241). We describe the anatomical features of the cranial bones, and compare them to other closely related sauropodomorph taxa such as Plateosaurus erlenbergiensis, Lufengosaurus huenei, Sarahsaurus aurifontanalis and Efraasia minor. We identify a suite of character states of the skull and braincase for M. carinatus that sets it apart from other taxa, but these remain tentative due to the lack of comparative sauropodomorph braincase descriptions in the literature. Furthermore, we hypothesize 27 new cranial characters useful for determining relationships in non-sauropodan Sauropodomorpha, delete five pre-existing characters and revise the scores of several existing cranial characters to make more explicit homology statements. All the characters that we hypothesized or revised are illustrated. Using parsimony as an optimality criterion, we then test the relationships of M. carinatus (using BP/1/5241 as a specimen-level exemplar) in our revised phylogenetic data matrix. PMID:29340238

  19. New insights into faster computation of uncertainties

    NASA Astrophysics Data System (ADS)

    Bhattacharya, Atreyee

    2012-11-01

    Heavy computation power, lengthy simulations, and an exhaustive number of model runs—often these seem like the only statistical tools that scientists have at their disposal when computing uncertainties associated with predictions, particularly in cases of environmental processes such as groundwater movement. However, calculation of uncertainties need not be as lengthy, a new study shows. Comparing two approaches—the classical Bayesian “credible interval” and a less commonly used regression-based “confidence interval” method—Lu et al. show that for many practical purposes both methods provide similar estimates of uncertainties. The advantage of the regression method is that it demands 10-1000 model runs, whereas the classical Bayesian approach requires 10,000 to millions of model runs.

  20. Reliability and maintainability assessment factors for reliable fault-tolerant systems

    NASA Technical Reports Server (NTRS)

    Bavuso, S. J.

    1984-01-01

    A long term goal of the NASA Langley Research Center is the development of a reliability assessment methodology of sufficient power to enable the credible comparison of the stochastic attributes of one ultrareliable system design against others. This methodology, developed over a 10 year period, is a combined analytic and simulative technique. An analytic component is the Computer Aided Reliability Estimation capability, third generation, or simply CARE III. A simulative component is the Gate Logic Software Simulator capability, or GLOSS. The numerous factors that potentially have a degrading effect on system reliability and the ways in which these factors that are peculiar to highly reliable fault tolerant systems are accounted for in credible reliability assessments. Also presented are the modeling difficulties that result from their inclusion and the ways in which CARE III and GLOSS mitigate the intractability of the heretofore unworkable mathematics.

  1. Application of Bayesian model averaging to measurements of the primordial power spectrum

    NASA Astrophysics Data System (ADS)

    Parkinson, David; Liddle, Andrew R.

    2010-11-01

    Cosmological parameter uncertainties are often stated assuming a particular model, neglecting the model uncertainty, even when Bayesian model selection is unable to identify a conclusive best model. Bayesian model averaging is a method for assessing parameter uncertainties in situations where there is also uncertainty in the underlying model. We apply model averaging to the estimation of the parameters associated with the primordial power spectra of curvature and tensor perturbations. We use CosmoNest and MultiNest to compute the model evidences and posteriors, using cosmic microwave data from WMAP, ACBAR, BOOMERanG, and CBI, plus large-scale structure data from the SDSS DR7. We find that the model-averaged 95% credible interval for the spectral index using all of the data is 0.940

  2. Distance-constrained orthogonal Latin squares for brain-computer interface.

    PubMed

    Luo, Gang; Min, Wanli

    2012-02-01

    The P300 brain-computer interface (BCI) using electroencephalogram (EEG) signals can allow amyotrophic lateral sclerosis (ALS) patients to instruct computers to perform tasks. To strengthen the P300 response and increase classification accuracy, we proposed an experimental design where characters are intensified according to orthogonal Latin square pairs. These orthogonal Latin square pairs satisfy certain distance constraint so that neighboring characters are not intensified simultaneously. However, it is unknown whether such distance-constrained, orthogonal Latin square pairs actually exist. In this paper, we show that for every matrix size commonly used in P300 BCI, thousands to millions of such distance-constrained, orthogonal Latin square pairs can be systematically and efficiently constructed and are sufficient for the purpose of being used in P300 BCI.

  3. The role of corporate credibility in legitimizing disease promotion.

    PubMed

    McDaniel, Patricia A; Malone, Ruth E

    2009-03-01

    We explored what corporate "credibility" means to tobacco companies to determine why it matters to companies and what a lack of credibility means to them. We collected documents from an online tobacco industry document archive and analyzed them with an interpretive approach. Tobacco companies conceptualized credibility not as being worthy of belief or confidence but as inspiring it. Thus, credibility was understood primarily as altering public perception of the industry. "Truth" was largely absent from tobacco industry conceptualizations of credibility, which were linked with "responsibility" and "reasonableness." However, industry research found that the public regarded credibility and responsibility differently, expecting these to entail truth telling, advertising reductions, less harmful products, apologies for deception, making amends, or exiting the tobacco business altogether. Overall, industry credibility-building projects failed repeatedly. Public health discourse increasingly attends to the roles of corporations in promoting disease. Industries such as tobacco and alcohol have been identified as profiting from harmful products. Yet corporations' ability to continue business as usual requires sustaining an implicit societal assent to their activities that depends on corporate credibility. For public health to address corporate disease promotion effectively, undermining corporate credibility may be strategically important.

  4. The Effect of Top-Level Domains and Advertisements on Health Web Site Credibility

    PubMed Central

    Wang, Zuoming; Loh, Tracy

    2004-01-01

    Background Concerns over health information on the Internet have generated efforts to enhance credibility markers; yet how users actually assess the credibility of online health information is largely unknown. Objective This study set out to (1) establish a parsimonious and valid questionnaire instrument to measure credibility of Internet health information by drawing on various previous measures of source, news, and other credibility scales; and (2) to identify the effects of Web-site domains and advertising on credibility perceptions. Methods Respondents (N = 156) examined one of 12 Web-site mock-ups and completed credibility scales in a 3 x 2 x 2 between-subjects experimental design. Factor analysis and validity checks were used for item reduction, and analysis of variance was employed for hypothesis testing of Web-site features' effects. Results In an attempt to construct a credibility instrument, three dimensions of credibility (safety, trustworthiness, and dynamism) were retained, reflecting traditional credibility sub-themes, but composed of items from disparate sources. When testing the effect of the presence or absence of advertising on a Web site on credibility, we found that this depends on the site's domain, with a trend for advertisements having deleterious effects on the credibility of sites with .org domain, but positive effects on sites with .com or .edu domains. Conclusions Health-information Web-site providers should select domains purposefully when they can, especially if they must accept on-site advertising. Credibility perceptions may not be invariant or stable, but rather are sensitive to topic and context. Future research may employ these findings in order to compare other forms of health-information delivery to optimal Web-site features. PMID:15471750

  5. Cross-validation of the Dot Counting Test in a large sample of credible and non-credible patients referred for neuropsychological testing.

    PubMed

    McCaul, Courtney; Boone, Kyle B; Ermshar, Annette; Cottingham, Maria; Victor, Tara L; Ziegler, Elizabeth; Zeller, Michelle A; Wright, Matthew

    2018-01-18

    To cross-validate the Dot Counting Test in a large neuropsychological sample. Dot Counting Test scores were compared in credible (n = 142) and non-credible (n = 335) neuropsychology referrals. Non-credible patients scored significantly higher than credible patients on all Dot Counting Test scores. While the original E-score cut-off of ≥17 achieved excellent specificity (96.5%), it was associated with mediocre sensitivity (52.8%). However, the cut-off could be substantially lowered to ≥13.80, while still maintaining adequate specificity (≥90%), and raising sensitivity to 70.0%. Examination of non-credible subgroups revealed that Dot Counting Test sensitivity in feigned mild traumatic brain injury (mTBI) was 55.8%, whereas sensitivity was 90.6% in patients with non-credible cognitive dysfunction in the context of claimed psychosis, and 81.0% in patients with non-credible cognitive performance in depression or severe TBI. Thus, the Dot Counting Test may have a particular role in detection of non-credible cognitive symptoms in claimed psychiatric disorders. Alternative to use of the E-score, failure on ≥1 cut-offs applied to individual Dot Counting Test scores (≥6.0″ for mean grouped dot counting time, ≥10.0″ for mean ungrouped dot counting time, and ≥4 errors), occurred in 11.3% of the credible sample, while nearly two-thirds (63.6%) of the non-credible sample failed one of more of these cut-offs. An E-score cut-off of 13.80, or failure on ≥1 individual score cut-offs, resulted in few false positive identifications in credible patients, and achieved high sensitivity (64.0-70.0%), and therefore appear appropriate for use in identifying neurocognitive performance invalidity.

  6. Teaching 3D computer animation to illustrators: the instructor as translator and technical director.

    PubMed

    Koning, Wobbe F

    2012-01-01

    An art instructor discusses the difficulties he's encountered teaching computer graphics skills to undergraduate art students. To help the students, he introduced an automated-rigging script for character animation.

  7. Automation Rover for Extreme Environments

    NASA Technical Reports Server (NTRS)

    Sauder, Jonathan; Hilgemann, Evan; Johnson, Michael; Parness, Aaron; Hall, Jeffrey; Kawata, Jessie; Stack, Kathryn

    2017-01-01

    Almost 2,300 years ago the ancient Greeks built the Antikythera automaton. This purely mechanical computer accurately predicted past and future astronomical events long before electronics existed1. Automata have been credibly used for hundreds of years as computers, art pieces, and clocks. However, in the past several decades automata have become less popular as the capabilities of electronics increased, leaving them an unexplored solution for robotic spacecraft. The Automaton Rover for Extreme Environments (AREE) proposes an exciting paradigm shift from electronics to a fully mechanical system, enabling longitudinal exploration of the most extreme environments within the solar system.

  8. Nonlinear filtering for character recognition in low quality document images

    NASA Astrophysics Data System (ADS)

    Diaz-Escobar, Julia; Kober, Vitaly

    2014-09-01

    Optical character recognition in scanned printed documents is a well-studied task, where the captured conditions like sheet position, illumination, contrast and resolution are controlled. Nowadays, it is more practical to use mobile devices for document capture than a scanner. So as a consequence, the quality of document images is often poor owing to presence of geometric distortions, nonhomogeneous illumination, low resolution, etc. In this work we propose to use multiple adaptive nonlinear composite filters for detection and classification of characters. Computer simulation results obtained with the proposed system are presented and discussed.

  9. Information-seeking practices of dental hygienists.

    PubMed Central

    Gravois, S L; Fisher, W; Bowen, D M

    1995-01-01

    This paper reports on a survey of the information-seeking, critical-analysis, and computer-application practices of dental hygienists. Questionnaires were mailed to a convenience sample of seventy-one dental hygiene practitioners. A 62% response rate was achieved. Results indicated that discussions with colleagues, continuing education courses, journals, and newsletters were the sources used most frequently for professional development and information retrieval. To evaluate professional information, these hygienists tended to rely on personal experience, credibility of the journal, and discussions with colleagues. Word processing was the most frequently used computer application; online database searching was rare in this group. Computer used within the employment setting was primarily for business rather than clinical applications. Many hygienists were interested in attending continuing education courses on use of computers to acquire professional information. PMID:8547904

  10. Modelling acquired dyslexia: a software tool for developing grapheme-phoneme correspondences.

    PubMed Central

    D'Autrechy, C. L.; Reggia, J. A.; Berndt, R. S.

    1991-01-01

    In extending a computer model of acquired dyslexia, it has become necessary to develop a way to group printed characters in a word so that the character groups essentially have a one-to-one correspondence with the word's phonemes (speech sounds). This requires deriving a set of correspondences (legal character groupings, legal associations of character groups with phonemes, etc.) that yield a single grouping or "segmentation" of characters when applied to any English word. To facilitate and partially automate this task, a segmentation program has been developed that uses an interchangeable set of correspondences. The program segments words according to these correspondences and tabulates their success over large sets of words. The program has been used successfully to segment a 20,000 word corpus, demonstrating that this approach can be used effectively and efficiently. PMID:1807611

  11. Role of Kekulé and Non-Kekulé Structures in the Radical Character of Alternant Polycyclic Aromatic Hydrocarbons: A TAO-DFT Study

    PubMed Central

    Yeh, Chia-Nan; Chai, Jeng-Da

    2016-01-01

    We investigate the role of Kekulé and non-Kekulé structures in the radical character of alternant polycyclic aromatic hydrocarbons (PAHs) using thermally-assisted-occupation density functional theory (TAO-DFT), an efficient electronic structure method for the study of large ground-state systems with strong static correlation effects. Our results reveal that the studies of Kekulé and non-Kekulé structures qualitatively describe the radical character of alternant PAHs, which could be useful when electronic structure calculations are infeasible due to the expensive computational cost. In addition, our results support previous findings on the increase in radical character with increasing system size. For alternant PAHs with the same number of aromatic rings, the geometrical arrangements of aromatic rings are responsible for their radical character. PMID:27457289

  12. The effectiveness of humor in persuasion: the case of business ethics training.

    PubMed

    Lyttle, J

    2001-04-01

    In this study, persuasion theory was used to develop the following predictions about use of humor in persuasive messages for business ethics training: (a) cartoon drawings will enhance persuasion by creating liking for the source, (b) ironic wisecracks will enhance persuasion by serving as a distraction from counterarguments, and (c) self-effacing humor will enhance persuasion by improving source credibility. Canadian business students (N = 148) participated in 1 of 4 versions of "The Ethics Challenge," a training exercise used by the Lockheed Martin Corporation. Three versions were modified by adding or removing cartoon drawings (of cartoon characters Dilbert and Dogbert) and humorous responses (Dogbert's wisecracks). Removing the cartoon drawings had little effect on persuasiveness. Removing ironic wisecracks had more effect, and interfering with the self-effacing combination of cartoons and wisecracks had the strongest effect. The results suggest that researchers should ground their predictions in existing theory and that practitioners should differentiate among humor types.

  13. So what exactly is nursing knowledge?

    PubMed

    Clarke, L

    2011-06-01

    This paper aims to present a discussion about intrinsic nursing knowledge. The paper stems from the author's study of knowledge claims enshrined in nursing journal articles, books and conference speeches. It is argued that claims by academic nurses have largely depended on principles drawn from continental and not Analytic (British-American) philosophy. Thus, claims are credible only insofar as they defer propositional logic. This is problematic inasmuch as nursing is a practice-based activity usually carried out in medical settings. Transpersonal nursing models are particularly criticizable in respect of their unworldly character as are also concepts based on shallow usages of physics or mathematics. I argue that sensible measurements of the 'real world' are possible--without endorsing positivism--and that nursing requires little recourse to logically unsustainable claims. The paper concludes with an analysis of a recent review of nursing knowledge, which analysis indicates the circularity that attends many discussions on the topic. © 2011 Blackwell Publishing.

  14. Computer-Assisted Spanish-Composition Survey--1986.

    ERIC Educational Resources Information Center

    Harvey, T. Edward

    1986-01-01

    A survey of high school and higher education teachers' (N=208) attitudes regarding the use of computers for Spanish-composition instruction revealed that: the lack of foreign-character support remains the major frustration; most teachers used Apple or IBM computers; and there was mixed opinion regarding the real versus the expected benefits of…

  15. Computers for the Disabled.

    ERIC Educational Resources Information Center

    Lazzaro, Joseph J.

    1993-01-01

    Describes adaptive technology for personal computers that accommodate disabled users and may require special equipment including hardware, memory, expansion slots, and ports. Highlights include vision aids, including speech synthesizers, magnification, braille, and optical character recognition (OCR); hearing adaptations; motor-impaired…

  16. Explaining evolution via constrained persistent perfect phylogeny

    PubMed Central

    2014-01-01

    Background The perfect phylogeny is an often used model in phylogenetics since it provides an efficient basic procedure for representing the evolution of genomic binary characters in several frameworks, such as for example in haplotype inference. The model, which is conceptually the simplest, is based on the infinite sites assumption, that is no character can mutate more than once in the whole tree. A main open problem regarding the model is finding generalizations that retain the computational tractability of the original model but are more flexible in modeling biological data when the infinite site assumption is violated because of e.g. back mutations. A special case of back mutations that has been considered in the study of the evolution of protein domains (where a domain is acquired and then lost) is persistency, that is the fact that a character is allowed to return back to the ancestral state. In this model characters can be gained and lost at most once. In this paper we consider the computational problem of explaining binary data by the Persistent Perfect Phylogeny model (referred as PPP) and for this purpose we investigate the problem of reconstructing an evolution where some constraints are imposed on the paths of the tree. Results We define a natural generalization of the PPP problem obtained by requiring that for some pairs (character, species), neither the species nor any of its ancestors can have the character. In other words, some characters cannot be persistent for some species. This new problem is called Constrained PPP (CPPP). Based on a graph formulation of the CPPP problem, we are able to provide a polynomial time solution for the CPPP problem for matrices whose conflict graph has no edges. Using this result, we develop a parameterized algorithm for solving the CPPP problem where the parameter is the number of characters. Conclusions A preliminary experimental analysis shows that the constrained persistent perfect phylogeny model allows to explain efficiently data that do not conform with the classical perfect phylogeny model. PMID:25572381

  17. Why do morphological phylogenies vary in quality? An investigation based on the comparative history of lizard clades.

    PubMed

    Arnold, E N

    1990-05-22

    Phylogenies based on morphology vary considerably in their quality: some are robust and explicit with little conflict in the data set, whereas others are far more tenuous, with much conflict and many possible alternatives. The main primary reasons for untrue or inexplicit morphological phylogenies are: not enough characters developed between branching points, uncertain character polarity, poorly differentiated character states, homoplasy caused by parallelism or reversal, and extinction, which may remove species entirely from consideration and can make originally conflicting data sets misleadingly compatible, increasing congruence at the expense of truth. Extinction differs from other confounding factors in not being apparent either in the data set or in subsequent analysis. One possibility is that variation in the quality of morphological phylogenies has resulted from exposure to different ecological situations. To investigate this, it is necessary to compare the histories of the clades concerned. In the case of explicit morphological phylogenies, ecological and behavioural data can be integrated with them and it may then be possible to decide whether morphological characters are likely to have been elicited by the environments through which the clade has passed. The credibility of such results depends not only on the phylogeny being robust but also on its detailed topology: a pectinate phylogeny will often allow more certain and more explicit statements to be made about historical events. In the case of poor phylogenies, it is not possible to produce detailed histories, but they can be compared with robust phylogenies in the range of ecological situations occupied, and whether they occupy novel situations in comparison with their outgroups. LeQuesne testing can give information about niche homoplasy, and it may also be possible to see if morphological features are functionally associated with ecological parameters, even if the direction of change is unknown. Examination of the robust and explicit phylogeny of the semaphore geckoes (Pristurus) suggests that its quality does stem from a variety of environmental factors. The group has progressed along an ecological continuum, passing through a series of increasingly severe niches that appear to have elicited many morphological changes. The fact that niches are progressively filled reduces the likelihood of species reinvading a previous one with related character reversal. Because the niches of advanced Pristurus are virtually unique within the Gekkonidae the morphological changes produced are also very rare and therefore easy to polarize. Ecological changes on the main stem of the phylogeny are abrupt and associated character states consequently well differentiated.(ABSTRACT TRUNCATED AT 400 WORDS)

  18. Empirical evaluation of the uncanny valley hypothesis fails to confirm the predicted effect of motion.

    PubMed

    Piwek, Lukasz; McKay, Lawrie S; Pollick, Frank E

    2014-03-01

    The uncanny valley hypothesis states that the acceptability of an artificial character will not increase linearly in relation to its likeness to human form. Instead, after an initial rise in acceptability there will be a pronounced decrease when the character is similar, but not identical to human form (Mori, 1970/2012). Moreover, it has been claimed but never directly tested that movement would accentuate this dip and make moving characters less acceptable. We used a number of full-body animated computer characters along with a parametrically defined motion set to examine the effect of motion quality on the uncanny valley. We found that improving the motion quality systematically improved the acceptability of the characters. In particular, the character classified in the deepest location of the uncanny valley became more acceptable when it was animated. Our results showed that although an uncanny valley was found for static characters, the deepening of the valley with motion, originally predicted by Mori (1970/2012), was not obtained. Copyright © 2013 Elsevier B.V. All rights reserved.

  19. Simulation Credibility: Advances in Verification, Validation, and Uncertainty Quantification

    NASA Technical Reports Server (NTRS)

    Mehta, Unmeel B. (Editor); Eklund, Dean R.; Romero, Vicente J.; Pearce, Jeffrey A.; Keim, Nicholas S.

    2016-01-01

    Decision makers and other users of simulations need to know quantified simulation credibility to make simulation-based critical decisions and effectively use simulations, respectively. The credibility of a simulation is quantified by its accuracy in terms of uncertainty, and the responsibility of establishing credibility lies with the creator of the simulation. In this volume, we present some state-of-the-art philosophies, principles, and frameworks. The contributing authors involved in this publication have been dedicated to advancing simulation credibility. They detail and provide examples of key advances over the last 10 years in the processes used to quantify simulation credibility: verification, validation, and uncertainty quantification. The philosophies and assessment methods presented here are anticipated to be useful to other technical communities conducting continuum physics-based simulations; for example, issues related to the establishment of simulation credibility in the discipline of propulsion are discussed. We envision that simulation creators will find this volume very useful to guide and assist them in quantitatively conveying the credibility of their simulations.

  20. Including autapomorphies is important for paleontological tip-dating with clocklike data, but not with non-clock data.

    PubMed

    Matzke, Nicholas J; Irmis, Randall B

    2018-01-01

    Tip-dating, where fossils are included as dated terminal taxa in Bayesian dating inference, is an increasingly popular method. Data for these studies often come from morphological character matrices originally developed for non-dated, and usually parsimony, analyses. In parsimony, only shared derived characters (synapomorphies) provide grouping information, so many character matrices have an ascertainment bias: they omit autapomorphies (unique derived character states), which are considered uninformative. There has been no study of the effect of this ascertainment bias in tip-dating, but autapomorphies can be informative in model-based inference. We expected that excluding autapomorphies would shorten the morphological branchlengths of terminal branches, and thus bias downwards the time branchlengths inferred in tip-dating. We tested for this effect using a matrix for Carboniferous-Permian eureptiles where all autapomorphies had been deliberately coded. Surprisingly, date estimates are virtually unchanged when autapomorphies are excluded, although we find large changes in morphological rate estimates and small effects on topological and dating confidence. We hypothesized that the puzzling lack of effect on dating was caused by the non-clock nature of the eureptile data. We confirm this explanation by simulating strict clock and non-clock datasets, showing that autapomorphy exclusion biases dating only for the clocklike case. A theoretical solution to ascertainment bias is computing the ascertainment bias correction (M k parsinf ), but we explore this correction in detail, and show that it is computationally impractical for typical datasets with many character states and taxa. Therefore we recommend that palaeontologists collect autapomorphies whenever possible when assembling character matrices.

  1. The research of computer multimedia assistant in college English listening

    NASA Astrophysics Data System (ADS)

    Zhang, Qian

    2012-04-01

    With the technology development of network information, there exists more and more seriously questions to our education. Computer multimedia application breaks the traditional foreign language teaching and brings new challenges and opportunities for the education. Through the multiple media application, the teaching process is full of animation, image, voice, and characters. This can improve the learning initiative and objective with great development of learning efficiency. During the traditional foreign language teaching, people use characters learning. However, through this method, the theory performance is good but the practical application is low. During the long time computer multimedia application in the foreign language teaching, many teachers still have prejudice. Therefore, the method is not obtaining the effect. After all the above, the research has significant meaning for improving the teaching quality of foreign language.

  2. Framework for Informed Policy Making Using Data from National Environmental Observatories

    NASA Astrophysics Data System (ADS)

    Wee, B.; Taylor, J. R.; Poinsatte, J.

    2012-12-01

    Large-scale environmental changes pose challenges that straddle environmental, economic, and social boundaries. As we design and implement climate adaptation strategies at the Federal, state, local, and tribal levels, accessible and usable data are essential for implementing actions that are informed by the best available information. Data-intensive science has been heralded as an enabler for scientific breakthroughs powered by advanced computing capabilities and interoperable data systems. Those same capabilities can be applied to data and information systems that facilitate the transformation of data into highly processed products. At the interface of scientifically informed public policy and data intensive science lies the potential for producers of credible, integrated, multi-scalar environmental data like the National Ecological Observatory Network (NEON) and its partners to capitalize on data and informatics interoperability initiatives that enable the integration of environmental data from across credible data sources. NSF's large-scale environmental observatories such as NEON and the Ocean Observatories Initiative (OOI) are designed to provide high-quality, long-term environmental data for research. These data are also meant to be repurposed for operational needs that like risk management, vulnerability assessments, resource management, and others. The proposed USDA Agriculture Research Service (ARS) Long Term Agro-ecosystem Research (LTAR) network is another example of such an environmental observatory that will produce credible data for environmental / agricultural forecasting and informing policy. To facilitate data fusion across observatories, there is a growing call for observation systems to more closely coordinate and standardize how variables are measured. Together with observation standards, cyberinfrastructure standards enable the proliferation of an ecosystem of applications that utilize diverse, high-quality, credible data. Interoperability facilitates the integration of data from multiple credible sources of data, and enables the repurposing of data for use at different geographical scales. Metadata that captures the transformation of data into value-added products ("provenance") lends reproducability and transparency to the entire process. This way, the datasets and model code used to create any product can be examined by other parties. This talk outlines a pathway for transforming environmental data into value-added products by various stakeholders to better inform sustainable agriculture using data from environmental observatories including NEON and LTAR.;

  3. Visual field differences in visual word recognition can emerge purely from perceptual learning: evidence from modeling Chinese character pronunciation.

    PubMed

    Hsiao, Janet Hui-Wen

    2011-11-01

    In Chinese orthography, a dominant character structure exists in which a semantic radical appears on the left and a phonetic radical on the right (SP characters); a minority opposite arrangement also exists (PS characters). As the number of phonetic radical types is much greater than semantic radical types, in SP characters the information is skewed to the right, whereas in PS characters it is skewed to the left. Through training a computational model for SP and PS character recognition that takes into account of the locations in which the characters appear in the visual field during learning, but does not assume any fundamental hemispheric processing difference, we show that visual field differences can emerge as a consequence of the fundamental structural differences in information between SP and PS characters, as opposed to the fundamental processing differences between the two hemispheres. This modeling result is also consistent with behavioral naming performance. This work provides strong evidence that perceptual learning, i.e., the information structure of word stimuli to which the readers have long been exposed, is one of the factors that accounts for hemispheric asymmetry effects in visual word recognition. Copyright © 2011 Elsevier Inc. All rights reserved.

  4. Credibility and advocacy in conservation science

    PubMed Central

    Horton, Cristi C.; Peterson, Tarla Rai; Banerjee, Paulami

    2015-01-01

    Abstract Conservation policy sits at the nexus of natural science and politics. On the one hand, conservation scientists strive to maintain scientific credibility by emphasizing that their research findings are the result of disinterested observations of reality. On the other hand, conservation scientists are committed to conservation even if they do not advocate a particular policy. The professional conservation literature offers guidance on negotiating the relationship between scientific objectivity and political advocacy without damaging conservation science's credibility. The value of this guidance, however, may be restricted by limited recognition of credibility's multidimensionality and emergent nature: it emerges through perceptions of expertise, goodwill, and trustworthiness. We used content analysis of the literature to determine how credibility is framed in conservation science as it relates to apparent contradictions between science and advocacy. Credibility typically was framed as a static entity lacking dimensionality. Authors identified expertise or trustworthiness as important, but rarely mentioned goodwill. They usually did not identify expertise, goodwill, or trustworthiness as dimensions of credibility or recognize interactions among these 3 dimensions of credibility. This oversimplification may limit the ability of conservation scientists to contribute to biodiversity conservation. Accounting for the emergent quality and multidimensionality of credibility should enable conservation scientists to advance biodiversity conservation more effectively. PMID:26041036

  5. The Role of Corporate Credibility in Legitimizing Disease Promotion

    PubMed Central

    Malone, Ruth E.

    2009-01-01

    Objectives. We explored what corporate “credibility” means to tobacco companies to determine why it matters to companies and what a lack of credibility means to them. Methods. We collected documents from an online tobacco industry document archive and analyzed them with an interpretive approach. Results. Tobacco companies conceptualized credibility not as being worthy of belief or confidence but as inspiring it. Thus, credibility was understood primarily as altering public perception of the industry. “Truth” was largely absent from tobacco industry conceptualizations of credibility, which were linked with “responsibility” and “reasonableness.” However, industry research found that the public regarded credibility and responsibility differently, expecting these to entail truth telling, advertising reductions, less harmful products, apologies for deception, making amends, or exiting the tobacco business altogether. Overall, industry credibility-building projects failed repeatedly. Conclusions. Public health discourse increasingly attends to the roles of corporations in promoting disease. Industries such as tobacco and alcohol have been identified as profiting from harmful products. Yet corporations' ability to continue business as usual requires sustaining an implicit societal assent to their activities that depends on corporate credibility. For public health to address corporate disease promotion effectively, undermining corporate credibility may be strategically important. PMID:19106419

  6. Using the Force: "Star Wars" in the Classroom

    ERIC Educational Resources Information Center

    Chartier, Timothy P.

    2007-01-01

    When the character Yoda first appeared on the silver screen, his movements were due to the efforts of famed muppeteer Frank Oz. In "Star Wars Episode II: Attack of the Clones," Yoda returned to the movies but this time the character was not a puppet but a digital image within a computer. This paper discusses the role, or, more aptly, the force, of…

  7. An Overview of Recent Developments in Computational Aeroelasticity

    NASA Technical Reports Server (NTRS)

    Bennett, Robert M.; Edwards, John W.

    2004-01-01

    The motivation for Computational Aeroelasticity (CA) and the elements of one type of the analysis or simulation process are briefly reviewed. The need for streamlining and improving the overall process to reduce elapsed time and improve overall accuracy is discussed. Further effort is needed to establish the credibility of the methodology, obtain experience, and to incorporate the experience base to simplify the method for future use. Experience with the application of a variety of Computational Aeroelasticity programs is summarized for the transonic flutter of two wings, the AGARD 445.6 wing and a typical business jet wing. There is a compelling need for a broad range of additional flutter test cases for further comparisons. Some existing data sets that may offer CA challenges are presented.

  8. Use of Third-Party Credibility in Hostile Situations.

    ERIC Educational Resources Information Center

    Gorney, Carole M.

    A study analyzed the use of third-party credibility as a deliberate and systematic public relations strategy to regain credibility for an organization faced with public hostility. Four types of third-party usage are: citizen participation, outside investigation, adversarial advocacy, and employee dissemination. Third-party credibility as a public…

  9. 45 CFR 158.232 - Calculating the credibility adjustment.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... experience is zero. (2) The base credibility factor for partially credible experience is determined based on... adjustment for an MLR based on partially credible experience is zero if both of the following conditions are... deductible factor is based on the average per person deductible of policies whose experience is included in...

  10. The WRITEACOURSE Language: Programming Manual. Revised Edition.

    ERIC Educational Resources Information Center

    Zosel, Mary; And Others

    WRITEACOURSE is a programing language for man-computer interactions. It was originally designed for writing computer assisted instruction courses, but it can also be used to control a remote terminal in a variety of applications which involve display and editing of characters. It is not suited for applications which use the computer as an…

  11. 45 CFR 158.231 - Life-years used to determine credible experience.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 1 2013-10-01 2013-10-01 false Life-years used to determine credible experience... and Providing the Rebate § 158.231 Life-years used to determine credible experience. (a) The life-years used to determine the credibility of an issuer's experience are the life-years for the MLR...

  12. 45 CFR 158.231 - Life-years used to determine credible experience.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 1 2014-10-01 2014-10-01 false Life-years used to determine credible experience... and Providing the Rebate § 158.231 Life-years used to determine credible experience. (a) The life-years used to determine the credibility of an issuer's experience are the life-years for the MLR...

  13. A comparison study between MLP and convolutional neural network models for character recognition

    NASA Astrophysics Data System (ADS)

    Ben Driss, S.; Soua, M.; Kachouri, R.; Akil, M.

    2017-05-01

    Optical Character Recognition (OCR) systems have been designed to operate on text contained in scanned documents and images. They include text detection and character recognition in which characters are described then classified. In the classification step, characters are identified according to their features or template descriptions. Then, a given classifier is employed to identify characters. In this context, we have proposed the unified character descriptor (UCD) to represent characters based on their features. Then, matching was employed to ensure the classification. This recognition scheme performs a good OCR Accuracy on homogeneous scanned documents, however it cannot discriminate characters with high font variation and distortion.3 To improve recognition, classifiers based on neural networks can be used. The multilayer perceptron (MLP) ensures high recognition accuracy when performing a robust training. Moreover, the convolutional neural network (CNN), is gaining nowadays a lot of popularity for its high performance. Furthermore, both CNN and MLP may suffer from the large amount of computation in the training phase. In this paper, we establish a comparison between MLP and CNN. We provide MLP with the UCD descriptor and the appropriate network configuration. For CNN, we employ the convolutional network designed for handwritten and machine-printed character recognition (Lenet-5) and we adapt it to support 62 classes, including both digits and characters. In addition, GPU parallelization is studied to speed up both of MLP and CNN classifiers. Based on our experimentations, we demonstrate that the used real-time CNN is 2x more relevant than MLP when classifying characters.

  14. Credibility and advocacy in conservation science.

    PubMed

    Horton, Cristi C; Peterson, Tarla Rai; Banerjee, Paulami; Peterson, Markus J

    2016-02-01

    Conservation policy sits at the nexus of natural science and politics. On the one hand, conservation scientists strive to maintain scientific credibility by emphasizing that their research findings are the result of disinterested observations of reality. On the other hand, conservation scientists are committed to conservation even if they do not advocate a particular policy. The professional conservation literature offers guidance on negotiating the relationship between scientific objectivity and political advocacy without damaging conservation science's credibility. The value of this guidance, however, may be restricted by limited recognition of credibility's multidimensionality and emergent nature: it emerges through perceptions of expertise, goodwill, and trustworthiness. We used content analysis of the literature to determine how credibility is framed in conservation science as it relates to apparent contradictions between science and advocacy. Credibility typically was framed as a static entity lacking dimensionality. Authors identified expertise or trustworthiness as important, but rarely mentioned goodwill. They usually did not identify expertise, goodwill, or trustworthiness as dimensions of credibility or recognize interactions among these 3 dimensions of credibility. This oversimplification may limit the ability of conservation scientists to contribute to biodiversity conservation. Accounting for the emergent quality and multidimensionality of credibility should enable conservation scientists to advance biodiversity conservation more effectively. © 2015 The Authors. Conservation Biology published by Wiley Periodicals, Inc. on behalf of Society for Conservation Biology.

  15. The Roles of Verification, Validation and Uncertainty Quantification in the NASA Standard for Models and Simulations

    NASA Technical Reports Server (NTRS)

    Zang, Thomas A.; Luckring, James M.; Morrison, Joseph H.; Blattnig, Steve R.; Green, Lawrence L.; Tripathi, Ram K.

    2007-01-01

    The National Aeronautics and Space Administration (NASA) recently issued an interim version of the Standard for Models and Simulations (M&S Standard) [1]. The action to develop the M&S Standard was identified in an internal assessment [2] of agency-wide changes needed in the wake of the Columbia Accident [3]. The primary goal of this standard is to ensure that the credibility of M&S results is properly conveyed to those making decisions affecting human safety or mission success criteria. The secondary goal is to assure that the credibility of the results from models and simulations meets the project requirements (for credibility). This presentation explains the motivation and key aspects of the M&S Standard, with a special focus on the requirements for verification, validation and uncertainty quantification. Some pilot applications of this standard to computational fluid dynamics applications will be provided as illustrations. The authors of this paper are the members of the team that developed the initial three drafts of the standard, the last of which benefited from extensive comments from most of the NASA Centers. The current version (number 4) incorporates modifications made by a team representing 9 of the 10 NASA Centers. A permanent version of the M&S Standard is expected by December 2007. The scope of the M&S Standard is confined to those uses of M&S that support program and project decisions that may affect human safety or mission success criteria. Such decisions occur, in decreasing order of importance, in the operations, the test & evaluation, and the design & analysis phases. Requirements are placed on (1) program and project management, (2) models, (3) simulations and analyses, (4) verification, validation and uncertainty quantification (VV&UQ), (5) recommended practices, (6) training, (7) credibility assessment, and (8) reporting results to decision makers. A key component of (7) and (8) is the use of a Credibility Assessment Scale, some of the details of which were developed in consultation with William Oberkampf, David Peercy and Timothy Trocano of Sandia National Laboratories. The focus of most of the requirements, including those for VV&UQ, is on the documentation of what was done and the reporting, using the Credibility Assessment Scale, of the level of rigor that was followed. The aspects of one option for the Credibilty Assessment Scale are (1) code verification, (2) solution verification, (3) validation, (4) predictive capability, (5) technical review, (6) process control, and (7) operator and analyst qualification.

  16. Further Validation of the Conner's Adult Attention Deficit/Hyperactivity Rating Scale Infrequency Index (CII) for Detection of Non-Credible Report of Attention Deficit/Hyperactivity Disorder Symptoms.

    PubMed

    Cook, Carolyn M; Bolinger, Elizabeth; Suhr, Julie

    2016-06-01

    Attention deficit/hyperactivity disorder (ADHD) can be easily presented in a non-credible manner, through non-credible report of ADHD symptoms and/or by non-credible performance on neuropsychological tests. While most studies have focused on detection of non-credible performance using performance validity tests, there are few studies examining the ability to detect non-credible report of ADHD symptoms. We provide further validation data for a recently developed measure of non-credible ADHD symptom report, the Conner's Adult ADHD Rating Scales (CAARS) Infrequency Index (CII). Using archival data from 86 adults referred for concerns about ADHD, we examined the accuracy of the CII in detecting extreme scores on the CAARS and invalid reporting on validity indices of the Minnesota Multiphasic Personality Inventory-2 Restructured Format (MMPI-2-RF). We also examined the accuracy of the CII in detecting non-credible performance on standalone and embedded performance validity tests. The CII was 52% sensitive to extreme scores on CAARS DSM symptom subscales (with 97% specificity) and 20%-36% sensitive to invalid responding on MMPI-2-RF validity scales (with near 90% specificity), providing further evidence for the interpretation of the CII as an indicator of non-credible ADHD symptom report. However, the CII detected only 18% of individuals who failed a standalone performance validity test (Word Memory Test), with 87.8% specificity, and was not accurate in detecting non-credible performance using embedded digit span cutoffs. Future studies should continue to examine how best to assess for non-credible symptom report in ADHD referrals. © The Author 2016. Published by Oxford University Press. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  17. Remote reset circuit

    DOEpatents

    Gritzo, R.E.

    1985-09-12

    A remote reset circuit acts as a stand-along monitor and controller by clocking in each character sent by a terminal to a computer and comparing it to a given reference character. When a match occurs, the remote reset circuit activates the system's hardware reset line. The remote reset circuit is hardware based centered around monostable multivibrators and is unaffected by system crashes, partial serial transmissions, or power supply transients. 4 figs.

  18. Are Children with Autism More Responsive to Animated Characters? A Study of Interactions with Humans and Human-Controlled Avatars

    ERIC Educational Resources Information Center

    Carter, Elizabeth J.; Williams, Diane L.; Hodgins, Jessica K.; Lehman, Jill F.

    2014-01-01

    Few direct comparisons have been made between the responsiveness of children with autism to computer-generated or animated characters and their responsiveness to humans. Twelve 4-to 8-year-old children with autism interacted with a human therapist; a human-controlled, interactive avatar in a theme park; a human actor speaking like the avatar; and…

  19. Remote reset circuit

    DOEpatents

    Gritzo, Russell E.

    1987-01-01

    A remote reset circuit acts as a stand-alone monitor and controller by clocking in each character sent by a terminal to a computer and comparing it to a given reference character. When a match occurs, the remote reset circuit activates the system's hardware reset line. The remote reset circuit is hardware based centered around monostable multivibrators and is unaffected by system crashes, partial serial transmissions, or power supply transients.

  20. Recognition of handwritten similar Chinese characters by self-growing probabilistic decision-based neural network.

    PubMed

    Fu, H C; Xu, Y Y; Chang, H Y

    1999-12-01

    Recognition of similar (confusion) characters is a difficult problem in optical character recognition (OCR). In this paper, we introduce a neural network solution that is capable of modeling minor differences among similar characters, and is robust to various personal handwriting styles. The Self-growing Probabilistic Decision-based Neural Network (SPDNN) is a probabilistic type neural network, which adopts a hierarchical network structure with nonlinear basis functions and a competitive credit-assignment scheme. Based on the SPDNN model, we have constructed a three-stage recognition system. First, a coarse classifier determines a character to be input to one of the pre-defined subclasses partitioned from a large character set, such as Chinese mixed with alphanumerics. Then a character recognizer determines the input image which best matches the reference character in the subclass. Lastly, the third module is a similar character recognizer, which can further enhance the recognition accuracy among similar or confusing characters. The prototype system has demonstrated a successful application of SPDNN to similar handwritten Chinese recognition for the public database CCL/HCCR1 (5401 characters x200 samples). Regarding performance, experiments on the CCL/HCCR1 database produced 90.12% recognition accuracy with no rejection, and 94.11% accuracy with 6.7% rejection, respectively. This recognition accuracy represents about 4% improvement on the previously announced performance. As to processing speed, processing before recognition (including image preprocessing, segmentation, and feature extraction) requires about one second for an A4 size character image, and recognition consumes approximately 0.27 second per character on a Pentium-100 based personal computer, without use of any hardware accelerator or co-processor.

  1. Hazardous Waste Cleanup: Compaq Computer Corporation in Sabana Grande, Puerto Rico

    EPA Pesticide Factsheets

    The Compaq Computer Corporation is located along an unpaved road in the Municipio (town) de Sabana Grande, in the southwest corner of the Commonwealth. The character of the surrounding land is generally rural, with the nearest residence located about ½

  2. Upper Grades Ideas.

    ERIC Educational Resources Information Center

    Thornburg, David; Beane, Pam

    1983-01-01

    Presents programs for creating animated characters (Atari), random sentences (Logo), and making a triangle (TRS-80 Level III Basic), and suggestions for creative writing and comparison shopping for computers/software. Also includes "Modems for Micros: Your Computer Can Talk on the Phone" (Bill Chalgren) on telecommunications capabilities of…

  3. Radiant Heat Testing of the H1224A Shipping/Storage Container

    DTIC Science & Technology

    1994-05-01

    re - entry vehicles caused by credible accidents during air and ground transportation. Radiant heat testing of the H1224A storage/shipping container is...inner container, and re - entry vehicle (RV) temperatures during radiant heat testing. Computer modelling can be used to predict weapon response throughout...Nomenclature RV Re - entry Vehicle midsection mass mock-up WR War Reserve STS Stockpile-to-Target Sequence NAWC Simulated H1224A container by Naval Air

  4. Second-Language Composition Instruction, Computers and First-Language Pedagogy: A Descriptive Survey.

    ERIC Educational Resources Information Center

    Harvey, T. Edward

    1987-01-01

    A national survey of full-time instructional faculty (N=208) at universities, 2-year colleges, and high schools regarding attitudes toward using computers in second-language composition instruction revealed a predomination of Apple and IBM-PC computers used, a major frustration in lack of foreign character support, and mixed opinions about real…

  5. Electrooculography-based continuous eye-writing recognition system for efficient assistive communication systems

    PubMed Central

    Shinozaki, Takahiro

    2018-01-01

    Human-computer interface systems whose input is based on eye movements can serve as a means of communication for patients with locked-in syndrome. Eye-writing is one such system; users can input characters by moving their eyes to follow the lines of the strokes corresponding to characters. Although this input method makes it easy for patients to get started because of their familiarity with handwriting, existing eye-writing systems suffer from slow input rates because they require a pause between input characters to simplify the automatic recognition process. In this paper, we propose a continuous eye-writing recognition system that achieves a rapid input rate because it accepts characters eye-written continuously, with no pauses. For recognition purposes, the proposed system first detects eye movements using electrooculography (EOG), and then a hidden Markov model (HMM) is applied to model the EOG signals and recognize the eye-written characters. Additionally, this paper investigates an EOG adaptation that uses a deep neural network (DNN)-based HMM. Experiments with six participants showed an average input speed of 27.9 character/min using Japanese Katakana as the input target characters. A Katakana character-recognition error rate of only 5.0% was achieved using 13.8 minutes of adaptation data. PMID:29425248

  6. Toda Systems, Cluster Characters, and Spectral Networks

    NASA Astrophysics Data System (ADS)

    Williams, Harold

    2016-11-01

    We show that the Hamiltonians of the open relativistic Toda system are elements of the generic basis of a cluster algebra, and in particular are cluster characters of nonrigid representations of a quiver with potential. Using cluster coordinates defined via spectral networks, we identify the phase space of this system with the wild character variety related to the periodic nonrelativistic Toda system by the wild nonabelian Hodge correspondence. We show that this identification takes the relativistic Toda Hamiltonians to traces of holonomies around a simple closed curve. In particular, this provides nontrivial examples of cluster coordinates on SL n -character varieties for n > 2 where canonical functions associated to simple closed curves can be computed in terms of quivers with potential, extending known results in the SL 2 case.

  7. Word-level recognition of multifont Arabic text using a feature vector matching approach

    NASA Astrophysics Data System (ADS)

    Erlandson, Erik J.; Trenkle, John M.; Vogt, Robert C., III

    1996-03-01

    Many text recognition systems recognize text imagery at the character level and assemble words from the recognized characters. An alternative approach is to recognize text imagery at the word level, without analyzing individual characters. This approach avoids the problem of individual character segmentation, and can overcome local errors in character recognition. A word-level recognition system for machine-printed Arabic text has been implemented. Arabic is a script language, and is therefore difficult to segment at the character level. Character segmentation has been avoided by recognizing text imagery of complete words. The Arabic recognition system computes a vector of image-morphological features on a query word image. This vector is matched against a precomputed database of vectors from a lexicon of Arabic words. Vectors from the database with the highest match score are returned as hypotheses for the unknown image. Several feature vectors may be stored for each word in the database. Database feature vectors generated using multiple fonts and noise models allow the system to be tuned to its input stream. Used in conjunction with database pruning techniques, this Arabic recognition system has obtained promising word recognition rates on low-quality multifont text imagery.

  8. Credibility assessment in child sexual abuse investigations: A descriptive analysis.

    PubMed

    Melkman, Eran P; Hershkowitz, Irit; Zur, Ronit

    2017-05-01

    A major challenge in cases of child sexual abuse (CSA) is determining the credibility of children's reports. Consequently cases may be misclassified as false or deemed 'no judgment possible'. Based on a large national sample of reports of CSA made in Israel in 2014, the study examines child and event characteristics contributing to the probability that reports of abuse would be judged credible. National data files of all children aged 3-14, who were referred for investigation following suspected victimization of sexual abuse, and had disclosed sexual abuse, were analyzed. Cases were classified as either 'credible' or 'no judgment possible'. The probability of reaching a 'credible' judgment was examined in relation to characteristics of the child (age, gender, cognitive delay, marital status of the parents,) and of the abusive event (abuse severity, frequency, perpetrator-victim relationship, perpetrator's use of grooming, and perpetrator's use of coercion), controlling for investigator's identity at the cluster level of the analysis. Of 1563 cases analyzed, 57.9% were assessed as credible. The most powerful predictors of a credible judgment were older age and absence of a cognitive delay. Reports of children to married parents, who experienced a single abusive event that involved perpetrator's use of grooming, were also more likely to be judged as credible. Rates of credible judgments found are lower than expected suggesting under-identification of truthful reports of CSA. In particular, those cases of severe and multiple abuse involving younger and cognitively delayed children are the ones with the lowest chances of being assessed as credible. Copyright © 2017 Elsevier Ltd. All rights reserved.

  9. Gender, smiling, and witness credibility in actual trials.

    PubMed

    Nagle, Jacklyn E; Brodsky, Stanley L; Weeter, Kaycee

    2014-01-01

    It has been acknowledged that females exhibit more smiling behaviors than males, but there has been little attention to this gender difference in the courtroom. Although both male and female witnesses exhibit smiling behaviors, there has been no research examining the subsequent effect of gender and smiling on witness credibility. This study used naturalistic observation to examine smiling behaviors and credibility in actual witnesses testifying in court. Raters assessed the smiling behaviors and credibility (as measured by the Witness Credibility Scale) of 32 male and female witnesses testifying in trials in a mid-sized Southern city. "Credibility raters" rated the perceived likeability, trustworthiness, confidence, knowledge, and overall credibility of the witnesses using the Witness Credibility Scale. "Smile raters" noted smiling frequency and types, including speaking/expressive and listening/receptive smiles. Gender was found to affect perceived trustworthiness ratings, in which male witnesses were seen as more trustworthy than female witnesses. No significant differences were found in the smiling frequency for male and female witnesses. However, the presence of smiling was found to contribute to perceived likeability of a witness. Smiling female witnesses were found to be more likeable than smiling male and non-smiling female witnesses. Copyright © 2014 John Wiley & Sons, Ltd.

  10. Personality and emotion-based high-level control of affective story characters.

    PubMed

    Su, Wen-Poh; Pham, Binh; Wardhani, Aster

    2007-01-01

    Human emotional behavior, personality, and body language are the essential elements in the recognition of a believable synthetic story character. This paper presents an approach using story scripts and action descriptions in a form similar to the content description of storyboards to predict specific personality and emotional states. By adopting the Abridged Big Five Circumplex (AB5C) Model of personality from the study of psychology as a basis for a computational model, we construct a hierarchical fuzzy rule-based system to facilitate the personality and emotion control of the body language of a dynamic story character. The story character can consistently perform specific postures and gestures based on his/her personality type. Story designers can devise a story context in the form of our story interface which predictably motivates personality and emotion values to drive the appropriate movements of the story characters. Our system takes advantage of relevant knowledge described by psychologists and researchers of storytelling, nonverbal communication, and human movement. Our ultimate goal is to facilitate the high-level control of a synthetic character.

  11. The Graphical User Interface: Crisis, Danger, and Opportunity.

    ERIC Educational Resources Information Center

    Boyd, L. H.; And Others

    1990-01-01

    This article describes differences between the graphical user interface and traditional character-based interface systems, identifies potential problems posed by graphic computing environments for blind computer users, and describes some programs and strategies that are being developed to provide access to those environments. (Author/JDD)

  12. Simulation of intelligent object behavior in a virtual reality system

    NASA Astrophysics Data System (ADS)

    Mironov, Sergey F.

    1998-01-01

    This article presents a technique for computer control of a power boat movement in real-time marine trainers or arcade games. The author developed and successfully implemented a general technique allowing intellectual navigation of computer controlled moving objects that proved to be appropriate for real-time applications. This technique covers significant part of necessary behavioral tasks that appear in such titles. At the same time the technique forms a part of a more general system that involves control of less complicated characters of another nature. The system being an open one can be easily used by an action or arcade programming to improve the overall quality of characters artificial intelligence style.

  13. CA-LOD: Collision Avoidance Level of Detail for Scalable, Controllable Crowds

    NASA Astrophysics Data System (ADS)

    Paris, Sébastien; Gerdelan, Anton; O'Sullivan, Carol

    The new wave of computer-driven entertainment technology throws audiences and game players into massive virtual worlds where entire cities are rendered in real time. Computer animated characters run through inner-city streets teeming with pedestrians, all fully rendered with 3D graphics, animations, particle effects and linked to 3D sound effects to produce more realistic and immersive computer-hosted entertainment experiences than ever before. Computing all of this detail at once is enormously computationally expensive, and game designers as a rule, have sacrificed the behavioural realism in favour of better graphics. In this paper we propose a new Collision Avoidance Level of Detail (CA-LOD) algorithm that allows games to support huge crowds in real time with the appearance of more intelligent behaviour. We propose two collision avoidance models used for two different CA-LODs: a fuzzy steering focusing on the performances, and a geometric steering to obtain the best realism. Mixing these approaches allows to obtain thousands of autonomous characters in real time, resulting in a scalable but still controllable crowd.

  14. Movie magic in the clinic: computer-generated characters for automated health counseling.

    PubMed

    Bickmore, Timothy

    2008-11-06

    In this presentation, I demonstrate how many of the technologies used in movie special effects and games have been successfully used in health education and behavior change interventions. Computer-animated health counselors simulate human face-to-face dialogue as a computer interface medium, including not only verbal behavior but nonverbal conversational behavior such as hand gesture, body posture shifts, and facial display of emotion. This technology has now been successfully used in a wide range of health interventions for education and counseling of patients and consumers, including applications in physical activity promotion, medication adherence, and hospital discharge. These automated counselors have been deployed on home computers, hospital-based touch screen kiosks, and mobile devices with integrated health behavior sensing capability. Development of these agents is an interdisciplinary endeavor spanning the fields of character modeling and animation, computational linguistics, artificial intelligence, health communication and behavioral medicine. I will give demonstrations of several fielded systems, describe the technologies and methodologies underlying their development, and present results from five randomized controlled trials that have been completed or are in progress.

  15. GPSS and Modeling of Computer Communication Networks.

    DTIC Science & Technology

    1982-04-01

    chains are used to alter the normal "flows" of transactions in a user defined manner. Transaction "flow" may be controlled on the basis of group ...authors refer to loops and rings interchangeably, including those who have designed loop networks with distributed control mechanisms [8,9,10,11,121...that detailed simulation of character by character transmission does not take place; rather, [ control message--data message-- control message! groupings

  16. Results of a feasibility study using the Newton-Raphson digital computer program to identify lifting body derivatives from flight data

    NASA Technical Reports Server (NTRS)

    Sim, A. G.

    1973-01-01

    A brief study was made to assess the applicability of the Newton-Raphson digital computer program as a routine technique for extracting aerodynamic derivatives from flight tests of lifting body types of vehicles. Lateral-direction flight data from flight tests of the HL-10 lifting body reserch vehicle were utilized. The results in general, show the computer program to be a reliable and expedient means for extracting derivatives for this class of vehicles as a standard procedure. This result was true even when stability augmentation was used. As a result of the study, a credible set of HL-10 lateral-directional derivatives was obtained from flight data. These derivatives are compared with results from wind-tunnel tests.

  17. Tutorial: Asteroseismic Stellar Modelling with AIMS

    NASA Astrophysics Data System (ADS)

    Lund, Mikkel N.; Reese, Daniel R.

    The goal of aims (Asteroseismic Inference on a Massive Scale) is to estimate stellar parameters and credible intervals/error bars in a Bayesian manner from a set of asteroseismic frequency data and so-called classical constraints. To achieve reliable parameter estimates and computational efficiency, it searches through a grid of pre-computed models using an MCMC algorithm—interpolation within the grid of models is performed by first tessellating the grid using a Delaunay triangulation and then doing a linear barycentric interpolation on matching simplexes. Inputs for the modelling consist of individual frequencies from peak-bagging, which can be complemented with classical spectroscopic constraints. aims is mostly written in Python with a modular structure to facilitate contributions from the community. Only a few computationally intensive parts have been rewritten in Fortran in order to speed up calculations.

  18. Fermionic solution of the Andrews-Baxter-Forrester model. II. Proof of Melzer`s polynomial identities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Warnaar, S.O.

    1996-07-01

    We compute the one-dimensional configuration sums of the AFB model using the fermionic techniques introduced in part I of this paper. Combined with the results of Andrews, Baxter, and Forrester, we prove polynominal identities for finitizations of the Virasoro characters {sub {chi}b, a}{sup (r-1, r)}(q) as conjectured by Melzer. In the thermodynamic limit these identities reproduce Rogers-Ramanujan-type identities for the unitary minimal Virasoro characters conjectured by the Stony Brook group. We also present a list of additional Virasoro character identities which follow from our proof of Melzer`s identities and application of Bailey`s lemma.

  19. A character network study of two Sci-Fi TV series

    NASA Astrophysics Data System (ADS)

    Tan, M. S. A.; Ujum, E. A.; Ratnavelu, K.

    2014-03-01

    This work is an analysis of the character networks in two science fiction television series: Stargate and Star Trek. These networks are constructed on the basis of scene co-occurrence between characters to indicate the presence of a connection. Global network structure measures such as the average path length, graph density, network diameter, average degree, median degree, maximum degree, and average clustering coefficient are computed as well as individual node centrality scores. The two fictional networks constructed are found to be quite similar in structure which is astonishing given that Stargate only ran for 18 years in comparison to the 48 years for Star Trek.

  20. An analysis of possible applications of fuzzy set theory to the actuarial credibility theory

    NASA Technical Reports Server (NTRS)

    Ostaszewski, Krzysztof; Karwowski, Waldemar

    1992-01-01

    In this work, we review the basic concepts of actuarial credibility theory from the point of view of introducing applications of the fuzzy set-theoretic method. We show how the concept of actuarial credibility can be modeled through the fuzzy set membership functions and how fuzzy set methods, especially fuzzy pattern recognition, can provide an alternative tool for estimating credibility.

  1. USSR Report: Cybernetics, Computers and Automation Technology

    DTIC Science & Technology

    1986-12-03

    Georgian SSR Academy of Sciences: "Ready for Dialogue"] [Text] Computers in schools, auditoria , and educational laboratories are an phenomenon to which we...professional-technical academies and VUZ auditoria . Obviously, the color of the screens and the characters on them is of major importance for people

  2. Online recognition of Chinese characters: the state-of-the-art.

    PubMed

    Liu, Cheng-Lin; Jaeger, Stefan; Nakagawa, Masaki

    2004-02-01

    Online handwriting recognition is gaining renewed interest owing to the increase of pen computing applications and new pen input devices. The recognition of Chinese characters is different from western handwriting recognition and poses a special challenge. To provide an overview of the technical status and inspire future research, this paper reviews the advances in online Chinese character recognition (OLCCR), with emphasis on the research works from the 1990s. Compared to the research in the 1980s, the research efforts in the 1990s aimed to further relax the constraints of handwriting, namely, the adherence to standard stroke orders and stroke numbers and the restriction of recognition to isolated characters only. The target of recognition has shifted from regular script to fluent script in order to better meet the requirements of practical applications. The research works are reviewed in terms of pattern representation, character classification, learning/adaptation, and contextual processing. We compare important results and discuss possible directions of future research.

  3. Establishing Credibility in the Multicultural Classroom: When the Instructor Speaks with an Accent

    ERIC Educational Resources Information Center

    McLean, Chikako Akamatsu

    2007-01-01

    Applying theories of cultural dimensions, teacher credibility, and nonverbal immediacy, this chapter explores classroom management techniques used by Asian female teachers to establish credibility. (Contains 1 note.)

  4. Supply Chain Risk Management: An Introduction to the Credible Threat

    DTIC Science & Technology

    2016-08-01

    connected. All we have to do is pull out our phones, tablets, laptops or any other similar device and get the information we need virtually...with the sup­ ply chain, especially when it comes to the use of electronics, computers and other computerized components. The attempt to remove or...Trusted State­of­the­Art Microelectronics Strategy Study ,“ July 2015, Potomac Institute for Policy Studies report. Figure 2. An Organization’s

  5. Use of Information Technology Tools in Source Selection Decision Making: A Study on USAF’s KC-X Tanker Replacement Program

    DTIC Science & Technology

    2008-06-01

    The most common outranking methods are the preference ranking organization method for enrichment evaluation ( PROMETHEE ) and the elimination and...Brans and Ph. Vincke, “A Preference Ranking Organization Method: (The PROMETHEE Method for Multiple Criteria Decision-Making),” Management Science 31... PROMETHEE ). This method needs a preference function for each criterion to compute the degree of preference.72 “The credibility of the outranking

  6. Computer vision cracks the leaf code

    PubMed Central

    Wilf, Peter; Zhang, Shengping; Chikkerur, Sharat; Little, Stefan A.; Wing, Scott L.; Serre, Thomas

    2016-01-01

    Understanding the extremely variable, complex shape and venation characters of angiosperm leaves is one of the most challenging problems in botany. Machine learning offers opportunities to analyze large numbers of specimens, to discover novel leaf features of angiosperm clades that may have phylogenetic significance, and to use those characters to classify unknowns. Previous computer vision approaches have primarily focused on leaf identification at the species level. It remains an open question whether learning and classification are possible among major evolutionary groups such as families and orders, which usually contain hundreds to thousands of species each and exhibit many times the foliar variation of individual species. Here, we tested whether a computer vision algorithm could use a database of 7,597 leaf images from 2,001 genera to learn features of botanical families and orders, then classify novel images. The images are of cleared leaves, specimens that are chemically bleached, then stained to reveal venation. Machine learning was used to learn a codebook of visual elements representing leaf shape and venation patterns. The resulting automated system learned to classify images into families and orders with a success rate many times greater than chance. Of direct botanical interest, the responses of diagnostic features can be visualized on leaf images as heat maps, which are likely to prompt recognition and evolutionary interpretation of a wealth of novel morphological characters. With assistance from computer vision, leaves are poised to make numerous new contributions to systematic and paleobotanical studies. PMID:26951664

  7. Influence of Cartoon Media Characters on Children's Attention to and Preference for Food and Beverage Products.

    PubMed

    Ogle, Andrew D; Graham, Dan J; Lucas-Thompson, Rachel G; Roberto, Christina A

    2017-02-01

    Over-consuming unhealthful foods and beverages contributes to pediatric obesity and associated diseases. Food marketing influences children's food preferences, choices, and intake. To examine whether adding licensed media characters to healthful food/beverage packages increases children's attention to and preference for these products. We hypothesized that children prefer less- (vs more-) healthful foods, and pay greater attention to and preferentially select products with (vs without) media characters regardless of nutritional quality. We also hypothesized that children prefer more-healthful products when characters are present over less-healthful products without characters. On a computer, participants viewed food/beverage pairs of more-healthful and less-healthful versions of similar products. The same products were shown with and without licensed characters on the packaging. An eye-tracking camera monitored participant gaze, and participants chose which product they preferred from each of 60 pairs. Six- to 9-year-old children (n=149; mean age=7.36, standard deviation=1.12) recruited from the Twin Cities, MN, area in 2012-2013. Visual attention and product choice. Attention to products was compared using paired-samples t tests, and product choice was analyzed with single-sample t tests. Analyses of variance were conducted to test for interaction effects of specific characters and child sex and age. Children paid more attention to products with characters and preferred less-healthful products. Contrary to our prediction, children chose products without characters approximately 62% of the time. Children's choices significantly differed based on age, sex, and the specific cartoon character displayed, with characters in this study being preferred by younger boys. Results suggest that putting licensed media characters on more-healthful food/beverage products might not encourage all children to make healthier food choices, but could increase selection of healthy foods among some, particularly younger children, boys, and those who like the featured character(s). Effective use likely requires careful demographic targeting. Copyright © 2017 Academy of Nutrition and Dietetics. Published by Elsevier Inc. All rights reserved.

  8. Source attribution and credibility of health and appearance exercise advertisements: relationship with implicit and explicit attitudes and intentions.

    PubMed

    Berry, Tanya R; Shields, Chris

    2014-02-01

    The relationship of attributed source (commercial or nonprofit) and credibility of exercise advertisements to explicit and implicit exercise-related attitudes and intentions was examined. Male and female participants (N = 227) were randomly assigned to watch health or appearance-related advertisements and then completed an implicit attitudes task and questionnaires. Health advertisements and those attributed to a nonprofit source were rated more credible. Appearance condition participants who attributed the advertisement to a nonprofit source also rated the advertisement as more credible. Participants who rated a commercial advertisement as credible reported higher implicit instrumental attitudes. Implications for exercise promotion are discussed.

  9. DiscML: an R package for estimating evolutionary rates of discrete characters using maximum likelihood.

    PubMed

    Kim, Tane; Hao, Weilong

    2014-09-27

    The study of discrete characters is crucial for the understanding of evolutionary processes. Even though great advances have been made in the analysis of nucleotide sequences, computer programs for non-DNA discrete characters are often dedicated to specific analyses and lack flexibility. Discrete characters often have different transition rate matrices, variable rates among sites and sometimes contain unobservable states. To obtain the ability to accurately estimate a variety of discrete characters, programs with sophisticated methodologies and flexible settings are desired. DiscML performs maximum likelihood estimation for evolutionary rates of discrete characters on a provided phylogeny with the options that correct for unobservable data, rate variations, and unknown prior root probabilities from the empirical data. It gives users options to customize the instantaneous transition rate matrices, or to choose pre-determined matrices from models such as birth-and-death (BD), birth-death-and-innovation (BDI), equal rates (ER), symmetric (SYM), general time-reversible (GTR) and all rates different (ARD). Moreover, we show application examples of DiscML on gene family data and on intron presence/absence data. DiscML was developed as a unified R program for estimating evolutionary rates of discrete characters with no restriction on the number of character states, and with flexibility to use different transition models. DiscML is ideal for the analyses of binary (1s/0s) patterns, multi-gene families, and multistate discrete morphological characteristics.

  10. Story Games: Marrying Silicon, Celluloid, and CD-ROM.

    ERIC Educational Resources Information Center

    Gussin, Lawrence

    1994-01-01

    Reports on themes emphasized at the April 1994 Computer Game Developers Conference held in Santa Clara (California), including the exploding CD-ROM marketplace and the potential and challenge of using CD-ROM's multimedia capacity to build cinema-quality stories and characters into computer games. Strategies for introducing more complex plots are…

  11. Add-Ons: The Ultimate Guide to Peripherals for the Blind Computer User.

    ERIC Educational Resources Information Center

    Croft, Diane L., Ed.

    Detailed product information on peripherals for the blind computer user is provided and applications, availability, reliability, price, and selection considerations are described. Chapters address the following topics and product categories: (1) scanners (optical character readers, Kurzweil Reading Machine); (2) a buyer's guide to modems; (3)…

  12. Printing Cyrillic and Other "Funny Characters" from a Computer.

    ERIC Educational Resources Information Center

    Gribble, Charles E.

    This paper reviews recent developments in the technology relating to microcomputer printing of the Cyrillic alphabet and related forms of Roman alphabet with diacritics used in Slavic and East European languages. The review includes information on the capacities of printers, computers (particularly the display capabilities), and interfaces…

  13. Design and Development of a Smart Storytelling Toy

    ERIC Educational Resources Information Center

    Kara, Nuri; Aydin, Cansu Cigdem; Cagiltay, Kursat

    2014-01-01

    Because computers generally make children passive listeners, new technological devices need to support children's storytelling activities. This article introduces the StoryTech, a smart toy that includes a virtual space comprised of computer-based graphics and characters as well as a real space that involves stuffed animals, background cards…

  14. Computational Infrastructure for Engine Structural Performance Simulation

    NASA Technical Reports Server (NTRS)

    Chamis, Christos C.

    1997-01-01

    Select computer codes developed over the years to simulate specific aspects of engine structures are described. These codes include blade impact integrated multidisciplinary analysis and optimization, progressive structural fracture, quantification of uncertainties for structural reliability and risk, benefits estimation of new technology insertion and hierarchical simulation of engine structures made from metal matrix and ceramic matrix composites. Collectively these codes constitute a unique infrastructure readiness to credibly evaluate new and future engine structural concepts throughout the development cycle from initial concept, to design and fabrication, to service performance and maintenance and repairs, and to retirement for cause and even to possible recycling. Stated differently, they provide 'virtual' concurrent engineering for engine structures total-life-cycle-cost.

  15. Increasing Valid Profiles in Phallometric Assessment of Sex Offenders with Child Victims: Combining the Strengths of Audio Stimuli and Synthetic Characters.

    PubMed

    Marschall-Lévesque, Shawn; Rouleau, Joanne-Lucine; Renaud, Patrice

    2018-02-01

    Penile plethysmography (PPG) is a measure of sexual interests that relies heavily on the stimuli it uses to generate valid results. Ethical considerations surrounding the use of real images in PPG have further limited the content admissible for these stimuli. To palliate this limitation, the current study aimed to combine audio and visual stimuli by incorporating computer-generated characters to create new stimuli capable of accurately classifying sex offenders with child victims, while also increasing the number of valid profiles. Three modalities (audio, visual, and audiovisual) were compared using two groups (15 sex offenders with child victims and 15 non-offenders). Both the new visual and audiovisual stimuli resulted in a 13% increase in the number of valid profiles at 2.5 mm, when compared to the standard audio stimuli. Furthermore, the new audiovisual stimuli generated a 34% increase in penile responses. All three modalities were able to discriminate between the two groups by their responses to the adult and child stimuli. Lastly, sexual interest indices for all three modalities could accurately classify participants in their appropriate groups, as demonstrated by ROC curve analysis (i.e., audio AUC = .81, 95% CI [.60, 1.00]; visual AUC = .84, 95% CI [.66, 1.00], and audiovisual AUC = .83, 95% CI [.63, 1.00]). Results suggest that computer-generated characters allow accurate discrimination of sex offenders with child victims and can be added to already validated stimuli to increase the number of valid profiles. The implications of audiovisual stimuli using computer-generated characters and their possible use in PPG evaluations are also discussed.

  16. MIADS2 ... an alphanumeric map information assembly and display system for a large computer

    Treesearch

    Elliot L. Amidon

    1966-01-01

    A major improvement and extension of the Map Information Assembly and Display System (MIADS) developed in 1964 is described. Basic principles remain unchanged, but the computer programs have been expanded and rewritten for a large computer, in Fortran IV and MAP languages. The code system is extended from 99 integers to about 2,200 alphanumeric 2-character codes. Hand-...

  17. Experimental Realization of a Quantum Support Vector Machine

    NASA Astrophysics Data System (ADS)

    Li, Zhaokai; Liu, Xiaomei; Xu, Nanyang; Du, Jiangfeng

    2015-04-01

    The fundamental principle of artificial intelligence is the ability of machines to learn from previous experience and do future work accordingly. In the age of big data, classical learning machines often require huge computational resources in many practical cases. Quantum machine learning algorithms, on the other hand, could be exponentially faster than their classical counterparts by utilizing quantum parallelism. Here, we demonstrate a quantum machine learning algorithm to implement handwriting recognition on a four-qubit NMR test bench. The quantum machine learns standard character fonts and then recognizes handwritten characters from a set with two candidates. Because of the wide spread importance of artificial intelligence and its tremendous consumption of computational resources, quantum speedup would be extremely attractive against the challenges of big data.

  18. ["Take it"--a musical by adolescents for adolescents as a new form of AIDS education].

    PubMed

    Amstad, H; Mühlemann, R

    1993-01-01

    In the spring of 1992, young actors, actresses and musicians presented in Basel for their schoolmates of the 8th and 9th school year a musical on the subject of AIDS. The information content of AIDS prevention was communicated by means of feelings, that means, in an emotional way (and no longer in a mainly cognitive way such as the conventional explanations in the classroom). The performance by youngsters of the same age made what was shown on the stage more credible, and at the same time, contributed to the "otherness" by means of this instruction: not as usual from superiors to inferiors, but on an equal level. This project of a workteam from the Basel Board of Education and the AIDS assistance had a pilot character for the rest of Switzerland and because of this could not draw from experience of similar presentations. Accordingly, there are both several positive as well as negative aspects to the present realisation of the project.

  19. High fidelity simulations of infrared imagery with animated characters

    NASA Astrophysics Data System (ADS)

    Näsström, F.; Persson, A.; Bergström, D.; Berggren, J.; Hedström, J.; Allvar, J.; Karlsson, M.

    2012-06-01

    High fidelity simulations of IR signatures and imagery tend to be slow and do not have effective support for animation of characters. Simplified rendering methods based on computer graphics methods can be used to overcome these limitations. This paper presents a method to combine these tools and produce simulated high fidelity thermal IR data of animated people in terrain. Infrared signatures for human characters have been calculated using RadThermIR. To handle multiple character models, these calculations use a simplified material model for the anatomy and clothing. Weather and temperature conditions match the IR-texture used in the terrain model. The calculated signatures are applied to the animated 3D characters that, together with the terrain model, are used to produce high fidelity IR imagery of people or crowds. For high level animation control and crowd simulations, HLAS (High Level Animation System) has been developed. There are tools available to create and visualize skeleton based animations, but tools that allow control of the animated characters on a higher level, e.g. for crowd simulation, are usually expensive and closed source. We need the flexibility of HLAS to add animation into an HLA enabled sensor system simulation framework.

  20. The role of lexical variables in the visual recognition of Chinese characters: A megastudy analysis.

    PubMed

    Sze, Wei Ping; Yap, Melvin J; Rickard Liow, Susan J

    2015-01-01

    Logographic Chinese orthography partially represents both phonology and semantics. By capturing the online processing of a large pool of Chinese characters, we were able to examine the relative salience of specific lexical variables when this nonalphabetic script is read. Using a sample of native mainland Chinese speakers (N = 35), lexical decision latencies for 1560 single characters were collated into a database, before the effects of a comprehensive range of variables were explored. Hierarchical regression analyses determined the unique item-level variance explained by orthographic (frequency, stroke count), semantic (age of learning, imageability, number of meanings), and phonological (consistency, phonological frequency) factors. Orthographic and semantic variables, respectively, accounted for more collective variance than the phonological variables. Significant main effects were further observed for the individual orthographic and semantic predictors. These results are consistent with the idea that skilled readers tend to rely on orthographic and semantic information when processing visually presented characters. This megastudy approach marks an important extension to existing work on Chinese character recognition, which hitherto has relied on factorial designs. Collectively, the findings reported here represent a useful set of empirical constraints for future computational models of character recognition.

  1. A comparison among several P300 brain-computer interface speller paradigms.

    PubMed

    Fazel-Rezai, Reza; Gavett, Scott; Ahmad, Waqas; Rabbi, Ahmed; Schneider, Eric

    2011-10-01

    Since the brain-computer interface (BCI) speller was first proposed by Farwell and Donchin, there have been modifications in the visual aspects of P300 paradigms. Most of the changes are based on the original matrix format such as changes in the number of rows and columns, font size, flash/ blank time, and flash order. The improvement in the resulting accuracy and speed of such systems has always been the ultimate goal. In this study, we have compared several different speller paradigms including row-column, single character flashing, and two region-based paradigms which are not based on the matrix format. In the first region-based paradigm, at the first level, characters and symbols are distributed over seven regions alphabetically, while in the second region-based paradigm they are distributed in the most frequently used order. At the second level, each one of the regions is further subdivided into seven subsets. The experimental results showed that the average accuracy and user acceptability for two region-based paradigms were higher than those for traditional paradigms such as row/column and single character.

  2. Evolving a Simulation Model Product Line Software Architecture from Heterogeneous Model Representations

    DTIC Science & Technology

    2003-09-01

    resolution M&S concept for integrating heterogeneous M&S into the hierarchy has existed since the early 1980s [DH92a, DH92b]. 25...groups [PAD78]. The need for credible M&S grew in the Nation’s private and public sectors. By 1980 , information from computer-based simulations...formal) identified in the [GMS+96 and RPG00]. We noted that systemic issues identi- fied in by reports, studies, and assessments the early 1980s

  3. Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework

    DTIC Science & Technology

    1999-06-01

    U.S. and its allies on the battlefield, but a credible threat to employ chemical or biological weapons in pursuit of national objectives would give...injury. 18 Instrumentalities that produce them are weapons. There is little debate about whether the use of chemicals or biologicals falls...282. 50 For an interesting projection of factors likely to affect the use of force in the future, see Anthony D’Amato, Megatrends in the Use of

  4. Motivating Programming: Using Storytelling to Make Computer Programming Attractive to Middle School Girls

    DTIC Science & Technology

    2006-11-01

    them with a particular tool, they will dance, slip on banana peels , do somersaults, etc. After children have played in the courtyard space, they can be...character doing a Matrix-style kick, and dogs throwing bananas at a dogcatcher. These slightly extreme reactions to things are very appealing to...the humor and the fact that the characters are behaving in ways that the children themselves cannot behave (e.g. “They can throw bananas

  5. Towards a Credibility Assessment of Models and Simulations

    NASA Technical Reports Server (NTRS)

    Blattnig, Steve R.; Green, Lawrence L.; Luckring, James M.; Morrison, Joseph H.; Tripathi, Ram K.; Zang, Thomas A.

    2008-01-01

    A scale is presented to evaluate the rigor of modeling and simulation (M&S) practices for the purpose of supporting a credibility assessment of the M&S results. The scale distinguishes required and achieved levels of rigor for a set of M&S elements that contribute to credibility including both technical and process measures. The work has its origins in an interest within NASA to include a Credibility Assessment Scale in development of a NASA standard for models and simulations.

  6. Defense Automation Resources Management Manual

    DTIC Science & Technology

    1988-09-01

    Electronic Command Signals Programmer, Plugboard Programmers Punch, Card Punch, Paper Tape Reader, Character Reader-Generator, Time Cards Reader...Multiplexor-Shift Register Group Multiplier Panel Control, Plugboard Panel, Interconnection, Digital Computer Panel, Meter-Attenuator, Tape Recorder PC Cards...Perforator, Tape Plug-In Unit Potentiometer, Coefficient, Analog Computer Programmer, Plugboard Punch, Paper Tape Racks Reader, Time Code Reader

  7. Construction of the NASA Thesaurus: Computer Processing Support. Final Report.

    ERIC Educational Resources Information Center

    Hammond, William

    Details are given on the necessary computer processing services required to produce a NASA thesaurus. These services included (1) keypunching the terminology to specifications from approximately 19,000 Term Review Forms furnished by NASA; (2) modifying a set of programs to satisfy NASA specifications, principally to accommodate 42 character terms…

  8. Animated Pedagogical Agents: A Review of Agent Technology Software in Electronic Learning Environments

    ERIC Educational Resources Information Center

    Govindasamy, Malliga K.

    2014-01-01

    Agent technology has become one of the dynamic and most interesting areas of computer science in recent years. The dynamism of this technology has resulted in computer generated characters, known as pedagogical agent, entering the digital learning environments in increasing numbers. Commonly deployed in implementing tutoring strategies, these…

  9. Simulating forest pictures by impact printers

    Treesearch

    Elliot L. Amidon; E. Joyce Dye

    1978-01-01

    Two mechanical devices that are mainly used to print computer output in text form can simulate pictures of terrain and forests. The line printer, which is available for batch processing at many computer installations, can approximate halftones by using overstruck characters to produce successively larger "dots." The printer/plotter, which is normally used as...

  10. How to Get from Cupertino to Boca Raton.

    ERIC Educational Resources Information Center

    Troxel, Duane K.; Chiavacci, Jim

    1985-01-01

    Describes seven methods to transfer data from Apple computer disks to IBM computer disks and vice versa: print out data and retype; use a commercial software package, optical-character reader, homemade cable, or modem to pass or transfer data directly; pay commercial data-transfer service; or store files on mainframe and download. (MBR)

  11. A Computer-Based Program to Teach Braille Reading to Sighted Individuals

    ERIC Educational Resources Information Center

    Scheithauer, Mindy C.; Tiger, Jeffrey H.

    2012-01-01

    Instructors of the visually impaired need efficient braille-training methods. This study conducted a preliminary evaluation of a computer-based program intended to teach the relation between braille characters and English letters using a matching-to-sample format with 4 sighted college students. Each participant mastered matching visual depictions…

  12. Investigating the Activities of Children toward a Smart Storytelling Toy

    ERIC Educational Resources Information Center

    Kara, Nuri; Aydin, Cansu Cigdem; Cagiltay, Kursat

    2013-01-01

    This paper introduces StoryTech, a smart storytelling toy that features a virtual space, which includes computer-based graphics and characters, and a real space, which includes plush toys, background cards, and a communication interface. When children put real objects on the receiver panel, the computer program shows related backgrounds and…

  13. Beach Profile Analysis System (BPAS). Volume III. BPAS User’s Guide: Analysis Module SURVY1.

    DTIC Science & Technology

    1982-06-01

    extrapolated using the two seawardmost points. Before computing volume changes, common bonds are established relative to the landward and seawsrd extent...Cyber 176 or equivalent computer. Such features include the 10- character, 60-bit word size, the FORTRAN- callable sort routine (interfacing with the NOS

  14. Beach Profile Analysis System (BPAS). Volume IV. BPAS User’s Guide: Analysis Module SURVY2.

    DTIC Science & Technology

    1982-06-01

    feet NSL), the shoreline position can be extrapolated using the two sawardmost points. Before computing volume changes, comon bonds are established...computer. Such features include the 10- character, 60-bit word size, the FORTRAN- callable sort routine (interfacing with the NOS or NOS/BE operating

  15. Error-Free Text Typing Performance of an Inductive Intra-Oral Tongue Computer Interface for Severely Disabled Individuals.

    PubMed

    Andreasen Struijk, Lotte N S; Bentsen, Bo; Gaihede, Michael; Lontis, Eugen R

    2017-11-01

    For severely paralyzed individuals, alternative computer interfaces are becoming increasingly essential for everyday life as social and vocational activities are facilitated by information technology and as the environment becomes more automatic and remotely controllable. Tongue computer interfaces have proven to be desirable by the users partly due to their high degree of aesthetic acceptability, but so far the mature systems have shown a relatively low error-free text typing efficiency. This paper evaluated the intra-oral inductive tongue computer interface (ITCI) in its intended use: Error-free text typing in a generally available text editing system, Word. Individuals with tetraplegia and able bodied individuals used the ITCI for typing using a MATLAB interface and for Word typing for 4 to 5 experimental days, and the results showed an average error-free text typing rate in Word of 11.6 correct characters/min across all participants and of 15.5 correct characters/min for participants familiar with tongue piercings. Improvements in typing rates between the sessions suggest that typing ratescan be improved further through long-term use of the ITCI.

  16. Credibility engineering in the food industry: linking science, regulation, and marketing in a corporate context.

    PubMed

    Penders, Bart; Nelis, Annemiek P

    2011-12-01

    We expand upon the notion of the "credibility cycle" through a study of credibility engineering by the food industry. Research and development (R&D) as well as marketing contribute to the credibility of the food company Unilever and its claims. Innovation encompasses the development, marketing, and sales of products. These are directed towards three distinct audiences: scientific peers, regulators, and consumers. R&D uses scientific articles to create credit for itself amongst peers and regulators. These articles are used to support health claims on products. However, R&D, regulation, and marketing are not separate realms. A single strategy of credibility engineering connects health claims to a specific public through linking that public to a health issue and a food product.

  17. What makes professors appear credible: The effect of demographic characteristics and ideological beliefs.

    PubMed

    Zhu, Luke Lei; Aquino, Karl; Vadera, Abhijeet K

    2016-06-01

    Five studies are conducted to examine how ideology and perceptions regarding gender, race, caste, and affiliation status affect how individuals judge researchers' credibility. Support is found for predictions that individuals judge researcher credibility according to their egalitarian or elitist ideologies and according to status cues including race, gender, caste, and university affiliation. Egalitarians evaluate low-status researchers as more credible than high-status researchers. Elitists show the opposite pattern. Credibility judgments affect whether individuals will interpret subsequent ambiguous events in accordance with the researcher's findings. Effects of diffuse status cues and ideological beliefs may be mitigated when specific status cues are presented to override stereotypes. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  18. Factors Underlying the Public's Credibility Perceptions in Educational Evaluations

    ERIC Educational Resources Information Center

    Jacobson, Miriam R.

    2016-01-01

    Understanding how evaluation audiences perceive credibility can help evaluators design evaluations and reports that support appropriate use. While researchers have studied credibility assessment among various educational stakeholders, little research has been conducted with the broader public. This study explored potential factors affecting the…

  19. Motivation and treatment credibility predict alliance in cognitive behavioral treatment for youth with anxiety disorders in community clinics.

    PubMed

    Fjermestad, K W; Lerner, M D; McLeod, B D; Wergeland, G J H; Haugland, B S M; Havik, O E; Öst, L-G; Silverman, W K

    2017-11-16

    We examined whether motivation and treatment credibility predicted alliance in a 10-session cognitive behavioral treatment delivered in community clinics for youth anxiety disorders. Ninety-one clinic-referred youths (mean age  = 11.4 years, standard deviation = 2.1, range 8-15 years, 49.5% boys) with anxiety disorders-rated treatment motivation at pretreatment and perceived treatment credibility after session 1. Youths and therapists (YT) rated alliance after session 3 (early) and session 7 (late). Hierarchical linear models were applied to examine whether motivation and treatment credibility predicted YT early alliance, YT alliance change, and YT alliance agreement. Motivation predicted high early YT alliance, but not YT alliance change or alliance agreement. Youth-rated treatment credibility predicted high early youth alliance and high YT positive alliance change, but not early therapist alliance or alliance agreement. Conclusion Efforts to enhance youth motivation and treatment credibility early in treatment could facilitate the formation of a strong YT alliance. © 2017 Wiley Periodicals, Inc.

  20. Controversy matters: Impacts of topic and solution controversy on the perceived credibility of a scientist who advocates.

    PubMed

    Beall, Lindsey; Myers, Teresa A; Kotcher, John E; Vraga, Emily K; Maibach, Edward W

    2017-01-01

    In this article, we focus on the potential influence of a scientist's advocacy position on the public's perceived credibility of scientists as a whole. Further, we examine how the scientist's solution position (information only, non-controversial, and controversial) affects the public's perception of the scientist's motivation for sharing information about specific issues (flu, marijuana, climate change, severe weather). Finally, we assess how perceived motivations mediate the relationship between solution position and credibility. Using data from a quota sample of American adults obtained by Qualtrics (n = 2,453), we found that in some conditions advocating for a solution positively predicted credibility, while in one condition, it negatively predicted scientist credibility. We also found that the influence of solution position on perceived credibility was mediated by several motivation perceptions; most notably through perception that the scientist was motivated to: (a) serve the public and (b) persuade the public. Further results and implications are discussed.

  1. Controversy matters: Impacts of topic and solution controversy on the perceived credibility of a scientist who advocates

    PubMed Central

    Myers, Teresa A.; Kotcher, John E.; Vraga, Emily K.; Maibach, Edward W.

    2017-01-01

    In this article, we focus on the potential influence of a scientist’s advocacy position on the public’s perceived credibility of scientists as a whole. Further, we examine how the scientist’s solution position (information only, non-controversial, and controversial) affects the public’s perception of the scientist’s motivation for sharing information about specific issues (flu, marijuana, climate change, severe weather). Finally, we assess how perceived motivations mediate the relationship between solution position and credibility. Using data from a quota sample of American adults obtained by Qualtrics (n = 2,453), we found that in some conditions advocating for a solution positively predicted credibility, while in one condition, it negatively predicted scientist credibility. We also found that the influence of solution position on perceived credibility was mediated by several motivation perceptions; most notably through perception that the scientist was motivated to: (a) serve the public and (b) persuade the public. Further results and implications are discussed. PMID:29136643

  2. When Is a Child's Forensic Statement Deemed Credible? A Comparison of Physical and Sexual Abuse Cases.

    PubMed

    Hershkowitz, Irit; Melkman, Eran P; Zur, Ronit

    2018-05-01

    A large national sample of 4,775 reports of child physical and sexual abuse made in Israel in 2014 was analyzed in order to examine whether assessments of credibility would vary according to abuse type, physical or sexual, and whether child and event characteristics contributing to the probability that reports of abuse would be determined as credible would be similar or different in child physical abuse (CPA) and child sexual abuse (CSA) cases. Results revealed that CPA reports were less likely to be viewed as credible (41.9%) compared to CSA reports (56.7%). Multigroup path analysis, however, indicated equivalence in predicting factors. In a unified model for both types of abuse, salient predictors of a credible judgment were older age, lack of a cognitive delay, and the alleged abusive event being a onetime less severe act. Over and beyond the effects of these factors, abuse type significantly contributed to the prediction of credibility judgments.

  3. Beyond Word Processing.

    ERIC Educational Resources Information Center

    Haight, Larry

    1989-01-01

    Types of specialty software that can help in computer editing are discussed, including programs for file transformation, optical character recognition, facsimile transmission, spell-checking, style assistance, editing, indexing, and headline-writing. (MSE)

  4. An exploratory pilot study to design and assess the credibility of a sham kinesiology treatment.

    PubMed

    Hall, Sue; Lewith, George; Brien, Sarah; Little, Paul

    2008-12-01

    Kinesiology is a complementary therapy assessing subtle change in manual muscle testing results to select individualised treatments. We report the exploratory 2-stage development and pilot of a sham kinesiology treatment for use in a clinical trial to evaluate the specific effects of this intervention. 1. To design, pilot and assess the credibility of a sham kinesiology treatment in a kinesiology-aware population. 2. To pilot the sham kinesiology in a cross-over study of sham versus real kinesiology, and to make an exploratory assessment of its credibility in a kinesiology-naïve population. 1. 10 kinesiology-aware volunteers received a specially designed sham treatment weekly for 5 weeks which was subject to a credibility assessment. 2. 10 kinesiology-naïve patients with low back pain were randomised to receive 4 real and 4 sham treatments in a cross-over design; the treatments were subject to a credibility assessment. 100% of participants found the sham protocol a credible treatment as measured by the credibility questionnaire. 100% of patients having real treatment first did not recognise that the second set of treatments were sham. Small numbers precluded the use of formal statistical tests. In this small sample it appeared feasible to deliver an apparently credible sham kinesiology treatment. This feasibility study has allowed us to develop a sham treatment for use in a larger prospective clinical trial of kinesiology in patients with low back pain. 2008 S. Karger AG, Basel.

  5. Learning through hand- or typewriting influences visual recognition of new graphic shapes: behavioral and functional imaging evidence.

    PubMed

    Longcamp, Marieke; Boucard, Céline; Gilhodes, Jean-Claude; Anton, Jean-Luc; Roth, Muriel; Nazarian, Bruno; Velay, Jean-Luc

    2008-05-01

    Fast and accurate visual recognition of single characters is crucial for efficient reading. We explored the possible contribution of writing memory to character recognition processes. We evaluated the ability of adults to discriminate new characters from their mirror images after being taught how to produce the characters either by traditional pen-and-paper writing or with a computer keyboard. After training, we found stronger and longer lasting (several weeks) facilitation in recognizing the orientation of characters that had been written by hand compared to those typed. Functional magnetic resonance imaging recordings indicated that the response mode during learning is associated with distinct pathways during recognition of graphic shapes. Greater activity related to handwriting learning and normal letter identification was observed in several brain regions known to be involved in the execution, imagery, and observation of actions, in particular, the left Broca's area and bilateral inferior parietal lobules. Taken together, these results provide strong arguments in favor of the view that the specific movements memorized when learning how to write participate in the visual recognition of graphic shapes and letters.

  6. Fast approach for toner saving

    NASA Astrophysics Data System (ADS)

    Safonov, Ilia V.; Kurilin, Ilya V.; Rychagov, Michael N.; Lee, Hokeun; Kim, Sangho; Choi, Donchul

    2011-01-01

    Reducing toner consumption is an important task in modern printing devices and has a significant positive ecological impact. Existing toner saving approaches have two main drawbacks: appearance of hardcopy in toner saving mode is worse in comparison with normal mode; processing of whole rendered page bitmap requires significant computational costs. We propose to add small holes of various shapes and sizes to random places inside a character bitmap stored in font cache. Such random perforation scheme is based on processing pipeline in RIP of standard printer languages Postscript and PCL. Processing of text characters only, and moreover, processing of each character for given font and size alone, is an extremely fast procedure. The approach does not deteriorate halftoned bitmap and business graphics and provide toner saving for typical office documents up to 15-20%. Rate of toner saving is adjustable. Alteration of resulted characters' appearance is almost indistinguishable in comparison with solid black text due to random placement of small holes inside the character regions. The suggested method automatically skips small fonts to preserve its quality. Readability of text processed by proposed method is fine. OCR programs process that scanned hardcopy successfully too.

  7. A method for inferring the rate of evolution of homologous characters that can potentially improve phylogenetic inference, resolve deep divergence and correct systematic biases.

    PubMed

    Cummins, Carla A; McInerney, James O

    2011-12-01

    Current phylogenetic methods attempt to account for evolutionary rate variation across characters in a matrix. This is generally achieved by the use of sophisticated evolutionary models, combined with dense sampling of large numbers of characters. However, systematic biases and superimposed substitutions make this task very difficult. Model adequacy can sometimes be achieved at the cost of adding large numbers of free parameters, with each parameter being optimized according to some criterion, resulting in increased computation times and large variances in the model estimates. In this study, we develop a simple approach that estimates the relative evolutionary rate of each homologous character. The method that we describe uses the similarity between characters as a proxy for evolutionary rate. In this article, we work on the premise that if the character-state distribution of a homologous character is similar to many other characters, then this character is likely to be relatively slowly evolving. If the character-state distribution of a homologous character is not similar to many or any of the rest of the characters in a data set, then it is likely to be the result of rapid evolution. We show that in some test cases, at least, the premise can hold and the inferences are robust. Importantly, the method does not use a "starting tree" to make the inference and therefore is tree independent. We demonstrate that this approach can work as well as a maximum likelihood (ML) approach, though the ML method needs to have a known phylogeny, or at least a very good estimate of that phylogeny. We then demonstrate some uses for this method of analysis, including the improvement in phylogeny reconstruction for both deep-level and recent relationships and overcoming systematic biases such as base composition bias. Furthermore, we compare this approach to two well-established methods for reweighting or removing characters. These other methods are tree-based and we show that they can be systematically biased. We feel this method can be useful for phylogeny reconstruction, understanding evolutionary rate variation, and for understanding selection variation on different characters.

  8. Influence of Cartoon Media Characters on Children’s Attention to and Preference for Food and Beverage Products

    PubMed Central

    Ogle, Andrew D.; Graham, Dan J.; Lucas-Thompson, Rachel G.; Roberto, Christina A.

    2017-01-01

    Background Over-consuming unhealthful foods and beverages contributes to pediatric obesity and associated diseases. Food marketing influences children’s food preferences, choices, and intake. Objective To examine whether adding licensed media characters to healthful food/beverage packages increases children’s attention to and preference for these products. We hypothesized that children prefer less- (vs more-) healthful foods, and pay greater attention to and preferentially select products with (vs without) media characters regardless of nutritional quality. We also hypothesized that children prefer more-healthful products when characters are present over less-healthful products without characters. Design On a computer, participants viewed food/beverage pairs of more-healthful and less-healthful versions of similar products. The same products were shown with and without licensed characters on the packaging. An eye-tracking camera monitored participant gaze, and participants chose which product they preferred from each of 60 pairs. Participants/setting Six- to 9-year-old children (n=149; mean age=7.36, standard deviation=1.12) recruited from the Twin Cities, MN, area in 2012–2013. Main outcome measures Visual attention and product choice. Statistical analyses performed Attention to products was compared using paired-samples t tests, and product choice was analyzed with single-sample t tests. Analyses of variance were conducted to test for interaction effects of specific characters and child sex and age. Results Children paid more attention to products with characters and preferred less-healthful products. Contrary to our prediction, children chose products without characters approximately 62% of the time. Children’s choices significantly differed based on age, sex, and the specific cartoon character displayed, with characters in this study being preferred by younger boys. Conclusions Results suggest that putting licensed media characters on more-healthful food/beverage products might not encourage all children to make healthier food choices, but could increase selection of healthy foods among some, particularly younger children, boys, and those who like the featured character(s). Effective use likely requires careful demographic targeting. PMID:27793520

  9. 8 CFR 208.2 - Jurisdiction

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... jurisdiction over credible fear determinations under § 208.30 and reasonable fear determinations under § 208.31... reasonable fear determinations referred to the Immigration Court under § 208.31, and credible fear... longer than authorized; (ii) An alien stowaway who has been found to have a credible fear of persecution...

  10. 8 CFR 1208.6 - Disclosure to third parties.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... application, records pertaining to any credible fear determination conducted pursuant to § 1208.30, and records pertaining to any reasonable fear determination conducted pursuant to § 1208.31, shall not be... a credible fear or reasonable fear interview, or received a credible fear or reasonable fear review...

  11. Computational modeling of peripheral pain: a commentary.

    PubMed

    Argüello, Erick J; Silva, Ricardo J; Huerta, Mónica K; Avila, René S

    2015-06-11

    This commentary is intended to find possible explanations for the low impact of computational modeling on pain research. We discuss the main strategies that have been used in building computational models for the study of pain. The analysis suggests that traditional models lack biological plausibility at some levels, they do not provide clinically relevant results, and they cannot capture the stochastic character of neural dynamics. On this basis, we provide some suggestions that may be useful in building computational models of pain with a wider range of applications.

  12. Computer-assisted handwriting style identification system for questioned document examination

    NASA Astrophysics Data System (ADS)

    Cha, Sung-Hyuk; Yoon, Sungsoo; Tappert, Charles C.; Lee, Yillbyung

    2005-03-01

    Handwriting originates from a particular copybook style such as Palmer or Zaner-Bloser that one learns in childhood. Since questioned document examination plays an important investigative and forensic role in many types of crime, it is important to develop a system that helps objectively identify a questioned document"s handwriting style. Here, we propose a computer vision system that can assist a document examiner in the identification of a writer"s handwriting style and therefore the origin or nationality of an unknown writer of a questioned document. We collected 33 Roman alphabet copybook styles from 18 countries. Each character in a questioned document is segmented and matched against all of the 33 handwriting copybook styles. The more characters present in the questioned document, the higher the accuracy observed.

  13. Classical Cosmology Through Animation Stories

    NASA Astrophysics Data System (ADS)

    Mijic, Milan; Kang, E. Y. E.; Longson, T.; State LA SciVi Project, Cal

    2010-05-01

    Computer animations are a powerful tool for explanation and communication of ideas, especially to a younger generation. Our team completed a three part sequence of short, computer animated stories about the insight and discoveries that lead to the understanding of the overall structure of the universe. Our principal characters are Immanuel Kant, Henrietta Leavitt, and Edwin Hubble. We utilized animations to model and visualize the physical concepts behind each discovery and to recreate the characters, locations, and flavor of the time. The animations vary in length from 6 to 11 minutes. The instructors or presenters may wish to utilize them separately or together. The animations may be used for learning classical cosmology in a visual way in GE astronomy courses, in pre-college science classes, or in public science education setting.

  14. Marginality, Credibility, and Impression Management: The Asian Sociologist in America.

    ERIC Educational Resources Information Center

    Unnithan, N. Prabha

    1988-01-01

    Relates personal experiences of a sociologist of Asian origin in an effort to illustrate problems inherent in the process of becoming accepted as an academic sociologist. Identifies important themes of marginality, credibility, and impression management. Points out ways in which the Asian sociologists can go about achieving credibility. (KO)

  15. 8 CFR 208.6 - Disclosure to third parties.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... credible fear determination conducted pursuant to § 208.30, and records pertaining to any reasonable fear... that a specific alien has applied for asylum, received a credible fear or reasonable fear interview, or received a credible fear or reasonable fear review shall also be protected from disclosure. The Service...

  16. Scientific independence: A key to credibility

    Treesearch

    Leonard F. Ruggiero

    2007-01-01

    Independence and objectivity are key ingredients of scientific credibility, especially in research organizations that are part of a natural resource management agency like the Forest Service. Credibility, in turn, is essential to the utility of scientific information in socio-political processes. In order to develop this thesis further, a basic understanding of Forest...

  17. Sexual Preference Similarity, Attitude Similarity, and Perceived Counselor Credibility and Attractiveness.

    ERIC Educational Resources Information Center

    Atkinson, Donald R.; And Others

    1981-01-01

    Examined the effect of membership group and attitudinal similarity on perceived counselor credibility and attractiveness. Homosexual men (N=84) rated the counselor's credibility and attractiveness after listening to a recorded counseling interview. The counselor was rated more expert, trustworthy, and attractive when he stated a sexual preference…

  18. Data Credibility: A Perspective from Systematic Reviews in Environmental Management

    ERIC Educational Resources Information Center

    Pullin, Andrew S.; Knight, Teri M.

    2009-01-01

    To use environmental program evaluation to increase effectiveness, predictive power, and resource allocation efficiency, evaluators need good data. Data require sufficient credibility in terms of fitness for purpose and quality to develop the necessary evidence base. The authors examine elements of data credibility using experience from critical…

  19. The Effects of Source Credibility in the Presence or Absence of Prior Attitudes: Implications for the Design of Persuasive Communication Campaigns.

    PubMed

    Kumkale, G Tarcan; Albarracín, Dolores; Seignourel, Paul J

    2010-06-01

    Most theories of persuasion predict that limited ability and motivation to think about communications should increase the impact of source credibility on persuasion. Furthermore, this effect is assumed to occur, regardless of whether or not the recipients have prior attitudes. In this study, the effects of source credibility, ability, and motivation (knowledge, message repetition, relevance) on persuasion were examined meta-analytically across both attitude formation and change conditions. Findings revealed that the Source Credibility × Ability/Motivation interaction emerged only when participants lacked prior attitudes and were unable to form a new attitude based on the message content. In such settings, the effects of source credibility decayed rapidly. The implications of these findings for applied communication campaigns are discussed.

  20. The Effects of Source Credibility in the Presence or Absence of Prior Attitudes: Implications for the Design of Persuasive Communication Campaigns1

    PubMed Central

    Kumkale, G. Tarcan; AlbarracÍn, Dolores; Seignourel, Paul J.

    2011-01-01

    Most theories of persuasion predict that limited ability and motivation to think about communications should increase the impact of source credibility on persuasion. Furthermore, this effect is assumed to occur, regardless of whether or not the recipients have prior attitudes. In this study, the effects of source credibility, ability, and motivation (knowledge, message repetition, relevance) on persuasion were examined meta-analytically across both attitude formation and change conditions. Findings revealed that the Source Credibility × Ability/Motivation interaction emerged only when participants lacked prior attitudes and were unable to form a new attitude based on the message content. In such settings, the effects of source credibility decayed rapidly. The implications of these findings for applied communication campaigns are discussed. PMID:21625405

  1. The effect of source credibility on consumers' perceptions of the quality of health information on the Internet.

    PubMed

    Bates, Benjamin R; Romina, Sharon; Ahmed, Rukhsana; Hopson, Danielle

    2006-03-01

    Recent use of the Internet as a source of health information has raised concerns about consumers' ability to tell 'good' information from 'bad' information. Although consumers report that they use source credibility to judge information quality, several observational studies suggest that consumers make little use of source credibility. This study examines consumer evaluations of web pages attributed to a credible source as compared to generic web pages on measures of message quality. In spring 2005, a community-wide convenience survey was distributed in a regional hub city in Ohio, USA. 519 participants were randomly assigned one of six messages discussing lung cancer prevention: three messages each attributed to a highly credible national organization and three identical messages each attributed to a generic web page. Independent sample t-tests were conducted to compare each attributed message to its counterpart attributed to a generic web page on measures of trustworthiness, truthfulness, readability, and completeness. The results demonstrated that differences in attribution to a source did not have a significant effect on consumers' evaluations of the quality of the information.Conclusions. The authors offer suggestions for national organizations to promote credibility to consumers as a heuristic for choosing better online health information through the use of media co-channels to emphasize credibility.

  2. The credibility of exposure therapy: Does the theoretical rationale matter?

    PubMed

    Arch, Joanna J; Twohig, Michael P; Deacon, Brett J; Landy, Lauren N; Bluett, Ellen J

    2015-09-01

    Little is understood about how the public perceives exposure-based therapy (ET) for treating anxiety and trauma-related disorders or how ET rationales affect treatment credibility. Distinct approaches to framing ET are practiced, including those emphasized in traditional cognitive behavioral therapy, acceptance and commitment therapy, and the more recent inhibitory learning model. However, their relative effect on ET's credibility remains unknown. A final sample of 964 U.S. adults provided baseline views of ET. Participants rated ET treatment credibility following a simple ET definition (pre-rationale) and following randomization to rationale modules addressing ET goals, fear, and cognitive strategies from distinct theoretical perspectives (post-rationale). Baseline ET views, symptoms, and sociodemographic characteristics were examined as putative moderators and predictors. At baseline, the majority had never heard of ET. From pre- to post-rationale, ET treatment credibility significantly increased but the rationales' theoretical perspective had little impact. More negative baseline ET views, specific ethnic/racial minority group status, and lower education moderated or predicted greater increases in treatment credibility following the rationale. ET remains relatively unknown as a treatment for anxiety or trauma, supporting the need for direct-to-consumer marketing. Diverse theory-driven rationales similarly increased ET credibility, particularly among those less likely to use ET. Copyright © 2015 Elsevier Ltd. All rights reserved.

  3. A generalized fuzzy credibility-constrained linear fractional programming approach for optimal irrigation water allocation under uncertainty

    NASA Astrophysics Data System (ADS)

    Zhang, Chenglong; Guo, Ping

    2017-10-01

    The vague and fuzzy parametric information is a challenging issue in irrigation water management problems. In response to this problem, a generalized fuzzy credibility-constrained linear fractional programming (GFCCFP) model is developed for optimal irrigation water allocation under uncertainty. The model can be derived from integrating generalized fuzzy credibility-constrained programming (GFCCP) into a linear fractional programming (LFP) optimization framework. Therefore, it can solve ratio optimization problems associated with fuzzy parameters, and examine the variation of results under different credibility levels and weight coefficients of possibility and necessary. It has advantages in: (1) balancing the economic and resources objectives directly; (2) analyzing system efficiency; (3) generating more flexible decision solutions by giving different credibility levels and weight coefficients of possibility and (4) supporting in-depth analysis of the interrelationships among system efficiency, credibility level and weight coefficient. The model is applied to a case study of irrigation water allocation in the middle reaches of Heihe River Basin, northwest China. Therefore, optimal irrigation water allocation solutions from the GFCCFP model can be obtained. Moreover, factorial analysis on the two parameters (i.e. λ and γ) indicates that the weight coefficient is a main factor compared with credibility level for system efficiency. These results can be effective for support reasonable irrigation water resources management and agricultural production.

  4. Can Simulation Credibility Be Improved Using Sensitivity Analysis to Understand Input Data Effects on Model Outcome?

    NASA Technical Reports Server (NTRS)

    Myers, Jerry G.; Young, M.; Goodenow, Debra A.; Keenan, A.; Walton, M.; Boley, L.

    2015-01-01

    Model and simulation (MS) credibility is defined as, the quality to elicit belief or trust in MS results. NASA-STD-7009 [1] delineates eight components (Verification, Validation, Input Pedigree, Results Uncertainty, Results Robustness, Use History, MS Management, People Qualifications) that address quantifying model credibility, and provides guidance to the model developers, analysts, and end users for assessing the MS credibility. Of the eight characteristics, input pedigree, or the quality of the data used to develop model input parameters, governing functions, or initial conditions, can vary significantly. These data quality differences have varying consequences across the range of MS application. NASA-STD-7009 requires that the lowest input data quality be used to represent the entire set of input data when scoring the input pedigree credibility of the model. This requirement provides a conservative assessment of model inputs, and maximizes the communication of the potential level of risk of using model outputs. Unfortunately, in practice, this may result in overly pessimistic communication of the MS output, undermining the credibility of simulation predictions to decision makers. This presentation proposes an alternative assessment mechanism, utilizing results parameter robustness, also known as model input sensitivity, to improve the credibility scoring process for specific simulations.

  5. Has computational creativity successfully made it "Beyond the Fence" in musical theatre?

    NASA Astrophysics Data System (ADS)

    Jordanous, Anna

    2017-10-01

    A significant test for software is to task it with replicating human performance, as done recently with creative software and the commercial project Beyond the Fence (undertaken for a television documentary Computer Says Show). The remit of this project was to use computer software as much as possible to produce "the world's first computer-generated musical". Several creative systems were used to generate this musical, which was performed in London's West End in 2016. This paper considers the challenge of evaluating this project. Current computational creativity evaluation methods are ill-suited to evaluating projects that involve creative input from multiple systems and people. Following recent inspiration within computational creativity research from interaction design, here the DECIDE evaluation framework is applied to evaluate the Beyond the Fence project. Evaluation finds that the project was reasonably successful at achieving the task of using computational generation to produce a credible musical. Lessons have been learned for future computational creativity projects though, particularly for affording creative software more agency and enabling software to interact with other creative partners. Upon reflection, the DECIDE framework emerges as a useful evaluation "checklist" (if not a tangible operational methodology) for evaluating multiple creative systems participating in a creative task.

  6. The Remote Analysis Station (RAS) as an instructional system

    NASA Technical Reports Server (NTRS)

    Rogers, R. H.; Wilson, C. L.; Dye, R. H.; Jaworski, E.

    1981-01-01

    "Hands-on" training in LANDSAT data analysis techniques can be obtained using a desk-top, interactive remote analysis station (RAS) which consists of a color CRT imagery display, with alphanumeric overwrite and keyboard, as well as a cursor controller and modem. This portable station can communicate via modem and dial-up telephone with a host computer at 1200 baud or it can be hardwired to a host computer at 9600 baud. A Z80 microcomputer controls the display refresh memory and remote station processing. LANDSAT data is displayed as three-band false-color imagery, one-band color-sliced imagery, or color-coded processed imagery. Although the display memory routinely operates at 256 x 256 picture elements, a display resolution of 128 x 128 can be selected to fill the display faster. In the false color mode the computer packs the data into one 8-bit character. When the host is not sending pictorial information the characters sent are in ordinary ASCII code. System capabilities are described.

  7. A 3D visualization and simulation of the individual human jaw.

    PubMed

    Muftić, Osman; Keros, Jadranka; Baksa, Sarajko; Carek, Vlado; Matković, Ivo

    2003-01-01

    A new biomechanical three-dimensional (3D) model for the human mandible based on computer-generated virtual model is proposed. Using maps obtained from the special kinds of photos of the face of the real subject, it is possible to attribute personality to the virtual character, while computer animation offers movements and characteristics within the confines of space and time of the virtual world. A simple two-dimensional model of the jaw cannot explain the biomechanics, where the muscular forces through occlusion and condylar surfaces are in the state of 3D equilibrium. In the model all forces are resolved into components according to a selected coordinate system. The muscular forces act on the jaw, along with the necessary force level for chewing as some kind of mandible balance, preventing dislocation and loading of nonarticular tissues. In the work is used new approach to computer-generated animation of virtual 3D characters (called "Body SABA"), using in one object package of minimal costs and easy for operation.

  8. Older Children and Adolescents with High-Functioning Autism Spectrum Disorders Can Comprehend Verbal Irony in Computer-Mediated Communication

    ERIC Educational Resources Information Center

    Glenwright, Melanie; Agbayewa, Abiola S.

    2012-01-01

    We compared the comprehension of verbal irony presented in computer-mediated conversations for older children and adolescents with high-functioning autism spectrum disorders (HFASD) and typically developing (TD) controls. We also determined whether participants' interpretations of irony were affected by the relationship between characters in the…

  9. Some Principles for the Human Use of Computers in Education.

    ERIC Educational Resources Information Center

    Dwyer, Thomas A.

    Several principles for the effective use of computers in education are identified as a result of experiences with Project Solo, an experiment in education patterned on the dual-solo example of flight instruction in allowing the student to eventually exert more influence on his learning than his instructor. First, the essential social character of…

  10. Beach Profile Analysis System (BPAS). Volume VII. BPAS User’s Guide: Analysis Module ELVDIS.

    DTIC Science & Technology

    1982-06-01

    changes, common bonds are established relative to the landward and seaward extent of the surveys on each profile line. The computed area under each pro...Cyber 176 or equivalent computer. Such features include the 10-character, 60- bit word size, the FORTRAN- callable sort routine (interfacing with the NOS

  11. Character Recognition Using Genetically Trained Neural Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Diniz, C.; Stantz, K.M.; Trahan, M.W.

    1998-10-01

    Computationally intelligent recognition of characters and symbols addresses a wide range of applications including foreign language translation and chemical formula identification. The combination of intelligent learning and optimization algorithms with layered neural structures offers powerful techniques for character recognition. These techniques were originally developed by Sandia National Laboratories for pattern and spectral analysis; however, their ability to optimize vast amounts of data make them ideal for character recognition. An adaptation of the Neural Network Designer soflsvare allows the user to create a neural network (NN_) trained by a genetic algorithm (GA) that correctly identifies multiple distinct characters. The initial successfidmore » recognition of standard capital letters can be expanded to include chemical and mathematical symbols and alphabets of foreign languages, especially Arabic and Chinese. The FIN model constructed for this project uses a three layer feed-forward architecture. To facilitate the input of characters and symbols, a graphic user interface (GUI) has been developed to convert the traditional representation of each character or symbol to a bitmap. The 8 x 8 bitmap representations used for these tests are mapped onto the input nodes of the feed-forward neural network (FFNN) in a one-to-one correspondence. The input nodes feed forward into a hidden layer, and the hidden layer feeds into five output nodes correlated to possible character outcomes. During the training period the GA optimizes the weights of the NN until it can successfully recognize distinct characters. Systematic deviations from the base design test the network's range of applicability. Increasing capacity, the number of letters to be recognized, requires a nonlinear increase in the number of hidden layer neurodes. Optimal character recognition performance necessitates a minimum threshold for the number of cases when genetically training the net. And, the amount of noise significantly degrades character recognition efficiency, some of which can be overcome by adding noise during training and optimizing the form of the network's activation fimction.« less

  12. Beliefs about human agency influence the neural processing of gaze during joint attention.

    PubMed

    Caruana, Nathan; de Lissa, Peter; McArthur, Genevieve

    2017-04-01

    The current study measured adults' P350 and N170 ERPs while they interacted with a character in a virtual reality paradigm. Some participants believed the character was controlled by a human ("avatar" condition, n = 19); others believed it was controlled by a computer program ("agent" condition, n = 19). In each trial, participants initiated joint attention in order to direct the character's gaze toward a target. In 50% of trials, the character gazed toward the target (congruent responses), and in 50% of trials the character gazed to a different location (incongruent response). In the avatar condition, the character's incongruent gaze responses generated significantly larger P350 peaks at centro-parietal sites than congruent gaze responses. In the agent condition, the P350 effect was strikingly absent. Left occipitotemporal N170 responses were significantly smaller in the agent condition compared to the avatar condition for both congruent and incongruent gaze shifts. These data suggest that beliefs about human agency may recruit mechanisms that discriminate the social outcome of a gaze shift after approximately 350 ms, and that these mechanisms may modulate the early perceptual processing of gaze. These findings also suggest that the ecologically valid measurement of social cognition may depend upon paradigms that simulate genuine social interactions.

  13. The Uncanny Valley Does Not Interfere with Level 1 Visual Perspective Taking

    PubMed Central

    MacDorman, Karl F.; Srinivas, Preethi; Patel, Himalaya

    2014-01-01

    When a computer-animated human character looks eerily realistic, viewers report a loss of empathy; they have difficulty taking the character’s perspective. To explain this perspective-taking impairment, known as the uncanny valley, a novel theory is proposed: The more human or less eerie a character looks, the more it interferes with level 1 visual perspective taking when the character’s perspective differs from that of the human observer (e.g., because the character competitively activates shared circuits in the observer’s brain). The proposed theory is evaluated in three experiments involving a dot-counting task in which participants either assumed or ignored the perspective of characters varying in their human photorealism and eeriness. Although response times and error rates were lower when the number of dots faced by the observer and character were the same (congruent condition) than when they were different (incongruent condition), no consistent pattern emerged between the human photorealism or eeriness of the characters and participants’ response times and error rates. Thus, the proposed theory is unsupported for level 1 visual perspective taking. As the effects of the uncanny valley on empathy have not previously been investigated systematically, these results provide evidence to eliminate one possible explanation. PMID:25221383

  14. A Computational Procedure for Identifying Bilinear Representations of Nonlinear Systems Using Volterra Kernels

    NASA Technical Reports Server (NTRS)

    Kvaternik, Raymond G.; Silva, Walter A.

    2008-01-01

    A computational procedure for identifying the state-space matrices corresponding to discrete bilinear representations of nonlinear systems is presented. A key feature of the method is the use of first- and second-order Volterra kernels (first- and second-order pulse responses) to characterize the system. The present method is based on an extension of a continuous-time bilinear system identification procedure given in a 1971 paper by Bruni, di Pillo, and Koch. The analytical and computational considerations that underlie the original procedure and its extension to the title problem are presented and described, pertinent numerical considerations associated with the process are discussed, and results obtained from the application of the method to a variety of nonlinear problems from the literature are presented. The results of these exploratory numerical studies are decidedly promising and provide sufficient credibility for further examination of the applicability of the method.

  15. Massive Data, the Digitization of Science, and Reproducibility of Results

    ScienceCinema

    Stodden, Victoria

    2018-04-27

    As the scientific enterprise becomes increasingly computational and data-driven, the nature of the information communicated must change. Without inclusion of the code and data with published computational results, we are engendering a credibility crisis in science. Controversies such as ClimateGate, the microarray-based drug sensitivity clinical trials under investigation at Duke University, and retractions from prominent journals due to unverified code suggest the need for greater transparency in our computational science. In this talk I argue that the scientific method be restored to (1) a focus on error control as central to scientific communication and (2) complete communication of the underlying methodology producing the results, ie. reproducibility. I outline barriers to these goals based on recent survey work (Stodden 2010), and suggest solutions such as the “Reproducible Research Standard” (Stodden 2009), giving open licensing options designed to create an intellectual property framework for scientists consonant with longstanding scientific norms.

  16. Use of the FDA nozzle model to illustrate validation techniques in computational fluid dynamics (CFD) simulations.

    PubMed

    Hariharan, Prasanna; D'Souza, Gavin A; Horner, Marc; Morrison, Tina M; Malinauskas, Richard A; Myers, Matthew R

    2017-01-01

    A "credible" computational fluid dynamics (CFD) model has the potential to provide a meaningful evaluation of safety in medical devices. One major challenge in establishing "model credibility" is to determine the required degree of similarity between the model and experimental results for the model to be considered sufficiently validated. This study proposes a "threshold-based" validation approach that provides a well-defined acceptance criteria, which is a function of how close the simulation and experimental results are to the safety threshold, for establishing the model validity. The validation criteria developed following the threshold approach is not only a function of Comparison Error, E (which is the difference between experiments and simulations) but also takes in to account the risk to patient safety because of E. The method is applicable for scenarios in which a safety threshold can be clearly defined (e.g., the viscous shear-stress threshold for hemolysis in blood contacting devices). The applicability of the new validation approach was tested on the FDA nozzle geometry. The context of use (COU) was to evaluate if the instantaneous viscous shear stress in the nozzle geometry at Reynolds numbers (Re) of 3500 and 6500 was below the commonly accepted threshold for hemolysis. The CFD results ("S") of velocity and viscous shear stress were compared with inter-laboratory experimental measurements ("D"). The uncertainties in the CFD and experimental results due to input parameter uncertainties were quantified following the ASME V&V 20 standard. The CFD models for both Re = 3500 and 6500 could not be sufficiently validated by performing a direct comparison between CFD and experimental results using the Student's t-test. However, following the threshold-based approach, a Student's t-test comparing |S-D| and |Threshold-S| showed that relative to the threshold, the CFD and experimental datasets for Re = 3500 were statistically similar and the model could be considered sufficiently validated for the COU. However, for Re = 6500, at certain locations where the shear stress is close the hemolysis threshold, the CFD model could not be considered sufficiently validated for the COU. Our analysis showed that the model could be sufficiently validated either by reducing the uncertainties in experiments, simulations, and the threshold or by increasing the sample size for the experiments and simulations. The threshold approach can be applied to all types of computational models and provides an objective way of determining model credibility and for evaluating medical devices.

  17. Use of Credibility Heuristics in a Social Question-Answering Service

    ERIC Educational Resources Information Center

    Matthews, Paul

    2015-01-01

    Introduction: This study looked at the effect of community peripheral cues (specifically voting score and answerer's reputation) on the user's credibility rating of answers. Method: Students in technology and philosophy were asked to assess the credibility of answers to questions posted on a social question-answering platform. Through the use of a…

  18. In Your Facebook: Examining Facebook Usage as Misbehavior on Perceived Teacher Credibility

    ERIC Educational Resources Information Center

    Hutchens, Jason S.; Hayes, Timothy

    2014-01-01

    Teachers sometimes do things that negatively impact their own credibility in classroom settings. One way instructors maintain credibility among students is by keeping a veil between their personal and professional personas. The advent of Facebook presents new challenges for instructors seeking to keep their personal lives private in order to…

  19. A Meta-Analytical Review of Teacher Credibility and Its Associations with Teacher Behaviors and Student Outcomes

    ERIC Educational Resources Information Center

    Finn, Amber N.; Schrodt, Paul; Witt, Paul L.; Elledge, Nikki; Jernberg, Kodiane A.; Larson, Lara M.

    2009-01-01

    This meta-analysis reviews the findings of 51 studies (N = 14,378) examining the associations among teacher credibility, teacher behaviors, and student outcomes. When all three dimensions of credibility are considered collectively (i.e., competence, trustworthiness, and caring), the cumulative evidence indicates a moderate, meaningful relationship…

  20. Effects of Argument Scaffolding and Source Credibility on Science Text Comprehension

    ERIC Educational Resources Information Center

    Lin, Tzu-Jung; Horng, Ruey-Yun; Anderson, Richard C.

    2014-01-01

    This study investigated the effects of argument scaffolding and source credibility on science text comprehension. Eighty-seven college students were randomly assigned to an argument scaffolding activity, or no scaffolding, and read 2 science texts, attributed to a high- or a low-credibility source. The argument-scaffolding group recalled less…

  1. Advisor-Advisee Three: Graduate Students' Perceptions of Verbal Aggression, Credibility, and Conflict Styles in the Advising Relationship

    ERIC Educational Resources Information Center

    Punyanunt-Carter, Narissra M.; Wrench, Jason S.

    2008-01-01

    The current study looked at the relation between advisee perceptions of advisor's verbal aggression, credibility, and conflict styles. Participants were 153 graduate students who reported their perceptions concerning their advisor. First, the study found that advisee perceptions of their advisor's credibility (competence, caring/goodwill, &…

  2. Notes on Experiments.

    ERIC Educational Resources Information Center

    Physics Education, 1986

    1986-01-01

    Describes (1) computer graphics for the coefficient of restitution; (2) an experiment on the optical processing of images; and (3) a simple, coherent optical system for character recognition using Polaroid (Type 665) negative film. (JN)

  3. Fuzzy robust credibility-constrained programming for environmental management and planning.

    PubMed

    Zhang, Yimei; Hang, Guohe

    2010-06-01

    In this study, a fuzzy robust credibility-constrained programming (FRCCP) is developed and applied to the planning for waste management systems. It incorporates the concepts of credibility-based chance-constrained programming and robust programming within an optimization framework. The developed method can reflect uncertainties presented as possibility-density by fuzzy-membership functions. Fuzzy credibility constraints are transformed to the crisp equivalents with different credibility levels, and ordinary fuzzy inclusion constraints are determined by their robust deterministic constraints by setting a-cut levels. The FRCCP method can provide different system costs under different credibility levels (lambda). From the results of sensitivity analyses, the operation cost of the landfill is a critical parameter. For the management, any factors that would induce cost fluctuation during landfilling operation would deserve serious observation and analysis. By FRCCP, useful solutions can be obtained to provide decision-making support for long-term planning of solid waste management systems. It could be further enhanced through incorporating methods of inexact analysis into its framework. It can also be applied to other environmental management problems.

  4. The Impact of Foreign Accent on Credibility: An Analysis of Cognitive Statement Ratings in a Swiss Context.

    PubMed

    Stocker, Ladina

    2017-06-01

    The present paper reports on a study investigating whether the presence of a foreign accent negatively affects credibility judgments. Previous research suggests that trivia statements recorded by speakers with a foreign accent are judged as less credible than when recorded by native speakers due to increased cognitive demands (Lev-Ari and Keysar in J Exp Soc Psychol 46(6):1093-1096, 2010. doi: 10.1016/j.jesp.2010.05.025 ). In the present study, 194 French- and 183 Swiss-German-speaking participants were asked to judge the truthfulness of 48 trivia statements recorded by speakers with French, Swiss-German, Italian and English accents by means of an online survey. Before submitting the survey, raters were asked to attribute given labels-including adjectives referring to credibility-to a language group aiming to elicit raters' stereotypes in a direct manner. Although the results of this task indicate that the raters do hold different stereotypes concerning credibility of speech communities, foreign accent does not seem to have an impact on credibility ratings in the Swiss context.

  5. Investigating electronic word-of-mouth effects on online discussion forums: the role of perceived positive electronic word-of-mouth review credibility.

    PubMed

    Chih, Wen-Hai; Wang, Kai-Yu; Hsu, Li-Chun; Huang, Su-Chen

    2013-09-01

    Electronic word of mouth (eWOM) has been an important factor influencing consumer purchase decisions. Using the ABC model of attitude, this study proposes a model to explain how eWOM affects online discussion forums. Specifically, we propose that platform (Web site reputation and source credibility) and customer (obtaining buying-related information and social orientation through information) factors influence purchase intentions via perceived positive eWOM review credibility, as well as product and Web site attitudes in an online community context. A total of 353 online discussion forum users in an online community (Fashion Guide) in Taiwan were recruited, and structural equation modeling (SEM) was used to test the research hypotheses. The results indicate that Web site reputation, source credibility, obtaining buying-related information, and social orientation through information positively influence perceived positive eWOM review credibility. In turn, perceived positive eWOM review credibility directly influences purchase intentions and also indirectly influences purchase intentions via product and Web site attitudes. Finally, we discuss the theoretical and managerial implications of the findings.

  6. Computer-Based Internet-Hosted Assessment of L2 Literacy: Computerizing and Administering of the Oxford Quick Placement Test in ExamView and Moodle

    NASA Astrophysics Data System (ADS)

    Meurant, Robert C.

    Sorting of Korean English-as-a-Foreign-Language (EFL) university students by Second Language (L2) aptitude allocates students to classes of compatible ability level, and was here used to screen candidates for interview. Paper-and-pen versions of the Oxford Quick Placement Test were adapted to computer-based testing via online hosting using FSCreations ExamView. Problems with their online hosting site led to conversion to the popular computer-based learning management system Moodle, hosted on www.ninehub.com. 317 sophomores were tested online to encourage L2 digital literacy. Strategies for effective hybrid implementation of Learning Management Systems in L2 tertiary education include computer-based Internet-hosted L2 aptitude tests. These potentially provide a convenient measure of student progress in developing L2 fluency, and offer a more objective and relevant means of teacher- and course-assessment than student evaluations, which tend to confuse entertainment value and teacher popularity with academic credibility and pedagogical effectiveness.

  7. Validation of Computational Models in Biomechanics

    PubMed Central

    Henninger, Heath B.; Reese, Shawn P.; Anderson, Andrew E.; Weiss, Jeffrey A.

    2010-01-01

    The topics of verification and validation (V&V) have increasingly been discussed in the field of computational biomechanics, and many recent articles have applied these concepts in an attempt to build credibility for models of complex biological systems. V&V are evolving techniques that, if used improperly, can lead to false conclusions about a system under study. In basic science these erroneous conclusions may lead to failure of a subsequent hypothesis, but they can have more profound effects if the model is designed to predict patient outcomes. While several authors have reviewed V&V as they pertain to traditional solid and fluid mechanics, it is the intent of this manuscript to present them in the context of computational biomechanics. Specifically, the task of model validation will be discussed with a focus on current techniques. It is hoped that this review will encourage investigators to engage and adopt the V&V process in an effort to increase peer acceptance of computational biomechanics models. PMID:20839648

  8. The effects of stakeholder involvement on perceptions of an evaluation's credibility.

    PubMed

    Jacobson, Miriam R; Azzam, Tarek

    2018-06-01

    This article presents a study of the effects of stakeholder involvement on perceptions of an evaluation's credibility. Crowdsourced members of the public and a group of educational administrators read a description of a hypothetical program and two evaluations of the program: one conducted by a researcher and one conducted by program staff (i.e. program stakeholders). Study participants were randomly assigned versions of the scenario with different levels of stakeholder credibility and types of findings. Results showed that both samples perceived the researcher's evaluation findings to be more credible than the program staff's, but that this difference was significantly reduced when the program staff were described to be highly credible. The article concludes with implications for theory and research on evaluation dissemination and stakeholder involvement. Copyright © 2018 Elsevier Ltd. All rights reserved.

  9. Contributing factors to the use of health-related websites.

    PubMed

    Hong, Traci

    2006-03-01

    This study explicates the influence of audience factors on website credibility and the subsequent effect that credibility has on the intention to revisit a site. It does so in an experimental setting in which participants were given two health-related search tasks. Reliance on the web for health-related information positively influenced website credibility in both searches. Knowledge was a significant predictor for the search task that required more cognitive ability. Of the credibility dimensions, trust/expertise and depth were significant predictors of intention to revisit a site in both searches. Fairness and goodwill were nonsignificant predictors in both searches.

  10. Clinical evaluation of wireless inductive tongue computer interface for control of computers and assistive devices.

    PubMed

    Lontis, Eugen R; Lund, Morten E; Christensen, Henrik V; Bentsen, Bo; Gaihede, Michael; Caltenco, Hector A; Andreasen Struijk, Lotte N S

    2010-01-01

    Typing performance of a full alphabet keyboard and a joystick type of mouse (with on-screen keyboard) provided by a wireless integrated tongue control system (TCS) has been investigated. The speed and accuracy have been measured in a form of a throughput defining the true correct words per minute [cwpm]. Training character sequences were typed in a dedicated interface that provided visual feedback of activated sensors, a map of the alphabet associated, and the task character. Testing sentences were typed in Word, with limited visual feedback, using non-predictive typing (map of characters in alphabetic order associated to sensors) and predictive typing (LetterWise) for TCS keyboard, and non-predictive typing for TCS mouse. Two subjects participated for four and three consecutive days, respectively, two sessions per day. Maximal throughput of 2.94, 2.46, and 2.06, 1.68 [cwpm] were obtained with TCS keyboard by subject 1 and 2 with predictive and non-predictive typing respectively. Maximal throughput of 2.09 and 1.71 [cwpm] was obtained with TCS mouse by subject 1 and 2, respectively. Same experimental protocol has been planned for a larger number of subjects.

  11. Virtual reality using guided imagery to create Kanji or Hiragana by computer graphics: I

    NASA Astrophysics Data System (ADS)

    Ishigame, Masaaki; Miura, Nozomu; Hosaka, Akiko

    1997-04-01

    We have been studying a kind of word-processor that is able to create Japanese characters, Kanji or Hiragana strings in the cursive style, using an electronic writing brush model. Int his paper, we describe in detail the operation characteristics of the electronic writing brush which we have proposed. We defined a touch shape pattern of the electronic writing brush as a form which is projected as a circle and a cone. The brush goes on certain points of the skeleton of the character figure which is given as skeleton data. The thickness of the line is determined by a diametric variable brush pressure. Our progressive action model can rotate the direction of the writing brush tip corresponding to the difference angle between the direction of brush tip and the direction of the brush movement, and also the softness of the writing brush to express the writing brush method called the side writing brush. The front side and back side of the writing brush can be expressed in a calligraphic drawing. With our technique we can draw characters in actual stroke order on a virtual computer plane as if they are written by an actual writing brush.

  12. Dimensions of Credibility in Models and Simulations

    NASA Technical Reports Server (NTRS)

    Steele, Martin J.

    2008-01-01

    Based on the National Aeronautics and Space Administration's (NASA's) work in developing a standard for models and simulations (M&S), the subject of credibility in M&S became a distinct focus. This is an indirect result from the Space Shuttle Columbia Accident Investigation Board (CAIB), which eventually resulted in an action, among others, to improve the rigor in NASA's M&S practices. The focus of this action came to mean a standardized method for assessing and reporting results from any type of M&S. As is typical in the standards development process, this necessarily developed into defming a common terminology base, common documentation requirements (especially for M&S used in critical decision making), and a method for assessing the credibility of M&S results. What surfaced in the development of the NASA Standard was the various dimensions credibility to consider when accepting the results from any model or simulation analysis. The eight generally relevant factors of credibility chosen in the NASA Standard proved only one aspect in the dimensionality of M&S credibility. At the next level of detail, the full comprehension of some of the factors requires an understanding along a couple of dimensions as well. Included in this discussion are the prerequisites for the appropriate use of a given M&S, the choice of factors in credibility assessment with their inherent dimensionality, and minimum requirements for fully reporting M&S results.

  13. Communicator-Related and Message-Related Thoughts as Mediators of the Influence of Communicator Credibility on Persuasion.

    ERIC Educational Resources Information Center

    Pallak, Suzanne R.; Francia, Rosina

    A study was conducted to test the hypothesis that for an "uninvolving topic" the persuasiveness of a highly credible communicator would be mediated by the favorability of the communicator-related thoughts generated, while for an "involving topic" the effect of the communicator's credibility would be mediated by the favorability…

  14. Truth and Credibility in Sincere Policy Analysis: Alternative Approaches for the Production of Policy-Relevant Knowledge.

    ERIC Educational Resources Information Center

    Bozeman, Barry; Landsbergen, David

    1989-01-01

    Two competing approaches to policy analysis are distinguished: a credibility approach, and a truth approach. According to the credibility approach, the policy analyst's role is to search for plausible argument rather than truth. Each approach has pragmatic tradeoffs in fulfilling the goal of providing usable knowledge to decision makers. (TJH)

  15. Body Type and Sex of Receiver: Their Effects on Source Credibility.

    ERIC Educational Resources Information Center

    Eckman, Bruce K.; Rancer, Andrew S.

    This study focused on whether actual or stereotypic associations with a speaker's body type would affect his or her credibility. Effects on the source-credibility ratings submitted by a total of 165 students were investigated for three different sources' body types. A significant main effect was found for body type but not for the blocked…

  16. The Development and Validation of an Instrument That Measures Student Perceptions of Teacher Credibility.

    ERIC Educational Resources Information Center

    Lapan, Stephen D.

    The purpose of this study was to develop and validate an instrument to collect student judgments regarding their teacher's credibility. Items were developed and evidence of content validity generated. A pilot sample and a final sample of high school students were administered the Source Credibility Measure (SCM) so that actual response data could…

  17. Cheap Talk and Credibility: The Consequences of Confidence and Accuracy on Advisor Credibility and Persuasiveness

    ERIC Educational Resources Information Center

    Sah, Sunita; Moore, Don A.; MacCoun, Robert J.

    2013-01-01

    Is it possible to increase one's influence simply by behaving more confidently? Prior research presents two competing hypotheses: (1) the confidence heuristic holds that more confidence increases credibility, and (2) the calibration hypothesis asserts that overconfidence will backfire when others find out. Study 1 reveals that, consistent with the…

  18. 8 CFR 208.14 - Approval, denial, referral, or dismissal of application.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... is found to have a credible fear of persecution or torture based on information elicited from the... proceedings under section 240 of the Act, without conducting a separate credible fear interview pursuant to § 208.30. If such applicant is not found to have a credible fear based on information elicited at the...

  19. 8 CFR 1208.14 - Approval, denial, referral, or dismissal of application.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... applicant is found to have a credible fear of persecution or torture based on information elicited from the... proceedings under section 240 of the Act, without conducting a separate credible fear interview pursuant to § 1208.30. If such applicant is not found to have a credible fear based on information elicited at the...

  20. What Does a Transformative Lens Bring to Credible Evidence in Mixed Methods Evaluations?

    ERIC Educational Resources Information Center

    Mertens, Donna M.

    2013-01-01

    Credibility in evaluation is a multifaceted concept that involves consideration of diverse stakeholders' perspectives and purposes. The use of a transformative lens is proposed as a means to bringing issues of social justice and human rights to the foreground in decisions about methodology, credibility of evidence, and use of evaluation…

  1. Students' Evaluation of the Credibility of Scientific Models that Represent Natural Entities and Phenomena

    ERIC Educational Resources Information Center

    Al-Balushi, Sulaiman M.

    2011-01-01

    The purpose of the current study was to explore learners' evaluation of the credibility of scientific models that represent natural entities and phenomena. Participants were 845 students in grades 9-11 (aged 15-17 years) and 108 prospective science teachers in Oman, totaling 953 students. A survey called Epistemologies about the Credibility of…

  2. 8 CFR 208.30 - Credible fear determinations involving stowaways and applicants for admission found inadmissible...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... credible fear interviews, determinations, and reviews under section 235(b)(1)(B) of the Act. Prior to... or she expresses such a desire. (c) Authority. Asylum officers conducting credible fear interviews shall have the authorities described in § 208.9(c). (d) Interview. The asylum officer, as defined in...

  3. 8 CFR 208.30 - Credible fear determinations involving stowaways and applicants for admission found inadmissible...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... credible fear interviews, determinations, and reviews under section 235(b)(1)(B) of the Act. Prior to... or she expresses such a desire. (c) Authority. Asylum officers conducting credible fear interviews shall have the authorities described in § 208.9(c). (d) Interview. The asylum officer, as defined in...

  4. The conformal characters

    NASA Astrophysics Data System (ADS)

    Bourget, Antoine; Troost, Jan

    2018-04-01

    We revisit the study of the multiplets of the conformal algebra in any dimension. The theory of highest weight representations is reviewed in the context of the Bernstein-Gelfand-Gelfand category of modules. The Kazhdan-Lusztig polynomials code the relation between the Verma modules and the irreducible modules in the category and are the key to the characters of the conformal multiplets (whether finite dimensional, infinite dimensional, unitary or non-unitary). We discuss the representation theory and review in full generality which representations are unitarizable. The mathematical theory that allows for both the general treatment of characters and the full analysis of unitarity is made accessible. A good understanding of the mathematics of conformal multiplets renders the treatment of all highest weight representations in any dimension uniform, and provides an overarching comprehension of case-by-case results. Unitary highest weight representations and their characters are classified and computed in terms of data associated to cosets of the Weyl group of the conformal algebra. An executive summary is provided, as well as look-up tables up to and including rank four.

  5. Pattern recognition technique

    NASA Technical Reports Server (NTRS)

    Hong, J. P.

    1971-01-01

    Technique operates regardless of pattern rotation, translation or magnification and successfully detects out-of-register patterns. It improves accuracy and reduces cost of various optical character recognition devices and page readers and provides data input to computer.

  6. Enter Words and Pictures the Easy Way--Scan Them.

    ERIC Educational Resources Information Center

    Olivas, Jerry

    1989-01-01

    Discusses image scanning and optical character recognition. Describes how computer scanners work. Summarizes scan quality, scanning speed requirements, and hardware requirements for scanners. Surveys the range of scanners currently available. (MVL)

  7. 2-D Animation's Not Just for Mickey Mouse.

    ERIC Educational Resources Information Center

    Weinman, Lynda

    1995-01-01

    Discusses characteristics of two-dimensional (2-D) animation; highlights include character animation, painting issues, and motion graphics. Sidebars present Silicon Graphics animations tools and 2-D animation programs for the desktop computer. (DGM)

  8. P300 Chinese input system based on Bayesian LDA.

    PubMed

    Jin, Jing; Allison, Brendan Z; Brunner, Clemens; Wang, Bei; Wang, Xingyu; Zhang, Jianhua; Neuper, Christa; Pfurtscheller, Gert

    2010-02-01

    A brain-computer interface (BCI) is a new communication channel between humans and computers that translates brain activity into recognizable command and control signals. Attended events can evoke P300 potentials in the electroencephalogram. Hence, the P300 has been used in BCI systems to spell, control cursors or robotic devices, and other tasks. This paper introduces a novel P300 BCI to communicate Chinese characters. To improve classification accuracy, an optimization algorithm (particle swarm optimization, PSO) is used for channel selection (i.e., identifying the best electrode configuration). The effects of different electrode configurations on classification accuracy were tested by Bayesian linear discriminant analysis offline. The offline results from 11 subjects show that this new P300 BCI can effectively communicate Chinese characters and that the features extracted from the electrodes obtained by PSO yield good performance.

  9. Anthropomorphic bias found in typically developing children is not found in children with autistic spectrum disorder.

    PubMed

    Chaminade, Thierry; Rosset, Delphine; Da Fonseca, David; Hodgins, Jessica K; Deruelle, Christine

    2015-02-01

    The anthropomorphic bias describes the finding that the perceived naturalness of a biological motion decreases as the human-likeness of a computer-animated agent increases. To investigate the anthropomorphic bias in autistic children, human or cartoon characters were presented with biological and artificial motions side by side on a touchscreen. Children were required to touch one that would grow while the other would disappear, implicitly rewarding their choice. Only typically developing controls depicted the expected preference for biological motion when rendered with human, but not cartoon, characters. Despite performing the task to report a preference, children with autism depicted neither normal nor reversed anthropomorphic bias, suggesting that they are not sensitive to the congruence of form and motion information when observing computer-animated agents' actions. © The Author(s) 2014.

  10. Large-eddy simulations of compressible convection on massively parallel computers. [stellar physics

    NASA Technical Reports Server (NTRS)

    Xie, Xin; Toomre, Juri

    1993-01-01

    We report preliminary implementation of the large-eddy simulation (LES) technique in 2D simulations of compressible convection carried out on the CM-2 massively parallel computer. The convective flow fields in our simulations possess structures similar to those found in a number of direct simulations, with roll-like flows coherent across the entire depth of the layer that spans several density scale heights. Our detailed assessment of the effects of various subgrid scale (SGS) terms reveals that they may affect the gross character of convection. Yet, somewhat surprisingly, we find that our LES solutions, and another in which the SGS terms are turned off, only show modest differences. The resulting 2D flows realized here are rather laminar in character, and achieving substantial turbulence may require stronger forcing and less dissipation.

  11. Reading as Active Sensing: A Computational Model of Gaze Planning in Word Recognition

    PubMed Central

    Ferro, Marcello; Ognibene, Dimitri; Pezzulo, Giovanni; Pirrelli, Vito

    2010-01-01

    We offer a computational model of gaze planning during reading that consists of two main components: a lexical representation network, acquiring lexical representations from input texts (a subset of the Italian CHILDES database), and a gaze planner, designed to recognize written words by mapping strings of characters onto lexical representations. The model implements an active sensing strategy that selects which characters of the input string are to be fixated, depending on the predictions dynamically made by the lexical representation network. We analyze the developmental trajectory of the system in performing the word recognition task as a function of both increasing lexical competence, and correspondingly increasing lexical prediction ability. We conclude by discussing how our approach can be scaled up in the context of an active sensing strategy applied to a robotic setting. PMID:20577589

  12. Reading as active sensing: a computational model of gaze planning in word recognition.

    PubMed

    Ferro, Marcello; Ognibene, Dimitri; Pezzulo, Giovanni; Pirrelli, Vito

    2010-01-01

    WE OFFER A COMPUTATIONAL MODEL OF GAZE PLANNING DURING READING THAT CONSISTS OF TWO MAIN COMPONENTS: a lexical representation network, acquiring lexical representations from input texts (a subset of the Italian CHILDES database), and a gaze planner, designed to recognize written words by mapping strings of characters onto lexical representations. The model implements an active sensing strategy that selects which characters of the input string are to be fixated, depending on the predictions dynamically made by the lexical representation network. We analyze the developmental trajectory of the system in performing the word recognition task as a function of both increasing lexical competence, and correspondingly increasing lexical prediction ability. We conclude by discussing how our approach can be scaled up in the context of an active sensing strategy applied to a robotic setting.

  13. Computers Take Flight: A History of NASA's Pioneering Digital Fly-By-Wire Project

    NASA Technical Reports Server (NTRS)

    Tomayko, James E.

    2000-01-01

    An overview of the NASA F-8 Fly-by Wire project is presented. The project made two significant contributions to the new technology: (1) a solid design base of techniques that work and those that do not, and (2) credible evidence of good flying qualities and the ability of such a system to tolerate real faults and to continue operation without degradation. In 1972 the F-8C aircraft used in the program became he first digital fly-by-wire aircraft to operate without a mechanical backup system.

  14. Optimal Futility Interim Design: A Predictive Probability of Success Approach with Time-to-Event Endpoint.

    PubMed

    Tang, Zhongwen

    2015-01-01

    An analytical way to compute predictive probability of success (PPOS) together with credible interval at interim analysis (IA) is developed for big clinical trials with time-to-event endpoints. The method takes account of the fixed data up to IA, the amount of uncertainty in future data, and uncertainty about parameters. Predictive power is a special type of PPOS. The result is confirmed by simulation. An optimal design is proposed by finding optimal combination of analysis time and futility cutoff based on some PPOS criteria.

  15. Consider the source: persuasion of implicit evaluations is moderated by source credibility.

    PubMed

    Smith, Colin Tucker; De Houwer, Jan; Nosek, Brian A

    2013-02-01

    The long history of persuasion research shows how to change explicit, self-reported evaluations through direct appeals. At the same time, research on how to change implicit evaluations has focused almost entirely on techniques of retraining existing evaluations or manipulating contexts. In five studies, we examined whether direct appeals can change implicit evaluations in the same way as they do explicit evaluations. In five studies, both explicit and implicit evaluations showed greater evidence of persuasion following information presented by a highly credible source than a source low in credibility. Whereas cognitive load did not alter the effect of source credibility on explicit evaluations, source credibility had an effect on the persuasion of implicit evaluations only when participants were encouraged and able to consider information about the source. Our findings reveal the relevance of persuasion research for changing implicit evaluations and provide new ideas about the processes underlying both types of evaluation.

  16. Assimilation and contrast in persuasion: the effects of source credibility in multiple message situations.

    PubMed

    Tormala, Zakary L; Clarkson, Joshua J

    2007-04-01

    The present research explores a contextual perspective on persuasion in multiple message situations. It is proposed that when people receive persuasive messages, the effects of those messages are influenced by other messages to which people recently have been exposed. In two experiments, participants received a target persuasive message from a moderately credible source. Immediately before this message, participants received another message, on a different topic, from a source with high or low credibility. In Experiment 1, participants' attitudes toward the target issue were more favorable after they had first been exposed to a different message from a low rather than high credibility source (contrast). In Experiment 2, this effect only emerged when a priming manipulation gave participants a dissimilarity mindset. When participants were primed with a similarity mindset, their attitudes toward the target issue were more favorable following a different message from a high rather than low credibility source (assimilation).

  17. Ideas on Learning a New Language Intertwined with the Current State of Natural Language Processing and Computational Linguistics

    ERIC Educational Resources Information Center

    Snyder, Robin M.

    2015-01-01

    In 2014, in conjunction with doing research in natural language processing and attending a global conference on computational linguistics, the author decided to learn a new foreign language, Greek, that uses a non-English character set. This paper/session will present/discuss an overview of the current state of natural language processing and…

  18. A Horizontal Tilt Correction Method for Ship License Numbers Recognition

    NASA Astrophysics Data System (ADS)

    Liu, Baolong; Zhang, Sanyuan; Hong, Zhenjie; Ye, Xiuzi

    2018-02-01

    An automatic ship license numbers (SLNs) recognition system plays a significant role in intelligent waterway transportation systems since it can be used to identify ships by recognizing the characters in SLNs. Tilt occurs frequently in many SLNs because the monitors and the ships usually have great vertical or horizontal angles, which decreases the accuracy and robustness of a SLNs recognition system significantly. In this paper, we present a horizontal tilt correction method for SLNs. For an input tilt SLN image, the proposed method accomplishes the correction task through three main steps. First, a MSER-based characters’ center-points computation algorithm is designed to compute the accurate center-points of the characters contained in the input SLN image. Second, a L 1- L 2 distance-based straight line is fitted to the computed center-points using M-estimator algorithm. The tilt angle is estimated at this stage. Finally, based on the computed tilt angle, an affine transformation rotation is conducted to rotate and to correct the input SLN horizontally. At last, the proposed method is tested on 200 tilt SLN images, the proposed method is proved to be effective with a tilt correction rate of 80.5%.

  19. Message framing and credibility: application in dental services.

    PubMed

    Arora, R

    2000-01-01

    This study uses an experimental approach to test the influence of message framing and credibility on the attitude toward a dental exam and consumers' intention to use the dental office. The findings indicate a strong effect of credibility on attitude as well as intention. The influence of framing is also statistically significant. Implications for marketers in terms of message strategy are discussed.

  20. The Impact of Foreign Accent on Credibility: An Analysis of Cognitive Statement Ratings in a Swiss Context

    ERIC Educational Resources Information Center

    Stocker, Ladina

    2017-01-01

    The present paper reports on a study investigating whether the presence of a foreign accent negatively affects credibility judgments. Previous research suggests that trivia statements recorded by speakers with a foreign accent are judged as less credible than when recorded by native speakers due to increased cognitive demands (Lev-Ari and Keysar…

  1. The Importance of 'Likes': The Interplay of Message Framing, Source, and Social Endorsement on Credibility Perceptions of Health Information on Facebook.

    PubMed

    Borah, Porismita; Xiao, Xizhu

    2018-01-01

    Online sources not only permeate the information-seeking environment of the younger generation, but also have profound influence in shaping their beliefs and behaviors. In this landscape, examining the factors responsible for credibility perceptions of online information is fundamental, particularly for health-related information. Using a 2 (frames: gain vs. loss) × 2 (source: expert vs. non-expert) × 2 (social endorsement: high vs. low) randomized between-subjects experimental design, this study examines the effect of health message framing and the moderating effects of social endorsement and source type on credibility perceptions of Facebook posts. Testing across two issues--physical activity and alcohol consumption--findings indicate that the gain-framed message was perceived as most credible. Additionally, significant three-way interactions suggest that social endorsement and source type affect the relationship between message framing and credibility perceptions. Specifically, the findings demonstrate that a gain-framed message from an expert source with high number of 'likes' is considered the most credible message. These findings have significant implications for information gathering from social media sources, such as the influence of 'likes' on health information.

  2. How Environmental Uncertainty Moderates the Effect of Relative Advantage and Perceived Credibility on the Adoption of Mobile Health Services by Chinese Organizations in the Big Data Era.

    PubMed

    Chen, Xing; Zhang, Xing

    2016-01-01

    Despite the importance of adoption of mobile health services by an organization on the diffusion of mobile technology in the big data era, it has received minimal attention in literature. This study investigates how relative advantage and perceived credibility affect an organization's adoption of mobile health services, as well as how environmental uncertainty changes the relationship of relative advantage and perceived credibility with adoption. A research model that integrates relative advantage, perceived credibility, environmental uncertainty, and an organization's intention to use mobile health service is developed. Quantitative data are collected from senior managers and information systems managers in 320 Chinese healthcare organizations. The empirical findings show that while relative advantage and perceived credibility both have positive effects on an organization's intention to use mobile health services, relative advantage plays a more important role than perceived credibility. Moreover, environmental uncertainty positively moderates the effect of relative advantage on an organization's adoption of mobile health services. Thus, mobile health services in environments characterized with high levels of uncertainty are more likely to be adopted because of relative advantage than in environments with low levels of uncertainty.

  3. Enhancing the quality and credibility of qualitative analysis.

    PubMed

    Patton, M Q

    1999-12-01

    Varying philosophical and theoretical orientations to qualitative inquiry remind us that issues of quality and credibility intersect with audience and intended research purposes. This overview examines ways of enhancing the quality and credibility of qualitative analysis by dealing with three distinct but related inquiry concerns: rigorous techniques and methods for gathering and analyzing qualitative data, including attention to validity, reliability, and triangulation; the credibility, competence, and perceived trustworthiness of the qualitative researcher; and the philosophical beliefs of evaluation users about such paradigm-based preferences as objectivity versus subjectivity, truth versus perspective, and generalizations versus extrapolations. Although this overview examines some general approaches to issues of credibility and data quality in qualitative analysis, it is important to acknowledge that particular philosophical underpinnings, specific paradigms, and special purposes for qualitative inquiry will typically include additional or substitute criteria for assuring and judging quality, validity, and credibility. Moreover, the context for these considerations has evolved. In early literature on evaluation methods the debate between qualitative and quantitative methodologists was often strident. In recent years the debate has softened. A consensus has gradually emerged that the important challenge is to match appropriately the methods to empirical questions and issues, and not to universally advocate any single methodological approach for all problems.

  4. How Environmental Uncertainty Moderates the Effect of Relative Advantage and Perceived Credibility on the Adoption of Mobile Health Services by Chinese Organizations in the Big Data Era

    PubMed Central

    2016-01-01

    Despite the importance of adoption of mobile health services by an organization on the diffusion of mobile technology in the big data era, it has received minimal attention in literature. This study investigates how relative advantage and perceived credibility affect an organization's adoption of mobile health services, as well as how environmental uncertainty changes the relationship of relative advantage and perceived credibility with adoption. A research model that integrates relative advantage, perceived credibility, environmental uncertainty, and an organization's intention to use mobile health service is developed. Quantitative data are collected from senior managers and information systems managers in 320 Chinese healthcare organizations. The empirical findings show that while relative advantage and perceived credibility both have positive effects on an organization's intention to use mobile health services, relative advantage plays a more important role than perceived credibility. Moreover, environmental uncertainty positively moderates the effect of relative advantage on an organization's adoption of mobile health services. Thus, mobile health services in environments characterized with high levels of uncertainty are more likely to be adopted because of relative advantage than in environments with low levels of uncertainty. PMID:28115932

  5. Credibility judgments of narratives: language, plausibility, and absorption.

    PubMed

    Nahari, Galit; Glicksohn, Joseph; Nachson, Israel

    2010-01-01

    Two experiments were conducted in order to find out whether textual features of narratives differentially affect credibility judgments made by judges having different levels of absorption (a disposition associated with rich visual imagination). Participants in both experiments were exposed to a textual narrative and requested to judge whether the narrator actually experienced the event he described in his story. In Experiment 1, the narrative varied in terms of language (literal, figurative) and plausibility (ordinary, anomalous). In Experiment 2, the narrative varied in terms of language only. The participants' perceptions of the plausibility of the story described and the extent to which they were absorbed in reading were measured. The data from both experiments together suggest that the groups applied entirely different criteria in credibility judgments. For high-absorption individuals, their credibility judgment depends on the degree to which the text can be assimilated into their own vivid imagination, whereas for low-absorption individuals it depends mainly on plausibility. That is, high-absorption individuals applied an experiential mental set while judging the credibility of the narrator, whereas low-absorption individuals applied an instrumental mental set. Possible cognitive mechanisms and implications for credibility judgments are discussed.

  6. Cost-Effective CNC Part Program Verification Development for Laboratory Instruction.

    ERIC Educational Resources Information Center

    Chen, Joseph C.; Chang, Ted C.

    2000-01-01

    Describes a computer numerical control program verification system that checks a part program before its execution. The system includes character recognition, word recognition, a fuzzy-nets system, and a tool path viewer. (SK)

  7. Hi-Tech Unrevealed.

    ERIC Educational Resources Information Center

    Vernooy, D. Andrew; Alter, Kevin

    2001-01-01

    Presents design features of the University of Texas' Applied Computational Engineering and Sciences Building and discusses how institutions can guide the character of their architecture without subverting the architects' responsibility to confront their contemporary culture in a critical manner. (GR)

  8. Significance of model credibility in estimating climate projection distributions for regional hydroclimatological risk assessments

    USGS Publications Warehouse

    Brekke, L.D.; Dettinger, M.D.; Maurer, E.P.; Anderson, M.

    2008-01-01

    Ensembles of historical climate simulations and climate projections from the World Climate Research Programme's (WCRP's) Coupled Model Intercomparison Project phase 3 (CMIP3) multi-model dataset were investigated to determine how model credibility affects apparent relative scenario likelihoods in regional risk assessments. Methods were developed and applied in a Northern California case study. An ensemble of 59 twentieth century climate simulations from 17 WCRP CMIP3 models was analyzed to evaluate relative model credibility associated with a 75-member projection ensemble from the same 17 models. Credibility was assessed based on how models realistically reproduced selected statistics of historical climate relevant to California climatology. Metrics of this credibility were used to derive relative model weights leading to weight-threshold culling of models contributing to the projection ensemble. Density functions were then estimated for two projected quantities (temperature and precipitation), with and without considering credibility-based ensemble reductions. An analysis for Northern California showed that, while some models seem more capable at recreating limited aspects twentieth century climate, the overall tendency is for comparable model performance when several credibility measures are combined. Use of these metrics to decide which models to include in density function development led to local adjustments to function shapes, but led to limited affect on breadth and central tendency, which were found to be more influenced by 'completeness' of the original ensemble in terms of models and emissions pathways. ?? 2007 Springer Science+Business Media B.V.

  9. Reliability modeling of fault-tolerant computer based systems

    NASA Technical Reports Server (NTRS)

    Bavuso, Salvatore J.

    1987-01-01

    Digital fault-tolerant computer-based systems have become commonplace in military and commercial avionics. These systems hold the promise of increased availability, reliability, and maintainability over conventional analog-based systems through the application of replicated digital computers arranged in fault-tolerant configurations. Three tightly coupled factors of paramount importance, ultimately determining the viability of these systems, are reliability, safety, and profitability. Reliability, the major driver affects virtually every aspect of design, packaging, and field operations, and eventually produces profit for commercial applications or increased national security. However, the utilization of digital computer systems makes the task of producing credible reliability assessment a formidable one for the reliability engineer. The root of the problem lies in the digital computer's unique adaptability to changing requirements, computational power, and ability to test itself efficiently. Addressed here are the nuances of modeling the reliability of systems with large state sizes, in the Markov sense, which result from systems based on replicated redundant hardware and to discuss the modeling of factors which can reduce reliability without concomitant depletion of hardware. Advanced fault-handling models are described and methods of acquiring and measuring parameters for these models are delineated.

  10. The Relation of Source Credibility and Message Frequency to Program Evaluation and Self-Confidence of Students in a Job Shadowing Program

    ERIC Educational Resources Information Center

    Linnehan, Frank

    2004-01-01

    Using a pre- and post-test design, this study examined the relation of an adult's credibility and message frequency to the beliefs of female high school students participating in a job-shadowing program. Hypotheses were based on the Elaboration Likelihood Model of attitude formation and change. Findings indicate that credibility of the adult…

  11. Interactions with Virtual People: Do Avatars Dream of Digital Sheep?. Chapter 6

    NASA Technical Reports Server (NTRS)

    Slater, Mel; Sanchez-Vives, Maria V.

    2007-01-01

    This paper explores another form of artificial entity, ones without physical embodiment. We refer to virtual characters as the name for a type of interactive object that have become familiar in computer games and within virtual reality applications. We refer to these as avatars: three-dimensional graphical objects that are in more-or-less human form which can interact with humans. Sometimes such avatars will be representations of real-humans who are interacting together within a shared networked virtual environment, other times the representations will be of entirely computer generated characters. Unlike other authors, who reserve the term agent for entirely computer generated characters and avatars for virtual embodiments of real people; the same term here is used for both. This is because avatars and agents are on a continuum. The question is where does their behaviour originate? At the extremes the behaviour is either completely computer generated or comes only from tracking of a real person. However, not every aspect of a real person can be tracked every eyebrow move, every blink, every breath rather real tracking data would be supplemented by inferred behaviours which are programmed based on the available information as to what the real human is doing and her/his underlying emotional and psychological state. Hence there is always some programmed behaviour it is only a matter of how much. In any case the same underlying problem remains how can the human character be portrayed in such a manner that its actions are believable and have an impact on the real people with whom it interacts? This paper has three main parts. In the first part we will review some evidence that suggests that humans react with appropriate affect in their interactions with virtual human characters, or with other humans who are represented as avatars. This is so in spite of the fact that the representational fidelity is relatively low. Our evidence will be from the realm of psychotherapy, where virtual social situations are created that do test whether people react appropriately within these situations. We will also consider some experiments on face-to-face virtual communications between people in the same shared virtual environments. The second part will try to give some clues about why this might happen, taking into account modern theories of perception from neuroscience. The third part will include some speculations about the future developments of the relationship between people and virtual people. We will suggest that a more likely scenario than the world becoming populated by physically embodied virtual people (robots, androids) is that in the relatively near future we will interact more and more in our everyday lives with virtual people- bank managers, shop assistants, instructors, and so on. What is happening in the movies with computer graphic generated individuals and entire crowds may move into the space of everyday life.

  12. A computer program for uncertainty analysis integrating regression and Bayesian methods

    USGS Publications Warehouse

    Lu, Dan; Ye, Ming; Hill, Mary C.; Poeter, Eileen P.; Curtis, Gary

    2014-01-01

    This work develops a new functionality in UCODE_2014 to evaluate Bayesian credible intervals using the Markov Chain Monte Carlo (MCMC) method. The MCMC capability in UCODE_2014 is based on the FORTRAN version of the differential evolution adaptive Metropolis (DREAM) algorithm of Vrugt et al. (2009), which estimates the posterior probability density function of model parameters in high-dimensional and multimodal sampling problems. The UCODE MCMC capability provides eleven prior probability distributions and three ways to initialize the sampling process. It evaluates parametric and predictive uncertainties and it has parallel computing capability based on multiple chains to accelerate the sampling process. This paper tests and demonstrates the MCMC capability using a 10-dimensional multimodal mathematical function, a 100-dimensional Gaussian function, and a groundwater reactive transport model. The use of the MCMC capability is made straightforward and flexible by adopting the JUPITER API protocol. With the new MCMC capability, UCODE_2014 can be used to calculate three types of uncertainty intervals, which all can account for prior information: (1) linear confidence intervals which require linearity and Gaussian error assumptions and typically 10s–100s of highly parallelizable model runs after optimization, (2) nonlinear confidence intervals which require a smooth objective function surface and Gaussian observation error assumptions and typically 100s–1,000s of partially parallelizable model runs after optimization, and (3) MCMC Bayesian credible intervals which require few assumptions and commonly 10,000s–100,000s or more partially parallelizable model runs. Ready access allows users to select methods best suited to their work, and to compare methods in many circumstances.

  13. Managing job seekers' organizational image beliefs: the role of media richness and media credibility.

    PubMed

    Cable, Daniel M; Yu, Kang Yang Trevor

    2006-07-01

    In this article, the authors assessed job seekers' organizational image beliefs before and after they experienced 3 recruitment media. The authors examined whether perceptions of media richness and credibility were related to improvements in the correspondence between job seekers' image beliefs and firms' projected images. Both media richness and credibility perceptions were associated with correspondence between job seekers' image beliefs and firms' projected images. However, results revealed that richness and credibility perceptions were likely to enhance job seekers' initial beliefs about firms' images when their beliefs were positive but did not diminish job seekers' beliefs about firms' images when their initial impressions were too positive. ((c) 2006 APA, all rights reserved).

  14. The dual impact of "appeal" and "researcher credibility" on mail survey response rate in the context of preventive health care.

    PubMed

    Angur, M G; Nataraajan, R; Chawla, S K

    1994-01-01

    Health and fitness centers are becoming increasingly aware of their importance in the realm of preventive health care. Many hospitals have begun to open and run fitness centers, a trend that seems very likely to continue. In a competitive environment, every center would desire to obtain maximum valid customer information at minimum cost, and this paper addresses this issue. The authors investigate the confluence of both appeal and researcher credibility on mail questionnaire response rates from a metropolitan membership of a large fitness center. Personal appeal with high researcher credibility was found to generate significantly higher response rate followed by the hybrid appeal with low researcher credibility.

  15. Document image cleanup and binarization

    NASA Astrophysics Data System (ADS)

    Wu, Victor; Manmatha, Raghaven

    1998-04-01

    Image binarization is a difficult task for documents with text over textured or shaded backgrounds, poor contrast, and/or considerable noise. Current optical character recognition (OCR) and document analysis technology do not handle such documents well. We have developed a simple yet effective algorithm for document image clean-up and binarization. The algorithm consists of two basic steps. In the first step, the input image is smoothed using a low-pass filter. The smoothing operation enhances the text relative to any background texture. This is because background texture normally has higher frequency than text does. The smoothing operation also removes speckle noise. In the second step, the intensity histogram of the smoothed image is computed and a threshold automatically selected as follows. For black text, the first peak of the histogram corresponds to text. Thresholding the image at the value of the valley between the first and second peaks of the histogram binarizes the image well. In order to reliably identify the valley, the histogram is smoothed by a low-pass filter before the threshold is computed. The algorithm has been applied to some 50 images from a wide variety of source: digitized video frames, photos, newspapers, advertisements in magazines or sales flyers, personal checks, etc. There are 21820 characters and 4406 words in these images. 91 percent of the characters and 86 percent of the words are successfully cleaned up and binarized. A commercial OCR was applied to the binarized text when it consisted of fonts which were OCR recognizable. The recognition rate was 84 percent for the characters and 77 percent for the words.

  16. Phylogenetic Analysis of Genome Rearrangements among Five Mammalian Orders

    PubMed Central

    Luo, Haiwei; Arndt, William; Zhang, Yiwei; Shi, Guanqun; Alekseyev, Max; Tang, Jijun; Hughes, Austin L.; Friedman, Robert

    2015-01-01

    Evolutionary relationships among placental mammalian orders have been controversial. Whole genome sequencing and new computational methods offer opportunities to resolve the relationships among 10 genomes belonging to the mammalian orders Primates, Rodentia, Carnivora, Perissodactyla and Artiodactyla. By application of the double cut and join distance metric, where gene order is the phylogenetic character, we computed genomic distances among the sampled mammalian genomes. With a marsupial outgroup, the gene order tree supported a topology in which Rodentia fell outside the cluster of Primates, Carnivora, Perissodactyla, and Artiodactyla. Results of breakpoint reuse rate and synteny block length analyses were consistent with the prediction of random breakage model, which provided a diagnostic test to support use of gene order as an appropriate phylogenetic character in this study. We the influence of rate differences among lineages and other factors that may contribute to different resolutions of mammalian ordinal relationships by different methods of phylogenetic reconstruction. PMID:22929217

  17. Optical character recognition: an illustrated guide to the frontier

    NASA Astrophysics Data System (ADS)

    Nagy, George; Nartker, Thomas A.; Rice, Stephen V.

    1999-12-01

    We offer a perspective on the performance of current OCR systems by illustrating and explaining actual OCR errors made by three commercial devices. After discussing briefly the character recognition abilities of humans and computers, we present illustrated examples of recognition errors. The top level of our taxonomy of the causes of errors consists of Imaging Defects, Similar Symbols, Punctuation, and Typography. The analysis of a series of 'snippets' from this perspective provides insight into the strengths and weaknesses of current systems, and perhaps a road map to future progress. The examples were drawn from the large-scale tests conducted by the authors at the Information Science Research Institute of the University of Nevada, Las Vegas. By way of conclusion, we point to possible approaches for improving the accuracy of today's systems. The talk is based on our eponymous monograph, recently published in The Kluwer International Series in Engineering and Computer Science, Kluwer Academic Publishers, 1999.

  18. Evaluating the message or the messenger? Implications for self-validation in persuasion.

    PubMed

    Clark, Jason K; Wegener, Duane T; Sawicki, Vanessa; Petty, Richard E; Briñol, Pablo

    2013-12-01

    Characteristics of persuasive message sources have been extensively studied. However, little attention has been paid to situations when people are motivated to form an evaluation of the communicator rather than the communicated issue. We postulated that these different foci can affect how a source validates message-related cognitions. Participants focused on the source (Studies 1 and 2) or the issue (Study 2) while reading weak or strong message arguments. Later, the communicator was described as low or high in credibility. When focused on the source, highly motivated participants were more confident and their attitudes were more reflective of thoughts when argument quality matched (e.g., weak arguments-low credibility) rather than mismatched (e.g., weak arguments-high credibility) source credibility. Conversely, when participants were focused on the issue, self-validation was greater when credibility was high rather than low-regardless of argument quality. Implications of these findings for the study and practice of persuasion are discussed.

  19. Reported credibility techniques in higher education evaluation studies that use qualitative methods: A research synthesis.

    PubMed

    Liao, Hongjing; Hitchcock, John

    2018-06-01

    This synthesis study examined the reported use of credibility techniques in higher education evaluation articles that use qualitative methods. The sample included 118 articles published in six leading higher education evaluation journals from 2003 to 2012. Mixed methods approaches were used to identify key credibility techniques reported across the articles, document the frequency of these techniques, and describe their use and properties. Two broad sets of techniques were of interest: primary design techniques (i.e., basic), such as sampling/participant recruitment strategies, data collection methods, analytic details, and additional qualitative credibility techniques (e.g., member checking, negative case analyses, peer debriefing). The majority of evaluation articles reported use of primary techniques although there was wide variation in the amount of supporting detail; most of the articles did not describe the use of additional credibility techniques. This suggests that editors of evaluation journals should encourage the reporting of qualitative design details and authors should develop strategies yielding fuller methodological description. Copyright © 2018 Elsevier Ltd. All rights reserved.

  20. Influence of User Ratings, Expert Ratings and Purposes of Information Use on the Credibility Judgments of College Students

    ERIC Educational Resources Information Center

    Lim, Sook; Steffel, Nick

    2015-01-01

    Introduction: This study examined whether user ratings, expert ratings and the purpose of the use of a book on a user-generated site influenced the credibility of the book. It also examined whether the effects of user ratings and expert ratings on credibility judgments of the book varied according to the purpose of information use. In addition,…

  1. The Challenges of Credible Thermal Protection System Reliability Quantification

    NASA Technical Reports Server (NTRS)

    Green, Lawrence L.

    2013-01-01

    The paper discusses several of the challenges associated with developing a credible reliability estimate for a human-rated crew capsule thermal protection system. The process of developing such a credible estimate is subject to the quantification, modeling and propagation of numerous uncertainties within a probabilistic analysis. The development of specific investment recommendations, to improve the reliability prediction, among various potential testing and programmatic options is then accomplished through Bayesian analysis.

  2. Planning of water resources management and pollution control for Heshui River watershed, China: A full credibility-constrained programming approach.

    PubMed

    Zhang, Y M; Huang, G; Lu, H W; He, Li

    2015-08-15

    A key issue facing integrated water resources management and water pollution control is to address the vague parametric information. A full credibility-based chance-constrained programming (FCCP) method is thus developed by introducing the new concept of credibility into the modeling framework. FCCP can deal with fuzzy parameters appearing concurrently in the objective and both sides of the constraints of the model, but also provide a credibility level indicating how much confidence one can believe the optimal modeling solutions. The method is applied to Heshui River watershed in the south-central China for demonstration. Results from the case study showed that groundwater would make up for the water shortage in terms of the shrinking surface water and rising water demand, and the optimized total pumpage of groundwater from both alluvial and karst aquifers would exceed 90% of its maximum allowable levels when credibility level is higher than or equal to 0.9. It is also indicated that an increase in credibility level would induce a reduction in cost for surface water acquisition, a rise in cost from groundwater withdrawal, and negligible variation in cost for water pollution control. Copyright © 2015 Elsevier B.V. All rights reserved.

  3. Source Credibility and the Biasing Effect of Narrative Information on the Perception of Vaccination Risks.

    PubMed

    Haase, Niels; Betsch, Cornelia; Renkewitz, Frank

    2015-08-01

    Immunization rates are below the Global Immunization Vision and Strategy established by the World Health Organization. One reason for this are anti-vaccination activists, who use the Internet to disseminate their agenda, frequently by publishing narrative reports about alleged vaccine adverse events. In health communication, the use of narrative information has been shown to be effectively persuasive. Furthermore, persuasion research indicates that the credibility of an information source may serve as a cue to discount or augment the communicated message. Thus, the present study investigated the effect of source credibility on the biasing effect of narrative information regarding the perception of vaccination risks. 265 participants were provided with statistical information (20%) regarding the occurrence of vaccine adverse events after vaccination against a fictitious disease. This was followed by 20 personalized narratives from an online forum on vaccination experiences. The authors varied the relative frequency of narratives reporting vaccine adverse events (35% vs. 85%), narrative source credibility (anti-vaccination website vs. neutral health forum), and the credibility of the statistical information (reliable data vs. unreliable data vs. control) in a between-subjects design. Results showed a stable narrative bias on risk perception that was not affected by credibility cues. However, narratives from an anti-vaccination website generally led to lower perceptions of vaccination risks.

  4. Perceived credibility and eyewitness testimony of children with intellectual disabilities.

    PubMed

    Henry, L; Ridley, A; Perry, J; Crane, L

    2011-04-01

    Although children with intellectual disabilities (ID) often provide accurate witness testimony, jurors tend to perceive their witness statements to be inherently unreliable. The current study explored the free recall transcripts of child witnesses with ID who had watched a video clip, relative to those of typically developing (TD) age-matched children, and assessed how mock jurors perceived these transcripts in the absence of knowledge of group (ID or TD) membership. A further aim of this research was to determine whether perceptions of credibility were associated with levels of free recall and witness characteristics (anxiety and mental age). Mock jurors rated the testimony of children with ID as less credible than that of a TD age-matched comparison group. This was largely because of the transcripts of the children with ID containing fewer details than those of the TD children. Anxiety and mental age were found to have no effect on perceived levels of credibility. It appears that even in the absence of knowledge of whether a child does or does not have ID, this factor still affects perceptions of credibility among mock jurors. Our findings suggest that fundamental differences in the quality of the witness transcripts lead to lower perceptions of credibility for children with ID. © 2011 The Authors. Journal of Intellectual Disability Research © 2011 Blackwell Publishing Ltd.

  5. Celiac disease on YouTube - a study of the Polish content available on the popular video-sharing website.

    PubMed

    Kiedrowski, Mirosław; Mróz, Andrzej; Gajewska, Danuta; Nurzyński, Paweł; Deptała, Andrzej

    2017-10-23

    Celiac disease affects about 1% of the population. Since most Polish households have a broadband Internet connection, a lot of people use web resources to learn about health and disease. YouTube service (www.youtube.com) offers a lot of videos concerning celiac disease. However, the credibility of the Polish videos available on YouTube and concerning celiac disease has never been analyzed. The aim of the study was to determine whether the YouTube service offers valuable content for Polish people affected by celiac disease. One hundred and fifty-four unique videos devoted to celiac disease and available in the Polish language were identified and critically assessed. Each video was categorized due to its topic(s), and evaluated for its credibility by two independent researchers. In general, 127 (82.5%) videos were found to be credible. The most credible categories of content presented organizations and events related to celiac disease/celiac society, followed by culinary recipes (100.0, 100.0, and 95.6% of credible videos, respectively). The least trustworthy categories were devoted to pathobiology and advertisements (55.6 and 54.3% of credible videos, respectively). YouTube service can serve as a supplementary source of knowledge for people affected by celiac disease, after careful selection of trustworthy content.

  6. Enhancing the quality and credibility of qualitative analysis.

    PubMed Central

    Patton, M Q

    1999-01-01

    Varying philosophical and theoretical orientations to qualitative inquiry remind us that issues of quality and credibility intersect with audience and intended research purposes. This overview examines ways of enhancing the quality and credibility of qualitative analysis by dealing with three distinct but related inquiry concerns: rigorous techniques and methods for gathering and analyzing qualitative data, including attention to validity, reliability, and triangulation; the credibility, competence, and perceived trustworthiness of the qualitative researcher; and the philosophical beliefs of evaluation users about such paradigm-based preferences as objectivity versus subjectivity, truth versus perspective, and generalizations versus extrapolations. Although this overview examines some general approaches to issues of credibility and data quality in qualitative analysis, it is important to acknowledge that particular philosophical underpinnings, specific paradigms, and special purposes for qualitative inquiry will typically include additional or substitute criteria for assuring and judging quality, validity, and credibility. Moreover, the context for these considerations has evolved. In early literature on evaluation methods the debate between qualitative and quantitative methodologists was often strident. In recent years the debate has softened. A consensus has gradually emerged that the important challenge is to match appropriately the methods to empirical questions and issues, and not to universally advocate any single methodological approach for all problems. PMID:10591279

  7. Distributed intrusion detection system based on grid security model

    NASA Astrophysics Data System (ADS)

    Su, Jie; Liu, Yahui

    2008-03-01

    Grid computing has developed rapidly with the development of network technology and it can solve the problem of large-scale complex computing by sharing large-scale computing resource. In grid environment, we can realize a distributed and load balance intrusion detection system. This paper first discusses the security mechanism in grid computing and the function of PKI/CA in the grid security system, then gives the application of grid computing character in the distributed intrusion detection system (IDS) based on Artificial Immune System. Finally, it gives a distributed intrusion detection system based on grid security system that can reduce the processing delay and assure the detection rates.

  8. Invalid before impaired: an emerging paradox of embedded validity indicators.

    PubMed

    Erdodi, Laszlo A; Lichtenstein, Jonathan D

    Embedded validity indicators (EVIs) are cost-effective psychometric tools to identify non-credible response sets during neuropsychological testing. As research on EVIs expands, assessors are faced with an emerging contradiction: the range of credible impairment disappears between the 'normal' and 'invalid' range of performance. We labeled this phenomenon as the invalid-before-impaired paradox. This study was designed to explore the origin of this psychometric anomaly, subject it to empirical investigation, and generate potential solutions. Archival data were analyzed from a mixed clinical sample of 312 (M Age  = 45.2; M Education  = 13.6) patients medically referred for neuropsychological assessment. The distribution of scores on eight subtests of the third and fourth editions of Wechsler Adult Intelligence Scale (WAIS) were examined in relation to the standard normal curve and two performance validity tests (PVTs). Although WAIS subtests varied in their sensitivity to non-credible responding, they were all significant predictors of performance validity. While subtests previously identified as EVIs (Digit Span, Coding, and Symbol Search) were comparably effective at differentiating credible and non-credible response sets, their classification accuracy was driven by their base rate of low scores, requiring different cutoffs to achieve comparable specificity. Invalid performance had a global effect on WAIS scores. Genuine impairment and non-credible performance can co-exist, are often intertwined, and may be psychometrically indistinguishable. A compromise between the alpha and beta bias on PVTs based on a balanced, objective evaluation of the evidence that requires concessions from both sides is needed to maintain/restore the credibility of performance validity assessment.

  9. Acceptance of Internet Banking Systems among Young Managers

    NASA Astrophysics Data System (ADS)

    Ariff, Mohd Shoki Md; M, Yeow S.; Zakuan, Norhayati; Zaidi Bahari, Ahamad

    2013-06-01

    The aim of this paper is to determine acceptance of internet banking system among potential young users, specifically future young managers. The relationships and the effects of computer self-efficacy (CSE) and extended technology acceptance model (TAM) on the behavioural intention (BI) to use internet banking system were examined. Measurement of CSE, TAM and BI were adapted from previous studies. However construct for TAM has been extended by adding a new variable which is perceived credibility (PC). A survey through questionnaire was conducted to determine the acceptance level of CSE, TAM and BI. Data were obtained from 275 Technology Management students, who are pursuing their undergraduate studies in a Malaysia's public university. The confirmatory factor analysis performed has identified four variables as determinant factors of internet banking acceptance. The first variable is computer self-efficacy (CSE), and another three variables from TAM constructs which are perceived usefulness (PU), perceived ease of use (PE) and perceived credibility (PC). The finding of this study indicated that CSE has a positive effect on PU and PE of the Internet banking systems. Respondents' CSE was positively affecting their PC of the systems, indicating that the higher the ability of one in computer skills, the higher the security and privacy issues of PC will be concerned. The multiple regression analysis indicated that only two construct of TAM; PU and PC were significantly associated with BI. It was found that the future managers' CSE indirectly affects their BI to use the internet banking systems through PU and PC of TAM. TAM was found to have direct effects on respondents' BI to use the systems. Both CSE and the PU and PC of TAM were good predictors in understanding individual responses to information technology. The role of PE of the original TAM to predict the attitude of users towards the use of information technology systems was surprisingly insignificant.

  10. When Children Learn Programming: Antecedents, Concepts and Outcomes.

    ERIC Educational Resources Information Center

    Shneiderman, Ben

    1985-01-01

    Discusses components of an educational plan which supports acquisition of computer programing skills by elementary school children, including antecedent knowledge required (sequencing, similarity, character recognition, part/whole relationships, conditional forms, repetition, and incrementation); initial programing concepts; and outcomes valuable…

  11. Document Delivery: An Annotated Selective Bibliography.

    ERIC Educational Resources Information Center

    Khalil, Mounir A.; Katz, Suzanne R.

    1992-01-01

    Presents a selective annotated bibliography of 61 items that deal with topics related to document delivery, including networks; hypertext; interlibrary loan; computer security; electronic publishing; copyright; online catalogs; resource sharing; electronic mail; electronic libraries; optical character recognition; microcomputers; liability issues;…

  12. Communications and Information: Compendium of Communications and Information Terminology

    DTIC Science & Technology

    2002-02-01

    Basic Access Module BASIC— Beginners All-Purpose Symbolic Instruction Code BBP—Baseband Processor BBS—Bulletin Board Service (System) BBTC—Broadband...media, formats and labels, programming language, computer documentation, flowcharts and terminology, character codes, data communications and input

  13. Font generation of personal handwritten Chinese characters

    NASA Astrophysics Data System (ADS)

    Lin, Jeng-Wei; Wang, Chih-Yin; Ting, Chao-Lung; Chang, Ray-I.

    2014-01-01

    Today, digital multimedia messages have drawn more and more attention due to the great achievement of computer and network techniques. Nevertheless, text is still the most popular media for people to communicate with others. Many fonts have been developed so that product designers can choose unique fonts to demonstrate their idea gracefully. It is commonly believed that handwritings can reflect one's personality, emotion, feeling, education level, and so on. This is especially true in Chinese calligraphy. However, it is not easy for ordinary users to customize a font of their personal handwritings. In this study, we performed a process reengineering in font generation. We present a new method to create font in a batch mode. Rather than to create glyphs of characters one by one according to their codepoints, people create glyphs incrementally in an on-demand manner. A Java Implementation is developed to read a document image of user handwritten Chinese characters, and make a vector font of these handwritten Chinese characters. Preliminary experiment result shows that the proposed method can help ordinary users create their personal handwritten fonts easily and quickly.

  14. Foveal splitting causes differential processing of Chinese orthography in the male and female brain.

    PubMed

    Hsiao, Janet Hui-Wen; Shillcock, Richard

    2005-10-01

    Chinese characters contain separate phonetic and semantic radicals. A dominant character type exists in which the semantic radical is on the left and the phonetic radical on the right; an opposite, minority structure also exists, with the semantic radical on the right and the phonetic radical on the left. We show that, when asked to pronounce isolated tokens of these two character types, males responded significantly faster when the phonetic information was on the right, whereas females showed a non-significant tendency in the opposite direction. Recent research on foveal structure and reading suggests that the two halves of a centrally fixated character are initially processed in different hemispheres. The male brain typically relies more on the left hemisphere for phonological processing compared with the female brain, causing this gender difference to emerge. This interaction is predicted by an implemented computational model. This study supports the existence of a gender difference in phonological processing, and shows that the effects of foveal splitting in reading extend far enough into word recognition to interact with the gender of the reader in a naturalistic reading task.

  15. Credibility of the emotional witness: a study of ratings by court judges.

    PubMed

    Wessel, Ellen; Drevland, Guri C B; Eilertsen, Dag Erik; Magnussen, Svein

    2006-04-01

    Previous studies have shown that the emotional behavior displayed during testimony may affect the perceived credibility of the witness. The present study compares credibility ratings by Norwegian court judges with those made by lay people. The participants viewed one of three video-recorded versions of a rape victim's statement, role played by a professional actress. The statement was given in a free-recall manner with one of three kinds of emotions displayed, termed congruent, neutral, and incongruent emotional expression. The results show that, in contrast to lay people, the credibility ratings of court judges and their votes for a guilty verdict were not influenced by the emotions displayed by the witness. Results are discussed in terms of professional expertise.

  16. The effects of similarity, parasocial identification, and source credibility in obesity public service announcements on diet and exercise self-efficacy.

    PubMed

    Phua, Joe

    2016-05-01

    This study examined the effect of the audience's similarity to, and parasocial identification with, spokespersons in obesity public service announcements, on perceived source credibility, and diet and exercise self-efficacy. The results (N = 200) indicated that perceived similarity to the spokesperson was significantly associated with three dimensions of source credibility (competence, trustworthiness, and goodwill), each of which in turn influenced parasocial identification with the spokesperson. Parasocial identification also exerted a positive impact on the audiences' diet and exercise self-efficacy. Additionally, significant differences were found between overweight viewers and non-overweight viewers on perceived similarity, parasocial identification with the spokesperson, and source credibility. © The Author(s) 2014.

  17. Can jurors recognize missing control groups, confounds, and experimenter bias in psychological science?

    PubMed

    McAuliff, Bradley D; Kovera, Margaret Bull; Nunez, Gabriel

    2009-06-01

    This study examined the ability of jury-eligible community members (N = 248) to detect internal validity threats in psychological science presented during a trial. Participants read a case summary in which an expert testified about a study that varied in internal validity (valid, missing control group, confound, and experimenter bias) and ecological validity (high, low). Ratings of expert evidence quality and expert credibility were higher for the valid versus missing control group versions only. Internal validity did not influence verdict or ratings of plaintiff credibility and no differences emerged as a function of ecological validity. Expert evidence quality, expert credibility, and plaintiff credibility were positively correlated with verdict. Implications for the scientific reasoning literature and for trials containing psychological science are discussed.

  18. Probing coherence aspects of adiabatic quantum computation and control.

    PubMed

    Goswami, Debabrata

    2007-09-28

    Quantum interference between multiple excitation pathways can be used to cancel the couplings to the unwanted, nonradiative channels resulting in robustly controlling decoherence through adiabatic coherent control approaches. We propose a useful quantification of the two-level character in a multilevel system by considering the evolution of the coherent character in the quantum system as represented by the off-diagonal density matrix elements, which switches from real to imaginary as the excitation process changes from being resonant to completely adiabatic. Such counterintuitive results can be explained in terms of continuous population exchange in comparison to no population exchange under the adiabatic condition.

  19. Surface defects and chiral algebras

    NASA Astrophysics Data System (ADS)

    Córdova, Clay; Gaiotto, Davide; Shao, Shu-Heng

    2017-05-01

    We investigate superconformal surface defects in four-dimensional N=2 superconformal theories. Each such defect gives rise to a module of the associated chiral algebra and the surface defect Schur index is the character of this module. Various natural chiral algebra operations such as Drinfeld-Sokolov reduction and spectral flow can be interpreted as constructions involving four-dimensional surface defects. We compute the index of these defects in the free hypermultiplet theory and Argyres-Douglas theories, using both infrared techniques involving BPS states, as well as renormalization group flows onto Higgs branches. In each case we find perfect agreement with the predicted characters.

  20. A platform for evolving intelligently interactive adversaries.

    PubMed

    Fogel, David B; Hays, Timothy J; Johnson, Douglas R

    2006-07-01

    Entertainment software developers face significant challenges in designing games with broad appeal. One of the challenges concerns creating nonplayer (computer-controlled) characters that can adapt their behavior in light of the current and prospective situation, possibly emulating human behaviors. This adaptation should be inherently novel, unrepeatable, yet within the bounds of realism. Evolutionary algorithms provide a suitable method for generating such behaviors. This paper provides background on the entertainment software industry, and details a prior and current effort to create a platform for evolving nonplayer characters with genetic and behavioral traits within a World War I combat flight simulator.

  1. Development and functional demonstration of a wireless intraoral inductive tongue computer interface for severely disabled persons.

    PubMed

    N S Andreasen Struijk, Lotte; Lontis, Eugen R; Gaihede, Michael; Caltenco, Hector A; Lund, Morten Enemark; Schioeler, Henrik; Bentsen, Bo

    2017-08-01

    Individuals with tetraplegia depend on alternative interfaces in order to control computers and other electronic equipment. Current interfaces are often limited in the number of available control commands, and may compromise the social identity of an individual due to their undesirable appearance. The purpose of this study was to implement an alternative computer interface, which was fully embedded into the oral cavity and which provided multiple control commands. The development of a wireless, intraoral, inductive tongue computer was described. The interface encompassed a 10-key keypad area and a mouse pad area. This system was embedded wirelessly into the oral cavity of the user. The functionality of the system was demonstrated in two tetraplegic individuals and two able-bodied individuals Results: The system was invisible during use and allowed the user to type on a computer using either the keypad area or the mouse pad. The maximal typing rate was 1.8 s for repetitively typing a correct character with the keypad area and 1.4 s for repetitively typing a correct character with the mouse pad area. The results suggest that this inductive tongue computer interface provides an esthetically acceptable and functionally efficient environmental control for a severely disabled user. Implications for Rehabilitation New Design, Implementation and detection methods for intra oral assistive devices. Demonstration of wireless, powering and encapsulation techniques suitable for intra oral embedment of assistive devices. Demonstration of the functionality of a rechargeable and fully embedded intra oral tongue controlled computer input device.

  2. Modernization and optimization of a legacy open-source CFD code for high-performance computing architectures

    NASA Astrophysics Data System (ADS)

    Gel, Aytekin; Hu, Jonathan; Ould-Ahmed-Vall, ElMoustapha; Kalinkin, Alexander A.

    2017-02-01

    Legacy codes remain a crucial element of today's simulation-based engineering ecosystem due to the extensive validation process and investment in such software. The rapid evolution of high-performance computing architectures necessitates the modernization of these codes. One approach to modernization is a complete overhaul of the code. However, this could require extensive investments, such as rewriting in modern languages, new data constructs, etc., which will necessitate systematic verification and validation to re-establish the credibility of the computational models. The current study advocates using a more incremental approach and is a culmination of several modernization efforts of the legacy code MFIX, which is an open-source computational fluid dynamics code that has evolved over several decades, widely used in multiphase flows and still being developed by the National Energy Technology Laboratory. Two different modernization approaches,'bottom-up' and 'top-down', are illustrated. Preliminary results show up to 8.5x improvement at the selected kernel level with the first approach, and up to 50% improvement in total simulated time with the latter were achieved for the demonstration cases and target HPC systems employed.

  3. Support Equipment Management in the F/A-18 Program

    DTIC Science & Technology

    1986-12-01

    or character (such as manuals and drawings) of a scientific or technical nature. Computer programs and related software are not technical data...documentation of computer programs and related software are. Also excluded are financial data or other information related to contract administration. 6...management in the F/A-18 program . Graeser, Kenneth S. http://hdl.handle.net/10945/22133 Downloaded from NPS Archive: Calhoun NAVAL POSTGRADUATE SCHOOL Monterey

  4. An on-line system for hand-printed input

    NASA Technical Reports Server (NTRS)

    Williams, T. G.; Bebb, J.

    1971-01-01

    The capability of graphic input/output systems is described. Topics considered are a character recognizer and dictionary building program, an initial flow chart element input program, and a system entitled The Assistant Mathematician, which uses ordinary mathematics to specify numeric computation. All three parts are necessary to allow a user to carry on a mathematical dialogue with the computer in the language and notation of his discipline or problem domain.

  5. Welcome to the Web: An Activity Booklet for Parents and Kids = Bienvenidos a Internet: Libro de actividades para padres y ninos.

    ERIC Educational Resources Information Center

    Schottman, Elly, Ed.

    Noting that children need help in learning to use wisely the computer and the Internet, this booklet, in English and Spanish versions, uses the characters from the public television program "Arthur" to suggest activities for parents to use with their children. The booklet begins with a read-aloud story about using computer games and the…

  6. Design Analysis Kit for Optimization and Terascale Applications 6.0

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    2015-10-19

    Sandia's Dakota software (available at http://dakota.sandia.gov) supports science and engineering transformation through advanced exploration of simulations. Specifically it manages and analyzes ensembles of simulations to provide broader and deeper perspective for analysts and decision makers. This enables them to: (1) enhance understanding of risk, (2) improve products, and (3) assess simulation credibility. In its simplest mode, Dakota can automate typical parameter variation studies through a generic interface to a computational model. However, Dakota also delivers advanced parametric analysis techniques enabling design exploration, optimization, model calibration, risk analysis, and quantification of margins and uncertainty with such models. It directly supports verificationmore » and validation activities. The algorithms implemented in Dakota aim to address challenges in performing these analyses with complex science and engineering models from desktop to high performance computers.« less

  7. Treatment choices for depression: Young people’s response to a traditional e-health versus a Health 2.0 website

    PubMed Central

    Scanlan, Faye; Jorm, Anthony; Reavley, Nicola; Meyer, Denny; Bhar, Sunil

    2017-01-01

    Objective This exploratory experimental study compared young people’s credibility appraisals and behavioural intentions following exposure to depression treatment information on a Health 2.0 website versus a traditional website. The traditional website listed evidence-based treatment recommendations for depression as judged by field experts. The Health 2.0 website contained information about how helpful each treatment was, as aggregated from feedback from young people with lived experience of depression. Method Participants (n = 279) were provided with a vignette asking them to imagine that they had just received a diagnosis of depression and they had gone online to find information to guide their treatment choices. They were randomly allocated to view either the traditional or the Health 2.0 website, and were asked to rate the credibility of the depression treatment information provided. They were also asked to indicate the extent to which they would be likely to act on the advice of the website. Results Participants in the traditional website condition rated their website as significantly more influential than did participants presented with the Health 2.0 website. This difference in treatment influence was fully accounted for the participants’ perception of credibility of the information provided by the websites. Conclusion The traditional website was rated as significantly more credible and influential than the Health 2.0 website. Treatment decisions appeared to be based on the extent to which online information appears credible. In conclusion, health-related content was perceived by users as more credible when endorsed by experts than by other users, and perceived message credibility appears to be a powerful determinant of behavioural intentions within the e-health setting.

  8. Prokinetics for the treatment of functional dyspepsia: Bayesian network meta-analysis.

    PubMed

    Yang, Young Joo; Bang, Chang Seok; Baik, Gwang Ho; Park, Tae Young; Shin, Suk Pyo; Suk, Ki Tae; Kim, Dong Joon

    2017-06-26

    Controversies persist regarding the effect of prokinetics for the treatment of functional dyspepsia (FD). This study aimed to assess the comparative efficacy of prokinetic agents for the treatment of FD. Randomized controlled trials (RCTs) of prokinetics for the treatment of FD were identified from core databases. Symptom response rates were extracted and analyzed using odds ratios (ORs). A Bayesian network meta-analysis was performed using the Markov chain Monte Carlo method in WinBUGS and NetMetaXL. In total, 25 RCTs, which included 4473 patients with FD who were treated with 6 different prokinetics or placebo, were identified and analyzed. Metoclopramide showed the best surface under the cumulative ranking curve (SUCRA) probability (92.5%), followed by trimebutine (74.5%) and mosapride (63.3%). However, the therapeutic efficacy of metoclopramide was not significantly different from that of trimebutine (OR:1.32, 95% credible interval: 0.27-6.06), mosapride (OR: 1.99, 95% credible interval: 0.87-4.72), or domperidone (OR: 2.04, 95% credible interval: 0.92-4.60). Metoclopramide showed better efficacy than itopride (OR: 2.79, 95% credible interval: 1.29-6.21) and acotiamide (OR: 3.07, 95% credible interval: 1.43-6.75). Domperidone (SUCRA probability 62.9%) showed better efficacy than itopride (OR: 1.37, 95% credible interval: 1.07-1.77) and acotiamide (OR: 1.51, 95% credible interval: 1.04-2.18). Metoclopramide, trimebutine, mosapride, and domperidone showed better efficacy for the treatment of FD than itopride or acotiamide. Considering the adverse events related to metoclopramide or domperidone, the short-term use of these agents or the alternative use of trimebutine or mosapride could be recommended for the symptomatic relief of FD.

  9. [An objective scoring system to evaluate the credibility of health related websites].

    PubMed

    Horváth, Tamás; Matics, Katalin; Meskó, Bertalan

    2018-04-01

    The unreliable quality of online health contents poses a serious challenge to the medical profession. Evaluating websites on the basis of their credibility increases the chance for readers to access professional content of better quality. Hungary still lags behind in taking practical steps to improve the quality and reliability of online patient education. EgészségKommandó (HealthCommando) is a new Hungarian objective scoring system established to evaluate the credibility of health related websites. It uses four types of indicators: transparency, content, recommendations, references. We evaluated 122 websites with EgészségKommandó. Out of this, 22.1% qualified as credible. The same assessment using JAMA benchmarks yielded only one credible website (0.8%). The most frequent deficiencies were the absence of reference to source, the omission of the quote that "the website information does not replace the doctor-patient discussion", and the identity of the author. In 45.9% of the cases, however, the content was written by medical professionals with contact information. By applying different types of credibility and quality indicators in a scoring system, EgészségKommandó can efficiently assess the websites on health-awareness. In cases where the recognized indicators are absent multiple times from a website, it will not pass the credibility test. Thus, EgészégKommandó can act as a filter. At the same time, EgészségKommandó is also capable of assessing webpages of different sorts systemically, and can recommend a proportionately large amount of reliable Hungarian medical web resources to those interested. Orv Hetil. 2018; 159(13): 511-519.

  10. Education in a Research University

    ERIC Educational Resources Information Center

    Arrow, Kenneth J. Ed.; And Others

    This collection of 30 essays on the character, administration, and management of research universities research university emphasizes the perspective of statistics and operations research: The essays are: "A Robust Faculty Planning Model" (Frederick Biedenweg); "Looking Back at Computer Models Employed in the Stanford University…

  11. The emotional child witness: effects on juror decision-making.

    PubMed

    Cooper, Alexia; Quas, Jodi A; Cleveland, Kyndra C

    2014-01-01

    Despite wide variations in child witness behavior while on the stand, little research has focused on how that behavior influences jurors' perceptions of the child's credibility or the case itself. In the current study, the impact of a child's emotional displays on credibility judgments and verdict preferences was examined in jury-eligible college students and jurors released from jury duty. No significant differences emerged in perceptions or verdicts based on whether a child was shown as crying or not while participants read a transcript of the child's testimony. However, participants who rated the child as more emotional (regardless of whether the image showed a crying child) were more likely to render guilty verdicts, were more certain of guilt, and found the child more credible and the defendant less credible than participants who rated the child as less emotional. Also, when the child was perceived as low in emotion, older children were rated as less credible than younger children. The results have implications for understanding how children's emotional displays and jurors' perceptions of children's emotionality influence decisions in sexual abuse cases. Copyright © 2014 John Wiley & Sons, Ltd.

  12. Knowledge of ghostwriting and financial conflicts-of-interest reduces the perceived credibility of biomedical research

    PubMed Central

    2011-01-01

    Background While the impact of conflicts-of-interest (COI) is of increasing concern in academic medicine, there is little research on the reaction of practicing clinicians to the disclosure of such conflicts. We developed two research vignettes presenting a fictional antidepressant medication study, one in which the principal investigator had no COI and another in which there were multiple COI disclosed. We confirmed the face validity of the COI vignette through consultation with experts. Hospital-based clinicians were randomly assigned to read one of these two vignettes and then administered a credibility scale. Findings Perceived credibility ratings were much lower in the COI group, with a difference of 11.00 points (31.42%) on the credibility scale total as calculated through the Mann-Whitney U test (95% CI = 6.99 - 15.00, p < .001). Clinicians in the COI group were also less likely to recommend the antidepressant medication discussed in the vignette (Odds Ratio = 0.163, 95% CI = .03 = 0.875). Conclusions In this study, increased disclosure of COI resulted in lower credibility ratings. PMID:21281504

  13. Scientific risk communication about controversial issues influences public perceptions of scientists' political orientations and credibility.

    PubMed

    Vraga, Emily; Myers, Teresa; Kotcher, John; Beall, Lindsey; Maibach, Ed

    2018-02-01

    Many scientists communicate with the public about risks associated with scientific issues, but such communication may have unintended consequences for how the public views the political orientations and the credibility of the communicating scientist. We explore this possibility using an experiment with a nationally representative sample of Americans in the fall of 2015. We find that risk communication on controversial scientific issues sometimes influences perceptions of the political orientations and credibility of the communicating scientist when the scientist addresses the risks of issues associated with conservative or liberal groups. This relationship is moderated by participant political ideology, with liberals adjusting their perceptions of the scientists' political beliefs more substantially when the scientist addressed the risks of marijuana use when compared with other issues. Conservatives' political perceptions were less impacted by the issue context of the scientific risk communication but indirectly influenced credibility perceptions. Our results support a contextual model of audience interpretation of scientific risk communication. Scientists should be cognizant that audience members may make inferences about the communicating scientist's political orientations and credibility when they engage in risk communication efforts about controversial issues.

  14. Computational Psychometrics Meets Hollywood: The Complexity in Emotional Storytelling.

    PubMed

    Cipresso, Pietro; Riva, Giuseppe

    2016-01-01

    Expressions of emotions are pervasive in media, especially in movies. In this article, we focus on the emotional relationships of movie characters in narrative thought and emotional storytelling. Several studies examine emotion elicitation through movies, but there is a gap in scientific literature and in the practice to quantitatively consider emotions among the characters of a movie story, which in turn provide the basis of spectator emotion elicitation. Some might argument that the ultimate purpose of a movie is to elicit emotions in the viewers; however, we are highlighting that the path to emotional stimulation entails emotions among the characters composing a narrative and manipulating to enable the effective elicitation of viewers' emotions. Here we provided and tested an effective quantitative method for analyzing these relationships in emotional networks, which allow for a clear understanding of the effects of story changes on movie perceptions and pleasantness.

  15. Character displacement of Cercopithecini primate visual signals

    PubMed Central

    Allen, William L.; Stevens, Martin; Higham, James P.

    2014-01-01

    Animal visual signals have the potential to act as an isolating barrier to prevent interbreeding of populations through a role in species recognition. Within communities of competing species, species recognition signals are predicted to undergo character displacement, becoming more visually distinctive from each other, however this pattern has rarely been identified. Using computational face recognition algorithms to model primate face processing, we demonstrate that the face patterns of guenons (tribe: Cercopithecini) have evolved under selection to become more visually distinctive from those of other guenon species with whom they are sympatric. The relationship between the appearances of sympatric species suggests that distinguishing conspecifics from other guenon species has been a major driver of diversification in guenon face appearance. Visual signals that have undergone character displacement may have had an important role in the tribe’s radiation, keeping populations that became geographically separated reproductively isolated on secondary contact. PMID:24967517

  16. Computational Psychometrics Meets Hollywood: The Complexity in Emotional Storytelling

    PubMed Central

    Cipresso, Pietro; Riva, Giuseppe

    2016-01-01

    Expressions of emotions are pervasive in media, especially in movies. In this article, we focus on the emotional relationships of movie characters in narrative thought and emotional storytelling. Several studies examine emotion elicitation through movies, but there is a gap in scientific literature and in the practice to quantitatively consider emotions among the characters of a movie story, which in turn provide the basis of spectator emotion elicitation. Some might argument that the ultimate purpose of a movie is to elicit emotions in the viewers; however, we are highlighting that the path to emotional stimulation entails emotions among the characters composing a narrative and manipulating to enable the effective elicitation of viewers' emotions. Here we provided and tested an effective quantitative method for analyzing these relationships in emotional networks, which allow for a clear understanding of the effects of story changes on movie perceptions and pleasantness. PMID:27877153

  17. Credible threats and promises.

    PubMed Central

    McNamara, John M; Houston, Alasdair I

    2002-01-01

    We consider various implications of information about the other player in two-player evolutionary games. A simple model of desertion shows that information about the partner's behaviour can be disadvantageous, and highlights the idea of credible threats. We then discuss the general issue of whether the partner can convince the focal player that it will behave in a specific way, i.e. whether the focal player can make credible threats or promises. We show that when desertion decisions depend on reserves, a player can manipulate its reserves so as to create a credible threat of desertion. We then extend previous work on the evolution of trust and commitment, discussing conditions under which it is advantageous to assume that a partner will behave in a certain way even though it is not in its best interest. PMID:12495517

  18. Credible threats and promises.

    PubMed

    McNamara, John M; Houston, Alasdair I

    2002-11-29

    We consider various implications of information about the other player in two-player evolutionary games. A simple model of desertion shows that information about the partner's behaviour can be disadvantageous, and highlights the idea of credible threats. We then discuss the general issue of whether the partner can convince the focal player that it will behave in a specific way, i.e. whether the focal player can make credible threats or promises. We show that when desertion decisions depend on reserves, a player can manipulate its reserves so as to create a credible threat of desertion. We then extend previous work on the evolution of trust and commitment, discussing conditions under which it is advantageous to assume that a partner will behave in a certain way even though it is not in its best interest.

  19. Development of TGS2611 methane sensor and SHT11 humidity and temperature sensor for measuring greenhouse gas on peatlands in south kalimantan, indonesia

    NASA Astrophysics Data System (ADS)

    Sugriwan, I.; Soesanto, O.

    2017-05-01

    The research was focused on development of data acquisition system to monitor the content of methane, relative humidity and temperature on peatlands in South Kalimantan, Indonesia. Methane is one of greenhouse gases that emitted from peatlands; while humidity and temperature are important parameters of microclimate on peatlands. The content of methane, humidity and temperature are three parameters were monitored digitally, real time, continuously and automatically record by data acquisition systems that interfaced to the personal computer. The hardware of data acquisition system consists of power supply unit, TGS2611 methane gas sensor, SHT11 humidity and temperature sensors, voltage follower, ATMega8535 microcontroller, 16 × 2 LCD character and personal computer. ATMega8535 module is a device to manage all part in measuring instrument. The software which is responsible to take sensor data, calculate characteristic equation and send data to 16 × 2 LCD character are Basic Compiler. To interface between measuring instrument and personal computer is maintained by Delphi 7. The result of data acquisition showed on 16 × 2 LCD characters, PC monitor and database with developed by XAMPP. Methane, humidity, and temperature which release from peatlands are trapped by Closed-Chamber Measurement with dimension 60 × 50 × 40 cm3. TGS2611 methane gas sensor and SHT11 humidity and temperature sensor are calibrated to determine transfer function used to data communication between sensors and microcontroller and integrated into ATMega8535 Microcontroller. Calculation of RS and RL of TGS2611 methane gas sensor refer to data sheet and obtained respectively 1360 ohm and 905 ohm. The characteristic equation of TGS2611 satisfies equation VRL = 0.561 ln n - 2.2641 volt, with n is a various concentrations and VRL in volt. The microcontroller maintained the voltage signal than interfaced it to liquid crystal displays and personal computer (laptop) to display result of the measurement. The result of data acquisition saved on excels and database format.

  20. New-generation stents compared with coronary bypass surgery for unprotected left main disease: A word of caution.

    PubMed

    Benedetto, Umberto; Taggart, David P; Sousa-Uva, Miguel; Biondi-Zoccai, Giuseppe; Di Franco, Antonino; Ohmes, Lucas B; Rahouma, Mohamed; Kamel, Mohamed; Caputo, Massimo; Girardi, Leonard N; Angelini, Gianni D; Gaudino, Mario

    2018-05-01

    With the advent of bare metal stents and drug-eluting stents, percutaneous coronary intervention has emerged as an alternative to coronary artery bypass grafting surgery for unprotected left main disease. However, whether the evolution of stents technology has translated into better results after percutaneous coronary intervention remains unclear. We aimed to compare coronary artery bypass grafting with stents of different generations for left main disease by performing a Bayesian network meta-analysis of available randomized controlled trials. All randomized controlled trials with at least 1 arm randomized to percutaneous coronary intervention with stents or coronary artery bypass grafting for left main disease were included. Bare metal stents and drug-eluting stents of first- and second-generation were compared with coronary artery bypass grafting. Poisson methods and Bayesian framework were used to compute the head-to-head incidence rate ratio and 95% credible intervals. Primary end points were the composite of death/myocardial infarction/stroke and repeat revascularization. Nine randomized controlled trials were included in the final analysis. Six trials compared percutaneous coronary intervention with coronary artery bypass grafting (n = 4654), and 3 trials compared different types of stents (n = 1360). Follow-up ranged from 6 months to 5 years. Second-generation drug-eluting stents (incidence rate ratio, 1.3; 95% credible interval, 1.1-1.6), but not bare metal stents (incidence rate ratio, 0.63; 95% credible interval, 0.27-1.4), and first-generation drug-eluting stents (incidence rate ratio, 0.85; 95% credible interval, 0.65-1.1) were associated with a significantly increased risk of death/myocardial infarction/stroke when compared with coronary artery bypass grafting. When compared with coronary artery bypass grafting, the highest risk of repeat revascularization was observed for bare metal stents (hazard ratio, 5.1; 95% confidence interval, 2.1-14), whereas first-generation drug-eluting stents (incidence rate ratio, 1.8; 95% confidence interval, 1.4-2.4) and second-generation drug-eluting stents (incidence rate ratio, 1.8; 95% confidence interval, 1.4-2.4) were comparable. The introduction of new-generation drug-eluting stents did not translate into better outcomes for percutaneous coronary intervention when compared with coronary artery bypass grafting. Copyright © 2017 The American Association for Thoracic Surgery. Published by Elsevier Inc. All rights reserved.

  1. Notional Scoring for Technical Review Weighting As Applied to Simulation Credibility Assessment

    NASA Technical Reports Server (NTRS)

    Hale, Joseph Peter; Hartway, Bobby; Thomas, Danny

    2008-01-01

    NASA's Modeling and Simulation Standard requires a credibility assessment for critical engineering data produced by models and simulations. Credibility assessment is thus a "qualifyingfactor" in reporting results from simulation-based analysis. The degree to which assessors should be independent of the simulation developers, users and decision makers is a recurring question. This paper provides alternative "weighting algorithms" for calculating the value-added for independence of the levels of technical review defined for the NASA Modeling and Simulation Standard.

  2. Understanding the Importance and Practice of Credible Leadership at Program Executive Office Ground Combat Systems (PEO GCS) and Program Executive Office Combat Support and Combat Service Support (PEO CS and CSS)

    DTIC Science & Technology

    2017-03-30

    and Program Executive Office Combat Support and Combat Service Support (PEO CS&CSS) Chad P. Stocker March 30, 2017 Submitted to...to Defense Acquisition University in partial fulfillment of the requirement of the Senior Service College Fellowship CREDIBLE LEADERSHIP AT PEO...of Credible Leadership at Program Executive Office Ground Combat Systems (PEO GCS) and Program Executive Office Combat Support and Combat Service

  3. Line-Editor Computer Program

    NASA Technical Reports Server (NTRS)

    Scott, Peter J.

    1989-01-01

    ZED editing program for DEC VAX computer simple, powerful line editor for text, program source code, and nonbinary data. Excels in processing of text by use of procedure files. Also features versatile search qualifiers, global changes, conditionals, online help, hexadecimal mode, space compression, looping, logical combinations of search strings, journaling, visible control characters, and automatic detabbing. Users of Cambridge implementation devised such ZED procedures as chess games, calculators, and programs for evaluating pi. Written entirely in C.

  4. Application of artificial neural networks to gaming

    NASA Astrophysics Data System (ADS)

    Baba, Norio; Kita, Tomio; Oda, Kazuhiro

    1995-04-01

    Recently, neural network technology has been applied to various actual problems. It has succeeded in producing a large number of intelligent systems. In this article, we suggest that it could be applied to the field of gaming. In particular, we suggest that the neural network model could be used to mimic players' characters. Several computer simulation results using a computer gaming system which is a modified version of the COMMONS GAME confirm our idea.

  5. Reading Machines for Blind People.

    ERIC Educational Resources Information Center

    Fender, Derek H.

    1983-01-01

    Ten stages of developing reading machines for blind people are analyzed: handling of text material; optics; electro-optics; pattern recognition; character recognition; storage; speech synthesizers; browsing and place finding; computer indexing; and other sources of input. Cost considerations of the final product are emphasized. (CL)

  6. Fast and Easy Searching of Files in Unisys 2200 Computers

    NASA Technical Reports Server (NTRS)

    Snook, Bryan E.

    2010-01-01

    A program has been written to enable (1) fast and easy searching of symbolic files for one or more strings of characters, dates, or numerical values in specific fields or columns and (2) summarizing results of searching other fields or columns.

  7. Code Verification of the HIGRAD Computational Fluid Dynamics Solver

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Van Buren, Kendra L.; Canfield, Jesse M.; Hemez, Francois M.

    2012-05-04

    The purpose of this report is to outline code and solution verification activities applied to HIGRAD, a Computational Fluid Dynamics (CFD) solver of the compressible Navier-Stokes equations developed at the Los Alamos National Laboratory, and used to simulate various phenomena such as the propagation of wildfires and atmospheric hydrodynamics. Code verification efforts, as described in this report, are an important first step to establish the credibility of numerical simulations. They provide evidence that the mathematical formulation is properly implemented without significant mistakes that would adversely impact the application of interest. Highly accurate analytical solutions are derived for four code verificationmore » test problems that exercise different aspects of the code. These test problems are referred to as: (i) the quiet start, (ii) the passive advection, (iii) the passive diffusion, and (iv) the piston-like problem. These problems are simulated using HIGRAD with different levels of mesh discretization and the numerical solutions are compared to their analytical counterparts. In addition, the rates of convergence are estimated to verify the numerical performance of the solver. The first three test problems produce numerical approximations as expected. The fourth test problem (piston-like) indicates the extent to which the code is able to simulate a 'mild' discontinuity, which is a condition that would typically be better handled by a Lagrangian formulation. The current investigation concludes that the numerical implementation of the solver performs as expected. The quality of solutions is sufficient to provide credible simulations of fluid flows around wind turbines. The main caveat associated to these findings is the low coverage provided by these four problems, and somewhat limited verification activities. A more comprehensive evaluation of HIGRAD may be beneficial for future studies.« less

  8. A Bayesian procedure for evaluating the frequency of calibration factor updates in highway safety manual (HSM) applications.

    PubMed

    Saha, Dibakar; Alluri, Priyanka; Gan, Albert

    2017-01-01

    The Highway Safety Manual (HSM) presents statistical models to quantitatively estimate an agency's safety performance. The models were developed using data from only a few U.S. states. To account for the effects of the local attributes and temporal factors on crash occurrence, agencies are required to calibrate the HSM-default models for crash predictions. The manual suggests updating calibration factors every two to three years, or preferably on an annual basis. Given that the calibration process involves substantial time, effort, and resources, a comprehensive analysis of the required calibration factor update frequency is valuable to the agencies. Accordingly, the objective of this study is to evaluate the HSM's recommendation and determine the required frequency of calibration factor updates. A robust Bayesian estimation procedure is used to assess the variation between calibration factors computed annually, biennially, and triennially using data collected from over 2400 miles of segments and over 700 intersections on urban and suburban facilities in Florida. Bayesian model yields a posterior distribution of the model parameters that give credible information to infer whether the difference between calibration factors computed at specified intervals is credibly different from the null value which represents unaltered calibration factors between the comparison years or in other words, zero difference. The concept of the null value is extended to include the range of values that are practically equivalent to zero. Bayesian inference shows that calibration factors based on total crash frequency are required to be updated every two years in cases where the variations between calibration factors are not greater than 0.01. When the variations are between 0.01 and 0.05, calibration factors based on total crash frequency could be updated every three years. Copyright © 2016 Elsevier Ltd. All rights reserved.

  9. Probing Ligand Effects on the Redox Energies of [4Fe-4S] Clusters Using Broken-Symmetry Density Functional Theory

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Niu, Shuqiang; Ichiye, Toshiko

    A central issue in understanding redox properties of iron-sulfur proteins is determining the factors that tune the reduction potentials of the Fe-S clusters. Recently, Solomon and coworkers have shown that the Fe-S bond covalency of protein analogs measured by %L, the percent ligand character of the Fe 3d orbitals, from ligand K-edge X-ray absorption spectroscopy (XAS) correlates with the electrochemical redox potentials. Also, Wang and coworkers have measured electron detachment energies for iron-sulfur clusters without environmental perturbations by gas-phase photoelectron spectroscopy (PES). Here the correlations of the ligand character with redox energy and %L character are examined in [Fe₄S₄L₄]2⁻ clustersmore » with different ligands by broken symmetry density functional theory (BS-DFT) calculations using the B3LYP functional together with PES and XAS experimental results. These gas-phase studies assess ligand effects independently of environmental perturbations and thus provide essential information for computational studies of iron-sulfur proteins. The B3LYP oxidation energies agree well with PES data, and the %L character obtained from natural bond orbital analysis correlates with XAS values, although it systematically underestimates them because of basis set effects. The results show that stronger electron-donating terminal ligands increase %Lt, the percent ligand character from terminal ligands, but decrease %Sb, the percent ligand character from the bridging sulfurs. Because the oxidized orbital has significant Fe-Lt antibonding character, the oxidation energy correlates well with %Lt. However, because the reduced orbital has varying contributions of both Fe-Lt and Fe-Sb antibonding character, the reduction energy does not correlate with either %Lt or %Sb. Overall, BSDFT calculations together with XAS and PES experiments can unravel the complex underlying factors in the redox energy and chemical bonding of the [4Fe-4S] clusters in iron-sulfur proteins.« less

  10. Virtual forensic entomology: improving estimates of minimum post-mortem interval with 3D micro-computed tomography.

    PubMed

    Richards, Cameron S; Simonsen, Thomas J; Abel, Richard L; Hall, Martin J R; Schwyn, Daniel A; Wicklein, Martina

    2012-07-10

    We demonstrate how micro-computed tomography (micro-CT) can be a powerful tool for describing internal and external morphological changes in Calliphora vicina (Diptera: Calliphoridae) during metamorphosis. Pupae were sampled during the 1st, 2nd, 3rd and 4th quarter of development after the onset of pupariation at 23 °C, and placed directly into 80% ethanol for preservation. In order to find the optimal contrast, four batches of pupae were treated differently: batch one was stained in 0.5M aqueous iodine for 1 day; two for 7 days; three was tagged with a radiopaque dye; four was left unstained (control). Pupae stained for 7d in iodine resulted in the best contrast micro-CT scans. The scans were of sufficiently high spatial resolution (17.2 μm) to visualise the internal morphology of developing pharate adults at all four ages. A combination of external and internal morphological characters was shown to have the potential to estimate the age of blowfly pupae with a higher degree of accuracy and precision than using external morphological characters alone. Age specific developmental characters are described. The technique could be used as a measure to estimate a minimum post-mortem interval in cases of suspicious death where pupae are the oldest stages of insect evidence collected. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  11. Decorated Heegaard Diagrams and Combinatorial Heegaard Floer Homology

    NASA Astrophysics Data System (ADS)

    Hammarsten, Carl

    Heegaard Floer homology is a collection of invariants for closed oriented three-manifolds, introduced by Ozsvath and Szabo in 2001. The simplest version is defined as the homology of a chain complex coming from a Heegaard diagram of the three manifold. In the original definition, the differentials count the number of points in certain moduli spaces of holomorphic disks, which are hard to compute in general. More recently, Sarkar and Wang (2006) and Ozsvath, Stipsicz and Szabo, (2009) have determined combinatorial methods for computing this homology with Z2 coefficients. Both methods rely on the construction of very specific Heegaard diagrams for the manifold, which are generally very complicated. Given a decorated Heegaard diagram H for a closed oriented 3-manifold Y, that is a Heegaard diagram together with a collection of embedded paths satisfying certain criteria, we describe a combinatorial recipe for a chain complex CF'[special character omitted]( H). If H satisfies some technical constraints we show that this chain complex is homotopically equivalent to the Heegaard Floer chain complex CF[special character omitted](H) and hence has the Heegaard Floer homology HF[special character omitted](Y) as its homology groups. Using branched spines we give an algorithm to construct a decorated Heegaard diagram which satisfies the necessary technical constraints for every closed oriented Y. We present this diagram graphically in the form of a strip diagram.

  12. Modification of Programs CHIEF and CID to Compute Sound Radiation from an Arbitrary Body with Mixed Boundary Conditions

    DTIC Science & Technology

    1991-06-01

    layer surfaces (NSU * NSV) DIMENSION CC(1I), TRNS(3), IELTS (8, 311) REAL Xl(lH@), YI(liOI) CHARACTER*3 SYMTYP CHARACTER*4 FLOTYP, TAPEID, PRTTYP INTEGER...element data. WRITE(NUINPRT, 1411) 1410 FORMAT(//,’ EEENT DATA’,/) DO 1412 1 = 1, I6EE WIlTE(KUNPRT,1411) 1, ( IELTS (J,1),J=1,S) 1412 CONTINUE 00 1414...1 = 1, iaaiM DO 1413 J =1, S CC(J) IELTS (J, 1) 1413 CONTINUE XIRG = XIRG * 1 CALL LDSURR(XIRG, 10, CC, TRNS, XIZAX, 22 NRL MEMORANDUM REPORT 6813 1

  13. Surface defects and chiral algebras

    DOE PAGES

    Córdova, Clay; Gaiotto, Davide; Shao, Shu-Heng

    2017-05-26

    Here, we investigate superconformal surface defects in four-dimensional N = 2 superconformal theories. Each such defect gives rise to a module of the associated chiral algebra and the surface defect Schur index is the character of this module. Various natural chiral algebra operations such as Drinfield-Sokolov reduction and spectral flow can be interpreted as constructions involving four-dimensional surface defects. We compute the index of these defects in the free hypermultiplet theory and Argyres-Douglas theories, using both infrared techniques involving BPS states, as well as renormalization group flows onto Higgs branches. We find perfect agreement with the predicted characters, in eachmore » case.« less

  14. Surface defects and chiral algebras

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Córdova, Clay; Gaiotto, Davide; Shao, Shu-Heng

    Here, we investigate superconformal surface defects in four-dimensional N = 2 superconformal theories. Each such defect gives rise to a module of the associated chiral algebra and the surface defect Schur index is the character of this module. Various natural chiral algebra operations such as Drinfield-Sokolov reduction and spectral flow can be interpreted as constructions involving four-dimensional surface defects. We compute the index of these defects in the free hypermultiplet theory and Argyres-Douglas theories, using both infrared techniques involving BPS states, as well as renormalization group flows onto Higgs branches. We find perfect agreement with the predicted characters, in eachmore » case.« less

  15. On the elliptic genera of manifolds of Spin(7) holonomy

    DOE PAGES

    Benjamin, Nathan; Harrison, Sarah M.; Kachru, Shamit; ...

    2015-12-16

    Superstring compactification on a manifold of Spin(7) holonomy gives rise to a 2d worldsheet conformal field theory with an extended supersymmetry algebra. The N=1 superconformal algebra is extended by additional generators of spins 2 and 5/2, and instead of just superconformal symmetry one has a c = 12 realization of the symmetry group SW(3/2,2). In this paper, we compute the characters of this supergroup and decompose the elliptic genus of a general Spin(7) compactification in terms of these characters. Here, we find suggestive relations to various sporadic groups, which are made more precise in a companion paper.

  16. Probability for Weather and Climate

    NASA Astrophysics Data System (ADS)

    Smith, L. A.

    2013-12-01

    Over the last 60 years, the availability of large-scale electronic computers has stimulated rapid and significant advances both in meteorology and in our understanding of the Earth System as a whole. The speed of these advances was due, in large part, to the sudden ability to explore nonlinear systems of equations. The computer allows the meteorologist to carry a physical argument to its conclusion; the time scales of weather phenomena then allow the refinement of physical theory, numerical approximation or both in light of new observations. Prior to this extension, as Charney noted, the practicing meteorologist could ignore the results of theory with good conscience. Today, neither the practicing meteorologist nor the practicing climatologist can do so, but to what extent, and in what contexts, should they place the insights of theory above quantitative simulation? And in what circumstances can one confidently estimate the probability of events in the world from model-based simulations? Despite solid advances of theory and insight made possible by the computer, the fidelity of our models of climate differs in kind from the fidelity of models of weather. While all prediction is extrapolation in time, weather resembles interpolation in state space, while climate change is fundamentally an extrapolation. The trichotomy of simulation, observation and theory which has proven essential in meteorology will remain incomplete in climate science. Operationally, the roles of probability, indeed the kinds of probability one has access too, are different in operational weather forecasting and climate services. Significant barriers to forming probability forecasts (which can be used rationally as probabilities) are identified. Monte Carlo ensembles can explore sensitivity, diversity, and (sometimes) the likely impact of measurement uncertainty and structural model error. The aims of different ensemble strategies, and fundamental differences in ensemble design to support of decision making versus advance science, are noted. It is argued that, just as no point forecast is complete without an estimate of its accuracy, no model-based probability forecast is complete without an estimate of its own irrelevance. The same nonlinearities that made the electronic computer so valuable links the selection and assimilation of observations, the formation of ensembles, the evolution of models, the casting of model simulations back into observables, and the presentation of this information to those who use it to take action or to advance science. Timescales of interest exceed the lifetime of a climate model and the career of a climate scientist, disarming the trichotomy that lead to swift advances in weather forecasting. Providing credible, informative climate services is a more difficult task. In this context, the value of comparing the forecasts of simulation models not only with each other but also with the performance of simple empirical models, whenever possible, is stressed. The credibility of meteorology is based on its ability to forecast and explain the weather. The credibility of climatology will always be based on flimsier stuff. Solid insights of climate science may be obscured if the severe limits on our ability to see the details of the future even probabilistically are not communicated clearly.

  17. A Robust Semi-Parametric Test for Detecting Trait-Dependent Diversification.

    PubMed

    Rabosky, Daniel L; Huang, Huateng

    2016-03-01

    Rates of species diversification vary widely across the tree of life and there is considerable interest in identifying organismal traits that correlate with rates of speciation and extinction. However, it has been challenging to develop methodological frameworks for testing hypotheses about trait-dependent diversification that are robust to phylogenetic pseudoreplication and to directionally biased rates of character change. We describe a semi-parametric test for trait-dependent diversification that explicitly requires replicated associations between character states and diversification rates to detect effects. To use the method, diversification rates are reconstructed across a phylogenetic tree with no consideration of character states. A test statistic is then computed to measure the association between species-level traits and the corresponding diversification rate estimates at the tips of the tree. The empirical value of the test statistic is compared to a null distribution that is generated by structured permutations of evolutionary rates across the phylogeny. The test is applicable to binary discrete characters as well as continuous-valued traits and can accommodate extremely sparse sampling of character states at the tips of the tree. We apply the test to several empirical data sets and demonstrate that the method has acceptable Type I error rates. © The Author(s) 2015. Published by Oxford University Press, on behalf of the Society of Systematic Biologists. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  18. Art and Dream.

    ERIC Educational Resources Information Center

    Guo, Shesen

    2003-01-01

    A computer-assisted learning/teaching model is conceived with implications of constructivist theory and an analogy between the traditional art form Shuanghuang and the teaching/learning environment. The virtual character of the model interacts with the learner, in the form of human behavior and speech supported by recognition biometrics,…

  19. Learning Inverse Rig Mappings by Nonlinear Regression.

    PubMed

    Holden, Daniel; Saito, Jun; Komura, Taku

    2017-03-01

    We present a framework to design inverse rig-functions-functions that map low level representations of a character's pose such as joint positions or surface geometry to the representation used by animators called the animation rig. Animators design scenes using an animation rig, a framework widely adopted in animation production which allows animators to design character poses and geometry via intuitive parameters and interfaces. Yet most state-of-the-art computer animation techniques control characters through raw, low level representations such as joint angles, joint positions, or vertex coordinates. This difference often stops the adoption of state-of-the-art techniques in animation production. Our framework solves this issue by learning a mapping between the low level representations of the pose and the animation rig. We use nonlinear regression techniques, learning from example animation sequences designed by the animators. When new motions are provided in the skeleton space, the learned mapping is used to estimate the rig controls that reproduce such a motion. We introduce two nonlinear functions for producing such a mapping: Gaussian process regression and feedforward neural networks. The appropriate solution depends on the nature of the rig and the amount of data available for training. We show our framework applied to various examples including articulated biped characters, quadruped characters, facial animation rigs, and deformable characters. With our system, animators have the freedom to apply any motion synthesis algorithm to arbitrary rigging and animation pipelines for immediate editing. This greatly improves the productivity of 3D animation, while retaining the flexibility and creativity of artistic input.

  20. A neural net based architecture for the segmentation of mixed gray-level and binary pictures

    NASA Technical Reports Server (NTRS)

    Tabatabai, Ali; Troudet, Terry P.

    1991-01-01

    A neural-net-based architecture is proposed to perform segmentation in real time for mixed gray-level and binary pictures. In this approach, the composite picture is divided into 16 x 16 pixel blocks, which are identified as character blocks or image blocks on the basis of a dichotomy measure computed by an adaptive 16 x 16 neural net. For compression purposes, each image block is further divided into 4 x 4 subblocks; a one-bit nonparametric quantizer is used to encode 16 x 16 character and 4 x 4 image blocks; and the binary map and quantizer levels are obtained through a neural net segmentor over each block. The efficiency of the neural segmentation in terms of computational speed, data compression, and quality of the compressed picture is demonstrated. The effect of weight quantization is also discussed. VLSI implementations of such adaptive neural nets in CMOS technology are described and simulated in real time for a maximum block size of 256 pixels.

  1. Electronic and ionization spectra of 1,1-diamino-2,2-dinitroethylene, FOX-7.

    PubMed

    Borges, Itamar

    2014-03-01

    Singlet, triplet and ionized states of the energetic molecule 1,1-diamino-2,2-dinitroethylene, known as FOX-7 or DADNE, were investigated using the symmetry-adapted-cluster configuration interaction (SAC-CI) ab initio wave function. The 20 computed singlet transitions, with 2 exceptions, were bright. The most intense singlet transitions were of the n₀→π type-typical of molecules having nitro groups. Fast intersystem crossing (ISC) from the 1¹A, 2¹A and 8¹A bright singlet transitions is possible. Other feasible ISC processes are discussed. The computed singlet and ionization spectra have similar features when compared to nitramide and N,N-dimethylnitramine molecules, which have only a nitro group. The ionization energies of the first 20 states have differences in comparison with Koopmans' energy values that can reach 3 eV. Moreover, the character of the first ionized states, dominated by single ionizations, is not the same when compared with the character resulting from application of Koopmans' theorem.

  2. Scientific risk communication about controversial issues influences public perceptions of scientists' political orientations and credibility

    PubMed Central

    2018-01-01

    Many scientists communicate with the public about risks associated with scientific issues, but such communication may have unintended consequences for how the public views the political orientations and the credibility of the communicating scientist. We explore this possibility using an experiment with a nationally representative sample of Americans in the fall of 2015. We find that risk communication on controversial scientific issues sometimes influences perceptions of the political orientations and credibility of the communicating scientist when the scientist addresses the risks of issues associated with conservative or liberal groups. This relationship is moderated by participant political ideology, with liberals adjusting their perceptions of the scientists' political beliefs more substantially when the scientist addressed the risks of marijuana use when compared with other issues. Conservatives' political perceptions were less impacted by the issue context of the scientific risk communication but indirectly influenced credibility perceptions. Our results support a contextual model of audience interpretation of scientific risk communication. Scientists should be cognizant that audience members may make inferences about the communicating scientist's political orientations and credibility when they engage in risk communication efforts about controversial issues. PMID:29515820

  3. How to Develop and Interpret a Credibility Assessment of Numerical Models for Human Research: NASA-STD-7009 Demystified

    NASA Technical Reports Server (NTRS)

    Nelson, Emily S.; Mulugeta, Lealem; Walton, Marlei; Myers, Jerry G.

    2014-01-01

    In the wake of the Columbia accident, the NASA-STD-7009 [1] credibility assessment was developed as a unifying platform to describe model credibility and the uncertainties in its modeling predictions. This standard is now being adapted by NASAs Human Research Program to cover a wide range of numerical models for human research. When used properly, the standard can improve the process of code development by encouraging the use of best practices. It can also give management more insight in making informed decisions through a better understanding of the models capabilities and limitations.To a newcomer, the abstractions presented in NASA-STD-7009 and the sheer volume of information that must be absorbed can be overwhelming. This talk is aimed at describing the credibility assessment, which is the heart of the standard, in plain terms. It will outline how to develop a credibility assessment under the standard. It will also show how to quickly interpret the graphs and tables that result from the assessment and how to drill down from the top-level view to the foundation of the assessment. Finally, it will highlight some of the resources that are available for further study.

  4. Persuading girls to take elective physical science courses in high school: Who are the credible communicators?

    NASA Astrophysics Data System (ADS)

    Koballa, Thomas R., Jr.

    Eighth-grade girls (N=257) randomly selected from nine different public junior high schools in central Texas were questioned in order to identify the communicators whom they perceive as highly credible regarding reasons for taking elective physical science courses in high school and the attributes associated with these communicators. Four persons were each identified by better than 10 percent of the sample as the best person to try to convince junior high school girls to take elective physical science courses in high school. In order of perceived credibility, these persons are father, woman science teacher, mother, and boy high school student. Slight variations in the order of perceived credibility were found when the responses from girls of the different ethnic groups represented in the sample (Caucasian, Hispanic, Black, and Asian) were examined separately. Attributes listed by the respondents for father, woman science teacher, mother, and boy high school student were examined and classified into the categories of prestige, trustworthiness, similarity, attractiveness, and power. Prestige and trustworthiness are the attributes associates most frequently with communicators identified as highly credible. Implications of the present study and suggestions for further research are discussed.

  5. 10 CFR 72.236 - Specific requirements for spent fuel storage cask approval and fabrication.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... maintained in a subcritical condition under credible conditions. (d) Radiation shielding and confinement... confinement of radioactive material under normal, off-normal, and credible accident conditions. (m) To the...

  6. 10 CFR 72.236 - Specific requirements for spent fuel storage cask approval and fabrication.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... maintained in a subcritical condition under credible conditions. (d) Radiation shielding and confinement... confinement of radioactive material under normal, off-normal, and credible accident conditions. (m) To the...

  7. 10 CFR 72.236 - Specific requirements for spent fuel storage cask approval and fabrication.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... maintained in a subcritical condition under credible conditions. (d) Radiation shielding and confinement... of radioactive material under normal, off-normal, and credible accident conditions. (m) To the extent...

  8. 10 CFR 72.236 - Specific requirements for spent fuel storage cask approval and fabrication.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... maintained in a subcritical condition under credible conditions. (d) Radiation shielding and confinement... of radioactive material under normal, off-normal, and credible accident conditions. (m) To the extent...

  9. 10 CFR 72.236 - Specific requirements for spent fuel storage cask approval and fabrication.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... maintained in a subcritical condition under credible conditions. (d) Radiation shielding and confinement... confinement of radioactive material under normal, off-normal, and credible accident conditions. (m) To the...

  10. The Relationship Between Attractiveness and Credibility of Television Commercials as Perceived by Children

    ERIC Educational Resources Information Center

    Breen, Myles P.; Powell, Jon T.

    1973-01-01

    This study tested whether children like commercials they believe or believe commercials they like. Results indicated a moderate correlation between the perceived attractiveness and the credibility of the commercials. (CH)

  11. Remote online ergonomic assessment in the office environment as compared to face-to-face ergonomic assessment.

    PubMed

    Eyal, Levy; Ribak, Joseph; Badihi, Yehuda

    2012-01-01

    remote online ergonomic assessment in the office environment as compared to face-to-face ergonomic assessment and examination of the applicability of remote online ergonomic assessment to office workers. 40 employees from a large Israeli hi-tech company were ergonomically assessed per the University of California computer usage checklist, according to the two assessment types (face-to-face and remote). An additional Ergonomist "assessor 2" examined the credibility of the process. Research hypothesis 1 was verified: 21 out of 22 questions (95.45%) from the checklist indicated compatibility between "assessor 1" to the "Gold Standard" at an 80% level. Research hypothesis 2: examining the credibility between the assessors with regard to remote assessment. This hypothesis was partially verified, the correlation between the assessors was measured at 0.54. Research hypothesis 3: examining the extent of deviation of natural posture between distal body parts assessment (distant from the center of the body) and proximal body parts (close to the center of the body). This hypothesis was clearly verified. It has been proven that there is statistical significance between the results. The current research has proved that there is an additional method to assess musculoskeletal disorders risk factors remotely online at office environment.

  12. The credibility challenge for global fluvial flood risk analysis

    NASA Astrophysics Data System (ADS)

    Trigg, M. A.; Birch, C. E.; Neal, J. C.; Bates, P. D.; Smith, A.; Sampson, C. C.; Yamazaki, D.; Hirabayashi, Y.; Pappenberger, F.; Dutra, E.; Ward, P. J.; Winsemius, H. C.; Salamon, P.; Dottori, F.; Rudari, R.; Kappes, M. S.; Simpson, A. L.; Hadzilacos, G.; Fewtrell, T. J.

    2016-09-01

    Quantifying flood hazard is an essential component of resilience planning, emergency response, and mitigation, including insurance. Traditionally undertaken at catchment and national scales, recently, efforts have intensified to estimate flood risk globally to better allow consistent and equitable decision making. Global flood hazard models are now a practical reality, thanks to improvements in numerical algorithms, global datasets, computing power, and coupled modelling frameworks. Outputs of these models are vital for consistent quantification of global flood risk and in projecting the impacts of climate change. However, the urgency of these tasks means that outputs are being used as soon as they are made available and before such methods have been adequately tested. To address this, we compare multi-probability flood hazard maps for Africa from six global models and show wide variation in their flood hazard, economic loss and exposed population estimates, which has serious implications for model credibility. While there is around 30%-40% agreement in flood extent, our results show that even at continental scales, there are significant differences in hazard magnitude and spatial pattern between models, notably in deltas, arid/semi-arid zones and wetlands. This study is an important step towards a better understanding of modelling global flood hazard, which is urgently required for both current risk and climate change projections.

  13. Reliability analysis of a utility-scale solar power plant

    NASA Astrophysics Data System (ADS)

    Kolb, G. J.

    1992-10-01

    This paper presents the results of a reliability analysis for a solar central receiver power plant that employs a salt-in-tube receiver. Because reliability data for a number of critical plant components have only recently been collected, this is the first time a credible analysis can be performed. This type of power plant will be built by a consortium of western US utilities led by the Southern California Edison Company. The 10 MW plant is known as Solar Two and is scheduled to be on-line in 1994. It is a prototype which should lead to the construction of 100 MW commercial-scale plants by the year 2000. The availability calculation was performed with the UNIRAM computer code. The analysis predicted a forced outage rate of 5.4 percent and an overall plant availability, including scheduled outages, of 91 percent. The code also identified the most important contributors to plant unavailability. Control system failures were identified as the most important cause of forced outages. Receiver problems were rated second with turbine outages third. The overall plant availability of 91 percent exceeds the goal identified by the US utility study. This paper discuses the availability calculation and presents evidence why the 91 percent availability is a credible estimate.

  14. The application of emulation techniques in the analysis of highly reliable, guidance and control computer systems

    NASA Technical Reports Server (NTRS)

    Migneault, Gerard E.

    1987-01-01

    Emulation techniques can be a solution to a difficulty that arises in the analysis of the reliability of guidance and control computer systems for future commercial aircraft. Described here is the difficulty, the lack of credibility of reliability estimates obtained by analytical modeling techniques. The difficulty is an unavoidable consequence of the following: (1) a reliability requirement so demanding as to make system evaluation by use testing infeasible; (2) a complex system design technique, fault tolerance; (3) system reliability dominated by errors due to flaws in the system definition; and (4) elaborate analytical modeling techniques whose precision outputs are quite sensitive to errors of approximation in their input data. Use of emulation techniques for pseudo-testing systems to evaluate bounds on the parameter values needed for the analytical techniques is then discussed. Finally several examples of the application of emulation techniques are described.

  15. [Theory, method and application of method R on estimation of (co)variance components].

    PubMed

    Liu, Wen-Zhong

    2004-07-01

    Theory, method and application of Method R on estimation of (co)variance components were reviewed in order to make the method be reasonably used. Estimation requires R values,which are regressions of predicted random effects that are calculated using complete dataset on predicted random effects that are calculated using random subsets of the same data. By using multivariate iteration algorithm based on a transformation matrix,and combining with the preconditioned conjugate gradient to solve the mixed model equations, the computation efficiency of Method R is much improved. Method R is computationally inexpensive,and the sampling errors and approximate credible intervals of estimates can be obtained. Disadvantages of Method R include a larger sampling variance than other methods for the same data,and biased estimates in small datasets. As an alternative method, Method R can be used in larger datasets. It is necessary to study its theoretical properties and broaden its application range further.

  16. A multicriteria decision making approach based on fuzzy theory and credibility mechanism for logistics center location selection.

    PubMed

    Wang, Bowen; Xiong, Haitao; Jiang, Chengrui

    2014-01-01

    As a hot topic in supply chain management, fuzzy method has been widely used in logistics center location selection to improve the reliability and suitability of the logistics center location selection with respect to the impacts of both qualitative and quantitative factors. However, it does not consider the consistency and the historical assessments accuracy of experts in predecisions. So this paper proposes a multicriteria decision making model based on credibility of decision makers by introducing priority of consistency and historical assessments accuracy mechanism into fuzzy multicriteria decision making approach. In this way, only decision makers who pass the credibility check are qualified to perform the further assessment. Finally, a practical example is analyzed to illustrate how to use the model. The result shows that the fuzzy multicriteria decision making model based on credibility mechanism can improve the reliability and suitability of site selection for the logistics center.

  17. To tweet or to retweet? That is the question for health professionals on twitter.

    PubMed

    Lee, Ji Young; Sundar, S Shyam

    2013-01-01

    Guided by the MAIN model ( Sundar, 2008 ), this study explored the effects of three interface cues conveying source attributes on credibility of health messages in Twitter: authority cue (whether a source is an expert or not), bandwagon cue (the number of followers that a source has-large vs. small), and source proximity cue (distance of messages from its original source-tweet vs. retweet). A significant three-way interaction effect on perceived credibility of health content was found, such that when a professional source with many followers tweets, participants tend to perceive the content to be more credible than when a layperson source with many followers tweets. For retweets, however, the exact opposite pattern was found. Results also show that for tweets, content credibility was significantly associated with the perceived expertise of proximal source, whereas for retweets, it was associated with the perceived trustworthiness of proximal source. Theoretical and practical implications are discussed.

  18. A Multicriteria Decision Making Approach Based on Fuzzy Theory and Credibility Mechanism for Logistics Center Location Selection

    PubMed Central

    Wang, Bowen; Jiang, Chengrui

    2014-01-01

    As a hot topic in supply chain management, fuzzy method has been widely used in logistics center location selection to improve the reliability and suitability of the logistics center location selection with respect to the impacts of both qualitative and quantitative factors. However, it does not consider the consistency and the historical assessments accuracy of experts in predecisions. So this paper proposes a multicriteria decision making model based on credibility of decision makers by introducing priority of consistency and historical assessments accuracy mechanism into fuzzy multicriteria decision making approach. In this way, only decision makers who pass the credibility check are qualified to perform the further assessment. Finally, a practical example is analyzed to illustrate how to use the model. The result shows that the fuzzy multicriteria decision making model based on credibility mechanism can improve the reliability and suitability of site selection for the logistics center. PMID:25215319

  19. Credibility assessments: operational issues and technology impact for law enforcement applications

    NASA Astrophysics Data System (ADS)

    Ryan, Andrew H., Jr.; Pavlidis, Ioannis; Rohrbaugh, J. W.; Marchak, Frank; Kozel, F. Andrew

    2003-09-01

    Law Enforcement personnel are faced with new challenges to rapidly assess the credibility of statements made by individuals in airports, border crossings, and a variety of environments not conducive to interviews. New technologies may offer assistance to law enforcement personnel in the interview and interrogation process. Additionally, homeland defense against terrorism challenges scientists to develop new methods of assessing truthfulness and credibility in humans. Current findings of four advanced research projects looking at emerging technologies in the credibility assessment are presented for discussion. This paper will discuss research efforts on four emerging technologies now underway at DoDPI and other institutions. These include: (1) Thermal Image Analysis (TIA); (2) Laser Doppler Vibrometry (LDV); (3) Eye Movement based Memory Assessment (EMMA); and (4) functional Magnetic Resonance Imaging (fMRI). A description each technique, the current state of these research efforts, and an overview of the potential for each of these emerging technologies will be provided.

  20. The Science and Technology of the US National Missile Defense System

    NASA Astrophysics Data System (ADS)

    Postol, Theodore A.

    2010-03-01

    The National Missile Defense System utilizes UHF and X-band radars for search, track and discrimination, and interceptors that use long-wave infrared sensors to identify and home on attacking warheads. The radars and infrared sensors in the missile defense system perform at near the theoretical limits predicted by physics. However, in spite of the fantastic technical advances in sensor technology, signal processing, and computational support functions, the National Missile Defense System cannot be expected to ever work in realistic combat environments. This talk will describe why these impressive technologies can never deliver on the promise of a credible defense against long-range ballistic missiles.

  1. Mathematics Programming on the Apple II and IBM PC.

    ERIC Educational Resources Information Center

    Myers, Roy E.; Schneider, David I.

    1987-01-01

    Details the features of BASIC used in mathematics programming and provides the information needed to translate between the Apple II and IBM PC computers. Discusses inputing a user-defined function, setting scroll windows, displaying subscripts and exponents, variable names, mathematical characters and special symbols. (TW)

  2. Storing and Viewing Electronic Documents.

    ERIC Educational Resources Information Center

    Falk, Howard

    1999-01-01

    Discusses the conversion of fragile library materials to computer storage and retrieval to extend the life of the items and to improve accessibility through the World Wide Web. Highlights include entering the images, including scanning; optical character recognition; full text and manual indexing; and available document- and image-management…

  3. Data Input for Libraries: State-of-the-Art Report.

    ERIC Educational Resources Information Center

    Buckland, Lawrence F.

    This brief overview of new manuscript preparation methods which allow authors and editors to set their own type discusses the advantages and disadvantages of optical character recognition (OCR), microcomputers and personal computers, minicomputers, and word processors for editing and database entry. Potential library applications are also…

  4. Development of improved ambient computation methods in support of the National Parks Air Tour Management Act

    DOT National Transportation Integrated Search

    2008-09-01

    Approximately 85 National Park units with commercial air tours will need Air Tour : Management Plans (ATMPs). The objective of an ATMP is to prevent or mitigate : significant adverse impacts to National Park resources. Noise impacts must be : charact...

  5. Exploring the Realized Niche: Simulated Ecological Mapping with a Microcomputer.

    ERIC Educational Resources Information Center

    Kent, J. W.

    1983-01-01

    Describes a computer program based upon field observations of littoral zonation modified by a small stream. The program employs user-defined color graphic characters to display simulated ecological maps representing the patterning of organisms in response to local values of niche limiting factors. (Author/JN)

  6. How adolescent girls interpret weight-loss advertising.

    PubMed

    Hobbs, Renee; Broder, Sharon; Pope, Holly; Rowe, Jonelle

    2006-10-01

    While they demonstrate some ability to critically analyze the more obvious forms of deceptive weight-loss advertising, many girls do not recognize how advertising evokes emotional responses or how visual and narrative techniques are used to increase identification in weight-loss advertising. This study examined how girls aged 9-17 years interpreted magazine advertising, television (TV) advertising and infomercials for weight-loss products in order to determine whether deceptive advertising techniques were recognized and to assess pre-existing media-literacy skills. A total of 42 participants were interviewed in seven geographic regions of the United States. In groups of three, participants were shown seven print and TV advertisements (ads) for weight-loss products and asked to share their interpretations of each ad. Common factors in girls' interpretation of weight-loss advertising included responding to texts emotionally by identifying with characters; comparing and contrasting persuasive messages with real-life experiences with family members; using prior knowledge about nutrition management and recognizing obvious deceptive claims like 'rapid' or 'permanent' weight loss. Girls were less able to demonstrate skills including recognizing persuasive construction strategies including message purpose, target audience and subtext and awareness of economic factors including financial motives, credibility enhancement and branding.

  7. A home for science: The life and times of Tropical and Polar field stations.

    PubMed

    Geissler, P Wenzel; Kelly, Ann H

    2016-12-01

    A 'halfway house' between the generic, purified space of the laboratory and the varied and particular spaces of the field, the field station is a controlled yet uncontained setting from which nature can be accessed and anchored. As living quarters for visiting scientists, field stations are also enmeshed in the routine and rhythms of everyday domestic life, and in longer cycles of habitation, wear, and repair. This introduction considers the empirical and conceptual significance of Polar and Tropical field stations as homes for scientific work and scientific lives. The field station's extra-territorial yet intimate character affects the credibility and circulation of knowledge along science's frontiers. The challenge of making a home in the (non-temperate) field and the mundane experiences of expatriation and appropriation establish particular political dynamics of knowledge-making in these locations. They bring into focus the imaginaries of nature and science that drive transnational research and put into relief the aesthetic and affective dimensions of work and life in these distant homes for science. All these themes are pursued and amplified in a different medium by the artists who contributed to our research and are also featured in this special issue.

  8. Modernization and optimization of a legacy open-source CFD code for high-performance computing architectures

    DOE PAGES

    Gel, Aytekin; Hu, Jonathan; Ould-Ahmed-Vall, ElMoustapha; ...

    2017-03-20

    Legacy codes remain a crucial element of today's simulation-based engineering ecosystem due to the extensive validation process and investment in such software. The rapid evolution of high-performance computing architectures necessitates the modernization of these codes. One approach to modernization is a complete overhaul of the code. However, this could require extensive investments, such as rewriting in modern languages, new data constructs, etc., which will necessitate systematic verification and validation to re-establish the credibility of the computational models. The current study advocates using a more incremental approach and is a culmination of several modernization efforts of the legacy code MFIX, whichmore » is an open-source computational fluid dynamics code that has evolved over several decades, widely used in multiphase flows and still being developed by the National Energy Technology Laboratory. Two different modernization approaches,‘bottom-up’ and ‘top-down’, are illustrated. Here, preliminary results show up to 8.5x improvement at the selected kernel level with the first approach, and up to 50% improvement in total simulated time with the latter were achieved for the demonstration cases and target HPC systems employed.« less

  9. Modernization and optimization of a legacy open-source CFD code for high-performance computing architectures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gel, Aytekin; Hu, Jonathan; Ould-Ahmed-Vall, ElMoustapha

    Legacy codes remain a crucial element of today's simulation-based engineering ecosystem due to the extensive validation process and investment in such software. The rapid evolution of high-performance computing architectures necessitates the modernization of these codes. One approach to modernization is a complete overhaul of the code. However, this could require extensive investments, such as rewriting in modern languages, new data constructs, etc., which will necessitate systematic verification and validation to re-establish the credibility of the computational models. The current study advocates using a more incremental approach and is a culmination of several modernization efforts of the legacy code MFIX, whichmore » is an open-source computational fluid dynamics code that has evolved over several decades, widely used in multiphase flows and still being developed by the National Energy Technology Laboratory. Two different modernization approaches,‘bottom-up’ and ‘top-down’, are illustrated. Here, preliminary results show up to 8.5x improvement at the selected kernel level with the first approach, and up to 50% improvement in total simulated time with the latter were achieved for the demonstration cases and target HPC systems employed.« less

  10. Evaluation of Rock Joint Coefficients

    NASA Astrophysics Data System (ADS)

    Audy, Ondřej; Ficker, Tomáš

    2017-10-01

    A computer method for evaluation of rock joint coefficients is described and several applications are presented. The method is based on two absolute numerical indicators that are formed by means of the Fourier replicas of rock joint profiles. The first indicator quantifies the vertical depth of profiles and the second indicator classifies wavy character of profiles. The absolute indicators have replaced the formerly used relative indicators that showed some artificial behavior in some cases. This contribution is focused on practical computations testing the functionality of the newly introduced indicators.

  11. Using Computer Technology To Monitor Student Progress and Remediate Reading Problems.

    ERIC Educational Resources Information Center

    McCullough, C. Sue

    1995-01-01

    Focuses on research about application of text-to-speech systems in diagnosing and remediating word recognition, vocabulary knowledge, and comprehension disabilities. As school psychologists move toward a consultative model of service delivery, they need to know about technology such as speech synthesizers, digitizers, optical-character-recognition…

  12. When Worlds Collide: An Augmented Reality Check

    ERIC Educational Resources Information Center

    Villano, Matt

    2008-01-01

    The technology is simple: Mobile technologies such as handheld computers and global positioning systems work in sync to create an alternate, hybrid world that mixes virtual characters with the actual physical environment. The result is a digital simulation that offers powerful game-playing opportunities and allows students to become more engaged…

  13. Modelling Human Emotions for Tactical Decision-Making Games

    ERIC Educational Resources Information Center

    Visschedijk, Gillian C.; Lazonder, Ard W.; van der Hulst, Anja; Vink, Nathalie; Leemkuil, Henny

    2013-01-01

    The training of tactical decision making increasingly occurs through serious computer games. A challenging aspect of designing such games is the modelling of human emotions. Two studies were performed to investigate the relation between fidelity and human emotion recognition in virtual human characters. Study 1 compared five versions of a virtual…

  14. The Design of the CCCII and Its Application Considerations in Library Automation.

    ERIC Educational Resources Information Center

    Huang, Jack Kai-tung; And Others

    This paper presents the major characteristics of the Chinese Character Code for Information Interchange (CCCII) and indicates its intended application for the interchange of Chinese information among computer systems and communication facilities, especially in library networks. It is considered sufficient for present day library applications,…

  15. Using ZWDOS to Communicate in Chinese on PC.

    ERIC Educational Resources Information Center

    Xie, Tianwei

    1995-01-01

    Describes the availability, installation, and use of the ZhonWen Disk Operating System (ZWDOS) to display, print, and transmit Chinese characters on conventional International Business Machines (IBM) personal computers and IBM-compatible machines. Also discussed is the use of ZWDOS to compose electronic mail messages, read newsgroups, and access…

  16. The Graphical User Interface Crisis: Danger and Opportunity.

    ERIC Educational Resources Information Center

    Boyd, Lawrence H.; And Others

    This paper examines graphic computing environments, identifies potential problems in providing access to blind people, and describes programs and strategies being developed to provide this access. The paper begins with an explanation of how graphic user interfaces differ from character-based systems in their use of pixels, visual metaphors such as…

  17. Individuality and Literacy: Historical Perspective.

    ERIC Educational Resources Information Center

    Robbins, Rosemary A.

    The technology of literacy for any given culture helps to Determine the character of its members. In less than 3,000 years, Western culture has been transformed from an oral/aural culture through many increasingly literate phases to a present stage which is approaching "computer literacy." Erich Fromm suggests that in the course of…

  18. New Approaches to Technology in HE Management

    ERIC Educational Resources Information Center

    Cobb, Chris

    2012-01-01

    Most UK universities can trace their current management information systems back to significant investments made in the 1990s, largely fuelled by concerns about the millenium bug and a change from character interfaces to graphical user interfaces following the introduction of the personal computer. It was during this period that institutions also…

  19. Phylogenetics Exercise Using Inherited Human Traits

    ERIC Educational Resources Information Center

    Tuimala, Jarno

    2006-01-01

    A bioinformatics laboratory exercise based on inherited human morphological traits is presented. It teaches how morphological characters can be used to study the evolutionary history of humans using parsimony. The exercise can easily be used in a pen-and-paper laboratory, but if computers are available, a more versatile analysis can be carried…

  20. Automated Bilingual Circulation System Using PC Local Area Networks.

    ERIC Educational Resources Information Center

    Iskanderani, A. I.; Anwar, M. A.

    1992-01-01

    Describes a personal computer and LAN-based automated circulation system capable of handling both Arabic and Latin characters that was developed for use at King Abdullaziz University (Jeddah, Saudi Arabia). Outlines system requirements, system structure, hardware needs, and individual functional modules of the system. Numerous examples and flow…

  1. Phenex: ontological annotation of phenotypic diversity.

    PubMed

    Balhoff, James P; Dahdul, Wasila M; Kothari, Cartik R; Lapp, Hilmar; Lundberg, John G; Mabee, Paula; Midford, Peter E; Westerfield, Monte; Vision, Todd J

    2010-05-05

    Phenotypic differences among species have long been systematically itemized and described by biologists in the process of investigating phylogenetic relationships and trait evolution. Traditionally, these descriptions have been expressed in natural language within the context of individual journal publications or monographs. As such, this rich store of phenotype data has been largely unavailable for statistical and computational comparisons across studies or integration with other biological knowledge. Here we describe Phenex, a platform-independent desktop application designed to facilitate efficient and consistent annotation of phenotypic similarities and differences using Entity-Quality syntax, drawing on terms from community ontologies for anatomical entities, phenotypic qualities, and taxonomic names. Phenex can be configured to load only those ontologies pertinent to a taxonomic group of interest. The graphical user interface was optimized for evolutionary biologists accustomed to working with lists of taxa, characters, character states, and character-by-taxon matrices. Annotation of phenotypic data using ontologies and globally unique taxonomic identifiers will allow biologists to integrate phenotypic data from different organisms and studies, leveraging decades of work in systematics and comparative morphology.

  2. Novel shadowless imaging for eyes-like diagnosis in vivo

    NASA Astrophysics Data System (ADS)

    Xue, Ning; Jiang, Kai; Li, Qi; Zhang, Lili; Ma, Li; Huang, Guoliang

    2016-10-01

    Eyes-like diagnosis was a traditional Chinese medicine method for many diseases, such as chronic gastritis, diabetes, hypertension etc. There was a close relationship between viscera and eyes-like. White-Eye was divided into fourteen sections, which corresponded to different viscera, so eyes-like was the reflection of status of viscera, in another words, it was an epitome of viscera health condition. In this paper, we developed a novel shadowless imaging technology and system for eyes-like diagnosis in vivo, which consisted of an optical shadowless imaging device for capturing and saving images of patients' eyes-like, and a computer linked to the device for image processing. A character matching algorithm was developed to extract the character of white-eye in corresponding sections of eyes-like images taken by the optical shadowless imaging device, according to the character of eyes-like, whether there were viscera diseases could be learned. A series of assays were carried out, and the results verified the feasibility of eyes-like diagnosis technique.

  3. Machine learning methods for credibility assessment of interviewees based on posturographic data.

    PubMed

    Saripalle, Sashi K; Vemulapalli, Spandana; King, Gregory W; Burgoon, Judee K; Derakhshani, Reza

    2015-01-01

    This paper discusses the advantages of using posturographic signals from force plates for non-invasive credibility assessment. The contributions of our work are two fold: first, the proposed method is highly efficient and non invasive. Second, feasibility for creating an autonomous credibility assessment system using machine-learning algorithms is studied. This study employs an interview paradigm that includes subjects responding with truthful and deceptive intent while their center of pressure (COP) signal is being recorded. Classification models utilizing sets of COP features for deceptive responses are derived and best accuracy of 93.5% for test interval is reported.

  4. Framing Service, Benefit, and Credibility Through Images and Texts: A Content Analysis of Online Promotional Messages of Korean Medical Tourism Industry.

    PubMed

    Jun, Jungmi

    2016-07-01

    This study examines how the Korean medical tourism industry frames its service, benefit, and credibility issues through texts and images of online brochures. The results of content analysis suggest that the Korean medical tourism industry attempts to frame their medical/health services as "excellence in surgeries and cancer care" and "advanced health technology and facilities." However, the use of cost-saving appeals was limited, which can be seen as a strategy to avoid consumers' association of lower cost with lower quality services, and to stress safety and credibility.

  5. Effects of argument quality, source credibility and self-reported diabetes knowledge on message attitudes: an experiment using diabetes related messages.

    PubMed

    Lin, Tung-Cheng; Hwang, Lih-Lian; Lai, Yung-Jye

    2017-05-17

    Previous studies have reported that credibility and content (argument quality) are the most critical factors affecting the quality of health information and its acceptance and use; however, this causal relationship merits further investigation in the context of health education. Moreover, message recipients' prior knowledge may moderate these relationships. This study used the elaboration likelihood model to determine the main effects of argument quality, source credibility and the moderating effect of self-reported diabetes knowledge on message attitudes. A between-subjects experimental design using an educational message concerning diabetes for manipulation was applied to validate the effects empirically. A total of 181 participants without diabetes were recruited from the Department of Health, Taipei City Government. Four group messages were manipulated in terms of argument quality (high and low) × source credibility (high and low). Argument quality and source credibility of health information significantly influenced the attitude of message recipients. The participants with high self-reported knowledge participants exhibited significant disapproval for messages with low argument quality. Effective health information should provide objective descriptions and cite reliable sources; in addition, it should provide accurate, customised messages for recipients who have high background knowledge level and ability to discern message quality. © 2017 Health Libraries Group Health Information & Libraries Journal.

  6. The relationship between clients' depression etiological beliefs and psychotherapy orientation preferences, expectations, and credibility beliefs.

    PubMed

    Tompkins, Kelley A; Swift, Joshua K; Rousmaniere, Tony G; Whipple, Jason L

    2017-06-01

    The purpose of this study was to examine the relationship between clients' etiological beliefs for depression and treatment preferences, credibility beliefs, and outcome expectations for five different depression treatments-behavioral activation, cognitive therapy, interpersonal psychotherapy, pharmacotherapy, and psychodynamic psychotherapy. Adult psychotherapy clients (N = 98) were asked to complete an online survey that included the Reasons for Depression Questionnaire, a brief description of each of the five treatment options, and credibility, expectancy, and preference questions for each option. On average, the participating clients rated pharmacotherapy as significantly less credible, having a lower likelihood of success, and being less preferred than the four types of psychotherapy. In general, interpersonal psychotherapy was also rated more negatively than the other types of psychotherapy. However, these findings depended somewhat on whether the participating client was personally experiencing depression. Credibility beliefs, outcome expectations, and preferences for pharmacotherapy were positively associated with biological beliefs for depression; however, the other hypothesized relationships between etiological beliefs and treatment attitudes were not supported. Although the study is limited based on the specific sample and treatment descriptions that were used, the results may still have implications for psychotherapy research, training, and practice. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  7. Evaluating the quality of websites relating to diet and eating disorders.

    PubMed

    Guardiola-Wanden-Berghe, Rocío; Gil-Pérez, Josefa D; Sanz-Valero, Javier; Wanden-Berghe, Carmina

    2011-12-01

    To verify whether the Credibility Indicator is able to evaluate the quality of websites. This is a descriptive cross-sectional study of websites on diet and anorexia/bulimia, using searches on Google to access the study population. Quality was studied using 22 variables selected by consolidating international proposals. In addition, eight variables belonging to the Credibility Indicator were also studied. Three hundred and fifty four homepages relating to diet and 366 homepages relating to anorexia/bulimia were evaluated. None of the websites met all of the quality criteria; neither did any website satisfy all of the Credibility Indicators. A positive correlation was observed between fulfilment of the Quality items and the Credibility Indicator (R = 0.72; P < 0.001). Significant differences were found in the fulfilment of the Total Quality variables between the websites that had these variables and those that did not (t-test = -9.91, P < 0.001). The quality of websites covering issues of diet and anorexia/bulimia is still poor. The Credibility Indicator is a useful aid when determining the quality of a website. It is evident that identifying authorship and affiliation is an important factor in predicting the quality of the information. © 2011 The authors. Health Information and Libraries Journal © 2011 Health Libraries Group.

  8. Processing the papal encyclical through perceptual filters: Pope Francis, identity-protective cognition, and climate change concern.

    PubMed

    Landrum, Asheley R; Lull, Robert B; Akin, Heather; Hasell, Ariel; Jamieson, Kathleen Hall

    2017-09-01

    Previous research suggests that when individuals encounter new information, they interpret it through perceptual 'filters' of prior beliefs, relevant social identities, and messenger credibility. In short, evaluations are not based solely on message accuracy, but also on the extent to which the message and messenger are amenable to the values of one's social groups. Here, we use the release of Pope Francis's 2015 encyclical as the context for a natural experiment to examine the role of prior values in climate change cognition. Based on our analysis of panel data collected before and after the encyclical's release, we find that political ideology moderated views of papal credibility on climate change for those participants who were aware of the encyclical. We also find that, in some contexts, non-Catholics who were aware of the encyclical granted Pope Francis additional credibility compared to the non-Catholics who were unaware of it, yet Catholics granted the Pope high credibility regardless of encyclical awareness. Importantly, papal credibility mediated the conditional relationships between encyclical awareness and acceptance of the Pope's messages on climate change. We conclude by discussing how our results provide insight into cognitive processing of new information about controversial issues. Copyright © 2017 Elsevier B.V. All rights reserved.

  9. Control of complex physically simulated robot groups

    NASA Astrophysics Data System (ADS)

    Brogan, David C.

    2001-10-01

    Actuated systems such as robots take many forms and sizes but each requires solving the difficult task of utilizing available control inputs to accomplish desired system performance. Coordinated groups of robots provide the opportunity to accomplish more complex tasks, to adapt to changing environmental conditions, and to survive individual failures. Similarly, groups of simulated robots, represented as graphical characters, can test the design of experimental scenarios and provide autonomous interactive counterparts for video games. The complexity of writing control algorithms for these groups currently hinders their use. A combination of biologically inspired heuristics, search strategies, and optimization techniques serve to reduce the complexity of controlling these real and simulated characters and to provide computationally feasible solutions.

  10. Computerized literature reference system: use of an optical scanner and optical character recognition software.

    PubMed

    Lossef, S V; Schwartz, L H

    1990-09-01

    A computerized reference system for radiology journal articles was developed by using an IBM-compatible personal computer with a hand-held optical scanner and optical character recognition software. This allows direct entry of scanned text from printed material into word processing or data-base files. Additionally, line diagrams and photographs of radiographs can be incorporated into these files. A text search and retrieval software program enables rapid searching for keywords in scanned documents. The hand scanner and software programs are commercially available, relatively inexpensive, and easily used. This permits construction of a personalized radiology literature file of readily accessible text and images requiring minimal typing or keystroke entry.

  11. Virtual performer: single camera 3D measuring system for interaction in virtual space

    NASA Astrophysics Data System (ADS)

    Sakamoto, Kunio; Taneji, Shoto

    2006-10-01

    The authors developed interaction media systems in the 3D virtual space. In these systems, the musician virtually plays an instrument like the theremin in the virtual space or the performer plays a show using the virtual character such as a puppet. This interactive virtual media system consists of the image capture, measuring performer's position, detecting and recognizing motions and synthesizing video image using the personal computer. In this paper, we propose some applications of interaction media systems; a virtual musical instrument and superimposing CG character. Moreover, this paper describes the measuring method of the positions of the performer, his/her head and both eyes using a single camera.

  12. Taking error into account when fitting models using Approximate Bayesian Computation.

    PubMed

    van der Vaart, Elske; Prangle, Dennis; Sibly, Richard M

    2018-03-01

    Stochastic computer simulations are often the only practical way of answering questions relating to ecological management. However, due to their complexity, such models are difficult to calibrate and evaluate. Approximate Bayesian Computation (ABC) offers an increasingly popular approach to this problem, widely applied across a variety of fields. However, ensuring the accuracy of ABC's estimates has been difficult. Here, we obtain more accurate estimates by incorporating estimation of error into the ABC protocol. We show how this can be done where the data consist of repeated measures of the same quantity and errors may be assumed to be normally distributed and independent. We then derive the correct acceptance probabilities for a probabilistic ABC algorithm, and update the coverage test with which accuracy is assessed. We apply this method, which we call error-calibrated ABC, to a toy example and a realistic 14-parameter simulation model of earthworms that is used in environmental risk assessment. A comparison with exact methods and the diagnostic coverage test show that our approach improves estimation of parameter values and their credible intervals for both models. © 2017 by the Ecological Society of America.

  13. Design of character-based DNA barcode motif for species identification: A computational approach and its validation in fishes.

    PubMed

    Chakraborty, Mohua; Dhar, Bishal; Ghosh, Sankar Kumar

    2017-11-01

    The DNA barcodes are generally interpreted using distance-based and character-based methods. The former uses clustering of comparable groups, based on the relative genetic distance, while the latter is based on the presence or absence of discrete nucleotide substitutions. The distance-based approach has a limitation in defining a universal species boundary across the taxa as the rate of mtDNA evolution is not constant throughout the taxa. However, character-based approach more accurately defines this using a unique set of nucleotide characters. The character-based analysis of full-length barcode has some inherent limitations, like sequencing of the full-length barcode, use of a sparse-data matrix and lack of a uniform diagnostic position for each group. A short continuous stretch of a fragment can be used to resolve the limitations. Here, we observe that a 154-bp fragment, from the transversion-rich domain of 1367 COI barcode sequences can successfully delimit species in the three most diverse orders of freshwater fishes. This fragment is used to design species-specific barcode motifs for 109 species by the character-based method, which successfully identifies the correct species using a pattern-matching program. The motifs also correctly identify geographically isolated population of the Cypriniformes species. Further, this region is validated as a species-specific mini-barcode for freshwater fishes by successful PCR amplification and sequencing of the motif (154 bp) using the designed primers. We anticipate that use of such motifs will enhance the diagnostic power of DNA barcode, and the mini-barcode approach will greatly benefit the field-based system of rapid species identification. © 2017 John Wiley & Sons Ltd.

  14. The morphological state space revisited: what do phylogenetic patterns in homoplasy tell us about the number of possible character states?

    PubMed Central

    Hoyal Cuthill, Jennifer F.

    2015-01-01

    Biological variety and major evolutionary transitions suggest that the space of possible morphologies may have varied among lineages and through time. However, most models of phylogenetic character evolution assume that the potential state space is finite. Here, I explore what the morphological state space might be like, by analysing trends in homoplasy (repeated derivation of the same character state). Analyses of ten published character matrices are compared against computer simulations with different state space models: infinite states, finite states, ordered states and an ‘inertial' model, simulating phylogenetic constraints. Of these, only the infinite states model results in evolution without homoplasy, a prediction which is not generally met by real phylogenies. Many authors have interpreted the ubiquity of homoplasy as evidence that the number of evolutionary alternatives is finite. However, homoplasy is also predicted by phylogenetic constraints on the morphological distance that can be traversed between ancestor and descendent. Phylogenetic rarefaction (sub-sampling) shows that finite and inertial state spaces do produce contrasting trends in the distribution of homoplasy. Two clades show trends characteristic of phylogenetic inertia, with decreasing homoplasy (increasing consistency index) as we sub-sample more distantly related taxa. One clade shows increasing homoplasy, suggesting exhaustion of finite states. Different clades may, therefore, show different patterns of character evolution. However, when parsimony uninformative characters are excluded (which may occur without documentation in cladistic studies), it may no longer be possible to distinguish inertial and finite state spaces. Interestingly, inertial models predict that homoplasy should be clustered among comparatively close relatives (parallel evolution), whereas finite state models do not. If morphological evolution is often inertial in nature, then homoplasy (false homology) may primarily occur between close relatives, perhaps being replaced by functional analogy at higher taxonomic scales. PMID:26640650

  15. Venturing into the uncanny valley of mind-The influence of mind attribution on the acceptance of human-like characters in a virtual reality setting.

    PubMed

    Stein, Jan-Philipp; Ohler, Peter

    2017-03-01

    For more than 40years, the uncanny valley model has captivated researchers from various fields of expertise. Still, explanations as to why slightly imperfect human-like characters can evoke feelings of eeriness remain the subject of controversy. Many experiments exploring the phenomenon have emphasized specific visual factors in connection to evolutionary psychological theories or an underlying categorization conflict. More recently, studies have also shifted away focus from the appearance of human-like entities, instead exploring their mental capabilities as basis for observers' discomfort. In order to advance this perspective, we introduced 92 participants to a virtual reality (VR) chat program and presented them with two digital characters engaged in an emotional and empathic dialogue. Using the same pre-recorded 3D scene, we manipulated the perceived control type of the depicted characters (human-controlled avatars vs. computer-controlled agents), as well as their alleged level of autonomy (scripted vs. self-directed actions). Statistical analyses revealed that participants experienced significantly stronger eeriness if they perceived the empathic characters to be autonomous artificial intelligences. As human likeness and attractiveness ratings did not result in significant group differences, we present our results as evidence for an "uncanny valley of mind" that relies on the attribution of emotions and social cognition to non-human entities. A possible relationship to the philosophy of anthropocentrism and its "threat to human distinctiveness" concept is discussed. Copyright © 2016 Elsevier B.V. All rights reserved.

  16. Tooth development and histology patterns in lamniform sharks (Elasmobranchii, Lamniformes) revisited.

    PubMed

    Schnetz, Lisa; Pfaff, Cathrin; Kriwet, Jürgen

    2016-12-01

    The dentition of lamniforme sharks exhibits several characters that have been used extensively to resolve the phylogenetic relationships of extant taxa, yet some uncertainties remain. Also, the development of different teeth of a tooth file within the jaws of most extant lamniforms has not been documented to date. High-resolution micro-computed tomography is used here to re-evaluate the importance of two dental characters within the order Lamniformes, which were considered not to be phylogenetically informative, the histotype and the number of teeth per tooth file. Additionally, the development and mineralization patterns of the teeth of the two osteodont lamniforms Lamna nasus and Alopias superciliosus were compared. We discuss the importance of these dental characters for phylogenetic interpretations to assess the quality of these characters in resolving lamniform relationships. The dental characters suggest that (1) Lamniformes are the only modern-level sharks exhibiting the osteodont histotype, (2) the osteodont histotype in lamniform sharks is a derived state in modern-level sharks (Elasmobranchii), (3) the osteodont type, conversely is convergently achieved when the clade Chondrichthyes is considered and thus might comprise a functional rather than a phylogenetic signal, and (4) there is an increase in the number of teeth per file throughout lamniform phylogeny. Structural development of the teeth of L. nasus and A. superciliosus is congruent with a previous investigation of the lamniform shark Carcharodon carcharias. J. Morphol. 277:1584-1598, 2016. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.

  17. Comparative study of notoungulate (Placentalia, Mammalia) bony labyrinths and new phylogenetically informative inner ear characters

    PubMed Central

    Macrini, Thomas E; Flynn, John J; Ni, Xijun; Croft, Darin A; Wyss, André R

    2013-01-01

    The phylogenetic relationships of notoungulates, an extinct group of predominantly South American herbivores, remain poorly resolved with respect to both other placental mammals and among one another. Most previous phylogenetic analyses of notoungulates have not included characters of the internal cranium, not least because few such features, including the bony labyrinth, have been described for members of the group. Here we describe the inner ears of the notoungulates Altitypotherium chucalensis (Mesotheriidae), Pachyrukhos moyani (Hegetotheriidae) and Cochilius sp. (Interatheriidae) based on reconstructions of bony labyrinths obtained from computed tomography imagery. Comparisons of the bony labyrinths of these taxa with the basally diverging notoungulate Notostylops murinus (Notostylopidae), an isolated petrosal from Itaboraí, Brazil, referred to Notoungulata, and six therian outgroups, yielded an inner ear character matrix of 25 potentially phylogenetically informative characters, 14 of them novel to this study. Two equivocally optimized character states potentially support a pairing of Mesotheriidae and Hegetotheriidae, whereas four others may be diagnostic of Notoungulata. Three additional characters are potentially informative for diagnosing more inclusive clades: one for crown Placentalia; another for a clade containing Kulbeckia, Zalambdalestes, and Placentalia; and a third for Eutheria (crown Placentalia plus stem taxa). Several other characters are apomorphic for at least one notoungulate in our study and are of potential interest for broader taxonomic sampling within Notoungulata to clarify currently enigmatic interrelationships. Measures of the semicircular canals were used to infer agility (e.g. capable of quick movements vs. lethargic movements) of these taxa. Agility scores calculated from these data generally corroborate interpretations based on postcranial remains of these or closely related species. We provide estimates of the low-frequency hearing limits in notoungulates based on the ratio of radii of the apical and basal turns of the cochlea. These limits range from 15 Hz in Notostylops to 149 Hz in Pachyrukhos, values comparable to the Asian elephant (Elephas maximus) and the California sea lion (Zalophus californianus) when hearing in air, respectively. PMID:24102069

  18. Improving compound-protein interaction prediction by building up highly credible negative samples.

    PubMed

    Liu, Hui; Sun, Jianjiang; Guan, Jihong; Zheng, Jie; Zhou, Shuigeng

    2015-06-15

    Computational prediction of compound-protein interactions (CPIs) is of great importance for drug design and development, as genome-scale experimental validation of CPIs is not only time-consuming but also prohibitively expensive. With the availability of an increasing number of validated interactions, the performance of computational prediction approaches is severely impended by the lack of reliable negative CPI samples. A systematic method of screening reliable negative sample becomes critical to improving the performance of in silico prediction methods. This article aims at building up a set of highly credible negative samples of CPIs via an in silico screening method. As most existing computational models assume that similar compounds are likely to interact with similar target proteins and achieve remarkable performance, it is rational to identify potential negative samples based on the converse negative proposition that the proteins dissimilar to every known/predicted target of a compound are not much likely to be targeted by the compound and vice versa. We integrated various resources, including chemical structures, chemical expression profiles and side effects of compounds, amino acid sequences, protein-protein interaction network and functional annotations of proteins, into a systematic screening framework. We first tested the screened negative samples on six classical classifiers, and all these classifiers achieved remarkably higher performance on our negative samples than on randomly generated negative samples for both human and Caenorhabditis elegans. We then verified the negative samples on three existing prediction models, including bipartite local model, Gaussian kernel profile and Bayesian matrix factorization, and found that the performances of these models are also significantly improved on the screened negative samples. Moreover, we validated the screened negative samples on a drug bioactivity dataset. Finally, we derived two sets of new interactions by training an support vector machine classifier on the positive interactions annotated in DrugBank and our screened negative interactions. The screened negative samples and the predicted interactions provide the research community with a useful resource for identifying new drug targets and a helpful supplement to the current curated compound-protein databases. Supplementary files are available at: http://admis.fudan.edu.cn/negative-cpi/. © The Author 2015. Published by Oxford University Press.

  19. Seismic hazard study for selected sites in New Mexico and Nevada

    NASA Astrophysics Data System (ADS)

    Johnston, J. C.

    1983-12-01

    Seismic hazard evaluations were conducted for specific sites in New Mexico and Nevada. For New Mexico, a model of seismicity was developed from historical accounts of medium to large shocks and the current microactivity record from local networks. Ninety percent confidence levels at Albuquerque and Roswell were computed to be 56 gals for a 10-year period and 77 gals for a 20-year period. Values of ground motion for Clovis were below these values. Peak velocity and displacement were also computed for each site. Deterministic spectra based on the estimated maximum credible earthquake for the zones which the sites occupy were also computed. For the sites in Nevada, the regionalizations used in Battis (1982) for the uniform seismicity model were slightly modified. For 10- and 20-year time periods, peak acceleration values for Indian Springs were computed to be 94 gals and 123 gals and for Hawthorne 206 gals and 268 gals. Deterministic spectra were also computed. The input parameters were well determined for the analysis for the Nevada sites because of the abundance of data. The values computed for New Mexico, however, are likely upper limits. As more data are collected from the area of the Rio Grande rift zone, the pattern of seismicity will become better understood. At this time a more detailed, and thus more accurate, model may emerge.

  20. Virtual reality and persecutory delusions: safety and feasibility.

    PubMed

    Fornells-Ambrojo, Miriam; Barker, Chris; Swapp, David; Slater, Mel; Antley, Angus; Freeman, Daniel

    2008-09-01

    Virtual reality (VR) has begun to be used to research the key psychotic symptom of paranoia. The initial studies have been with non-clinical individuals and individuals at high risk of psychosis. The next step is to develop the technology for the understanding and treatment of clinical delusions. Therefore the present study investigated the acceptability and safety of using VR with individuals with current persecutory delusions. Further, it set out to determine whether patients feel immersed in a VR social environment and, consequently, experience paranoid thoughts. Twenty individuals with persecutory delusions and twenty non-clinical individuals spent 4 min in a VR underground train containing neutral characters. Levels of simulator sickness, distress, sense of presence, and persecutory ideation about the computer characters were measured. A one-week follow-up was conducted to check longer-term side effects. The VR experience did not raise levels of anxiety or symptoms of simulator sickness. No side effects were reported at the follow-up. There was a considerable degree of presence in the VR scenario for all participants. A high proportion of the persecutory delusions group (65%) had persecutory thinking about the computer characters, although this rate was not significantly higher than the non-clinical group. The study indicates that brief experiences in VR are safe and acceptable to people with psychosis. Further, patients with paranoia can feel engaged in VR scenes and experience persecutory thoughts. Exposure to social situations using VR has the potential to be incorporated into cognitive behavioural interventions for paranoia.

  1. Semantic ambiguity effects on traditional Chinese character naming: A corpus-based approach.

    PubMed

    Chang, Ya-Ning; Lee, Chia-Ying

    2017-11-09

    Words are considered semantically ambiguous if they have more than one meaning and can be used in multiple contexts. A number of recent studies have provided objective ambiguity measures by using a corpus-based approach and have demonstrated ambiguity advantages in both naming and lexical decision tasks. Although the predictive power of objective ambiguity measures has been examined in several alphabetic language systems, the effects in logographic languages remain unclear. Moreover, most ambiguity measures do not explicitly address how the various contexts associated with a given word relate to each other. To explore these issues, we computed the contextual diversity (Adelman, Brown, & Quesada, Psychological Science, 17; 814-823, 2006) and semantic ambiguity (Hoffman, Lambon Ralph, & Rogers, Behavior Research Methods, 45; 718-730, 2013) of traditional Chinese single-character words based on the Academia Sinica Balanced Corpus, where contextual diversity was used to evaluate the present semantic space. We then derived a novel ambiguity measure, namely semantic variability, by computing the distance properties of the distinct clusters grouped by the contexts that contained a given word. We demonstrated that semantic variability was superior to semantic diversity in accounting for the variance in naming response times, suggesting that considering the substructure of the various contexts associated with a given word can provide a relatively fine scale of ambiguity information for a word. All of the context and ambiguity measures for 2,418 Chinese single-character words are provided as supplementary materials.

  2. The role of negative affect and message credibility in perceived effectiveness of smokeless tobacco health warning labels in Navi Mumbai, India and Dhaka, Bangladesh: A moderated-mediation analysis.

    PubMed

    Mutti-Packer, Seema; Reid, Jessica L; Thrasher, James F; Romer, Daniel; Fong, Geoffrey T; Gupta, Prakash C; Pednekar, Mangesh S; Nargis, Nigar; Hammond, David

    2017-10-01

    There is strong evidence showing that pictorial health warnings are more effective than text-only warnings. However, much of this evidence comes from high-income countries and is limited to cigarette packaging. Moreover, few studies have identified mechanisms that might explain the impact of warnings. The current study examined the potential mediating role of negative affect and the moderating influence of message credibility in perceived effectiveness of smokeless tobacco warnings in two low- and middle-income countries (LMICs). Field interviews were conducted in India and Bangladesh, with adult (19+ years) smokeless tobacco users (n=1053), and youth (16-18years) users (n=304) and non-users (n=687). Respondents were randomly assigned to view warnings in one of four conditions: (1) Text-only, (2) pictorial with symbolic imagery, (3) pictorial with graphic images of health effects, or (4) pictorial with personalized graphic images plus a personal testimonial. The findings provide support for the mediating influence of negative affect in perceived effectiveness, for adult and youth smokeless tobacco users who viewed pictorial warnings (vs. text-only), and graphic health warnings (vs. personal testimonials). Among adults, message credibility moderated the indirect effect; the association was stronger when credibility was high and weaker when it was low. Among youth users and non-users, message credibility did not moderate the indirect effect. Consistent with research from high-income countries, these findings highlight the importance of selecting imagery that will elicit negative emotional reactions and be perceived as credible. Differential effects among adults and youth highlight the importance of pre-testing images. Copyright © 2017 Elsevier Ltd. All rights reserved.

  3. Bomb Threat Assessments. Fact Sheet

    ERIC Educational Resources Information Center

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  4. 8 CFR 1003.42 - Review of credible fear determination.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ....42 Section 1003.42 Aliens and Nationality EXECUTIVE OFFICE FOR IMMIGRATION REVIEW, DEPARTMENT OF JUSTICE GENERAL PROVISIONS EXECUTIVE OFFICE FOR IMMIGRATION REVIEW Immigration Court-Rules of Procedure § 1003.42 Review of credible fear determination. (a) Referral. Jurisdiction for an Immigration Judge to...

  5. Perceptions of Witness Credibility: Variations across Age

    ERIC Educational Resources Information Center

    Newcombe, Peter A.; Bransgrove, Jennifer

    2007-01-01

    Potential jurors' abilities to discriminate between accurate and inaccurate responses to interviewer questions were investigated. Young child witnesses were expected to be judged as less credible than older children and adult witnesses. Participant-jurors viewed videotaped interviews that paired an accurate respondent with an inaccurate respondent…

  6. Brand emotional credibility: effects of mixed emotions about branded products with varying credibility.

    PubMed

    Mileti, Antonio; Prete, M Irene; Guido, Gianluigi

    2013-10-01

    This research investigates the effects of mixed emotions on the positioning and on the intention to purchase different categories of branded products (i.e., Attractiveness-products, Expertise-products, and Trustworthiness-products), in relation to their main component of credibility (Ohanian, 1990). On the basis of a focus group (n = 12) aimed to identify the three branded products used as stimuli and a pre-test (n = 240) directed to discover emotions elicited by them, two studies (n = 630; n = 240) were carried out. Positioning and multiple regression analyses showed that positive and negative emotions are positively related with the positioning and the purchase intention of Attractiveness-products, and, respectively, positively and negatively related with those of Trustworthiness-products; whereas negative emotions are negatively associated with those of Expertise-products. Brand Emotional Credibility--i.e., the emotional believability of the brand positioning signals--may help to identify unconscious elements and the simultaneous importance of mixed emotions associated with different products to match consumers' desires and expectations.

  7. The emotional male victim: effects of presentation mode on judged credibility.

    PubMed

    Landström, Sara; Ask, Karl; Sommar, Charlotte

    2015-02-01

    The emotional victim effect (EVE, i.e., that the emotionality of a victim's demeanor affects perceived credibility) is a robust research finding for female victims of rape but much less explored for other types of victims and crimes. In this article, we investigate the EVE with a male assault complainant. In addition, we vary the presentation mode via which the complainant is shown to the assessors. A sample of law students (N = 81) participated in an experiment where they viewed and assessed credibility of a male complainant who appeared either live or on video. The complainant behaved either in an emotional or a neutral manner. Result showed that the presentation mode but not the EVE affected the assessors' credibility assessments: The complainant was perceived as more truthful when communicating live, as opposed to via video. Practical implications, as well as the generality of the EVE, are discussed. © 2014 Scandinavian Psychological Associations and John Wiley & Sons Ltd.

  8. Establishing the credibility of qualitative research findings: the plot thickens.

    PubMed

    Cutcliffe, J R; McKenna, H P

    1999-08-01

    Qualitative research is increasingly recognized and valued and its unique place in nursing research is highlighted by many. Despite this, some nurse researchers continue to raise epistemological issues about the problems of objectivity and the validity of qualitative research findings. This paper explores the issues relating to the representativeness or credibility of qualitative research findings. It therefore critiques the existing distinct philosophical and methodological positions concerning the trustworthiness of qualitative research findings, which are described as follows: quantitative studies should be judged using the same criteria and terminology as quantitative studies; it is impossible, in a meaningful way, for any criteria to be used to judge qualitative studies; qualitative studies should be judged using criteria that are developed for and fit the qualitative paradigm; and the credibility of qualitative research findings could be established by testing out the emerging theory by means of conducting a deductive quantitative study. The authors conclude by providing some guidelines for establishing the credibility of qualitative research findings.

  9. Mentalizing skills do not differentiate believers from non-believers, but credibility enhancing displays do.

    PubMed

    Maij, David L R; van Harreveld, Frenk; Gervais, Will; Schrag, Yann; Mohr, Christine; van Elk, Michiel

    2017-01-01

    The ability to mentalize has been marked as an important cognitive mechanism enabling belief in supernatural agents. In five studies we cross-culturally investigated the relationship between mentalizing and belief in supernatural agents with large sample sizes (over 67,000 participants in total) and different operationalizations of mentalizing. The relative importance of mentalizing for endorsing supernatural beliefs was directly compared with credibility enhancing displays-the extent to which people observed credible religious acts during their upbringing. We also compared autistic with neurotypical adolescents. The empathy quotient and the autism-spectrum quotient were not predictive of belief in supernatural agents in all countries (i.e., The Netherlands, Switzerland and the United States), although we did observe a curvilinear effect in the United States. We further observed a strong influence of credibility enhancing displays on belief in supernatural agents. These findings highlight the importance of cultural learning for acquiring supernatural beliefs and ask for reconsiderations of the importance of mentalizing.

  10. Mentalizing skills do not differentiate believers from non-believers, but credibility enhancing displays do

    PubMed Central

    van Harreveld, Frenk; Gervais, Will; Schrag, Yann; Mohr, Christine; van Elk, Michiel

    2017-01-01

    The ability to mentalize has been marked as an important cognitive mechanism enabling belief in supernatural agents. In five studies we cross-culturally investigated the relationship between mentalizing and belief in supernatural agents with large sample sizes (over 67,000 participants in total) and different operationalizations of mentalizing. The relative importance of mentalizing for endorsing supernatural beliefs was directly compared with credibility enhancing displays–the extent to which people observed credible religious acts during their upbringing. We also compared autistic with neurotypical adolescents. The empathy quotient and the autism-spectrum quotient were not predictive of belief in supernatural agents in all countries (i.e., The Netherlands, Switzerland and the United States), although we did observe a curvilinear effect in the United States. We further observed a strong influence of credibility enhancing displays on belief in supernatural agents. These findings highlight the importance of cultural learning for acquiring supernatural beliefs and ask for reconsiderations of the importance of mentalizing. PMID:28832606

  11. Predictors of dropout from community clinic child CBT for anxiety disorders.

    PubMed

    Wergeland, Gro Janne H; Fjermestad, Krister W; Marin, Carla E; Haugland, Bente Storm-Mowatt; Silverman, Wendy K; Öst, Lars-Göran; Havik, Odd E; Heiervang, Einar R

    2015-04-01

    The aim was to investigate predictors of treatment dropout among 182 children (aged 8-15 years) participating in an effectiveness trial of manual-based 10-session individual and group cognitive behavior therapy (CBT) for anxiety disorders in community clinics. The dropout rate was 14.4%, with no significant difference between the two treatment conditions. We examined predictors for overall dropout (n=26), early (≤session 4, n=15), and late dropout (≥session 5, n=11). Overall dropout was predicted by low child and parent rated treatment credibility, and high parent self-rated internalizing symptoms. Low child rated treatment credibility predicted both early and late dropout. High parent self-rated internalizing symptoms predicted early dropout, whereas low parent rated treatment credibility predicted late dropout. These results highlight the importance of addressing treatment credibility, and to offer support for parents with internalizing symptoms, to help children and families remain in treatment. Copyright © 2015 Elsevier Ltd. All rights reserved.

  12. When Information from Public Health Officials is Untrustworthy: The Use of Online News, Interpersonal Networks, and Social Media during the MERS Outbreak in South Korea.

    PubMed

    Jang, Kyungeun; Baek, Young Min

    2018-03-20

    Public health officials (PHOs) are responsible for providing trustworthy information during a public health crisis; however, there is little research on how the public behaves when their expectations for such information are violated. Drawing on media dependency theory and source credibility research as our primary theoretical framework, we tested how credibility of information from PHOs is associated with people's reliance on a particular communication channel in the context of the 2015 Middle East Respiratory Syndrome (MERS) outbreak in South Korea. Using nationally representative data (N = 1036) collected during the MERS outbreak, we found that less credible information from PHOs led to more frequent use of online news, interpersonal networks, and social media for acquiring MERS-related information. However, credibility of information from PHOs was not associated with the use of television news or print newspapers. The theoretical and practical implications of our results on communication channels usage are discussed.

  13. Credibility of neuropsychological performances of Persian Gulf War veterans and military control subjects participating in clinical epidemiological research.

    PubMed

    Barrash, Joseph; Denburg, Natalie L; Moser, David J; Woolson, Robert F; Schumacher, Amy J; Doebbeling, Bradley N

    2007-07-01

    We investigated whether Persian Gulf War veterans (GWVs) were more likely than Persian Gulf War-era veterans deployed elsewhere (GEVs) to have noncredible neuropsychological examinations. A total of 301 GWVs and 99 GEVs underwent neuropsychological testing. The credibility of 173 examinations showing impairment was evaluated based on test performances, clinical background, psychometric measures, and other self-report data. All 11 examinations judged less than fully credible by one neuropsychologist, plus 19 examinations judged impaired but credible, were then evaluated independently by two more neuropsychologists. Noncredibility was judged with excellent reliability (93% agreement). Seven examinations were judged noncredible. Rates of noncredibility did not differ between GWVs (1%) and GEVs (4%). The pattern of associations of noncredible examinations with cognitive, psychological, and clinical variables generally indicated defective neuropsychological scores, with no coherent pattern, and personality disorder. Findings supported the validity of noncredibility judgments and suggested that noncredible examinations are not a significant problem in neuropsychological investigations of GWVs.

  14. Computational biomechanics changes our view on insect head evolution.

    PubMed

    Blanke, Alexander; Watson, Peter J; Holbrey, Richard; Fagan, Michael J

    2017-02-08

    Despite large-scale molecular attempts, the relationships of the basal winged insect lineages dragonflies, mayflies and neopterans, are still unresolved. Other data sources, such as morphology, suffer from unclear functional dependencies of the structures considered, which might mislead phylogenetic inference. Here, we assess this problem by combining for the first time biomechanics with phylogenetics using two advanced engineering techniques, multibody dynamics analysis and finite-element analysis, to objectively identify functional linkages in insect head structures which have been used traditionally to argue basal winged insect relationships. With a biomechanical model of unprecedented detail, we are able to investigate the mechanics of morphological characters under biologically realistic load, i.e. biting. We show that a range of head characters, mainly ridges, endoskeletal elements and joints, are indeed mechanically linked to each other. An analysis of character state correlation in a morphological data matrix focused on head characters shows highly significant correlation of these mechanically linked structures. Phylogenetic tree reconstruction under different data exclusion schemes based on the correlation analysis unambiguously supports a sistergroup relationship of dragonflies and mayflies. The combination of biomechanics and phylogenetics as it is proposed here could be a promising approach to assess functional dependencies in many organisms to increase our understanding of phenotypic evolution. © 2017 The Author(s).

  15. An online semi-supervised brain-computer interface.

    PubMed

    Gu, Zhenghui; Yu, Zhuliang; Shen, Zhifang; Li, Yuanqing

    2013-09-01

    Practical brain-computer interface (BCI) systems should require only low training effort for the user, and the algorithms used to classify the intent of the user should be computationally efficient. However, due to inter- and intra-subject variations in EEG signal, intermittent training/calibration is often unavoidable. In this paper, we present an online semi-supervised P300 BCI speller system. After a short initial training (around or less than 1 min in our experiments), the system is switched to a mode where the user can input characters through selective attention. In this mode, a self-training least squares support vector machine (LS-SVM) classifier is gradually enhanced in back end with the unlabeled EEG data collected online after every character input. In this way, the classifier is gradually enhanced. Even though the user may experience some errors in input at the beginning due to the small initial training dataset, the accuracy approaches that of fully supervised method in a few minutes. The algorithm based on LS-SVM and its sequential update has low computational complexity; thus, it is suitable for online applications. The effectiveness of the algorithm has been validated through data analysis on BCI Competition III dataset II (P300 speller BCI data). The performance of the online system was evaluated through experimental results on eight healthy subjects, where all of them achieved the spelling accuracy of 85 % or above within an average online semi-supervised learning time of around 3 min.

  16. Motivation and Treatment Credibility Predicts Dropout, Treatment Adherence, and Clinical Outcomes in an Internet-Based Cognitive Behavioral Relaxation Program: A Randomized Controlled Trial.

    PubMed

    Alfonsson, Sven; Olsson, Erik; Hursti, Timo

    2016-03-08

    In previous research, variables such as age, education, treatment credibility, and therapeutic alliance have shown to affect patients' treatment adherence and outcome in Internet-based psychotherapy. A more detailed understanding of how such variables are associated with different measures of adherence and clinical outcomes may help in designing more effective online therapy. The aims of this study were to investigate demographical, psychological, and treatment-specific variables that could predict dropout, treatment adherence, and treatment outcomes in a study of online relaxation for mild to moderate stress symptoms. Participant dropout and attrition as well as data from self-report instruments completed before, during, and after the online relaxation program were analyzed. Multiple linear and logistical regression analyses were conducted to predict early dropout, overall attrition, online treatment progress, number of registered relaxation exercises, posttreatment symptom levels, and reliable improvement. Dropout was significantly predicted by treatment credibility, whereas overall attrition was associated with reporting a focus on immediate consequences and experiencing a low level of intrinsic motivation for the treatment. Treatment progress was predicted by education level and treatment credibility, whereas number of registered relaxation exercises was associated with experiencing intrinsic motivation for the treatment. Posttreatment stress symptoms were positively predicted by feeling external pressure to participate in the treatment and negatively predicted by treatment credibility. Reporting reliable symptom improvement after treatment was predicted by treatment credibility and therapeutic bond. This study confirmed that treatment credibility and a good working alliance are factors associated with successful Internet-based psychotherapy. Further, the study showed that measuring adherence in different ways provides somewhat different results, which underscore the importance of carefully defining treatment adherence in psychotherapy research. Lastly, the results suggest that finding the treatment interesting and engaging may help patients carry through with the intervention and complete prescribed assignments, a result that may help guide the design of future interventions. Clinicaltrials.gov NCT02535598; http://clinicaltrials.gov/ct2/show/NCT02535598 (Archived by WebCite at http://www.webcitation.org/6fl38ms7y).

  17. But it's doctor recommended and I read the fine print: antecedents to drug companies' perceived credibility.

    PubMed

    Park, Jin Seong; Hoy, Mariea Grubbs

    2013-01-01

    Using 2009 National Consumer Survey data from Experian Simmons, the authors found that dependence on doctor recommendations to assess the integrity of advertised drugs and the extent of reading small print in direct-to-consumer prescription drug advertising positively related to consumers' perceived credibility of health information from pharmaceutical companies, which in turn positively influenced willingness to ask their doctor for a specific medicine they saw or heard advertised. The potential effect of small print reading on willingness to request prescription was partially mediated by perceived credibility of information from drug companies. The findings are discussed in light of their practical implications.

  18. Algorithms for Haptic Rendering of 3D Objects

    NASA Technical Reports Server (NTRS)

    Basdogan, Cagatay; Ho, Chih-Hao; Srinavasan, Mandayam

    2003-01-01

    Algorithms have been developed to provide haptic rendering of three-dimensional (3D) objects in virtual (that is, computationally simulated) environments. The goal of haptic rendering is to generate tactual displays of the shapes, hardnesses, surface textures, and frictional properties of 3D objects in real time. Haptic rendering is a major element of the emerging field of computer haptics, which invites comparison with computer graphics. We have already seen various applications of computer haptics in the areas of medicine (surgical simulation, telemedicine, haptic user interfaces for blind people, and rehabilitation of patients with neurological disorders), entertainment (3D painting, character animation, morphing, and sculpting), mechanical design (path planning and assembly sequencing), and scientific visualization (geophysical data analysis and molecular manipulation).

  19. Addictions Counselors' Credibility: The Impact of Interactional Style, Recovery Status, and Nonverbal Behavior

    ERIC Educational Resources Information Center

    Toriello, Paul J.; Strohmer, Douglas C.

    2004-01-01

    The impact of addictions counselors' interactional style (confrontational vs. motivational), recovery status (recovering vs. nonrecovering), and nonverbal behavior (facilitative vs. neutral) on 116 clients' perceptions of addictions counselor credibility was examined in a fully crossed factorial design. Significant results were found, and…

  20. Credible Phenomenological Research: A Mixed-Methods Study

    ERIC Educational Resources Information Center

    Flynn, Stephen V.; Korcuska, James S.

    2018-01-01

    The authors conducted a 3-phase investigation into the credible standards for phenomenological research practices identified in the literature and endorsed by a sample of counselor education qualitative research experts. Utilizing a mixed-methods approach, the findings offer evidence that professional counseling has a distinctive format in which…

Top