ERIC Educational Resources Information Center
Laird, Robert D.; Marrero, Matthew D.; Melching, Jessica A.; Kuhn, Emily S.
2013-01-01
Adolescents use various strategies to manage their parents' access to information. This study tested developmental change in strategy use, longitudinal associations between disclosing and concealing strategies, and longitudinal associations linking disclosing and concealing strategies with antisocial behavior and depressive symptoms. Self-report…
An interfering Go/No-go task does not affect accuracy in a Concealed Information Test.
Ambach, Wolfgang; Stark, Rudolf; Peper, Martin; Vaitl, Dieter
2008-04-01
Following the idea that response inhibition processes play a central role in concealing information, the present study investigated the influence of a Go/No-go task as an interfering mental activity, performed parallel to the Concealed Information Test (CIT), on the detectability of concealed information. 40 undergraduate students participated in a mock-crime experiment and simultaneously performed a CIT and a Go/No-go task. Electrodermal activity (EDA), respiration line length (RLL), heart rate (HR) and finger pulse waveform length (FPWL) were registered. Reaction times were recorded as behavioral measures in the Go/No-go task as well as in the CIT. As a within-subject control condition, the CIT was also applied without an additional task. The parallel task did not influence the mean differences of the physiological measures of the mock-crime-related probe and the irrelevant items. This finding might possibly be due to the fact that the applied parallel task induced a tonic rather than a phasic mental activity, which did not influence differential responding to CIT items. No physiological evidence for an interaction between the parallel task and sub-processes of deception (e.g. inhibition) was found. Subjects' performance in the Go/No-go parallel task did not contribute to the detection of concealed information. Generalizability needs further investigations of different variations of the parallel task.
NASA Astrophysics Data System (ADS)
A. AL-Salhi, Yahya E.; Lu, Songfeng
2016-08-01
Quantum steganography can solve some problems that are considered inefficient in image information concealing. It researches on Quantum image information concealing to have been widely exploited in recent years. Quantum image information concealing can be categorized into quantum image digital blocking, quantum image stereography, anonymity and other branches. Least significant bit (LSB) information concealing plays vital roles in the classical world because many image information concealing algorithms are designed based on it. Firstly, based on the novel enhanced quantum representation (NEQR), image uniform blocks clustering around the concrete the least significant Qu-block (LSQB) information concealing algorithm for quantum image steganography is presented. Secondly, a clustering algorithm is proposed to optimize the concealment of important data. Finally, we used Con-Steg algorithm to conceal the clustered image blocks. Information concealing located on the Fourier domain of an image can achieve the security of image information, thus we further discuss the Fourier domain LSQu-block information concealing algorithm for quantum image based on Quantum Fourier Transforms. In our algorithms, the corresponding unitary Transformations are designed to realize the aim of concealing the secret information to the least significant Qu-block representing color of the quantum cover image. Finally, the procedures of extracting the secret information are illustrated. Quantum image LSQu-block image information concealing algorithm can be applied in many fields according to different needs.
Dietrich, Ariana B; Hu, Xiaoqing; Rosenfeld, J Peter
2014-03-01
In the first of two experiments, we compared the accuracy of the P300 concealed information test protocol as a function of numbers of trials experienced by subjects and ERP averages analyzed by investigators. Contrary to Farwell et al. (Cogn Neurodyn 6(2):115-154, 2012), we found no evidence that 100 trial based averages are more accurate than 66 or 33 trial based averages (all numbers led to accuracies of 84-94 %). There was actually a trend favoring the lowest trial numbers. The second study compared numbers of irrelevant stimuli recalled and recognized in the 3-stimulus protocol versus the complex trial protocol (Rosenfeld in Memory detection: theory and application of the concealed information test, Cambridge University Press, New York, pp 63-89, 2011). Again, in contrast to expectations from Farwell et al. (Cogn Neurodyn 6(2):115-154, 2012), there were no differences between protocols, although there were more irrelevant stimuli recognized than recalled, and irrelevant 4-digit number group stimuli were neither recalled nor recognized as well as irrelevant city name stimuli. We therefore conclude that stimulus processing in the P300-based complex trial protocol-with no more than 33 sweep averages-is adequate to allow accurate detection of concealed information.
Examination of an Electronic Patient Record Display Method to Protect Patient Information Privacy.
Niimi, Yukari; Ota, Katsumasa
2017-02-01
Electronic patient records facilitate the provision of safe, high-quality medical care. However, because personnel can view almost all stored information, this study designed a display method using a mosaic blur (pixelation) to temporarily conceal information patients do not want shared. This study developed an electronic patient records display method for patient information that balanced the patient's desire for personal information protection against the need for information sharing among medical personnel. First, medical personnel were interviewed about the degree of information required for both individual duties and team-based care. Subsequently, they tested a mock display method that partially concealed information using a mosaic blur, and they were interviewed about the effectiveness of the display method that ensures patient privacy. Participants better understood patients' demand for confidentiality, suggesting increased awareness of patients' privacy protection. However, participants also indicated that temporary concealment of certain information was problematic. Other issues included the inconvenience of removing the mosaic blur to obtain required information and risk of insufficient information for medical care. Despite several issues with using a display method that temporarily conceals information according to patient privacy needs, medical personnel could accept this display method if information essential to medical safety remains accessible.
[Effects of false memories on the Concealed Information Test].
Zaitsu, Wataru
2012-10-01
The effects of false memories on polygraph examinations with the Concealed Information Test (CIT) were investigated by using the Deese-Roediger-McDermott (DRM) paradigm, which allows participants to evoke false memories. Physiological responses to questions consisting of learned, lure, and unlearned items were measured and recorded. The results indicated that responses to lure questions showed critical responses to questions about learned items. These responses included repression of respiration, an increase in electrodermal activity, and a drop in heart rate. These results suggest that critical response patterns are generated in the peripheral nervous system by true and false memories.
Matsuda, Izumi; Ogawa, Tokihiro; Tsuneoka, Michiko; Verschuere, Bruno
2015-03-01
The concealed information test (CIT) can be used to assess whether an individual possesses crime-related information. However, its discrimination performance has room for improvement. We examined whether screening out participants who do not respond distinctively on a pretest improves the diagnosticity of a mock-crime CIT. Before conducting the CIT, we gave a pretest to 152 participants, 80 of whom were assigned as guilty. Pretest screening significantly improved the diagnostic value of the mock-crime CIT; however, it also led to a substantial number of undiagnosed participants (33.6%). Pretest screening holds promise, but its application would benefit from dedicated measures for screening out participants. © 2014 Society for Psychophysiological Research.
A Concealed Information Test with multimodal measurement.
Ambach, Wolfgang; Bursch, Stephanie; Stark, Rudolf; Vaitl, Dieter
2010-03-01
A Concealed Information Test (CIT) investigates differential physiological responses to deed-related (probe) vs. irrelevant items. The present study focused on the detection of concealed information using simultaneous recordings of autonomic and brain electrical measures. As a secondary issue, verbal and pictorial presentations were compared with respect to their influence on the recorded measures. Thirty-one participants underwent a mock-crime scenario with a combined verbal and pictorial presentation of nine items. The subsequent CIT, designed with respect to event-related potential (ERP) measurement, used a 3-3.5s interstimulus interval. The item presentation modality, i.e. pictures or written words, was varied between subjects; no response was required from the participants. In addition to electroencephalogram (EEG), electrodermal activity (EDA), electrocardiogram (ECG), respiratory activity, and finger plethysmogram were recorded. A significant probe-vs.-irrelevant effect was found for each of the measures. Compared to sole ERP measurement, the combination of ERP and EDA yielded incremental information for detecting concealed information. Although, EDA per se did not reach the predictive value known from studies primarily designed for peripheral physiological measurement. Presentation modality neither influenced the detection accuracy for autonomic measures nor EEG measures; this underpins the equivalence of verbal and pictorial item presentation in a CIT, regardless of the physiological measures recorded. Future studies should further clarify whether the incremental validity observed in the present study reflects a differential sensitivity of ERP and EDA to different sub-processes in a CIT. Copyright 2009 Elsevier B.V. All rights reserved.
Using more different and more familiar targets improves the detection of concealed information.
Suchotzki, Kristina; De Houwer, Jan; Kleinberg, Bennett; Verschuere, Bruno
2018-04-01
When embedded among a number of plausible irrelevant options, the presentation of critical (e.g., crime-related or autobiographical) information is associated with a marked increase in response time (RT). This RT effect crucially depends on the inclusion of a target/non-target discrimination task with targets being a dedicated set of items that require a unique response (press YES; for all other items press NO). Targets may be essential because they share a feature - familiarity - with the critical items. Whereas irrelevant items have not been encountered before, critical items are known from the event or the facts of the investigation. Target items are usually learned before the test, and thereby made familiar to the participants. Hence, familiarity-based responding needs to be inhibited on the critical items and may therefore explain the RT increase on the critical items. This leads to the hypothesis that the more participants rely on familiarity, the more pronounced the RT increase on critical items may be. We explored two ways to increase familiarity-based responding: (1) Increasing the number of different target items, and (2) using familiar targets. In two web-based studies (n = 357 and n = 499), both the number of different targets and the use of familiar targets facilitated concealed information detection. The effect of the number of different targets was small yet consistent across both studies, the effect of target familiarity was large in both studies. Our results support the role of familiarity-based responding in the Concealed Information Test and point to ways on how to improve validity of the Concealed Information Test. Copyright © 2018 Elsevier B.V. All rights reserved.
Varga, Mihai; Visu-Petra, George; Miclea, Mircea; Visu-Petra, Laura
2015-01-01
Concealing the possession of relevant information represents a complex cognitive process, shaped by contextual demands and individual differences in cognitive and socio-emotional functioning. The Reaction Time-based Concealed Information Test (RT-CIT) is used to detect concealed knowledge based on the difference in RTs between denying recognition of critical (probes) and newly encountered (irrelevant) information. Several research questions were addressed in this scenario implemented after a mock crime. First, we were interested whether the introduction of a social stimulus (facial identity) simulating a virtual investigator would facilitate the process of deception detection. Next, we explored whether his emotional displays (friendly, hostile or neutral) would have a differential impact on speed of responses to probe versus irrelevant items. We also compared the impact of introducing similar stimuli in a working memory (WM) updating context without requirements to conceal information. Finally, we explored the association between deceptive behavior and individual differences in WM updating proficiency or in internalizing problems (state / trait anxiety and depression). Results indicated that the mere presence of a neutral virtual investigator slowed down participants' responses, but not the appended lie-specific time (difference between probes and irrelevants). Emotional expression was shown to differentially affect speed of responses to critical items, with positive displays from the virtual examiner enhancing lie-specific time, compared to negative facial expressions, which had an opposite impact. This valence-specific effect was not visible in the WM updating context. Higher levels of trait / state anxiety were related to faster responses to probes in the negative condition (hostile facial expression) of the RT-CIT. These preliminary findings further emphasize the need to take into account motivational and emotional factors when considering the transfer of deception detection techniques from the laboratory to real-life settings. PMID:25699516
Self-Concealment and Suicidal Behaviors
ERIC Educational Resources Information Center
Friedlander, Adam; Nazem, Sarra; Fiske, Amy; Nadorff, Michael R.; Smith, Merideth D.
2012-01-01
Understanding self-concealment, the tendency to actively conceal distressing personal information from others, may be important in developing effective ways to help individuals with suicidal ideation. No published study has yet assessed the relation between self-concealment and suicidal behaviors. Additionally, most self-concealment research has…
The current and future status of the concealed information test for field use.
Matsuda, Izumi; Nittono, Hiroshi; Allen, John J B
2012-01-01
The Concealed Information Test (CIT) is a psychophysiological technique for examining whether a person has knowledge of crime-relevant information. Many laboratory studies have shown that the CIT has good scientific validity. However, the CIT has seldom been used for actual criminal investigations. One successful exception is its use by the Japanese police. In Japan, the CIT has been widely used for criminal investigations, although its probative force in court is not strong. In this paper, we first review the current use of the field CIT in Japan. Then, we discuss two possible approaches to increase its probative force: sophisticated statistical judgment methods and combining new psychophysiological measures with classic autonomic measures. On the basis of these considerations, we propose several suggestions for future practice and research involving the field CIT.
The Current and Future Status of the Concealed Information Test for Field Use
Matsuda, Izumi; Nittono, Hiroshi; Allen, John J. B.
2012-01-01
The Concealed Information Test (CIT) is a psychophysiological technique for examining whether a person has knowledge of crime-relevant information. Many laboratory studies have shown that the CIT has good scientific validity. However, the CIT has seldom been used for actual criminal investigations. One successful exception is its use by the Japanese police. In Japan, the CIT has been widely used for criminal investigations, although its probative force in court is not strong. In this paper, we first review the current use of the field CIT in Japan. Then, we discuss two possible approaches to increase its probative force: sophisticated statistical judgment methods and combining new psychophysiological measures with classic autonomic measures. On the basis of these considerations, we propose several suggestions for future practice and research involving the field CIT. PMID:23205018
Visu-Petra, George; Varga, Mihai; Miclea, Mircea; Visu-Petra, Laura
2013-01-01
The possibility to enhance the detection efficiency of the Concealed Information Test (CIT) by increasing executive load was investigated, using an interference design. After learning and executing a mock crime scenario, subjects underwent three deception detection tests: an RT-based CIT, an RT-based CIT plus a concurrent memory task (CITMem), and an RT-based CIT plus a concurrent set-shifting task (CITShift). The concealed information effect, consisting in increased RT and lower response accuracy for probe items compared to irrelevant items, was evidenced across all three conditions. The group analyses indicated a larger difference between RTs to probe and irrelevant items in the dual-task conditions, but this difference was not translated in a significantly increased detection efficiency at an individual level. Signal detection parameters based on the comparison with a simulated innocent group showed accurate discrimination for all conditions. Overall response accuracy on the CITMem was highest and the difference between response accuracy to probes and irrelevants was smallest in this condition. Accuracy on the concurrent tasks (Mem and Shift) was high, and responses on these tasks were significantly influenced by CIT stimulus type (probes vs. irrelevants). The findings are interpreted in relation to the cognitive load/dual-task interference literature, generating important insights for research on the involvement of executive functions in deceptive behavior. PMID:23543918
Winograd, Michael R; Rosenfeld, J Peter
2014-12-01
In P300-Concealed Information Tests used with mock crime scenarios, the amount of detail revealed to a participant prior to the commission of the mock crime can have a serious impact on a study's validity. We predicted that exposure to crime details through instructions would bias detection rates toward enhanced sensitivity. In a 2 × 2 factorial design, participants were either informed (through mock crime instructions) or naïve as to the identity of a to-be-stolen item, and then either committed (guilty) or did not commit (innocent) the crime. Results showed that prior knowledge of the stolen item was sufficient to cause 69% of innocent-informed participants to be incorrectly classified as guilty. Further, we found a trend toward enhanced detection rate for guilty-informed participants over guilty-naïve participants. Results suggest that revealing details to participants through instructions biases detection rates in the P300-CIT toward enhanced sensitivity. Copyright © 2014 Elsevier B.V. All rights reserved.
Is anterior N2 enhancement a reliable electrophysiological index of concealed information?
Ganis, Giorgio; Bridges, David; Hsu, Chun-Wei; Schendan, Haline E
2016-12-01
Concealed information tests (CITs) are used to determine whether an individual possesses information about an item of interest. Event-related potential (ERP) measures in CITs have focused almost exclusively on the P3b component, showing that this component is larger when lying about the item of interest (probe) than telling the truth about control items (irrelevants). Recent studies have begun to examine other ERP components, such as the anterior N2, with mixed results. A seminal CIT study found that visual probes elicit a larger anterior N2 than irrelevants (Gamer and Berti, 2010) and suggested that this component indexes cognitive control processes engaged when lying about probes. However, this study did not control for potential intrinsic differences among the stimuli: the same probe and irrelevants were used for all participants, and there was no control condition composed of uninformed participants. Here, first we show that the N2 effect found in the study by Gamer and Berti (2010) was in large part due to stimulus differences, as the effect observed in a concealed information condition was comparable to that found in two matched control conditions without any concealed information (Experiments 1 and 2). Next, we addressed the issue of the generality of the N2 findings by counterbalancing a new set of stimuli across participants and by using a control condition with uninformed participants (Experiment 3). Results show that the probe did not elicit a larger anterior N2 than the irrelevants under these controlled conditions. These findings suggest that caution should be taken in using the N2 as an index of concealed information in CITs. Furthermore, they are a reminder that results of CIT studies (not only with ERPs) performed without stimulus counterbalancing and suitable control conditions may be confounded by differential intrinsic properties of the stimuli employed. Copyright © 2016 Elsevier Inc. All rights reserved.
The Act of Answering Questions Elicited Differentiated Responses in a Concealed Information Test.
Otsuka, Takuro; Mizutani, Mitsuyoshi; Yagi, Akihiro; Katayama, Jun'ichi
2018-04-17
The concealed information test (CIT), a psychophysiological detection of deception test, compares physiological responses between crime-related and crime-unrelated items. In previous studies, whether the act of answering questions affected physiological responses was unclear. This study examined effects of both question-related and answer-related processes on physiological responses. Twenty participants received a modified CIT, in which the interval between presentation of questions and answering them was 27 s. Differentiated respiratory movements and cardiovascular responses between items were observed for both questions (items) and answers, while differentiated skin conductance response was observed only for questions. These results suggest that physiological responses to questions reflected orientation to a crime-related item, while physiological responses during answering reflected inhibition of psychological arousal caused by orienting. Regarding the CIT's accuracy, participants' perception of the questions themselves more strongly influenced physiological responses than answering them. © 2018 American Academy of Forensic Sciences.
Sauerland, Melanie; Wolfs, Andrea C F; Crans, Samantha; Verschuere, Bruno
2017-11-27
Direct eyewitness identification is widely used, but prone to error. We tested the validity of indirect eyewitness identification decisions using the reaction time-based concealed information test (CIT) for assessing cooperative eyewitnesses' face memory as an alternative to traditional lineup procedures. In a series of five experiments, a total of 401 mock eyewitnesses watched one of 11 different stimulus events that depicted a breach of law. Eyewitness identifications in the CIT were derived from longer reaction times as compared to well-matched foil faces not encountered before. Across the five experiments, the weighted mean effect size d was 0.14 (95% CI 0.08-0.19). The reaction time-based CIT seems unsuited for testing cooperative eyewitnesses' memory for faces. The careful matching of the faces required for a fair lineup or the lack of intent to deceive may have hampered the diagnosticity of the reaction time-based CIT.
Bultman, Mark W.
2013-01-01
Data on the Earth’s total-intensity magnetic field acquired near ground level and at measurement intervals as small as 1 m include information on the spatial distribution of nearsurface magnetic dipoles that in many cases are unique to a specific lithology. Such spatial information is expressed in the texture (physical appearance or characteristics) of the data at scales of hundreds of meters to kilometers. These magnetic textures are characterized by several descriptive statistics, their power spectrum, and their multifractal spectrum. On the basis of a graphical comparison and textural characterization, ground-based magnetic-field profile data can be used to estimate bedrock lithology concealed by as much as 100 m of basin fill in some cases, information that is especially important in assessing and exploring for concealed mineral deposits. I demonstrate that multifractal spectra of ground-based magnetic-field-profile data can be used to differentiate exposed lithologies and that the shape and position of the multifractal spectrum of the ground-based magnetic-field-profile of concealed lithologies can be matched to the upward-continued multifractal spectrum of an exposed lithology to help distinguish the concealed lithology. In addition, ground-based magnetic-field-profile data also detect minute differences in the magnetic susceptibility of rocks over small horizontal and vertical distances and so can be used for precise modeling of bedrock geometry and structure, even when that bedrock is concealed by 100 m or more of nonmagnetic basin fill. Such data contain valuable geologic information on the bedrock concealed by basin fill that may not be so visible in aeromagnetic data, including areas of hydrothermal alteration, faults, and other bedrock structures. Interpretation of these data in the San Rafael Basin, southeastern Arizona, has yielded results for estimating concealed lithologies, concealed structural geology, and a concealed potential mineral-resource target.
Farwell, Lawrence A.; Richardson, Drew C.; Richardson, Graham M.; Furedy, John J.
2014-01-01
A classification concealed information test (CIT) used the “brain fingerprinting” method of applying P300 event-related potential (ERP) in detecting information that is (1) acquired in real life and (2) unique to US Navy experts in military medicine. Military medicine experts and non-experts were asked to push buttons in response to three types of text stimuli. Targets contain known information relevant to military medicine, are identified to subjects as relevant, and require pushing one button. Subjects are told to push another button to all other stimuli. Probes contain concealed information relevant to military medicine, and are not identified to subjects. Irrelevants contain equally plausible, but incorrect/irrelevant information. Error rate was 0%. Median and mean statistical confidences for individual determinations were 99.9% with no indeterminates (results lacking sufficiently high statistical confidence to be classified). We compared error rate and statistical confidence for determinations of both information present and information absent produced by classification CIT (Is a probe ERP more similar to a target or to an irrelevant ERP?) vs. comparison CIT (Does a probe produce a larger ERP than an irrelevant?) using P300 plus the late negative component (LNP; together, P300-MERMER). Comparison CIT produced a significantly higher error rate (20%) and lower statistical confidences: mean 67%; information-absent mean was 28.9%, less than chance (50%). We compared analysis using P300 alone with the P300 + LNP. P300 alone produced the same 0% error rate but significantly lower statistical confidences. These findings add to the evidence that the brain fingerprinting methods as described here provide sufficient conditions to produce less than 1% error rate and greater than 95% median statistical confidence in a CIT on information obtained in the course of real life that is characteristic of individuals with specific training, expertise, or organizational affiliation. PMID:25565941
Concealment of sexual orientation.
Sylva, David; Rieger, Gerulf; Linsenmeier, Joan A W; Bailey, J Michael
2010-02-01
Sex-atypical behaviors may be used to identify a person as homosexual. To shield themselves from prejudice, homosexual people may attempt to conceal these behaviors. It is not clear how effectively they can do so. In Study 1, we asked homosexual participants to conceal their sex-atypical behaviors while talking about the weather. Raters watched videos of the participants and judged the likelihood that each participant was homosexual. Homosexual participants were able to partially conceal signs of their orientation, but they remained distinguishable from heterosexual participants. In Study 2, we tested the ability to conceal signs of one's sexual orientation in a more demanding situation: a mock job interview. In this scenario, homosexual men were even less effective at concealing their orientation. Higher cognitive demands in this new situation may have interfered with their ability to conceal.
Wavelet Fusion for Concealed Object Detection Using Passive Millimeter Wave Sequence Images
NASA Astrophysics Data System (ADS)
Chen, Y.; Pang, L.; Liu, H.; Xu, X.
2018-04-01
PMMW imaging system can create interpretable imagery on the objects concealed under clothing, which gives the great advantage to the security check system. Paper addresses wavelet fusion to detect concealed objects using passive millimeter wave (PMMW) sequence images. According to PMMW real-time imager acquired image characteristics and storage methods firstly, using the sum of squared difference (SSD) as the image-related parameters to screen the sequence images. Secondly, the selected images are optimized using wavelet fusion algorithm. Finally, the concealed objects are detected by mean filter, threshold segmentation and edge detection. The experimental results show that this method improves the detection effect of concealed objects by selecting the most relevant images from PMMW sequence images and using wavelet fusion to enhance the information of the concealed objects. The method can be effectively applied to human body concealed object detection in millimeter wave video.
Subject-based discriminative sparse representation model for detection of concealed information.
Akhavan, Amir; Moradi, Mohammad Hassan; Vand, Safa Rafiei
2017-05-01
The use of machine learning approaches in concealed information test (CIT) plays a key role in the progress of this neurophysiological field. In this paper, we presented a new machine learning method for CIT in which each subject is considered independent of the others. The main goal of this study is to adapt the discriminative sparse models to be applicable for subject-based concealed information test. In order to provide sufficient discriminability between guilty and innocent subjects, we introduced a novel discriminative sparse representation model and its appropriate learning methods. For evaluation of the method forty-four subjects participated in a mock crime scenario and their EEG data were recorded. As the model input, in this study the recurrence plot features were extracted from single trial data of different stimuli. Then the extracted feature vectors were reduced using statistical dependency method. The reduced feature vector went through the proposed subject-based sparse model in which the discrimination power of sparse code and reconstruction error were applied simultaneously. Experimental results showed that the proposed approach achieved better performance than other competing discriminative sparse models. The classification accuracy, sensitivity and specificity of the presented sparsity-based method were about 93%, 91% and 95% respectively. Using the EEG data of a single subject in response to different stimuli types and with the aid of the proposed discriminative sparse representation model, one can distinguish guilty subjects from innocent ones. Indeed, this property eliminates the necessity of several subject EEG data in model learning and decision making for a specific subject. Copyright © 2017 Elsevier B.V. All rights reserved.
Rosenfeld, J Peter; Ward, Anne; Drapekin, Jesse; Labkovsky, Elena; Tullman, Samuel
2017-03-01
The present study investigated the extent to which people can suppress semantic memory as indexed with the P300 ERP and the autobiographical implicit association test (aIAT). In EXP 1, participants (22) were run in a counterbalanced repeated measures study in both simply knowledgeable (SK) and knowledgeable with suppression (SP) conditions. A P300-based, concealed information test ("Complex Trial Protocol"; CTP) with a 50/50 Target/Nontarget (T/NT) ratio was given both with and without instructions to suppress semantic memories. The results showed increased P300s to probe name stimuli, reduced (but still high positive) aIAT d-scores, and increased simple reaction times to all stimuli used in ERP tests in the SP condition. EXP 2 was similar, but with SP and SK in two separate groups, and a 20/80 T/NT ratio. Again, ERP and aIAT results failed to show a suppression effect for semantic memory. The behavioral data suggest some task demand effects under suppression instructions, and that EXP 1 was more demanding than EXP 2. Copyright © 2017 Elsevier B.V. All rights reserved.
The Effects of Concealing Academic Achievement Information on Adolescents' Self-Concept
ERIC Educational Resources Information Center
Zhang, Baoshan; Wang, Mo; Li, Juan; Yu, Guoliang; Bi, Yan-Ling
2011-01-01
Using an experimental design, the effect of concealing academic achievement information on adolescents' self-concept was examined in the current study. Specifically, adolescents with low academic achievement and adolescents with average to high academic achievement (N = 129) were randomly assigned to different interview contexts wherein…
Hoy-Ellis, Charles P.
2016-01-01
Recent population-based studies indicate that sexual minorities aged 50 and older experience significantly higher rates of psychological distress than their heterosexual age-peers. The minority stress model has been useful in explaining disparately high rates of psychological distress among younger sexual minorities. The purpose of this study is to test a hypothesized structural relationship between two minority stressors—internalized heterosexism and concealment of sexual orientation—and consequent psychological distress among a sample of 2,349 lesbian, gay, and bisexual adults aged 50 to 95 years old. Structural equation modeling indicates that concealment has a nonsignificant direct effect on psychological distress but a significant indirect effect that is mediated through internalized heterosexism; the effect of concealment is itself concealed. This may explain divergent results regarding the role of concealment in psychological distress in other studies, and the implications will be discussed. PMID:26322654
Rosenfeld, J Peter; Labkovsky, Elena; Davydova, Elena; Ward, Anne; Rosenfeld, Lauren
2017-05-01
Previous research indicated that the skin conductance response of the autonomic nervous system in the Concealed Information Test (CIT) is typically increased in subjects who are financially and otherwise incentivized to defeat the CIT (the paradoxical "motivational impairment" effect). This is not the case for RT-based CITs, nor P300 tests based on the three-stimulus protocol for detection of cognitive malingering (although these are not the same as CITs). The present report is the first attempt to study the effect of financial motivation on the P300-based Complex Trial Protocol using both episodic and semantic memory probe and irrelevant stimuli. The Test of Memory Malingering (TOMM) was used to validate behavioral differences between the two groups we created by offering one (paid) group but not another (unpaid) group a financial reward for beating our tests. Group behavioral differences on the TOMM did confirm group manipulations. Probe-minus-irrelevant P300 differences did not differ between groups, although as previously, semantic memory-evoked P300s were larger than episodic memory-evoked P300s. © 2017 Society for Psychophysiological Research.
Current Research and Potential Applications of the Concealed Information Test: An Overview
Ben-Shakhar, Gershon
2012-01-01
Research interest in psychophysiological detection of deception has significantly increased since the September 11 terror attack in the USA. In particular, the concealed information test (CIT), designed to detect memory traces that can connect suspects to a certain crime, has been extensively studied. In this paper I will briefly review several psychophysiological detection paradigms that have been studied, with a focus on the CIT. The theoretical background of the CIT, its strength and weaknesses, its potential applications as well as research finings related to its validity (based on a recent meta-analytic study), will be discussed. Several novel research directions, with a focus on factors that may affect CIT detection in realistic settings (e.g., memory for crime details; the effect of emotional stress during crime execution) will be described. Additionally, research focusing on mal-intentions and attempts to detect terror networks using information gathered from groups of suspects using both the standard CIT and the searching CIT will be reviewed. Finally, implications of current research to the actual application of the CIT will be discussed and several recommendations that can enhance the use of the CIT will be made. PMID:23060826
The nest-concealment hypothesis: New insights from a comparative analysis
Borgmann, Kathi L.; Conway, Courtney J.
2015-01-01
Selection of a breeding site is critical for many animals, especially for birds whose offspring are stationary during development. Thus, birds are often assumed to prefer concealed nest sites. However, 74% of studies (n = 106) that have evaluated this relationship for open-cup nesting songbirds in North America failed to support the nest-concealment hypothesis. We conducted a comparative analysis to identify factors that contribute to variation in the ability of researchers to find support for the nest-concealment hypothesis. We found that some of the discrepancy among studies can be explained by interspecific differences in morphological and extrinsic factors that affect nest predation. Moreover, methods that investigators used to estimate concealment affected whether studies found support for the nest-concealment hypothesis; 33% of the studies that used quantitative estimates found support for the nest-concealment hypothesis whereas only 10% of the studies that used qualitative estimates found support. The timing of measurements also explained some of the ambiguity; studies that provided little information regarding the timing of their foliage density estimates were less likely to support the nest-concealment hypothesis. Species with more conspicuous male plumage were less likely to support the nest-concealment hypothesis when we analyzed studies that used visual estimates. Whereas species with more conspicuous female plumage were more likely to support the nest-concealment hypothesis when we analyzed studies that used quantitative measures. Our results demonstrate that support for the nest-concealment hypothesis has been equivocal, but that some of the ambiguity can be explained by morphological traits and methods used to measure concealment.
Concealable Stigmatized Identities and Psychological Well-Being
Quinn, Diane M.; Earnshaw, Valerie A.
2013-01-01
Many people have concealable stigmatized identities: Identities that can be hidden from others and that are socially devalued and negatively stereotyped. Understanding how these concealable stigmatized identities affect psychological well-being is critical. We present our model of the components of concealable stigmatized identities including valenced content – internalized stigma, experienced discrimination, anticipated stigma, disclosure reactions, and counter-stereotypic/positive information – and magnitude – centrality and salience. Research has shown that negatively valenced content is related to increased psychological distress. However, smaller identity magnitude may buffer this distress. We review the research available and discuss important areas for future work. PMID:23730326
Living at Risk: Concealing Risk and Preserving Hope in Huntington Disease
Sims, Sharon L.; Swenson, Melinda M.; Harrison, Joan M.; Moskowitz, Carol; Stepanov, Nonna; Suter, Gregory W.; Westphal, Beryl J.
2013-01-01
Much of the qualitative research on Huntington disease has focused on the genetic testing aspects of HD. The overall purpose of this qualitative study was to gather information about the everyday experience of living with the risk of developing Huntington disease in a sample of individuals at risk for HD who have chosen not to pursue genetic testing. Data for this article was obtained from unstructured, open-ended qualitative interviews of a sample of people participating in the PHAROS study. PHAROS, the Prospective Huntington At-Risk Observational Study, is a multi-site study that aims to establish whether experienced clinicians can reliably determine the earliest clinical symptoms of Huntington disease in individuals at 50% risk for HD who have chosen not to undergo genetic testing. Interviews were conducted at six PHAROS research sites across the United States. In this paper, the research team used qualitative description to construct and explore two main themes: (1) careful concealment of risk as an act of self-preservation and (2) preserving hope. PMID:17943424
Hu, Xiaoqing; Pornpattananangkul, Narun; Rosenfeld, J Peter
2013-05-01
In an event-related potential (ERP)-based concealed information test (CIT), we investigated the effect of manipulated awareness of concealed information on the ERPs. Participants either committed a mock crime or not (guilty vs. innocent) before the CIT, and received feedback regarding either specific (high awareness) or general (low awareness) task performance during the CIT. We found that awareness and recognition of the crime-relevant information differentially influenced the frontal-central N200 and parietal P300: Probe elicited a larger N200 than irrelevant only when guilty participants were in the high awareness condition, whereas the P300 was mainly responsive to information recognition. No N200-P300 correlation was found, allowing for a combined measure of both yielding the highest detection efficiency in the high awareness group (AUC = .91). Finally, a color-naming Stroop task following the CIT revealed that guilty participants showed larger interference effects than innocent participants, suggesting that the former expended more attentional resources during the CIT. Copyright © 2013 Society for Psychophysiological Research.
Video error concealment using block matching and frequency selective extrapolation algorithms
NASA Astrophysics Data System (ADS)
P. K., Rajani; Khaparde, Arti
2017-06-01
Error Concealment (EC) is a technique at the decoder side to hide the transmission errors. It is done by analyzing the spatial or temporal information from available video frames. It is very important to recover distorted video because they are used for various applications such as video-telephone, video-conference, TV, DVD, internet video streaming, video games etc .Retransmission-based and resilient-based methods, are also used for error removal. But these methods add delay and redundant data. So error concealment is the best option for error hiding. In this paper, the error concealment methods such as Block Matching error concealment algorithm is compared with Frequency Selective Extrapolation algorithm. Both the works are based on concealment of manually error video frames as input. The parameter used for objective quality measurement was PSNR (Peak Signal to Noise Ratio) and SSIM(Structural Similarity Index). The original video frames along with error video frames are compared with both the Error concealment algorithms. According to simulation results, Frequency Selective Extrapolation is showing better quality measures such as 48% improved PSNR and 94% increased SSIM than Block Matching Algorithm.
Gu, Jing; Wang, Qi; Wang, Xiaogang; Li, Hailong; Gu, Mei; Ming, Haixia; Dong, Xiaoli; Yang, Kehu; Wu, Hongyan
2014-01-01
Background. This review provides the first methodological information assessment of protocol of acupuncture RCTs registered in WHO International Clinical Trials Registry Platform (ICTRP). Methods. All records of acupuncture RCTs registered in the ICTRP have been collected. The methodological design assessment involved whether the randomization methods, allocation concealment, and blinding were adequate or not based on the information of registration records (protocols of acupuncture RCTs). Results. A total of 453 records, found in 11 registries, were examined. Methodological details were insufficient in registration records; there were 76.4%, 89.0%, and 21.4% records that did not provide information on randomization methods, allocation concealment, and blinding respectively. The proportions of adequate randomization methods, allocation concealment, and blinding were only 107 (23.6%), 48 (10.6%), and 210 (46.4%), respectively. The methodological design improved year by year, especially after 2007. Additionally, methodology of RCTs with ethics approval was clearly superior to those without ethics approval and different among registries. Conclusions. The overall methodological design based on registration records of acupuncture RCTs is not very well but improved year by year. The insufficient information on randomization methods, allocation concealment, and blinding maybe due to the relevant description is not taken seriously in acupuncture RCTs' registration. PMID:24688591
Gu, Jing; Wang, Qi; Wang, Xiaogang; Li, Hailong; Gu, Mei; Ming, Haixia; Dong, Xiaoli; Yang, Kehu; Wu, Hongyan
2014-01-01
Background. This review provides the first methodological information assessment of protocol of acupuncture RCTs registered in WHO International Clinical Trials Registry Platform (ICTRP). Methods. All records of acupuncture RCTs registered in the ICTRP have been collected. The methodological design assessment involved whether the randomization methods, allocation concealment, and blinding were adequate or not based on the information of registration records (protocols of acupuncture RCTs). Results. A total of 453 records, found in 11 registries, were examined. Methodological details were insufficient in registration records; there were 76.4%, 89.0%, and 21.4% records that did not provide information on randomization methods, allocation concealment, and blinding respectively. The proportions of adequate randomization methods, allocation concealment, and blinding were only 107 (23.6%), 48 (10.6%), and 210 (46.4%), respectively. The methodological design improved year by year, especially after 2007. Additionally, methodology of RCTs with ethics approval was clearly superior to those without ethics approval and different among registries. Conclusions. The overall methodological design based on registration records of acupuncture RCTs is not very well but improved year by year. The insufficient information on randomization methods, allocation concealment, and blinding maybe due to the relevant description is not taken seriously in acupuncture RCTs' registration.
A Concealed Barcode Identification System Using Terahertz Time-domain Spectroscopy
NASA Astrophysics Data System (ADS)
Guan, Yu; Yamamoto, Manabu; Kitazawa, Toshiyuki; Tripathi, Saroj R.; Takeya, Kei; Kawase, Kodo
2015-03-01
We present a concealed terahertz barcode/chipless tag to achieve remote identification through an obstructing material using terahertz radiation. We show scanned terahertz reflection spectral images of barcodes concealed by a thick obstacle. A concealed and double- side printed terahertz barcode structure is proposed, and we demonstrate that our design has better performance in definition than a single-side printed barcode using terahertz time-domain spectroscopy. This technique combines the benefits of a chipless tag to read encoded information covered by an optically opaque material with low cost and a simple fabrication process. Simulations are also described, along with an explanation of the principle of the terahertz barcode identification system.
Strategic action or self-control? Adolescent information management and delinquency.
Grigoryeva, Maria S
2018-05-01
Recent scholarship has begun to challenge the prevailing view that children are passive recipients of parental socialization, including the common belief that parental disciplinary practices are central to explaining adolescent problem behaviors. This research shows that children exert a significant influence over parents via information management, or the degree to which children disclose information about their behavior to parents. Despite the incorporation of child information management into contemporary models of parenting, significant theoretical and empirical concerns cast doubt on its utility over classic parent-centered approaches. The current paper addresses these concerns and adjudicates between disparate definitions of adolescent information management in two ways. First, it provides a theoretically grounded definition of information management as agentic behavior. Second, it specifies a model that tests definitions of secret keeping as agentic against a non-agentic definition of secret keeping supplied by criminological theories of self-control. The model is estimated with three four-wave cross-lagged panel models, which disentangle the interrelationships between parenting, child concealment of information, and child problem behavior in a sample of high risk youth. The results offer support for a definition of concealment as strategic and self-regarding, and have implications for research on delinquency, parent-child interactions, and child agency. Copyright © 2018 Elsevier Inc. All rights reserved.
Concealed identification symbols and nondestructive determination of the identification symbols
Nance, Thomas A.; Gibbs, Kenneth M.
2014-09-16
The concealing of one or more identification symbols into a target object and the subsequent determination or reading of such symbols through non-destructive testing is described. The symbols can be concealed in a manner so that they are not visible to the human eye and/or cannot be readily revealed to the human eye without damage or destruction of the target object. The identification symbols can be determined after concealment by e.g., the compilation of multiple X-ray images. As such, the present invention can also provide e.g., a deterrent to theft and the recovery of lost or stolen objects.
Automated Human Screening for Detecting Concealed Knowledge
ERIC Educational Resources Information Center
Twyman, Nathan W.
2012-01-01
Screening individuals for concealed knowledge has traditionally been the purview of professional interrogators investigating a crime. But the ability to detect when a person is hiding important information would be of high value to many other fields and functions. This dissertation proposes design principles for and reports on an implementation…
Concealed semantic and episodic autobiographical memory electrified.
Ganis, Giorgio; Schendan, Haline E
2012-01-01
Electrophysiology-based concealed information tests (CIT) try to determine whether somebody possesses concealed information about a crime-related item (probe) by comparing event-related potentials (ERPs) between this item and comparison items (irrelevants). Although the broader field is sometimes referred to as "memory detection," little attention has been paid to the precise type of underlying memory involved. This study begins addressing this issue by examining the key distinction between semantic and episodic memory in the autobiographical domain within a CIT paradigm. This study also addresses the issue of whether multiple repetitions of the items over the course of the session habituate the brain responses. Participants were tested in a 3-stimulus CIT with semantic autobiographical probes (their own date of birth) and episodic autobiographical probes (a secret date learned just before the study). Results dissociated these two memory conditions on several ERP components. Semantic probes elicited a smaller frontal N2 than episodic probes, consistent with the idea that the frontal N2 decreases with greater pre-existing knowledge about the item. Likewise, semantic probes elicited a smaller central N400 than episodic probes. Semantic probes also elicited a larger P3b than episodic probes because of their richer meaning. In contrast, episodic probes elicited a larger late positive complex (LPC) than semantic probes, because of the recent episodic memory associated with them. All these ERPs showed a difference between probes and irrelevants in both memory conditions, except for the N400, which showed a difference only in the semantic condition. Finally, although repetition affected the ERPs, it did not reduce the difference between probes and irrelevants. These findings show that the type of memory associated with a probe has both theoretical and practical importance for CIT research.
Concealed semantic and episodic autobiographical memory electrified
Ganis, Giorgio; Schendan, Haline E.
2013-01-01
Electrophysiology-based concealed information tests (CIT) try to determine whether somebody possesses concealed information about a crime-related item (probe) by comparing event-related potentials (ERPs) between this item and comparison items (irrelevants). Although the broader field is sometimes referred to as “memory detection,” little attention has been paid to the precise type of underlying memory involved. This study begins addressing this issue by examining the key distinction between semantic and episodic memory in the autobiographical domain within a CIT paradigm. This study also addresses the issue of whether multiple repetitions of the items over the course of the session habituate the brain responses. Participants were tested in a 3-stimulus CIT with semantic autobiographical probes (their own date of birth) and episodic autobiographical probes (a secret date learned just before the study). Results dissociated these two memory conditions on several ERP components. Semantic probes elicited a smaller frontal N2 than episodic probes, consistent with the idea that the frontal N2 decreases with greater pre-existing knowledge about the item. Likewise, semantic probes elicited a smaller central N400 than episodic probes. Semantic probes also elicited a larger P3b than episodic probes because of their richer meaning. In contrast, episodic probes elicited a larger late positive complex (LPC) than semantic probes, because of the recent episodic memory associated with them. All these ERPs showed a difference between probes and irrelevants in both memory conditions, except for the N400, which showed a difference only in the semantic condition. Finally, although repetition affected the ERPs, it did not reduce the difference between probes and irrelevants. These findings show that the type of memory associated with a probe has both theoretical and practical importance for CIT research. PMID:23355816
Hartman, Jessica D; Patock-Peckham, Julie A; Corbin, William R; Gates, Jonathan R; Leeman, Robert F; Luk, Jeremy W; King, Kevin M
2015-01-01
Self-concealment reflects uncomfortable feelings, thoughts, and information people have about themselves that they avoid telling others (Larson & Chastain, 1990). According to Larson and Chastain (1990) these secrets range from the slightly embarrassing to the very distressing with an individual's most traumatic experiences often concealed. Parental attitudes including those involving self-disclosure are thought to be expressed in their choice of parenting style (Brand, Hatzinger, Beck, & Holsboer-Trachsler, 2009). The specific aim of this investigation was to examine the direct and indirect influences of parenting styles on self-concealment, impaired control over drinking (i.e. the inability to stop drinking when intended), alcohol use (quantity/frequency), and alcohol-related problems. A structural equation model with 419 (223 men, 196 women) university students was examined. Two and three path mediated effects were examined with the bias corrected bootstrap technique in Mplus. Having an authoritarian mother was directly linked to more self-concealment, while having an authoritative father was directly linked to less self-concealment. Higher levels of mother authoritarianism were indirectly linked to both increased alcohol use and alcohol-related problems through more self-concealment and more impaired control over drinking. Moreover, higher levels of father authoritativeness were indirectly linked to less alcohol use and alcohol-related problems through less self-concealment and less impaired control over drinking. These findings suggest that parenting styles influence vulnerabilities such as self-concealment in the impaired control over the drinking pathway to alcohol use and alcohol-related problems. Copyright © 2014 Elsevier Ltd. All rights reserved.
ERIC Educational Resources Information Center
Dogan, Ugur; Çolak, Tugba Seda
2016-01-01
This study was tested a model for explain to social networks sites (SNS) usage with structural equation modeling (SEM). Using SEM on a sample of 475 high school students (35% male, 65% female) students, model was investigated the relationship between self-concealment, social appearance anxiety, loneliness on SNS such as Twitter and Facebook usage.…
Associations Between Secret-Keeping and Quality of Life in Older Adults.
Maas, Joyce; Wismeijer, Andreas A J; Van Assen, Marcel A L M
2018-01-01
This study examined the effects of secrecy on quality of life in a sample consisting of older adults (>50 years; N = 301). Three key components of secrecy were examined with the Tilburg Secrecy Scale-25 (TSS25; possession of a secret, self-concealment, and cognitive preoccupation). The TSS25 distinguishes between the tendency to conceal personal information (self-concealment) and the tendency to worry or ruminate about the secret (cognitive preoccupation), thereby enabling investigation of the effects of secrecy on quality of life in detail. Confirming previous findings in younger samples, we found a positive effect of possession of a secret on quality of life, after controlling for both TSS25's self-concealment and cognitive preoccupation. This suggests that keeping secrets may have a positive association with quality of life in older adults as well, as long as they do not have the tendency to self-conceal and are not cognitively preoccupied with their secret.
Farwell, Lawrence A; Richardson, Drew C; Richardson, Graham M
2013-08-01
Brain fingerprinting detects concealed information stored in the brain by measuring brainwave responses. We compared P300 and P300-MERMER event-related brain potentials for error rate/accuracy and statistical confidence in four field/real-life studies. 76 tests detected presence or absence of information regarding (1) real-life events including felony crimes; (2) real crimes with substantial consequences (either a judicial outcome, i.e., evidence admitted in court, or a $100,000 reward for beating the test); (3) knowledge unique to FBI agents; and (4) knowledge unique to explosives (EOD/IED) experts. With both P300 and P300-MERMER, error rate was 0 %: determinations were 100 % accurate, no false negatives or false positives; also no indeterminates. Countermeasures had no effect. Median statistical confidence for determinations was 99.9 % with P300-MERMER and 99.6 % with P300. Brain fingerprinting methods and scientific standards for laboratory and field applications are discussed. Major differences in methods that produce different results are identified. Markedly different methods in other studies have produced over 10 times higher error rates and markedly lower statistical confidences than those of these, our previous studies, and independent replications. Data support the hypothesis that accuracy, reliability, and validity depend on following the brain fingerprinting scientific standards outlined herein.
Abdollahi, Abbas; Hosseinian, Simin; Beh-Pajooh, Ahmad; Carlbring, Per
2017-01-01
One of the biggest barriers in treating adolescents with mental health problems is their refusing to seek psychological help. This study was designed to examine the relationships between two forms of perfectionism, self-concealment and attitudes toward seeking psychological help and to test the mediating role of self-concealment in the relationship between perfectionism and attitudes toward seeking psychological help among Malaysian high school students. The participants were 475 Malaysian high school students from four high schools in Kuala Lumpur, Malaysia. Structural equation modelling results indicated that high school students with high levels of socially prescribed perfectionism, high levels of self-concealment, and low levels of self-oriented perfectionism reported negative attitudes toward seeking psychological help. Bootstrapping analysis showed that self-concealment emerged as a significant, full mediator in the link between socially prescribed perfectionism and attitudes toward seeking psychological help. Moderated mediation analysis also examined whether the results generalized across men and women. The results revealed that male students with socially prescribed perfectionism are more likely to engage in self-concealment, which in turn, leads to negative attitudes toward seeking psychological help more than their female counterparts. The results suggested that students high in socially prescribed perfectionism were more likely to engage in self-concealment and be less inclined to seek psychological help.
ERIC Educational Resources Information Center
Cepeda-Benito, Antonio; Short, Paul
1998-01-01
New information about the role of self-concealment in the decision to seek psychological services is investigated. Different types of distress selectively predict students' perceived likelihood of seeking help according to the problems for which help would be sought (N=732). Results are discussed in contrast to previous researchers' findings. (EMK)
Geven, Linda M; Ben-Shakhar, Gershon; Kindt, Merel; Verschuere, Bruno
2018-06-15
From a cognitive perspective, lying can be regarded as a complex cognitive process requiring the interplay of several executive functions. Meta-analytic research on 114 studies encompassing 3,307 participants (Suchotzki, Verschuere, Van Bockstaele, Ben-Shakhar, & Crombez, ) suggests that computerized paradigms can reliably assess the cognitive burden of lying, with large reaction time differences between lying and truth telling. These studies, however, lack a key ingredient of real-life deception, namely self-initiated behavior. Research participants have typically been instructed to commit a mock crime and conceal critical information, whereas in real life, people freely choose whether or not to engage in antisocial behavior. In this study, participants (n = 433) engaged in a trivia quiz and were provided with a monetary incentive for high accuracy performance. Participants were randomly allocated to either a condition where they were instructed to cheat on the quiz (mimicking the typical laboratory set-up) or to a condition in which they were provided with the opportunity to cheat, yet without explicit instructions to do so. Assessments of their response times in a subsequent Concealed Information Test (CIT) revealed that both instructed cheaters (n = 107) and self-initiated cheaters (n = 142) showed the expected RT-slowing for concealed information. The data indicate that the cognitive signature of lying is not restricted to explicitly instructed cheating, but it can also be observed for self-initiated cheating. These findings are highly encouraging from an ecological validity perspective. Copyright © 2018 The Authors. Topics in Cognitive Science published by Wiley Periodicals, Inc. on behalf of Cognitive Science Society. Inc.
Fey, David L.; Granitto, Matthew; Giles, Stuart A.; Smith, Steven M.; Eppinger, Robert G.; Kelley, Karen D.
2009-01-01
In the summer of 2007, the U.S. Geological Survey (USGS) began an exploration geochemical research study over the Pebble porphyry copper-gold-molybdenum deposit. This report presents the analytical data collected in 2008. The Pebble deposit is world class in size, and is almost entirely concealed by tundra, glacial deposits, and post-Cretaceous volcanic rocks. The Pebble deposit was chosen for this study because it is concealed by surficial cover rocks, is relatively undisturbed (except for exploration company drill holes), is a large mineral system, and is fairly well-constrained at depth by the drill hole geology and geochemistry. The goals of this study are to 1) determine whether the concealed deposit can be detected with surface samples, 2) better understand the processes of metal migration from the deposit to the surface, and 3) test and develop methods for assessing mineral resources in similar concealed terrains. The analytical data are presented as an integrated Microsoft Access 2003 database and as separate Excel files.
Carrell, David; Malin, Bradley; Aberdeen, John; Bayer, Samuel; Clark, Cheryl; Wellner, Ben; Hirschman, Lynette
2013-01-01
Secondary use of clinical text is impeded by a lack of highly effective, low-cost de-identification methods. Both, manual and automated methods for removing protected health information, are known to leave behind residual identifiers. The authors propose a novel approach for addressing the residual identifier problem based on the theory of Hiding In Plain Sight (HIPS). HIPS relies on obfuscation to conceal residual identifiers. According to this theory, replacing the detected identifiers with realistic but synthetic surrogates should collectively render the few 'leaked' identifiers difficult to distinguish from the synthetic surrogates. The authors conducted a pilot study to test this theory on clinical narrative, de-identified by an automated system. Test corpora included 31 oncology and 50 family practice progress notes read by two trained chart abstractors and an informaticist. Experimental results suggest approximately 90% of residual identifiers can be effectively concealed by the HIPS approach in text containing average and high densities of personal identifying information. This pilot test suggests HIPS is feasible, but requires further evaluation. The results need to be replicated on larger corpora of diverse origin under a range of detection scenarios. Error analyses also suggest areas where surrogate generation techniques can be refined to improve efficacy. If these results generalize to existing high-performing de-identification systems with recall rates of 94-98%, HIPS could increase the effective de-identification rates of these systems to levels above 99% without further advancements in system recall. Additional and more rigorous assessment of the HIPS approach is warranted.
ERIC Educational Resources Information Center
Horan, Sean M.; Bryant, Leah E.
2017-01-01
This essay encourages research on the presence of guns in college classrooms. Readers are asked to consider that around 11 million individuals have concealed carry permits (Crime Prevention Research Center, 2014), and roughly 20% of states allow concealed guns on campus (e.g., Anderson, 2016). Given the centrality of guns in our culture, and…
Motion compensated shape error concealment.
Schuster, Guido M; Katsaggelos, Aggelos K
2006-02-01
The introduction of Video Objects (VOs) is one of the innovations of MPEG-4. The alpha-plane of a VO defines its shape at a given instance in time and hence determines the boundary of its texture. In packet-based networks, shape, motion, and texture are subject to loss. While there has been considerable attention paid to the concealment of texture and motion errors, little has been done in the field of shape error concealment. In this paper we propose a post-processing shape error concealment technique that uses the motion compensated boundary information of the previously received alpha-plane. The proposed approach is based on matching received boundary segments in the current frame to the boundary in the previous frame. This matching is achieved by finding a maximally smooth motion vector field. After the current boundary segments are matched to the previous boundary, the missing boundary pieces are reconstructed by motion compensation. Experimental results demonstrating the performance of the proposed motion compensated shape error concealment method, and comparing it with the previously proposed weighted side matching method are presented.
Detection and identification of concealed weapons using matrix pencil
NASA Astrophysics Data System (ADS)
Adve, Raviraj S.; Thayaparan, Thayananthan
2011-06-01
The detection and identification of concealed weapons is an extremely hard problem due to the weak signature of the target buried within the much stronger signal from the human body. This paper furthers the automatic detection and identification of concealed weapons by proposing the use of an effective approach to obtain the resonant frequencies in a measurement. The technique, based on Matrix Pencil, a scheme for model based parameter estimation also provides amplitude information, hence providing a level of confidence in the results. Of specific interest is the fact that Matrix Pencil is based on a singular value decomposition, making the scheme robust against noise.
Emotional Arousal at Memory Encoding Enhanced P300 in the Concealed Information Test
Osugi, Akemi; Ohira, Hideki
2018-01-01
Previous studies have reported that the concealed information test (CIT) is a reliable and powerful method for detecting information. However, the external validity of the CIT studies has not been fully proven. In particular, few studies have examined the effects of emotional arousal at memory encoding on physiological responses in the CIT. The present study investigated the influence on the CIT of the magnitude of emotional arousal at memory encoding of a mock crime, using the P300 component of the event-related brain potential (ERP). In accord with the assumptions of excitation-transfer theory, we presented emotionally arousing pictures before a mock crime. Participants were randomly assigned to either a high emotional arousal group (n = 10) or a low emotional arousal group (n = 11), viewing pictures expected to arouse emotion at a high or low level, respectively. Subsequently, all participants enacted the same mock crime, in which they were instructed to stab a pillow with a sharp-edged tool (e.g., a kitchen knife or ice pick) as if harassing a mannequin lying on a bed. After the antecedent emotional experience, the P300-based CIT was conducted. Participants in the high arousal group showed significantly greater P300 amplitudes in response to a probe stimulus compared with the low arousal group. No differences were found between the groups in response to irrelevant stimuli. These results support the notion that emotional arousal influences the P300 in the CIT paradigm. PMID:29375446
A new surgical technique for concealed penis using an advanced musculocutaneous scrotal flap.
Han, Dong-Seok; Jang, Hoon; Youn, Chang-Shik; Yuk, Seung-Mo
2015-06-19
Until recently, no single, universally accepted surgical method has existed for all types of concealed penis repairs. We describe a new surgical technique for repairing concealed penis by using an advanced musculocutaneous scrotal flap. From January 2010 to June 2014, we evaluated 12 patients (12-40 years old) with concealed penises who were surgically treated with an advanced musculocutaneous scrotal flap technique after degloving through a ventral approach. All the patients were scheduled for regular follow-up at 6, 12, and 24 weeks postoperatively. The satisfaction grade for penile size, morphology, and voiding status were evaluated using a questionnaire preoperatively and at all of the follow-ups. Information regarding complications was obtained during the postoperative hospital stay and at all follow-ups. The patients' satisfaction grades, which included the penile size, morphology, and voiding status, improved postoperatively compared to those preoperatively. All patients had penile lymphedema postoperatively; however, this disappeared within 6 weeks. There were no complications such as skin necrosis and contracture, voiding difficulty, or erectile dysfunction. Our advanced musculocutaneous scrotal flap technique for concealed penis repair is technically easy and safe. In addition, it provides a good cosmetic appearance, functional outcomes and excellent postoperative satisfaction grades. Lastly, it seems applicable in any type of concealed penis, including cases in which the ventral skin defect is difficult to cover.
Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects' Information
Ho, Peng Foong; Kam, Yvonne Hwei-Syn; Wee, Mee Chin
2014-01-01
Traditionally, picture-based password systems employ password objects (pictures/icons/symbols) as input during an authentication session, thus making them vulnerable to “shoulder-surfing” attack because the visual interface by function is easily observed by others. Recent software-based approaches attempt to minimize this threat by requiring users to enter their passwords indirectly by performing certain mental tasks to derive the indirect password, thus concealing the user's actual password. However, weaknesses in the positioning of distracter and password objects introduce usability and security issues. In this paper, a new method, which conceals information about the password objects as much as possible, is proposed. Besides concealing the password objects and the number of password objects, the proposed method allows both password and distracter objects to be used as the challenge set's input. The correctly entered password appears to be random and can only be derived with the knowledge of the full set of password objects. Therefore, it would be difficult for a shoulder-surfing adversary to identify the user's actual password. Simulation results indicate that the correct input object and its location are random for each challenge set, thus preventing frequency of occurrence analysis attack. User study results show that the proposed method is able to prevent shoulder-surfing attack. PMID:24991649
Creating fair lineups for suspects with distinctive features.
Zarkadi, Theodora; Wade, Kimberley A; Stewart, Neil
2009-12-01
In their descriptions, eyewitnesses often refer to a culprit's distinctive facial features. However, in a police lineup, selecting the only member with the described distinctive feature is unfair to the suspect and provides the police with little further information. For fair and informative lineups, the distinctive feature should be either replicated across foils or concealed on the target. In the present experiments, replication produced more correct identifications in target-present lineups--without increasing the incorrect identification of foils in target-absent lineups--than did concealment. This pattern, and only this pattern, is predicted by the hybrid-similarity model of recognition.
Goal-Directed Modulation of Neural Memory Patterns: Implications for fMRI-Based Memory Detection.
Uncapher, Melina R; Boyd-Meredith, J Tyler; Chow, Tiffany E; Rissman, Jesse; Wagner, Anthony D
2015-06-03
Remembering a past event elicits distributed neural patterns that can be distinguished from patterns elicited when encountering novel information. These differing patterns can be decoded with relatively high diagnostic accuracy for individual memories using multivoxel pattern analysis (MVPA) of fMRI data. Brain-based memory detection--if valid and reliable--would have clear utility beyond the domain of cognitive neuroscience, in the realm of law, marketing, and beyond. However, a significant boundary condition on memory decoding validity may be the deployment of "countermeasures": strategies used to mask memory signals. Here we tested the vulnerability of fMRI-based memory detection to countermeasures, using a paradigm that bears resemblance to eyewitness identification. Participants were scanned while performing two tasks on previously studied and novel faces: (1) a standard recognition memory task; and (2) a task wherein they attempted to conceal their true memory state. Univariate analyses revealed that participants were able to strategically modulate neural responses, averaged across trials, in regions implicated in memory retrieval, including the hippocampus and angular gyrus. Moreover, regions associated with goal-directed shifts of attention and thought substitution supported memory concealment, and those associated with memory generation supported novelty concealment. Critically, whereas MVPA enabled reliable classification of memory states when participants reported memory truthfully, the ability to decode memory on individual trials was compromised, even reversing, during attempts to conceal memory. Together, these findings demonstrate that strategic goal states can be deployed to mask memory-related neural patterns and foil memory decoding technology, placing a significant boundary condition on their real-world utility. Copyright © 2015 the authors 0270-6474/15/358531-15$15.00/0.
Anderson, E.D.; Smith, S.M.; Giles, S.A.; Granitto, Matthew; Eppinger, R.G.; Bedrosian, P.A.; Shah, A.K.; Kelley, K.D.; Fey, D.L.; Minsley, B.J.; Brown, P.J.
2011-01-01
In 2007, the U.S. Geological Survey began a multidisciplinary study in southwest Alaska to investigate the setting and detectability of mineral deposits in concealed volcanic and glacial terranes. The study area hosts the world-class Pebble porphyry Cu-Au-Mo deposit, and through collaboration with the Pebble Limited Partnership, a range of geophysical and geochemical investigations was carried out in proximity to the deposit. The deposit is almost entirely concealed by tundra, glacial deposits, and post-mineralization volcanic rocks. The discovery of mineral resources beneath cover is becoming more important because most of the mineral resources at the surface have already been discovered. Research is needed to identify ways in which to assess for concealed mineral resources. This report presents the uninterpreted geophysical measurements and geochemical and mineralogical analytical data from samples collected during the summer field seasons from 2007 to 2010, and makes the data available in a single Geographic Information System (GIS) database.
Obstruction of critical information on over-the-counter medication packages by external tags.
Sansgiry, Sujit S; Pawaskar, Manjiri D
2005-02-01
Over-the-counter (OTC) medication packages are important sources of information for consumers during product selection and use. Consumers may not be able to access information from OTC packages if external tags, namely price or anti-theft tags, are improperly placed. To determine the amount and type of information concealed by anti-theft tags and price tags affixed on OTC drug packages. A field study was performed by evaluating packages containing acetaminophen and combinations of acetaminophen in stores located in Houston. Five packages for 4 products selected from each store after an initial survey for presence of an external tag were examined. A data collection sheet was prepared that extracted the type and amount of information concealed by these tags. Data were analyzed by performing descriptive analyses to provide an understanding of the information obscured. A total of 24 stores were considered in the study, and 67 products and 285 packages were evaluated. External tags, both anti-theft and price tags, obscured significant amounts of information on the principal display panel (53.4%) and the Drug Facts panel (47.7%) of OTC packages. These tags concealed crucial information on various aspects of labels such as brand names (42.3%), product description (36.3%), warnings (51.5%), uses (10.4%), and purposes (7.2%). Results suggest that improper use of external tags clearly obscured important information on OTC medication packages necessary for consumers to make informed decisions regarding product selection and use. Tagging practices should be altered to allow consumers full access to drug information on the product.
Intentional retrieval suppression can conceal guilty knowledge in ERP memory detection tests☆
Bergström, Zara M.; Anderson, Michael C.; Buda, Marie; Simons, Jon S.; Richardson-Klavehn, Alan
2013-01-01
Brain-activity markers of guilty knowledge have been promoted as accurate and reliable measures for establishing criminal culpability. Tests based on these markers interpret the presence or absence of memory-related neural activity as diagnostic of whether or not incriminating information is stored in a suspect's brain. This conclusion critically relies on the untested assumption that reminders of a crime uncontrollably elicit memory-related brain activity. However, recent research indicates that, in some circumstances, humans can control whether they remember a previous experience by intentionally suppressing retrieval. We examined whether people could use retrieval suppression to conceal neural evidence of incriminating memories as indexed by Event-Related Potentials (ERPs). When people were motivated to suppress crime retrieval, their memory-related ERP effects were significantly decreased, allowing guilty individuals to evade detection. Our findings indicate that brain measures of guilty knowledge may be under criminals’ intentional control and place limits on their use in legal settings. PMID:23664804
Asha, Stephen Edward; Higham, Matthew; Child, Peter
2015-05-01
If package counts on abdominal CTs of body-packers were known to be accurate, follow-up CTs could be avoided. The objective was to determine the accuracy of CT for the number of concealed packages in body-packers, and the reliability of package counts reported by body-packers who admit to concealing drugs. Suspected body-packers were identified from the emergency departments (ED) database. The medical record and radiology reports were reviewed for package counts determined by CT, patient-reported and physically retrieved. The last method was used as the reference standard. Sensitivity, specificity, positive predictive values (PPV) and negative predictive values (NPV) were calculated for CT package count accuracy. Reliability of patient-reported package counts was assessed using Pearson's correlation coefficient. There were 50 confirmed body-packers on whom 104 CT scans were performed. Data for the index and reference tests were available for 84 scans. The sensitivity, specificity, PPV and NPV for CT package count were 63% (95% CI 46% to 77%), 82% (95% CI 67% to 92%), 76% (95% CI 58% to 89%) and 71% (95% CI 56% to 83%) respectively. For CTs with a package count<15, the sensitivity, specificity, PPV and NPV for CT package count were 96% (95% CI 80% to 99%), 95% (95% CI 82% to 99%), 93% (95% CI 76% to 99%) and 97% (95% CI 86% to 100%), respectively. Correlation between patient-reported package counts and the number of packages retrieved was high (r=0.90, p<0.001, R2=81%). The accuracy of CT for determining the number of concealed packages is poor, although when applied to patients with few concealed packages accuracy is high and is useful as a rule-out test. Among patients who have admitted to drug concealment, the number of packages reported to be concealed is reliable. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
Being and feeling unique: statistical deviance and psychological marginality.
Frable, D E
1993-03-01
Two studies tested the hypothesis that people with culturally stigmatized and concealable conditions (e.g., gays, epileptics, juvenile delinquents, and incest victims) would be more likely to feel unique than people with culturally valued or conspicuous conditions (e.g., the physically attractive, the intellectually gifted, the obese, and the facially scarred). In Study 1, culturally stigmatized individuals with concealable conditions were least likely to perceive consensus between their personal preferences and those of others. In Study 2, they were most likely to describe themselves as unique and to make these self-relevant decisions quickly. Marginality is a psychological reality, not just a statistical one, for those with stigmatized and concealable "master status" conditions.
Rockenbach, Bettina; Milinski, Manfred
2011-11-08
Conflicts of interest between the community and its members are at the core of human social dilemmas. If observed selfishness has future costs, individuals may hide selfish acts but display altruistic ones, and peers aim at identifying the most selfish persons to avoid them as future social partners. An interaction involving hiding and seeking information may be inevitable. We staged an experimental social-dilemma game in which actors could pay to conceal information about their contribution, giving, and punishing decisions from an observer who selects her future social partners from the actors. The observer could pay to conceal her observation of the actors. We found sophisticated dynamic strategies on either side. Actors hide their severe punishment and low contributions but display high contributions. Observers select high contributors as social partners; remarkably, punishment behavior seems irrelevant for qualifying as a social partner. That actors nonetheless pay to conceal their severe punishment adds a further puzzle to the role of punishment in human social behavior. Competition between hiding and seeking information about social behavior may be even more relevant and elaborate in the real world but usually is hidden from our eyes.
ERIC Educational Resources Information Center
Bathje, Geoff J.; Kim, Eunha; Rau, Ellen; Bassiouny, Muhammad Adam; Kim, Taehoon
2014-01-01
This study examined attitudes toward face-to-face (f2f) and online counseling among 228 Korean college students. In addition, it tested a hypothesized model proposing that general propensities (i.e., self-concealment, openness to experience, and loss of face) would influence counseling-specific expectations (i.e., self-stigma and disclosure…
Code of Federal Regulations, 2013 CFR
2013-04-01
... information technology and information technology data? 543.20 Section 543.20 Indians NATIONAL INDIAN GAMING... § 543.20 What are the minimum internal control standards for information technology and information... prevent the concealment of fraud. (4) Information technology agents having access to Class II gaming...
Code of Federal Regulations, 2014 CFR
2014-04-01
... information technology and information technology data? 543.20 Section 543.20 Indians NATIONAL INDIAN GAMING... § 543.20 What are the minimum internal control standards for information technology and information... prevent the concealment of fraud. (4) Information technology agents having access to Class II gaming...
Stutterheim, Sarah E; Brands, Ronald; Baas, Ineke; Lechner, Lilian; Kok, Gerjo; Bos, Arjan E R
We explored workplace experiences of 10 health care providers with HIV in the Netherlands. We used semi-structured interviews to discuss motivations for disclosure and concealment, reactions to disclosures, the impact of reactions, and coping with negative reactions. Reasons for disclosure were wanting to share the secret, expecting positive responses, observing positive reactions to others, wanting to prevent negative reactions, and being advised to disclose. Reasons for concealment included fearing negative reactions, observing negative reactions, previous negative experiences, having been advised to conceal, and considering disclosure unnecessary. Positive reactions included seeing HIV as a nonissue; showing interest, support, and empathy; and maintaining confidentiality. Negative reactions included management wanting to inform employees, work restrictions, hiring difficulties, gossip, and hurtful comments, resulting in participants being upset, taken aback, angry, depressed, or feeling resignation. Participants coped by providing information, standing above the experience, attributing reactions to ignorance, seeking social support, or leaving their jobs. Copyright © 2017 Association of Nurses in AIDS Care. Published by Elsevier Inc. All rights reserved.
Concealment of type 1 diabetes at work in Finland: a mixed-method study
Munir, Fehmidah; Moilanen, Leena; Räsänen, Kimmo; Hänninen, Vilma
2018-01-01
Objectives To explore the possible reasons for concealing type 1 diabetes (T1D) at work. Methods The main set of data came from a cross-sectional survey (response rate 49.3%), the participants of which were 688 wage earners with T1D. Concealment of T1D was measured by asking respondents have they ever during their working career hidden their diabetes from their (A) colleagues and (B) line manager. Furthermore, semistructured interviews (n=20) were conducted to obtain deeper understanding. Questionnaire data were analysed using logistic regression analyses and qualitative interviews with inductive thematic analysis. Results About 30% of wage earners with T1D had concealed their condition during their working career from their colleagues and almost 20% from their line manager. Individuals aged 18–44 years age were more likely to conceal their T1D from their colleagues than older workers during their working career. Not disclosing T1D to the extended family (OR 5.24 (95% CI 2.06 to 13.35)), feeling an outsider at work (OR 2.47 (95% CI 1.58 to 3.84)), being embarrassed by receiving special attention at work (OR 1.99 (95% CI 1.33 to 2.96)) and neglecting treatment at work (OR 1.59 (95% CI 1.01 to 2.48)) were all associated with concealment of T1D from colleagues. The youngest age group of 18–24 years were more likely to conceal their T1D from their line managers than the older age groups during their working career. Not disclosing T1D to the extended family (OR 4.41 (95% CI 1.72 to 11.32)), feeling like an outsider at work (OR 2.51 (1.52 to 4.14)) and being embarrassed by receiving special attention at work (OR 1.81 (95% CI 1.13 to 2.91)) were associated with concealment of T1D from line managers. From the interviews, five main themes related to concealment emerged, expressing fears related to the consequences of telling: (1) being perceived as weak, (2) job discrimination, (3) unwanted attention, (4) being seen as a person who uses their T1D for seeking advantages and (5) losing privacy. Conclusions A considerable proportion of wage earners with T1D are concealing their diagnosis often because of feelings associated with stigma. Both overemphasis and underestimation of T1D at work by the colleagues or line manager may lead to concealing T1D and may thus be harmful to self-management of T1D. The obstacles in disclosing T1D might be diminished by giving adequate information at the workplace about the condition and its significance. PMID:29331976
Combined illumination cylindrical millimeter-wave imaging technique for concealed weapon detection
NASA Astrophysics Data System (ADS)
Sheen, David M.; McMakin, Douglas L.; Hall, Thomas E.
2000-07-01
A novel millimeter-wave imaging technique has been developed for personnel surveillance applications, including the detection of concealed weapons, explosives, drugs, and other contraband material. Millimeter-waves are high-frequency radio waves in the frequency band of 30 - 300 GHz, and pose no health threat to humans at moderate power levels. These waves readily penetrate common clothing materials, and are reflected by the human body and by concealed items. The combined illumination cylindrical imaging concept consists of a vertical, high-resolution, millimeter-wave array of antennas which is scanned in a cylindrical manner about the person under surveillance. Using a computer, the data from this scan is mathematically reconstructed into a series of focused 3D images of the person. After reconstruction, the images are combined into a single high-resolution 3D image of the person under surveillance. This combined image is then rendered using 3D computer graphics techniques. The combined cylindrical illumination is critical as it allows the display of information from all angles. This is necessary because millimeter-waves do not penetrate the body. Ultimately, the images displayed to the operate will be icon-based to protect the privacy of the person being screened. Novel aspects of this technique include the cylindrical scanning concept and the image reconstruction algorithm, which was developed specifically for this imaging system. An engineering prototype based on this cylindrical imaging technique has been fabricated and tested. This work has been sponsored by the Federal Aviation Administration.
Hildebrand, Lee; Melchert, Timothy P; Anderson, Rebecca C
2014-08-01
Many healthcare providers have been concerned about the extent to which potential kidney donors use impression management or concealment of important information regarding their medical history, current functioning, or other circumstances that could affect whether they are accepted as donors. To date, however, there has been very little empirical examination of these questions. It is also not known whether donors' use of impression management pre-donation is related to their reactions and adjustment post-donation. This study surveyed 76 individuals who had donated a kidney one to six yr previously regarding their use of impression management and their concealing of information during their psychological evaluations. They were also asked about their reactions to the donation and whether they would make the same decision again. In addition, 21 of these donors participated in focus groups that explored these questions in depth. Many of the kidney donors reported that they possessed very strong motivation to donate and consequently used impression management in their interactions with medical professionals pre-donation. Very few donors, however, indicated that they concealed information during their pre-donation evaluations. The donors' psychological reactions post-donation were generally positive, and nearly all indicated that they would make the same decision again. © 2014 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.
32 CFR 2700.12 - Criteria for and level of original classification.
Code of Federal Regulations, 2011 CFR
2011-07-01
... FOR MICRONESIAN STATUS NEGOTIATIONS SECURITY INFORMATION REGULATIONS Original Classification § 2700.12... be classified only when protecting the national security requires that the information they contain be withheld from public disclosure. Information may not be classified to conceal violations of law...
25 CFR 542.16 - What are the minimum internal control standards for information technology?
Code of Federal Regulations, 2014 CFR
2014-04-01
... information technology? 542.16 Section 542.16 Indians NATIONAL INDIAN GAMING COMMISSION, DEPARTMENT OF THE... standards for information technology? Link to an amendment published at 73 FR 60498, Oct. 10, 2008. This... information technology procedures to go undetected or fraud to be concealed. (5) Non-information technology...
25 CFR 542.16 - What are the minimum internal control standards for information technology?
Code of Federal Regulations, 2013 CFR
2013-04-01
... information technology? 542.16 Section 542.16 Indians NATIONAL INDIAN GAMING COMMISSION, DEPARTMENT OF THE... standards for information technology? Link to an amendment published at 73 FR 60498, Oct. 10, 2008. This... information technology procedures to go undetected or fraud to be concealed. (5) Non-information technology...
Experimental Blind Quantum Computing for a Classical Client.
Huang, He-Liang; Zhao, Qi; Ma, Xiongfeng; Liu, Chang; Su, Zu-En; Wang, Xi-Lin; Li, Li; Liu, Nai-Le; Sanders, Barry C; Lu, Chao-Yang; Pan, Jian-Wei
2017-08-04
To date, blind quantum computing demonstrations require clients to have weak quantum devices. Here we implement a proof-of-principle experiment for completely classical clients. Via classically interacting with two quantum servers that share entanglement, the client accomplishes the task of having the number 15 factorized by servers who are denied information about the computation itself. This concealment is accompanied by a verification protocol that tests servers' honesty and correctness. Our demonstration shows the feasibility of completely classical clients and thus is a key milestone towards secure cloud quantum computing.
Experimental Blind Quantum Computing for a Classical Client
NASA Astrophysics Data System (ADS)
Huang, He-Liang; Zhao, Qi; Ma, Xiongfeng; Liu, Chang; Su, Zu-En; Wang, Xi-Lin; Li, Li; Liu, Nai-Le; Sanders, Barry C.; Lu, Chao-Yang; Pan, Jian-Wei
2017-08-01
To date, blind quantum computing demonstrations require clients to have weak quantum devices. Here we implement a proof-of-principle experiment for completely classical clients. Via classically interacting with two quantum servers that share entanglement, the client accomplishes the task of having the number 15 factorized by servers who are denied information about the computation itself. This concealment is accompanied by a verification protocol that tests servers' honesty and correctness. Our demonstration shows the feasibility of completely classical clients and thus is a key milestone towards secure cloud quantum computing.
Specific NIST projects in support of the NIJ Concealed Weapon Detection and Imaging Program
NASA Astrophysics Data System (ADS)
Paulter, Nicholas G.
1998-12-01
The Electricity Division of the National Institute of Standards and Technology is developing revised performance standards for hand-held (HH) and walk-through (WT) metal weapon detectors, test procedures and systems for these detectors, and a detection/imaging system for finding concealed weapons. The revised standards will replace the existing National Institute of Justice (NIJ) standards for HH and WT devices and will include detection performance specifications as well as system specifications (environmental conditions, mechanical strength and safety, response reproducibility and repeatability, quality assurance, test reporting, etc.). These system requirements were obtained from the Law Enforcement and corrections Technology Advisory Council, an advisory council for the NIJ. Reproducible and repeatable test procedures and appropriate measurement systems will be developed for evaluating HH and WT detection performance. A guide to the technology and application of non- eddy-current-based detection/imaging methods (such as acoustic, passive millimeter-wave and microwave, active millimeter-wave and terahertz-wave, x-ray, etc.) Will be developed. The Electricity Division is also researching the development of a high- frequency/high-speed (300 GH to 1 THz) pulse-illuminated, stand- off, video-rate, concealed weapons/contraband imaging system.
Keene, Danya E; Cowan, Sarah K; Baker, Amy Castro
2015-05-01
We analyzed experiences of stigmatization, concealment, and isolation among African American homeowners who were experiencing mortgage strain. We conducted semistructured interviews between March 2012 and May 2013 with 28 African American homeowners in a northeastern US city who were experiencing mortgage strain. We coded all of the transcripts and reviewed data for codes relating to stigma, sharing information, social support, social isolation, and the meaning of homeownership. Our data showed that mortgage strain can be a concealable stigma. Participants internalized this stigma, expressing shame about their mortgage situation. Additionally, some participants anticipated that others would view them as less worthy given their mortgage trouble. In an effort to avoid stigmatization, many concealed their mortgage trouble, which often led to isolation. This stigmatization, concealment, and isolation seemed to contribute to participants' depression, anxiety, and emotional distress. Stigma may exacerbate stress associated with mortgage strain and contribute to poor mental health, particularly among upwardly mobile African Americans who have overcome significant structural barriers to home ownership. Reducing stigma associated with mortgage strain may help to reduce the health consequences of this stressful life event.
25 CFR 542.16 - What are the minimum internal control standards for information technology?
Code of Federal Regulations, 2012 CFR
2012-04-01
... information technology? 542.16 Section 542.16 Indians NATIONAL INDIAN GAMING COMMISSION, DEPARTMENT OF THE... standards for information technology? Link to an amendment published at 73 FR 60498, Oct. 10, 2008. This... prevent error in general information technology procedures to go undetected or fraud to be concealed. (5...
Medical makeup for concealing facial scars.
Mee, Donna; Wong, Brian J F
2012-10-01
Surgical, laser, and pharmacological therapies are all used to correct scars and surgical incisions, though have limits with respect to how well facial skin can be restored or enhanced. The use of cosmetics has long been a relevant adjunct to all scar treatment modalities. In recent years, technical advancements in the chemistry and composition of cosmetic products have provided the patient with a broader range of products to employ for concealing scars. This review will provide an overview of contemporary methods for concealing facial scars, birthmarks, and pigmentary changes without the use of traditional/dated, heavy appearing camouflage products. Additionally, general guidelines and information will be provided with respect to identifying competent makeup artists for care of the medical patient. The article by no means is meant to be a tutorial, but rather serves as a starting point in this allied field of medicine. Thieme Medical Publishers 333 Seventh Avenue, New York, NY 10001, USA.
Code of Federal Regulations, 2010 CFR
2010-10-01
... information or making a false statement in connection with the registration process? 385.306 Section 385.306... information or making a false statement in connection with the registration process? A carrier that furnishes false or misleading information, or conceals material information in connection with the registration...
Stedmon, Alex W; Eachus, Peter; Baillie, Les; Tallis, Huw; Donkor, Richard; Edlin-White, Robert; Bracewell, Robert
2015-03-01
Individuals trying to conceal knowledge from interrogators are likely to experience raised levels of stress that can manifest itself across biological, physiological, psychological and behavioural factors, providing an opportunity for detection. Using established research paradigms an innovative scalable interrogation was designed in which participants were given a 'token' that represented information they had to conceal from interviewers. A control group did not receive a token and therefore did not have to deceive the investigators. The aim of this investigation was to examine differences between deceivers and truth-tellers across the four factors by collecting data for cortisol levels, sweat samples, heart-rate, respiration, skin temperature, subjective stress ratings and video and audio recordings. The results provided an integrated understanding of responses to interrogation by those actively concealing information and those acting innocently. Of particular importance, the results also suggest, for the first time in an interrogation setting, that stressed individuals may secrete a volatile steroid based marker that could be used for stand-off detection. The findings are discussed in relation to developing a scalable interrogation protocol for future research in this area. Copyright © 2014 Elsevier Ltd and The Ergonomics Society. All rights reserved.
Long, Ashley S; Ambegaonkar, Jatin P; Fahringer, Patty M
2011-12-01
The performing arts style of cirque has grown in popularity, with high-school participants increasingly practicing this style. Still, little research has examined the injury reporting rates and patterns in this population. Our study aimed to compare injury reporting rates and injury concealment patterns between high-school cirque performers and a peer-group of basketball players. Fifty participants (30 cirque, 20 basketball) completed a 12-item injury history and concealment instrument with chi-squared analyses and Fisher's exact tests comparing groups (p = 0.05). While no group differences (p = 0.36) existed in injuries reported, basketball players were more likely (p = 0.01) to miss participation due to injury than cirque performers. No significant difference existed between participants regarding which healthcare provider they reported to first (p = 0.27), but basketball players reported their injuries to the athletic trainer at higher rates (50%) than cirque performers (20%). A nonsignificant trend (p = 0.08) was noted in promptness to report injury, with more cirque performers (13%) concealing their injuries than basketball players (5%). Several reasons were noted for concealment of injury, with the most common being the belief that the injury would "go away" on its own. Knee injuries were most common in basketball players (23.7%) and back and knee injuries (10.5% each) in cirque performers. Despite similar injury rates, cirque participants concealed injuries more than peer-basketball players. Reasons may include losing performance roles, unfamiliarity and low trust with healthcare providers, ignorance about initially minor-looking injuries, and higher pain tolerance thresholds. Education and communication are essential to allow performing artists to seek healthcare support. Research is needed to appropriately understand and meet the needs of this underserved performing artist population.
The need for randomization in animal trials: an overview of systematic reviews.
Hirst, Jennifer A; Howick, Jeremy; Aronson, Jeffrey K; Roberts, Nia; Perera, Rafael; Koshiaris, Constantinos; Heneghan, Carl
2014-01-01
Randomization, allocation concealment, and blind outcome assessment have been shown to reduce bias in human studies. Authors from the Collaborative Approach to Meta Analysis and Review of Animal Data from Experimental Studies (CAMARADES) collaboration recently found that these features protect against bias in animal stroke studies. We extended the scope the work from CAMARADES to include investigations of treatments for any condition. We conducted an overview of systematic reviews. We searched Medline and Embase for systematic reviews of animal studies testing any intervention (against any control) and we included any disease area and outcome. We included reviews comparing randomized versus not randomized (but otherwise controlled), concealed versus unconcealed treatment allocation, or blinded versus unblinded outcome assessment. Thirty-one systematic reviews met our inclusion criteria: 20 investigated treatments for experimental stroke, 4 reviews investigated treatments for spinal cord diseases, while 1 review each investigated treatments for bone cancer, intracerebral hemorrhage, glioma, multiple sclerosis, Parkinson's disease, and treatments used in emergency medicine. In our sample 29% of studies reported randomization, 15% of studies reported allocation concealment, and 35% of studies reported blinded outcome assessment. We pooled the results in a meta-analysis, and in our primary analysis found that failure to randomize significantly increased effect sizes, whereas allocation concealment and blinding did not. In our secondary analyses we found that randomization, allocation concealment, and blinding reduced effect sizes, especially where outcomes were subjective. Our study demonstrates the need for randomization, allocation concealment, and blind outcome assessment in animal research across a wide range of outcomes and disease areas. Since human studies are often justified based on results from animal studies, our results suggest that unduly biased animal studies should not be allowed to constitute part of the rationale for human trials.
Deciding to Reveal Sexual Information and Sexuality Education in Mother-Daughter Relationships
ERIC Educational Resources Information Center
Coffelt, Tina A.
2017-01-01
Communication privacy management theory informed this study of nine mothers and their 18- or 19-year-old daughters who were interviewed to understand privacy rule foundations that influence their decisions to reveal or conceal sexual information. Findings reveal the salience of motivation and the risk-benefit ratio when making decisions about…
Optic-null space medium for cover-up cloaking without any negative refraction index materials
Sun, Fei; He, Sailing
2016-01-01
With the help of optic-null medium, we propose a new way to achieve invisibility by covering up the scattering without using any negative refraction index materials. Compared with previous methods to achieve invisibility, the function of our cloak is to cover up the scattering of the objects to be concealed by a background object of strong scattering. The concealed object can receive information from the outside world without being detected. Numerical simulations verify the performance of our cloak. The proposed method will be a great addition to existing invisibility technology. PMID:27383833
Optic-null space medium for cover-up cloaking without any negative refraction index materials.
Sun, Fei; He, Sailing
2016-07-07
With the help of optic-null medium, we propose a new way to achieve invisibility by covering up the scattering without using any negative refraction index materials. Compared with previous methods to achieve invisibility, the function of our cloak is to cover up the scattering of the objects to be concealed by a background object of strong scattering. The concealed object can receive information from the outside world without being detected. Numerical simulations verify the performance of our cloak. The proposed method will be a great addition to existing invisibility technology.
ERIC Educational Resources Information Center
von Hippel, Frank; Primack, Joel
1972-01-01
Considers devices by which the executive branch exploits its scientific advisors for political advantage while concealing much of the information they have provided'' and discusses ways in which scientists can help bring into being counterbalancing political forces by providing the public and Congress with the information they need.'' (Author/AL)
Memory Detection 2.0: The First Web-Based Memory Detection Test
Kleinberg, Bennett; Verschuere, Bruno
2015-01-01
There is accumulating evidence that reaction times (RTs) can be used to detect recognition of critical (e.g., crime) information. A limitation of this research base is its reliance upon small samples (average n = 24), and indications of publication bias. To advance RT-based memory detection, we report upon the development of the first web-based memory detection test. Participants in this research (Study1: n = 255; Study2: n = 262) tried to hide 2 high salient (birthday, country of origin) and 2 low salient (favourite colour, favourite animal) autobiographical details. RTs allowed to detect concealed autobiographical information, and this, as predicted, more successfully so than error rates, and for high salient than for low salient items. While much remains to be learned, memory detection 2.0 seems to offer an interesting new platform to efficiently and validly conduct RT-based memory detection research. PMID:25874966
Magsamen-Conrad, Kate; Billotte-Verhoff, China; Greene, Kathryn
2014-11-01
This research examines the effect of online social capital and Internet use on the normally negative effects of technology addiction, especially for individuals prone to self-concealment. Self-concealment is a personality trait that describes individuals who are more likely to withhold personal and private information, inhibiting catharsis and wellbeing. Addiction, in any context, is also typically associated with negative outcomes. However, we investigate the hypothesis that communication technology addiction may positively affect wellbeing for self-concealing individuals when online interaction is positive, builds relationships, or fosters a sense of community. Within these parameters, increased communication through mediated channels (and even addiction) may reverse the otherwise negative effects of self-concealment on wellbeing. Overall, the proposed model offers qualified support for the continued analysis of mediated communication as a potential source for improving the wellbeing for particular individuals. This study is important because we know that healthy communication in relationships, including disclosure, is important to wellbeing. This study recognizes that not all people are comfortable communicating in face-to-face settings. Our findings offer evidence that the presence of computers in human behaviors (e.g., mediated channels of communication and NCTs) enables some individuals to communicate and fos ter beneficial interpersonal relationships, and improve their wellbeing.
Magsamen-Conrad, Kate; Billotte-Verhoff, China; Greene, Kathryn
2014-01-01
This research examines the effect of online social capital and Internet use on the normally negative effects of technology addiction, especially for individuals prone to self-concealment. Self-concealment is a personality trait that describes individuals who are more likely to withhold personal and private information, inhibiting catharsis and wellbeing. Addiction, in any context, is also typically associated with negative outcomes. However, we investigate the hypothesis that communication technology addiction may positively affect wellbeing for self-concealing individuals when online interaction is positive, builds relationships, or fosters a sense of community. Within these parameters, increased communication through mediated channels (and even addiction) may reverse the otherwise negative effects of self-concealment on wellbeing. Overall, the proposed model offers qualified support for the continued analysis of mediated communication as a potential source for improving the wellbeing for particular individuals. This study is important because we know that healthy communication in relationships, including disclosure, is important to wellbeing. This study recognizes that not all people are comfortable communicating in face-to-face settings. Our findings offer evidence that the presence of computers in human behaviors (e.g., mediated channels of communication and NCTs) enables some individuals to communicate and fos ter beneficial interpersonal relationships, and improve their wellbeing. PMID:25568591
Jung, Kyungyong; Kim, Dae Hwan; Ryu, Ji Young
2018-05-11
In this study, we explored the relationship between concealing emotions at work and musculoskeletal symptoms in Korean workers using data from a national, population-based survey. Data were obtained from the third Korean Working Conditions Survey in 2011. We investigated the prevalence of three musculoskeletal symptoms ("back pain", "pain in the upper extremities", and "pain in the lower extremities"). Multiple logistic regression analysis was also performed to determine odds ratios (ORs) for musculoskeletal symptoms according to concealing emotions at work, adjusting for socioeconomic factors. In both sexes, the emotion-concealing group showed a significantly higher prevalence of "pain in the upper extremities" and "pain in the lower extremities" than the non-emotion-concealing group. For back pain, male - but not female - workers who concealed their emotions showed a higher prevalence than their non-emotion-concealing counterparts; the difference was statistically significant. Adjusted ORs for musculoskeletal symptoms (excluding "back pain" for female workers) in the emotion-concealing group were significantly higher. Our study suggests that concealment of emotions is closely associated with musculoskeletal symptoms, and the work environment should operate in consideration not only of the physical health work condition of workers but also of their emotional efforts including concealing emotion at work.
Crandall, Marie; Eastman, Alexander; Violano, Pina; Greene, Wendy; Allen, Steven; Block, Ernest; Christmas, Ashley Britton; Dennis, Andrew; Duncan, Thomas; Foster, Shannon; Goldberg, Stephanie; Hirsh, Michael; Joseph, D'Andrea; Lommel, Karen; Pappas, Peter; Shillinglaw, William
2016-11-01
In the past decade, more than 300,000 people in the United States have died from firearm injuries. Our goal was to assess the effectiveness of two particular prevention strategies, restrictive licensing of firearms and concealed carry laws, on firearm-related injuries in the US Restrictive Licensing was defined to include denials of ownership for various offenses, such as performing background checks for domestic violence and felony convictions. Concealed carry laws allow licensed individuals to carry concealed weapons. A comprehensive review of the literature was performed. We used Grading of Recommendations Assessment, Development, and Evaluation methodology to assess the breadth and quality of the data specific to our Population, Intervention, Comparator, Outcomes (PICO) questions. A total of 4673 studies were initially identified, then seven more added after two subsequent, additional literature reviews. Of these, 3,623 remained after removing duplicates; 225 case reports, case series, and reviews were excluded, and 3,379 studies were removed because they did not focus on prevention or did not address our comparators of interest. This left a total of 14 studies which merited inclusion for PICO 1 and 13 studies which merited inclusion for PICO 2. PICO 1: We recommend the use of restrictive licensing to reduce firearm-related injuries.PICO 2: We recommend against the use of concealed carry laws to reduce firearm-related injuries.This committee found an association between more restrictive licensing and lower firearm injury rates. All 14 studies were population-based, longitudinal, used modeling to control for covariates, and 11 of the 14 were multi-state. Twelve of the studies reported reductions in firearm injuries, from 7% to 40%. We found no consistent effect of concealed carry laws. Of note, the varied quality of the available data demonstrates a significant information gap, and this committee recommends that we as a society foster a nurturing and encouraging environment that can strengthen future evidence based guidelines. Systematic review, level III.
Clothing adjustments for concealed soft body armor during moderate physical exertion.
Ryan, Greg A; Bishop, Stacy H; Herron, Robert L; Katica, Charles P; Elbon, Bre'anna L; Bosak, Andrew M; Bishop, Phillip
2015-01-01
Previous research has studied the impact of Level II concealed soft body armor (SBA) on the augmentation of heat storage in a hot environment simulating a typical summer day in the southeastern United States (wet bulb globe temperature [WBGT] = 30°C) and noted a significant difference between macro- and micro-WBGTs. The purpose of this study was to characterize the microclimate (micro-WBGT) under a concealed Level II SBA during 60 min of moderately intense work at two separate macro-WBGTs (26°C and 30°C), and to establish WBGT corrections to allow prediction of heat strain in an individual wearing a concealed Level II SBA. A single trial was performed with nine volunteers (27 ± 4 years) outfitted with a simulated standard law enforcement uniform and a traditional concealed Level II SBA, in a moderately warm environment (WBGT = 26°C). Each participant performed cycles of 12 min of walking (1.25 L · min(-1)) and 3 min of arm curls (14.3 kg, 0.6 L · min(-1)) with a 5 min rest after every other cycle, for a total of 60 minutes. This trial was compared to an identical previously completed 60-min work bout at 30°C. A two-way repeated measures ANOVA with Post hoc Bonferroni and paired samples t-test analysis was conducted. A greater difference between macro- micro-WBGTs existed at 26°C compared to the 30°C macro-WBGT. Under these conditions, a moderate work in Level II SBA requires a WBGT correction of 8.9°C and 6.2°C at macro-WBGTs of 26°C and 30°C, respectively. A modified simple linear regression prediction model was established for mean Micro-WBGT for each macro-WBGTs after the plateau point at the 30 min mark. The derivation regressions at 26°C (R(2) = 0.99), and 30°C (R(2) = 0.99) indicate that micro-WBGT could be predicted for each 15 minutes time at both macro-WBGTs tested for individuals doing moderate intensity (300 Kcals · hr(-1)) work wearing concealed Level II SBA.
An Exploratory Investigation of Social Stigma and Concealment in Patients with Multiple Sclerosis.
Cook, Jonathan E; Germano, Adriana L; Stadler, Gertraud
2016-01-01
We conducted a preliminary investigation into dimensions of stigma and their relation to disease concealment in a sample of American adults living with multiple sclerosis (MS). Fifty-three adults with MS in the United States completed an online survey assessing anticipated, internalized, and isolation stigma, as well as concealment. Responses to all the scales were relatively low, on average, but above scale minimums (P < .001). Ratings of isolation stigma and concealment were highest. Anticipated stigma strongly predicted concealment. Many adults living with MS may be concerned that they will be the target of social stigma because of their illness. These concerns are associated with disease concealment. More research is needed to investigate how MS stigma and concealment may be independent contributors to health in patients with MS.
NASA Astrophysics Data System (ADS)
Bates, Tiffany R.; Mc Leod, Roger D.; Mc Leod, David M.
2003-10-01
The Pequakets Molocket (adherent of God La[ngued]oc Christ Cathar Spirit-signal) and Metallak operated in NH and the western border area of ME, during the early 1800s. Molocket requested shelter in South Paris, ME during a powerful thunderstorm. Denied access, she cursed that area. Our interests have led us to recognize that there may be psychological reasons that deception is good strategic procedure for concealing valuable activities associated with impact power groups striving to protect their operating turf. Many sites associated with tradition-respecting Native Americans are quite electromagnetically responsive to climate change. Metallak (mathematician-applied astronomer God Spirit-signal) is purported to have driven off his son over purloined furs; that elder son then operated among the MiKmaw/Micmacs of ME and the Canadian Maritimes. They are purported to make the weather. Information protection and surreptitious data collection may indicate an impact groups concealed interests.
Inter-Identity Autobiographical Amnesia in Patients with Dissociative Identity Disorder
Huntjens, Rafaële J. C.; Verschuere, Bruno; McNally, Richard J.
2012-01-01
Background A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder) is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive of dissociative amnesia. The aim of the current study was to objectively assess transfer of autobiographical information between identities in a larger sample of DID patients. Methods Using a concealed information task, we assessed recognition of autobiographical details in an amnesic identity. Eleven DID patients, 27 normal controls, and 23 controls simulating DID participated. Controls and simulators were matched to patients on age, education level, and type of autobiographical memory tested. Findings Although patients subjectively reported amnesia for the autobiographical details included in the task, the results indicated transfer of information between identities. Conclusion The results call for a revision of the DID definition. The amnesia criterion should be modified to emphasize its subjective nature. PMID:22815769
Inter-identity autobiographical amnesia in patients with dissociative identity disorder.
Huntjens, Rafaële J C; Verschuere, Bruno; McNally, Richard J
2012-01-01
A major symptom of Dissociative Identity Disorder (DID; formerly Multiple Personality Disorder) is dissociative amnesia, the inability to recall important personal information. Only two case studies have directly addressed autobiographical memory in DID. Both provided evidence suggestive of dissociative amnesia. The aim of the current study was to objectively assess transfer of autobiographical information between identities in a larger sample of DID patients. Using a concealed information task, we assessed recognition of autobiographical details in an amnesic identity. Eleven DID patients, 27 normal controls, and 23 controls simulating DID participated. Controls and simulators were matched to patients on age, education level, and type of autobiographical memory tested. Although patients subjectively reported amnesia for the autobiographical details included in the task, the results indicated transfer of information between identities. The results call for a revision of the DID definition. The amnesia criterion should be modified to emphasize its subjective nature.
An Estimation Approach to Extract Multimedia Information in Distributed Steganographic Images
2007-07-01
image steganography (DIS) [8] is a new method of concealing secret information in several host images , leaving...distributed image steganography , steganalysis, estimation, image quality matrix 1 Introduction Steganography is a method that hides secret information...used to sufficiently hide a secret image . Another emerging image steganographic technique is referred to as distributed image steganography
Venetis, Maria K; Chernichky-Karcher, Skye; Gettings, Patricia E
2018-06-01
Within the context of mental illness disclosure between friends, this study tested the disclosure decision-making model (DD-MM; Greene, 2009) to comprehensively investigate factors that predict disclosure enactment strategies. The DD-MM describes how individuals determine whether they will reveal or conceal non-visible health information. Processes of revealing, called disclosures, take various forms including preparation and rehearsal, directness, third-party disclosure, incremental disclosures, entrapment, and indirect mediums (Afifi & Steuber, 2009). We explore the disclosure decision-making process to understand how college students select to disclose their mental illness information with a friend. Participants were 144 students at a Midwestern university who had disclosed their mental illness information to a friend. Structural equation modeling analyses revealed that college students choose strategies based on their evaluation of information assessment and closeness, and that for some strategies, efficacy mediates the relationship between information assessment and strategy. This manuscript discusses implications of findings and suggests direction for future research.
Student attitudes toward concealed handguns on campus at 2 universities.
Cavanaugh, Michael R; Bouffard, Jeffrey A; Wells, William; Nobles, Matt R
2012-12-01
We examined student support for a policy that would allow carrying of concealed handguns on university campuses. Large percentages of students at 2 universities expressed very low levels of comfort with the idea of permitting concealed handgun carrying on campus, suggesting that students may not welcome less restrictive policies. Students held slightly different opinions about concealed handguns on and off campus, suggesting that they view the campus environment as unique with respect to concealed handgun carrying.
Macoveciuc, Ioana; Márquez-Grant, Nicholas; Horsfall, Ian; Zioupos, Peter
2017-06-01
Burning of human remains is one method used by perpetrators to conceal fatal trauma and expert opinions regarding the degree of skeletal evidence concealment are often disparate. This experiment aimed to reduce this incongruence in forensic anthropological interpretation of burned human remains and implicitly contribute to the development of research methodologies sufficiently robust to withstand forensic scrutiny in the courtroom. We have tested the influence of thermal alteration on pre-existing sharp and blunt trauma on twenty juvenile sheep radii in the laboratory using an automated impact testing system and an electric furnace. The testing conditions simulated a worst-case scenario where remains with pre-existing sharp or blunt trauma were exposed to burning with an intentional vehicular fire scenario in mind. All impact parameters as well as the burning conditions were based on those most commonly encountered in forensic cases and maintained constant throughout the experiment. The results have shown that signatures associated with sharp and blunt force trauma were not masked by heat exposure and highlights the potential for future standardization of fracture analysis in burned bone. Our results further emphasize the recommendation given by other experts on handling, processing and recording burned remains at the crime scene and mortuary. Copyright © 2017 Elsevier B.V. All rights reserved.
Student Attitudes Toward Concealed Handguns on Campus at 2 Universities
Bouffard, Jeffrey A.; Wells, William; Nobles, Matt R.
2012-01-01
We examined student support for a policy that would allow carrying of concealed handguns on university campuses. Large percentages of students at 2 universities expressed very low levels of comfort with the idea of permitting concealed handgun carrying on campus, suggesting that students may not welcome less restrictive policies. Students held slightly different opinions about concealed handguns on and off campus, suggesting that they view the campus environment as unique with respect to concealed handgun carrying. PMID:22720763
Classification-Based Spatial Error Concealment for Visual Communications
NASA Astrophysics Data System (ADS)
Chen, Meng; Zheng, Yefeng; Wu, Min
2006-12-01
In an error-prone transmission environment, error concealment is an effective technique to reconstruct the damaged visual content. Due to large variations of image characteristics, different concealment approaches are necessary to accommodate the different nature of the lost image content. In this paper, we address this issue and propose using classification to integrate the state-of-the-art error concealment techniques. The proposed approach takes advantage of multiple concealment algorithms and adaptively selects the suitable algorithm for each damaged image area. With growing awareness that the design of sender and receiver systems should be jointly considered for efficient and reliable multimedia communications, we proposed a set of classification-based block concealment schemes, including receiver-side classification, sender-side attachment, and sender-side embedding. Our experimental results provide extensive performance comparisons and demonstrate that the proposed classification-based error concealment approaches outperform the conventional approaches.
25 CFR 11.444 - Carrying concealed weapons.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 25 Indians 1 2014-04-01 2014-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor unless...
25 CFR 11.444 - Carrying concealed weapons.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 25 Indians 1 2013-04-01 2013-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor unless...
25 CFR 11.444 - Carrying concealed weapons.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 25 Indians 1 2011-04-01 2011-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor unless...
25 CFR 11.444 - Carrying concealed weapons.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 25 Indians 1 2010-04-01 2010-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor unless...
25 CFR 11.444 - Carrying concealed weapons.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 25 Indians 1 2012-04-01 2011-04-01 true Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor unless...
Mental Layouts of Concealed Objects as a Function of Bizarre Imagery and Retention Interval.
ERIC Educational Resources Information Center
Iaccino, James; And Others
To determine whether concealed imagery was an effective mnemonic aid in the recall of paired objects, two studies were conducted with explicitly worded instructions to conceal targets and with variable image formation periods. In each study, 40 subjects were presented with counterbalanced verbal descriptions of Concealed, Pictorial, and Separate…
Mapping Fearscapes of a Mammalian Herbivore using Terrestrial LiDAR and UAV Imagery
NASA Astrophysics Data System (ADS)
Olsoy, P.; Nobler, J. D.; Forbey, J.; Rachlow, J. L.; Burgess, M. A.; Glenn, N. F.; Shipley, L. A.
2013-12-01
Concealment allows prey animals to remain hidden from a predator and can influence both real and perceived risks of predation. The heterogeneous nature of vegetative structure can create a variable landscape of concealment - a 'fearscape' - that may influence habitat quality and use by prey. Traditional measurements of concealment rely on a limited number of distances, heights, and vantage points, resulting in small snapshots of concealment available to a prey animal. Our objective was to demonstrate the benefits of emerging remote sensing techniques to map fearscapes for pygmy rabbits (Brachylagus idahoensis) in sagebrush steppe habitat across a continuous range of scales. Specifically, we used vegetation height rasters derived from terrestrial laser scanning (TLS) to create viewsheds from multiple vantage points, representing predator visibility. The sum of all the viewsheds modeled horizontal concealment of prey at both the shrub and patch scales. We also used a small, unmanned aerial vehicle (UAV) to determine vertical concealment at a habitat scale. Terrestrial laser scanning provided similar estimates of horizontal concealment at the shrub scale when compared to photographic methods (R2 = 0.85). Both TLS and UAV provide the potential to quantify concealment of prey from multiple distances, heights, or vantage points, allowing the creation of a manipulable fearscape map that can be correlated with habitat use by prey animals. The predictive power of such a map also could identify shrubs or patches for fine scale nutritional and concealment analysis for future investigation and conservation efforts. Fearscape map at the mound-scale. Viewsheds were calculated from 100 equally spaced observer points located 4 m from the closest on-mound sagebrush of interest. Red areas offer low concealment, while green areas provide high concealment.
Standoff concealed weapon detection using a 350-GHz radar imaging system
NASA Astrophysics Data System (ADS)
Sheen, David M.; Hall, Thomas E.; Severtsen, Ronald H.; McMakin, Douglas L.; Hatchell, Brian K.; Valdez, Patrick L. J.
2010-04-01
The sub-millimeter (sub-mm) wave frequency band from 300 - 1000 GHz is currently being developed for standoff concealed weapon detection imaging applications. This frequency band is of interest due to the unique combination of high resolution and clothing penetration. The Pacific Northwest National Laboratory (PNNL) is currently developing a 350 GHz, active, wideband, three-dimensional, radar imaging system to evaluate the feasibility of active sub-mm imaging for standoff detection. Standoff concealed weapon and explosive detection is a pressing national and international need for both civilian and military security, as it may allow screening at safer distances than portal screening techniques. PNNL has developed a prototype active wideband 350 GHz radar imaging system based on a wideband, heterodyne, frequency-multiplier-based transceiver system coupled to a quasi-optical focusing system and high-speed rotating conical scanner. This prototype system operates at ranges up to 10+ meters, and can acquire an image in 10 - 20 seconds, which is fast enough to scan cooperative personnel for concealed weapons. The wideband operation of this system provides accurate ranging information, and the images obtained are fully three-dimensional. During the past year, several improvements to the system have been designed and implemented, including increased imaging speed using improved balancing techniques, wider bandwidth, and improved image processing techniques. In this paper, the imaging system is described in detail and numerous imaging results are presented.
ERIC Educational Resources Information Center
Phillips, Jeffrey Douglas
1990-01-01
Significant information on the relative thickness of plutons, the structure of poorly exposed or concealed magnetic units, and possible evidence of mineralized ground are discussed. The techniques used to produce images that reveal the new information are described. A list of 34 references is included. (CW)
An explosives detection system for airline security using coherent x-ray scattering technology
NASA Astrophysics Data System (ADS)
Madden, Robert W.; Mahdavieh, Jacob; Smith, Richard C.; Subramanian, Ravi
2008-08-01
L-3 Communications Security and Detection Systems (SDS) has developed a new system for automated alarm resolution in airline baggage Explosive Detection Systems (EDS) based on coherent x-ray scattering spectroscopy. The capabilities of the system were demonstrated in tests with concealed explosives at the Transportation Security Laboratory and airline passenger baggage at Orlando International Airport. The system uses x-ray image information to identify suspicious objects and performs targeted diffraction measurements to classify them. This extra layer of detection capability affords a significant reduction in the rate of false alarm objects that must presently be resolved by opening passenger bags for hand inspection.
Bruce, Douglas; Harper, Gary W.; Bauermeister, Jose A.
2015-01-01
Introduction Minority stress processes have been shown to have significant associations with negative mental health outcomes among sexual minority populations. Given that adversity may be experienced growing up as a sexual minority in heteronormative, if not heterosexist, environments, our research on resilience among sexual minority male youth proposes that positive identity development may buffer the effects of a range of minority stress processes. Methods An ethnically diverse sample of 200 sexual minority males ages 16–24 (mean age, 20.9 years) was recruited using mixed recruitment methods. We developed and tested two new measures: concealment stress during adolescence and sexual minority-related positive identity development. We then tested a path model that assessed the effects of minority stressors, positive identity development, and social support on major depressive symptoms. Results Experience of stigma was associated with internalized homophobia (β=.138, p<.05) and major depressive symptoms (β=1.076, OR=2.933, p<.001), and internalized homophobia partially mediated experience’s effects on major depression (β=.773, OR=2.167, p<.001). Concealment stress was associated with positive identity development (β=.155, p<.05) and internalized homophobia (β=.418, p<.001), and positive identity development partially mediated concealment stress’s effects on internalized homophobia (β=−.527, p<.001). Concealment stress demonstrated a direct effect on major depression (β=1.400, OR=4.056, p<.001), and indirect paths to social support through positive identity development. Conclusions With these results, we offer an exploratory model that empirically identifies significant paths among minority stress dimensions, positive identity development, and major depressive symptoms. This study helps further our understanding of minority stress, identity development, and resources of resilience among sexual minority male youth. PMID:26478901
Bruce, Douglas; Harper, Gary W; Bauermeister, Jose A
2015-09-01
Minority stress processes have been shown to have significant associations with negative mental health outcomes among sexual minority populations. Given that adversity may be experienced growing up as a sexual minority in heteronormative, if not heterosexist, environments, our research on resilience among sexual minority male youth proposes that positive identity development may buffer the effects of a range of minority stress processes. An ethnically diverse sample of 200 sexual minority males ages 16-24 (mean age, 20.9 years) was recruited using mixed recruitment methods. We developed and tested two new measures: concealment stress during adolescence and sexual minority-related positive identity development. We then tested a path model that assessed the effects of minority stressors, positive identity development, and social support on major depressive symptoms. Experience of stigma was associated with internalized homophobia (β=.138, p<.05) and major depressive symptoms (β=1.076, OR=2.933, p<.001), and internalized homophobia partially mediated experience's effects on major depression (β=.773, OR=2.167, p<.001). Concealment stress was associated with positive identity development (β=.155, p<.05) and internalized homophobia (β=.418, p<.001), and positive identity development partially mediated concealment stress's effects on internalized homophobia (β=-.527, p<.001). Concealment stress demonstrated a direct effect on major depression (β=1.400, OR=4.056, p<.001), and indirect paths to social support through positive identity development. With these results, we offer an exploratory model that empirically identifies significant paths among minority stress dimensions, positive identity development, and major depressive symptoms. This study helps further our understanding of minority stress, identity development, and resources of resilience among sexual minority male youth.
Pro-anorexia websites: what a clinician should know.
Harshbarger, Jenni L; Ahlers-Schmidt, Carolyn R; Mayans, Laura; Mayans, David; Hawkins, Joseph H
2009-05-01
The purpose of this study was to conduct a content analysis of the "Tips and Tricks" section of pro-ana websites to better understand information shared on these sites, and aide clinicians in identification, treatment, and prevention of anorexia. Nine pro-ana websites were evaluated to identify categories of information in "Tips and Tricks." A content analysis was performed using emergent coding methods and 16 categories were determined. Reliability was acceptable (Cohen's Kappa = 0.702). Discrepancies were corrected by consensus. Frequencies of individual categories were computed. Most "Tips and Tricks" are directed at dieting/restricting calories (28.6%) and distraction (14.0%). Most disturbing, 11% of comments were directed at lying and concealing symptoms. Clinicians aware of "Tips and Tricks" might be better equipped to recognize the symptoms of anorexia early in treatment. Knowledge of "Tips and Tricks" can also facilitate better education, making it difficult for clients to conceal their illness.
Campaign for Right to Carry Concealed Guns on Campuses Gains Traction
ERIC Educational Resources Information Center
Wiseman, Rachel
2012-01-01
Five years after the Virginia Tech massacre prompted a student in Texas to start a Facebook page in favor of the right to carry concealed weapons on college campuses, the resulting group, Students for Concealed Carry, has advanced its cause. In more than a dozen states, legislation has been introduced to allow the carrying of concealed firearms on…
Regulatory focus moderates the social performance of individuals who conceal a stigmatized identity.
Newheiser, Anna-Kaisa; Barreto, Manuela; Ellemers, Naomi; Derks, Belle; Scheepers, Daan
2015-12-01
People often choose to hide a stigmatized identity to avoid bias. However, hiding stigma can disrupt social interactions. We considered whether regulatory focus qualifies the social effects of hiding stigma by examining interactions in which stigmatized participants concealed a devalued identity from non-stigmatized partners. In the Prevention Focus condition, stigmatized participants were instructed to prevent a negative impression by concealing the identity; in the Promotion Focus condition, they were instructed to promote a positive impression by concealing the identity; in the Control condition, they were simply asked to conceal the identity. Both non-stigmatized partners and independent raters rated the interactions more positively in the Promotion Focus condition. Thus, promotion focus is interpersonally beneficial for individuals who conceal a devalued identity. © 2015 The British Psychological Society.
Edwards, Katie M; Sylaska, Kateryna M
2013-11-01
Preliminary research suggests that partner violence is a problem among lesbian, gay, bisexual, transgender, queer, and questioning (LGBTQ) college youth. However, there is no study to date with college youth on the factors associated with perpetration of same-sex partner violence, which is needed to inform prevention efforts specific to this population. Thus, the purpose of the current study was to assess how facets of minority stress (i.e., sexual-orientation-related victimization, sexual minority stigma, internalized homonegativity, sexual identity concealment) relate to physical, sexual, and psychological partner violence perpetration among LGBTQ college youth (N = 391; 49% identified as men; 72% Caucasian; M age: 20.77 years). At the bivariate level, physical perpetration was related to identity concealment and internalized homonegativity; sexual perpetration was related to internalized homonegativity; and psychological perpetration was related to sexual-orientation-related victimization. However, at the multivariate level (after controlling for concurrent victimization), psychological perpetration was unrelated to minority stress variables, whereas physical and sexual perpetration were both related to internalized homonegativity; physical perpetration was also related to identity concealment. These results underscore the utility of understanding partner violence among LGBTQ youth through a minority stress framework. Moreover, the current study highlights the need for a better understanding of factors that mediate and moderate the relationship between minority stress and partner violence perpetration among LGBTQ youth in order to inform prevention and intervention efforts.
Attachment style, self-concealment, and interpersonal distance among Japanese undergraduates.
Yukawa, Shintaro; Tokuda, Hideji; Sato, Jun
2007-06-01
The relationships among attachment style, self-concealment, and interpersonal distance were studied with 71 Japanese undergraduates (33 men and 38 women, ages 18 to 20 years, M = 18.7, SD= .6). Participants completed a questionnaire about Self-concealment and Attachment Styles (Secure, Anxious, and Avoidant). One week later, Interpersonal Distance, which individuals maintain between themselves and others, was measured by the stop-distance paradigm. Analysis showed that scores for more Anxious and Avoidant Attachment Styles were positively correlated with those for greater Self-concealment. Scores for greater Self-concealment and more Anxious Attachment Style were also correlated with longer Interpersonal Distance.
Stereo sequence transmission via conventional transmission channel
NASA Astrophysics Data System (ADS)
Lee, Ho-Keun; Kim, Chul-Hwan; Han, Kyu-Phil; Ha, Yeong-Ho
2003-05-01
This paper proposes a new stereo sequence transmission technique using digital watermarking for compatibility with conventional 2D digital TV. We, generally, compress and transmit image sequence using temporal-spatial redundancy between stereo images. It is difficult for users with conventional digital TV to watch the transmitted 3D image sequence because many 3D image compression methods are different. To solve such a problem, in this paper, we perceive the concealment of new information of digital watermarking and conceal information of the other stereo image into three channels of the reference image. The main target of the technique presented is to let the people who have conventional DTV watch stereo movies at the same time. This goal is reached by considering the response of human eyes to color information and by using digital watermarking. To hide right images into left images effectively, bit-change in 3 color channels and disparity estimation according to the value of estimated disparity are performed. The proposed method assigns the displacement information of right image to each channel of YCbCr on DCT domain. Each LSB bit on YCbCr channels is changed according to the bits of disparity information. The performance of the presented methods is confirmed by several computer experiments.
Utility of the exercise electrocardiogram testing in sudden cardiac death risk stratification.
Refaat, Marwan M; Hotait, Mostafa; Tseng, Zian H
2014-07-01
Sudden cardiac death (SCD) remains a major public health problem. Current established criteria identifying those at risk of sudden arrhythmic death, and likely to benefit from implantable cardioverter defibrillators (ICDs), are neither sensitive nor specific. Exercise electrocardiogram (ECG) testing was traditionally used for information concerning patients' symptoms, exercise capacity, cardiovascular function, myocardial ischemia detection, and hemodynamic responses during activity in patients with hypertrophic cardiomyopathy. We conducted a systematic review of MEDLINE on the utility of exercise ECG testing in SCD risk stratification. Exercise testing can unmask suspected primary electrical diseases in certain patients (catecholaminergic polymorphic ventricular tachycardia or concealed long QT syndrome) and can be effectively utilized to risk stratify patients at an increased (such as early repolarization syndrome and Brugada syndrome) or decreased risk of SCD, such as the loss of preexcitation on exercise testing in asymptomatic Wolff-Parkinson-White syndrome. Exercise ECG testing helps in SCD risk stratification in patients with and without arrhythmogenic hereditary syndromes. © 2014 Wiley Periodicals, Inc.
Number Theory and Public-Key Cryptography.
ERIC Educational Resources Information Center
Lefton, Phyllis
1991-01-01
Described are activities in the study of techniques used to conceal the meanings of messages and data. Some background information and two BASIC programs that illustrate the algorithms used in a new cryptographic system called "public-key cryptography" are included. (CW)
Concealing Emotions at Work Is Associated with Allergic Rhinitis in Korea.
Seok, Hongdeok; Yoon, Jin-Ha; Won, Jong-Uk; Lee, Wanhyung; Lee, June-Hee; Jung, Pil Kyun; Roh, Jaehoon
2016-01-01
Concealing emotions at work can cause considerable psychological stress. While there is extensive research on the adverse health effects of concealing emotions and the association between allergic diseases and stress, research has not yet investigated whether concealing emotions at work is associated with allergic rhinitis. Allergic rhinitis is a common disease in many industrialized countries, and its prevalence is increasing. Thus, our aim was to determine the strength of this association using data from three years (2007-2009) of the 4th Korean National Health and Nutrition Examination Survey. Participants (aged 20-64) were 8,345 individuals who were economically active and who had completed the questionnaire items on concealing emotions at work. Odds ratio (OR) and 95% confidence intervals (95% CIs) were calculated for allergic rhinitis using logistic regression models. Among all participants, 3,140 subjects (37.6%) reported concealing their emotions at work: 1,661 men and 1,479 women. The OR (95% CIs) for allergic rhinitis among those who concealed emotions at work versus those who did not was 1.318 (1.148-1.512). Stratified by sex, the OR (95% CIs) was 1.307 (1.078-1.585) among men and 1.346 (1.105-1.639) among women. Thus, individuals who concealed their emotions at work were significantly more likely to have a diagnosis of AR in comparison to those who did not. Because concealing emotions at work has adverse health effects, labor policies that aim to reduce this practice are needed.
Method for imaging a concealed object
Davidson, James R [Idaho Falls, ID; Partin, Judy K [Idaho Falls, ID; Sawyers, Robert J [Idaho Falls, ID
2007-07-03
A method for imaging a concealed object is described and which includes a step of providing a heat radiating body, and wherein an object to be detected is concealed on the heat radiating body; imaging the heat radiating body to provide a visibly discernible infrared image of the heat radiating body; and determining if the visibly discernible infrared image of the heat radiating body is masked by the presence of the concealed object.
2013-01-01
Background There is little or no information available on the impact of funding by the food industry on trial outcomes and methodological quality of synbiotics, probiotics and prebiotics research in infants. The objective of this study was to compare the methodological quality, outcomes of food industry sponsored trials versus non industry sponsored trials, with regards to supplementation of synbiotics, probiotics and prebiotics in infant formula. Methods A comprehensive search was conducted to identify published and unpublished randomized clinical trials (RCTs). Cochrane methodology was used to assess the risk of bias of included RCTs in the following domains: 1) sequence generation; 2) allocation concealment; 3) blinding; 4) incomplete outcome data; 5) selective outcome reporting; and 6) other bias. Clinical outcomes and authors’ conclusions were reported in frequencies and percentages. The association between source of funding, risk of bias, clinical outcomes and conclusions were assessed using Pearson’s Chi-square test and the Fisher’s exact test. A p-value < 0.05 was statistically significant. Results Sixty seven completed and 3 on-going RCTs were included. Forty (59.7%) were funded by food industry, 11 (16.4%) by non-industry entities and 16 (23.9%) did not specify source of funding. Several risk of bias domains, especially sequence generation, allocation concealment and blinding, were not adequately reported. There was no significant association between the source of funding and sequence generation, allocation concealment, blinding and selective reporting, majority of reported clinical outcomes or authors’ conclusions. On the other hand, source of funding was significantly associated with the domains of incomplete outcome data, free of other bias domains as well as reported antibiotic use and conclusions on weight gain. Conclusion In RCTs on infants fed infant formula containing probiotics, prebiotics or synbiotics, the source of funding did not influence the majority of outcomes in favour of the sponsors’ products. More non-industry funded research is needed to further assess the impact of funding on methodological quality, reported clinical outcomes and authors’ conclusions. PMID:24219082
Schrimshaw, Eric W; Siegel, Karolynn; Downing, Martin J; Parsons, Jeffrey T
2013-02-01
Although bisexual men report lower levels of mental health relative to gay men, few studies have examined the factors that contribute to bisexual men's mental health. Bisexual men are less likely to disclose, and more likely to conceal (i.e., a desire to hide), their sexual orientation than gay men. Theory suggests that this may adversely impact their mental health. This report examined the factors associated with disclosure and with concealment of sexual orientation, the association of disclosure and concealment with mental health, and the potential mediators (i.e., internalized homophobia, social support) of this association with mental health. An ethnically diverse sample of 203 non-gay-identified, behaviorally bisexual men who do not disclose their same-sex behavior to their female partners were recruited in New York City to complete a single set of self-report measures. Concealment was associated with higher income, a heterosexual identification, living with a wife or girlfriend, more frequent sex with women, and less frequent sex with men. Greater concealment, but not disclosure to friends and family, was significantly associated with lower levels of mental health. Multiple mediation analyses revealed that both internalized homophobia and general emotional support significantly mediated the association between concealment and mental health. The findings demonstrate that concealment and disclosure are independent constructs among bisexual men. Further, they suggest that interventions addressing concerns about concealment, emotional support, and internalized homophobia may be more beneficial for increasing the mental health of bisexual men than those focused on promoting disclosure.
Schrimshaw, Eric W.; Siegel, Karolynn; Downing, Martin J.; Parsons, Jeffrey T.
2013-01-01
Objective Although bisexual men report lower levels of mental health relative to gay men, few studies have examined the factors that contribute to bisexual men’s mental health. Bisexual men are less likely to disclose, and more likely to conceal (i.e., a desire to hide), their sexual orientation than gay men. Theory suggests that this may adversely impact their mental health. This report examined the factors associated with disclosure and with concealment of sexual orientation, the association of disclosure and concealment with mental health, and the potential mediators (i.e., internalized homophobia, social support) of this association with mental health. Method An ethnically-diverse sample of 203 non-gay-identified, behaviorally-bisexual men who do not disclose their same-sex behavior to their female partners were recruited in New York City to complete a single set of self-report measures. Results Concealment was associated with higher income, a heterosexual identification, living with a wife or girlfriend, more frequent sex with women, and less frequent sex with men. Greater concealment, but not disclosure to friends and family, was significantly associated with lower levels of mental health. Multiple mediation analyses revealed that both internalized homophobia and general emotional support significantly mediated the association between concealment and mental health. Conclusions The findings demonstrate that concealment and disclosure are independent constructs among bisexual men. Further, they suggest that interventions addressing concerns about concealment, emotional support, and internalized homophobia may be more beneficial for increasing the mental health of bisexual men than those focused on promoting disclosure. PMID:23276123
Geometry, structure, and concealed lithology of the San Rafael Basin, southeastern Arizona
Bultman, Mark W.
1999-01-01
The contiguous United States has been well explored for exposed conventional mineral deposits. Therefore, it is likely that many economically viable and strategically significant conventional undiscovered mineral deposits will be found in bedrock concealed beneath basin sediments. Mineral resource assessments must incorporate an understanding of the geometry, structure, and concealed lithology of basins in order to be accurate. This report presents an analysis of the basin geometry and structure of the San Rafael basin in southeastern Arizona. In addition, a new methodology for inferring concealed lithology is presented and applied in the San Rafael basin. Gravity data is used to model the geometry of the basin using recent models of sediment density vs. depth developed in the region. This modeling indicates that the basin has a maximum depth of approximately 1.05 km plus or minus 0.10 km. In the southern portion, the basin can be modeled as an asymmetric graben faulted on the western margin. The northern portion of the basin is structurally more complex and may have high angle faults on the western, northern, and eastern margin. Near-ground closely spaced Earth’s total intensity magnetic field data is used to locate concealed faults within the basin. This data is also used to infer lithology concealed by shallow basin sediments. Airborne Earth’s total intensity magnetic field data is used to help infer concealed lithology in deep portions of the basin. The product of integrating all data and interpretations is a map which presents the geometry of the basin, faults and contacts concealed by basin sediments, and an estimate of the bedrock lithology concealed by basin sediment. Based on basin geometry and concealed lithology, the San Rafael basin has a high potential for concealed mineral deposits on its western and northern margin. In particular, a newly discovered magnetic anomaly in the northern portion of the basin can be modeled as a granitic intrusion with highly altered margins and may represent a potential mineral resource target. Based on the permeability and porosity of upper basin fill found in nearby basins, the San Rafael basin may contain an aquifer up to 300 meters thick over a substantial area of the basin.
Chaudoir, Stephenie R.; Fisher, Jeffrey D.
2010-01-01
Disclosure is a critical aspect of the experience of people who live with concealable stigmatized identities. This article presents the Disclosure Processes Model (DPM)— a framework that examines when and why interpersonal disclosure may be beneficial. The DPM suggests that antecedent goals representing approach and avoidance motivational systems moderate the effect of disclosure on numerous individual, dyadic, and social contextual outcomes and that these effects are mediated by three distinct processes: (1) alleviation of inhibition, (2) social support, and (3) changes in social information. Ultimately, the DPM provides a framework that advances disclosure theory and identifies strategies that can assist disclosers in maximizing the likelihood that disclosure will benefit well-being. PMID:20192562
DOE Office of Scientific and Technical Information (OSTI.GOV)
Burrows, T.A.; Thoma, P.J.
Two types of ion-mobility detectors were evaluated in both laboratory and field tests. Laboratory test results show that these detectors are highly sensitive to dynamite and pistol powder and have good false-alarm agent rejection. Field tests of these two detectors revealed that they would detect dynamite and Ball-C-Propellent in free air. However, neither of the ion-mobility detectors would detect these explosives if the explosives were concealed.
Development and Validation of the Body Concealment Scale for Scleroderma.
Jewett, Lisa R; Malcarne, Vanessa L; Kwakkenbos, Linda; Harcourt, Diana; Rumsey, Nichola; Körner, Annett; Steele, Russell J; Hudson, Marie; Baron, Murray; Haythornthwaite, Jennifer A; Heinberg, Leslie; Wigley, Fredrick M; Thombs, Brett D
2016-08-01
Body concealment is a component of social avoidance among people with visible differences from disfiguring conditions, including systemic sclerosis (SSc). The study objective was to develop a measure of body concealment related to avoidance behaviors in SSc. Initial items for the Body Concealment Scale for Scleroderma (BCSS) were selected using item analysis in a development sample of 93 American SSc patients. The factor structure of the BCSS was evaluated in 742 Canadian patients with single-factor, 2-factor, and bifactor confirmatory factor analysis models. Convergent and divergent validity were assessed by comparing the BCSS total score with the Brief-Satisfaction with Appearance Scale (Brief-SWAP) and measures of depressive symptoms and pain. A 2-factor model (Comparative Fit Index [CFI] 0.99, Tucker-Lewis Index [TLI] 0.98, Root Mean Square Error of Approximation [RMSEA] 0.08) fit substantially better than a 1-factor model (CFI 0.95, TLI 0.94, RMSEA 0.15) for the 9-item BCSS, but the Concealment with Clothing and Concealment of Hands factors were highly correlated (α = 0.79). The bifactor model (CFI 0.99, TLI 0.99, RMSEA 0.08) also fit well. In the bifactor model, the omega coefficient was high for the general factor (ω = 0.80), but low for the Concealment with Clothing (ω = 0.01) and Concealment of Hands (ω = 0.33) factors. The BCSS total score correlated more strongly with the Brief-SWAP Social Discomfort (r = 0.59) and Dissatisfaction with Appearance (r = 0.53) subscales than with measures of depressive symptoms and pain. The BCSS sum score is a valid indicator of body concealment in SSc that extends the concepts of body concealment and avoidance beyond the realms of body shape and weight to concerns of individuals with visible differences from SSc. © 2016, American College of Rheumatology.
Anklam, Charles; Kirby, Adam; Sharevski, Filipo; Dietz, J Eric
2015-01-01
Active shooting violence at confined settings, such as educational institutions, poses serious security concerns to public safety. In studying the effects of active shooter scenarios, the common denominator associated with all events, regardless of reason/intent for shooter motives, or type of weapons used, was the location chosen and time expended between the beginning of the event and its culmination. This in turn directly correlates to number of casualties incurred in any given event. The longer the event protracts, the more casualties are incurred until law enforcement or another barrier can react and culminate the situation. Using AnyLogic technology, devise modeling scenarios to test multiple hypotheses against free-agent modeling simulation to determine the best method to reduce casualties associated with active shooter scenarios. Test four possible scenarios of responding to active shooter in a public school setting using agent-based computer modeling techniques-scenario 1: basic scenario where no access control or any type of security is used within the school; scenario 2, scenario assumes that concealed carry individual(s) (5-10 percent of the work force) are present in the school; scenario 3, scenario assumes that the school has assigned resource officer; scenario 4, scenario assumes that the school has assigned resource officer and concealed carry individual(s) (5-10 percent) present in the school. Statistical data from modeling scenarios indicating which tested hypothesis resulted in fewer casualties and quicker culmination of event. The use of AnyLogic proved the initial hypothesis that a decrease on response time to an active shooter scenario directly reduced victim casualties. Modeling tests show statistically significant fewer casualties in scenarios where on scene armed responders such as resource officers and concealed carry personnel were present.
NASA Astrophysics Data System (ADS)
Yeom, Seokwon
2013-05-01
Millimeter waves imaging draws increasing attention in security applications for weapon detection under clothing. In this paper, concealed object segmentation and three-dimensional localization schemes are reviewed. A concealed object is segmented by the k-means algorithm. A feature-based stereo-matching method estimates the longitudinal distance of the concealed object. The distance is estimated by the discrepancy between the corresponding centers of the segmented objects. Experimental results are provided with the analysis of the depth resolution.
Shin, Dong Wook; Park, Jong Hyock; Kim, So Young; Park, Eal Whan; Yang, Hyung Kook; Ahn, Eunmi; Park, Seon Mee; Lee, Young Joon; Lim, Myong Cheol; Seo, Hong Gwan
2014-05-01
We aimed to identify the prevalence of feelings of guilt, censure, and concealment of smoking status among cancer patients and their family members who continued to smoke after the patient's diagnosis. Among 990 patient-family member dyads, 45 patients and 173 family members who continued to smoke for at least 1 month after the patients' diagnoses were administered questions examining feelings of guilt, censure, and smoking concealment. Most patients who continued to smoke reported experiencing feelings of guilt toward their families (75.6%) and censure from their family members (77.8%), and many concealed their smoking from their family members (44.4%) or healthcare professionals (46.7%). Family members who continued to smoke also reported feelings of guilt with respect to the patient (63.6%) and that the patient was critical of them (68.9%), and many concealed their smoking from the patient (28.5%) or healthcare professionals (9.3%). Patients' feeling of guilt was associated with concealment of smoking from family members (55.9% vs. 10.0%) or health care professionals (55.9% vs. 20.0%). Family members who reported feeling guilty (36.5% vs. 16.3%) or censured (34.5% vs. 16.7%) were more likely to conceal smoking from patients. Many patients and family members continue to smoke following cancer diagnosis, and the majority of them experience feelings of guilt and censure, which can lead to the concealment of smoking status from families or health care professionals. Feelings of guilt, censure, and concealment of smoking should be considered in the development and implementation of smoking cessation programs for cancer patients and family members. Copyright © 2013 John Wiley & Sons, Ltd.
Bry, Laura Jane; Mustanski, Brian; Garofalo, Robert; Burns, Michelle Nicole
2017-01-01
Disclosure of a sexual or gender minority status has been associated with both positive and negative effects on wellbeing. Few studies have explored the disclosure and concealment process in young people. Interviews were conducted with 10 sexual and/or gender minority individuals, aged 18–22 years, of male birth sex. Data were analyzed qualitatively, yielding determinants and effects of disclosure and concealment. Determinants of disclosure included holding positive attitudes about one’s identity and an implicit devaluation of acceptance by society. Coming out was shown to have both positive and negative effects on communication and social support, and was associated with both increases and decreases in experiences of stigma. Determinants of concealment included lack of comfort with one’s identity and various motivations to avoid discrimination. Concealment was also related to hypervigilance and unique strategies of accessing social support. Results are discussed in light of their clinical implications. PMID:27633070
Bril-Barniv, Shani; Moran, Galia S; Naaman, Adi; Roe, David; Karnieli-Miller, Orit
2017-03-01
People with mental illnesses face the dilemma of whether to disclose or conceal their diagnosis, but this dilemma was scarcely researched. To gain in-depth understanding of this dilemma, we interviewed 29 individuals with mental illnesses: 16 with major depression/bipolar disorders and 13 with schizophrenia. Using a phenomenological design, we analyzed individuals' experiences, decision-making processes, and views of gains and costs regarding concealment and disclosure of mental illness. We found that participants employed both positive and negative disclosure/concealment practices. Positive practices included enhancing personal recovery, community integration, and/or supporting others. Negative practices occurred in forced, uncontrolled situations. We also identified various influencing factors, including familial norms of sharing, accumulated experiences with disclosure, and ascribed meaning to diagnosis. Based on these findings, we deepen the understanding about decision-making processes and the consequences of disclosing or concealing mental illness. We discuss how these finding can help consumers explore potential benefits and disadvantages of mental illness disclosure/concealment occurrences.
Goldstein, Adam O; Viera, Anthony J; Pierson, John; Barnhouse, Kathy K; Tulsky, James A; Richman, Barak D
2015-06-01
Law enforcement officials have asked health care providers to evaluate patient applications for concealed weapon permits. The current study was designed to examine physician beliefs regarding competency to carry a concealed weapon for patients with specific physical and mental conditions. Among 222 North Carolina physicians who participated in this survey (40% response rate), large variation and uncertainty existed for determining competency. Physicians most frequently chose mild dementia, post-traumatic stress disorder, and recent depression as conditions that would render a patient not competent to carry a concealed weapon. Male physicians and those owning a gun were more likely to deem a patient competent. Almost a third of physicians were unsure about competence for most conditions. Physicians asked to assess competency of patients to carry a concealed weapon have quite disparate views on competency and little confidence in their decisions. If physicians are expected to assess patient competence to carry a concealed weapon, more objective criteria and training are needed. Copyright © 2015 John Wiley & Sons, Ltd.
Bry, Laura Jane; Mustanski, Brian; Garofalo, Robert; Burns, Michelle Nicole
2017-01-01
Disclosure of a sexual or gender minority status has been associated with both positive and negative effects on wellbeing. Few studies have explored the disclosure and concealment process in young people. Interviews were conducted with 10 sexual and/or gender minority individuals, aged 18-22 years, of male birth sex. Data were analyzed qualitatively, yielding determinants and effects of disclosure and concealment. Determinants of disclosure included holding positive attitudes about one's identity and an implicit devaluation of acceptance by society. Coming out was shown to have both positive and negative effects on communication and social support and was associated with both increases and decreases in experiences of stigma. Determinants of concealment included lack of comfort with one's identity and various motivations to avoid discrimination. Concealment was also related to hypervigilance and unique strategies of accessing social support. Results are discussed in light of their clinical implications.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 3 2010-01-01 2010-01-01 false Violations. 216.9 Section 216.9 Energy DEPARTMENT OF ENERGY OIL MATERIALS ALLOCATION AND PRIORITY PERFORMANCE UNDER CONTRACTS OR ORDERS TO MAXIMIZE DOMESTIC ENERGY SUPPLIES § 216.9 Violations. Any person who willfully furnishes false information or conceals any...
Code of Federal Regulations, 2014 CFR
2014-10-01
... Documentation; Mortgagee Consent; Validation § 67.142 Penalties. (a) An owner or operator of a vessel with a... fact during the application process for or application process to renew a fishery endorsement of the... information or knowingly conceals a material fact during the application process for or application process to...
Code of Federal Regulations, 2010 CFR
2010-10-01
... Documentation; Mortgagee Consent; Validation § 67.142 Penalties. (a) An owner or operator of a vessel with a... fact during the application process for or application process to renew a fishery endorsement of the... information or knowingly conceals a material fact during the application process for or application process to...
Code of Federal Regulations, 2011 CFR
2011-10-01
... Documentation; Mortgagee Consent; Validation § 67.142 Penalties. (a) An owner or operator of a vessel with a... fact during the application process for or application process to renew a fishery endorsement of the... information or knowingly conceals a material fact during the application process for or application process to...
Code of Federal Regulations, 2012 CFR
2012-10-01
... Documentation; Mortgagee Consent; Validation § 67.142 Penalties. (a) An owner or operator of a vessel with a... fact during the application process for or application process to renew a fishery endorsement of the... information or knowingly conceals a material fact during the application process for or application process to...
Code of Federal Regulations, 2013 CFR
2013-10-01
... Documentation; Mortgagee Consent; Validation § 67.142 Penalties. (a) An owner or operator of a vessel with a... fact during the application process for or application process to renew a fishery endorsement of the... information or knowingly conceals a material fact during the application process for or application process to...
49 CFR 571.108 - Standard No. 108; Lamps, reflective devices, and associated equipment.
Code of Federal Regulations, 2012 CFR
2012-10-01
... which the headlamp is in the design open operating position. Headlamp concealment device means a device.... Headlamp test fixture means a device designed to support a headlamp or headlamp assembly in the test... (other than a standardized sealed beam headlamp designed to conform to paragraph S7.3 or a replaceable...
Psychometric Evaluation of the Pain Attitudes Questionnaire-Revised for People With Advanced Cancer.
Mah, Kenneth; Tran, Kim T; Gauthier, Lynn R; Rodin, Gary; Zimmermann, Camilla; Warr, David; Librach, S Lawrence; Moore, Malcolm; Shepherd, Frances A; Gagliese, Lucia
2017-07-01
Pain-related stoicism and cautiousness are theorized to be more prevalent in older than younger patients and to lead to greater pain under-reporting and consequently inadequate pain management in older patients. The Pain Attitudes Questionnaire-Revised (PAQ-R), which measures 5 pain-related stoicism (fortitude, concealment, superiority) and cautiousness (self-doubt, reluctance) factors in chronic pain, can help test this hypothesis in advanced cancer but requires validation. We conducted a psychometric evaluation of the PAQ-R in 155 younger (younger than 60 years) and 114 older (aged 60 years and older) patients with advanced cancer. Participants showed disagreement with self-doubt items and floor effects with the subscale. Confirmatory factor analyses revealed good fit of the PAQ-R's 5 factors to younger and older groups' data but collinearity between fortitude and concealment. Multisample confirmatory factor analyses supported partial scalar invariance between age groups. Few hypothesized age-related differences were observed. Younger patients reported higher superiority scores than older patients. Whereas older patients showed greater fortitude and superiority with lower average pain intensity, younger patients showed greater concealment or fortitude with greater worst and average pain intensity. Furthermore, whereas older patients displayed greater superiority with lower interference in relations with others, younger patients displayed greater concealment and superiority with greater interference in walking ability and greater concealment and self-doubt with more interference in relations with others. Cross-validation of the PAQ-R's factor structure and identification of pathways to the factors and effect on pain-related outcomes using multivariate approaches are warranted. This article presents the psychometric properties of a measure of 2 particular pain-related attitudes. The measure can help clarify whether these attitudes adversely influence pain reporting in older patients with advanced cancer as hypothesized and, in turn, explain the inadequate pain management frequently reported with this clinical group. Copyright © 2017 American Pain Society. Published by Elsevier Inc. All rights reserved.
Concealed weapons detection using electromagnetic resonances
NASA Astrophysics Data System (ADS)
Hunt, Allen R.; Hogg, R. Douglas; Foreman, William
1998-12-01
Concealed weapons pose a significant threat to both law enforcement and security agency personnel. The uncontrolled environments associated with peacekeeping and the move toward relaxation of concealed weapons laws here in the U.S. provide a strong motivation for developing weapons detection technologies which are noninvasive and can function noncooperatively. Existing weapons detection systems are primarily oriented to detecting metal and require the cooperation of the person being searched. The new generation of detectors under development that focuses primarily on imaging methods, faces problems associated with privacy issues. There remains a need for a weapons detector which is portable, detects weapons remotely, avoids the issues associated with privacy rights, can tell the difference between car keys and a knife, and is affordable enough that one can be issued to every peacekeeper and law enforcement officer. AKELA is developing a concealed weapons detector that uses wideband radar techniques to excite natural electromagnetic resonances that characterize the size, shape, and material composition of an object. Neural network processing is used to classify the difference between weapons and nuisance objects. We have constructed both time and frequency domain test systems and used them to gather experimental data on a variety of armed and unarmed individuals. These experiments have been performed in an environment similar to the operational environment. Preliminary results from these experiments show that it is possible to detect a weapon being carried by an individual from a distance of 10 to 15 feet, and to detect a weapon being concealed behind the back. The power required is about 100 milliwatts. A breadboard system is being fabricated and will be used by AKELA and our law enforcement partner to gather data in operationally realistic situations. While a laptop computer will control the breadboard system, the wideband radar electronics will fit in a box the size of a CD ROM drive of a computer.
Jordan, Daniel M; Do, Ron
2018-04-11
While sequence-based genetic tests have long been available for specific loci, especially for Mendelian disease, the rapidly falling costs of genome-wide genotyping arrays, whole-exome sequencing, and whole-genome sequencing are moving us toward a future where full genomic information might inform the prognosis and treatment of a variety of diseases, including complex disease. Similarly, the availability of large populations with full genomic information has enabled new insights about the etiology and genetic architecture of complex disease. Insights from the latest generation of genomic studies suggest that our categorization of diseases as complex may conceal a wide spectrum of genetic architectures and causal mechanisms that ranges from Mendelian forms of complex disease to complex regulatory structures underlying Mendelian disease. Here, we review these insights, along with advances in the prediction of disease risk and outcomes from full genomic information. Expected final online publication date for the Annual Review of Genomics and Human Genetics Volume 19 is August 31, 2018. Please see http://www.annualreviews.org/page/journal/pubdates for revised estimates.
Zhang, Xin-Sheng; Liu, Shi-Xiong; Xiang, Xue-Yan; Zhang, Wen-Gang; Tang, Da-Xing
2014-04-01
To search for a simple and effective surgical approach to the management of moderate to severe pediatric concealed penis in children. We used Devine's technique via incision between the penis and scrotum in the treatment of 68 cases of moderate to severe pediatric concealed penis. The patients were aged 3 -13 (mean 6.5) years, 30 with moderate and 38 with severe pediatric concealed penis. This strategy achieved good near- and long-term effects and satisfactory appearance of the penis, which was similar to that of circumcision. At 3 months after surgery, the penile length was 3 - 5.2 cm, averaging (2.35 +/- 0.35) cm. Devine's technique via incision between the penis and scrotum is a simple and effective surgical option for moderate to severe pediatric concealed penis in children.
Steganography and Cryptography Inspired Enhancement of Introductory Programming Courses
ERIC Educational Resources Information Center
Kortsarts, Yana; Kempner, Yulia
2015-01-01
Steganography is the art and science of concealing communication. The goal of steganography is to hide the very existence of information exchange by embedding messages into unsuspicious digital media covers. Cryptography, or secret writing, is the study of the methods of encryption, decryption and their use in communications protocols.…
Technical Evaluation of Metal Detectors for Concealed Weapons (Supplement 1)
DOT National Transportation Integrated Search
1972-04-01
This document augments the classification and technical evaluation of Commercial Metal Detectors presented in Report No. DOT-TSC-OST-71-15, June 1971. Data based on extensive laboratory tests are presented on two hand-held models and two walk-through...
ERIC Educational Resources Information Center
Ford, Daniel F.; Kendall, Henry W.
1975-01-01
Many scientists feel that research into nuclear safety has been diverted or distorted, and the results of the research concealed or inaccurately reported on a large number of occasions. Of particular concern have been the emergency cooling systems which have not, as yet, been adequately tested. (Author/MA)
Surmounting the Effects of Lossy Compression on Steganography
1996-10-01
and can be exploited to export sensitive information. Since images are fre- quently compressed for storage or transmission, effective steganography ... steganography is that which is stored with an accuracy far greater than necessary for the data’s use and display. Image , Postscript, and audio files are...information can be concealed in bitmapped image files with little or no visible degradation of the image [4.]. This process, called steganography , is
Impact of frequency and polarization diversity on a terahertz radar's imaging performance
NASA Astrophysics Data System (ADS)
Cooper, Ken B.; Dengler, Robert J.; Llombart, Nuria
2011-05-01
The Jet Propulsion Laboratory's 675 GHz, 25 m standoff imaging radar can achieve >1 Hz real time frame rates over 40x40 cm fields of view for rapid detection of person-borne concealed weapons. In its normal mode of operation, the radar generates imagery based solely on the time-of-flight, or range, between the radar and target. With good clothing penetration at 675 GHz, a hidden object will be detectable as an anomaly in the range-to-surface profile of a subject. Here we report on results of two modifications in the radar system that were made to asses its performance using somewhat different detection approaches. First, the radar's operating frequency and bandwidth were cut in half, to 340 GHz and 13 GHz, where there potential system advantages include superior transmit power and clothing penetration, as well as a lower cost of components. In this case, we found that the twofold reduction in range and cross-range resolution sharply limited the quality of through-clothes imagery, although some improvement is observed for detection of large targets concealed by very thick clothing. The second radar modification tested involved operation in a fully polarimetric mode, where enhanced image contrast might occur between surfaces with different material or geometric characteristics. Results from these tests indicated that random speckle dominates polarimetric power imagery, making it an unattractive approach for contrast improvement. Taken together, the experiments described here underscore the primary importance of high resolution imaging in THz radar applications for concealed weapons detection.
Spiegel, Tali; De Bel, Vera; Steverink, Nardi
2016-01-01
This study aims to describe the interplay between the work trajectories and the passing patterns of individuals with degenerative eye conditions in different phases of their career, as well as the disease progression and the career and well-being outcomes associated with different works and passing trajectories. Qualitative interviews on the topic of work trajectories were conducted with 36 working or retired individuals with degenerative eye conditions. The "bigger picture" method was used to explore passing and concealment behavioral patterns, and their associations with various work trajectories. Five patterns of passing and concealment behavior in the workplace were identified and were linked with various work trajectories among visually impaired study participants: (1) no career adjustments, concealed condition throughout career; (2) revealed condition after adjusting career plans; (3) increasingly open about their condition over the course of their career; (4) engaged in career planning, always open about their condition; and (5) engaged in limited career planning, always open about their condition. Patterns characterized by less planning and more identity concealment were associated with more stress and lower levels of self-acceptance, while patterns characterized by more planning for vision deterioration and less passing behavior were associated with higher levels self-acceptance and fewer obstacles over the course of an individual's career. The study's findings can serve as a guide for health professionals. Many individuals with degenerative eye conditions try to conceal their identity as visually impaired in the professional setting. Different aspects of career outcomes (e.g. age of retirement) and wellbeing outcomes (e.g. self-acceptance and stress) associate with identity concealment patterns of individuals throughout their careers. Identifying concealment patterns will allow health professionals to tackle particular adverse outcomes and challenges associated with these patterns.
Malterud, Kirsti; Bjorkman, Mari
2016-10-01
The last decades have offered substantial improvement regarding human rights for lesbian and gay (LG) persons. Yet LG persons are often in the closet, concealing their sexual orientation. We present a qualitative study based on 182 histories submitted from 161 LG individuals to a Web site. The aim was to explore experiences of closeting among LG persons in Norway. A broad range of strategies was used for closeting, even among individuals who generally considered themselves to be out of the closet. Concealment was enacted by blunt denial, clever avoidance, or subtle vagueness. Other strategies included changing or eliminating the pronoun or name of the partner in ongoing conversations. Context-dependent concealment, differentiating between persons, situations, or arenas, was repeatedly applied for security or convenience. We propose a shift from "being in the closet" to "situated concealment of sexual orientation."
Cairo, Francesco; Sanz, Ignacio; Matesanz, Paula; Nieri, Michele; Pagliaro, Umberto
2012-02-01
The aim of this systematic review (SR) was to assess the quality of reporting randomized clinical trials (RCTs) in the field of implant dentistry, its evolution over time and the possible relations between quality items and reported outcomes. RCTs in implant dentistry were retrieved through electronic and hand searches. Risk of bias in individual studies was assessed focusing on study design, outcome assessment and clinical relevance. Associations between quality items and year of publication of RCTs or reporting of statistically significant outcomes were tested. Among the 495 originally screened manuscripts published from 1989 to April 2011, 276 RCTs were assessed in this SR; 59% of them were published between 2006 and 2011. RCTs were mainly parallel (65%), with a single centre (83%) and a superiority design (88%). Trials in implant dentistry showed several methodological flaws: only 37% showed a random sequence generation at low risk of bias, 75% did not provide information on allocation concealment, only 12% performed a correct sample size calculation, the examiner was blind solely in 42% of studies where blinding was feasible. In addition, only 21% of RCTs declared operator experience and 31% reported patient-related outcomes. Many quality items improved over time. Allocation concealment at high risk of bias (p = 0.0125), no information on drop-out (p = 0.0318) and lack of CONSORT adherence (p = 0.0333) were associated with statistically significant reported outcomes. The overall quality of reporting of RCTs in implant dentistry is poor and only partially improved in the last years. Caution is suggested when interpreting these RCTs since risk of bias was associated with higher chance of reporting of statistically significant results. © 2012 John Wiley & Sons A/S.
Fusion of radar and ultrasound sensors for concealed weapons detection
NASA Astrophysics Data System (ADS)
Felber, Franklin S.; Davis, Herbert T., III; Mallon, Charles E.; Wild, Norbert C.
1996-06-01
An integrated radar and ultrasound sensor, capable of remotely detecting and imaging concealed weapons, is being developed. A modified frequency-agile, mine-detection radar is intended to specify with high probability of detection at ranges of 1 to 10 m which individuals in a moving crowd may be concealing metallic or nonmetallic weapons. Within about 1 to 5 m, the active ultrasound sensor is intended to enable a user to identify a concealed weapon on a moving person with low false-detection rate, achieved through a real-time centimeter-resolution image of the weapon. The goal for sensor fusion is to have the radar acquire concealed weapons at long ranges and seamlessly hand over tracking data to the ultrasound sensor for high-resolution imaging on a video monitor. We have demonstrated centimeter-resolution ultrasound images of metallic and non-metallic weapons concealed on a human at ranges over 1 m. Processing of the ultrasound images includes filters for noise, frequency, brightness, and contrast. A frequency-agile radar has been developed by JAYCOR under the U.S. Army Advanced Mine Detection Radar Program. The signature of an armed person, detected by this radar, differs appreciably from that of the same person unarmed.
Ehsani, Maryam; Taleghani, Fariba; Hematti, Simin; Abazari, Parvaneh
2016-12-01
The findings of numerous studies have illustrated that there is still a high proportion of cancer patients in Eastern and Middle-East countries including Iran, who are not properly informed of their disease due to the concealment atmosphere which still prevails. This descriptive qualitative study is aimed at exploring perceptions of patients, patients' family members, physicians and nurses regarding cancer disclosure challenges. Thirty-five participants (15 patients, 6 family members, 9 physicians, and 5 nurses) were selected through purposive sampling. The data were collected through in-depth interviews; after which they were analyzed using a qualitative content analysis with an inductive approach. Data analysis revealed the following three categories: first, challenges related to healthcare system which deals with the deficiencies, strains and concerns in medical setting and healthcare team training; second, challenges related to family insistence on concealment which includes their fear of cancer disclosure and its negative impact on the patients; and third, challenges related to policy making which consists of deficiencies in legislative and supportive institutions for advocacy of truth telling. Successful move from concealment to effective disclosure attitude in cancer patients in Iran requires a national determination for resolving challenges in medical education as well as other different social, cultural and policy making dimensions. Copyright © 2016. Published by Elsevier Ltd.
Code of Federal Regulations, 2014 CFR
2014-07-01
... educational, medical, retirement, social welfare, or other such benefits from a foreign country; (4) Residence... recur and does not cast doubt on the individual's current reliability, trustworthiness, or good judgment..., good-faith efforts to correct the omission, concealment, or falsification before being confronted with...
Code of Federal Regulations, 2010 CFR
2010-07-01
... educational, medical, retirement, social welfare, or other such benefits from a foreign country; (4) Residence... recur and does not cast doubt on the individual's current reliability, trustworthiness, or good judgment..., good-faith efforts to correct the omission, concealment, or falsification before being confronted with...
Code of Federal Regulations, 2012 CFR
2012-07-01
... educational, medical, retirement, social welfare, or other such benefits from a foreign country; (4) Residence... recur and does not cast doubt on the individual's current reliability, trustworthiness, or good judgment..., good-faith efforts to correct the omission, concealment, or falsification before being confronted with...
Code of Federal Regulations, 2013 CFR
2013-07-01
... educational, medical, retirement, social welfare, or other such benefits from a foreign country; (4) Residence... recur and does not cast doubt on the individual's current reliability, trustworthiness, or good judgment..., good-faith efforts to correct the omission, concealment, or falsification before being confronted with...
Code of Federal Regulations, 2011 CFR
2011-07-01
... educational, medical, retirement, social welfare, or other such benefits from a foreign country; (4) Residence... recur and does not cast doubt on the individual's current reliability, trustworthiness, or good judgment..., good-faith efforts to correct the omission, concealment, or falsification before being confronted with...
Patients' Opinions on Display Methods to Protect Privacy.
Niimi, Yukari; Ota, Katsumasa
2016-01-01
The purpose of this study is to ascertain if patients will accept an electronic patient record system that temporarily conceals their private information. We interviewed 11 outpatients at a core hospital in Shizuoka prefecture of Japan. Most patients agree with our idea using temporary mosaic on the screen to protect their privacy.
Calibration, reconstruction, and rendering of cylindrical millimeter-wave image data
NASA Astrophysics Data System (ADS)
Sheen, David M.; Hall, Thomas E.
2011-05-01
Cylindrical millimeter-wave imaging systems and technology have been under development at the Pacific Northwest National Laboratory (PNNL) for several years. This technology has been commercialized, and systems are currently being deployed widely across the United States and internationally. These systems are effective at screening for concealed items of all types; however, new sensor designs, image reconstruction techniques, and image rendering algorithms could potentially improve performance. At PNNL, a number of specific techniques have been developed recently to improve cylindrical imaging methods including wideband techniques, combining data from full 360-degree scans, polarimetric imaging techniques, calibration methods, and 3-D data visualization techniques. Many of these techniques exploit the three-dimensionality of the cylindrical imaging technique by optimizing the depth resolution of the system and using this information to enhance detection. Other techniques, such as polarimetric methods, exploit scattering physics of the millimeter-wave interaction with concealed targets on the body. In this paper, calibration, reconstruction, and three-dimensional rendering techniques will be described that optimize the depth information in these images and the display of the images to the operator.
Investigating expectation effects using multiple physiological measures
Siller, Alexander; Ambach, Wolfgang; Vaitl, Dieter
2015-01-01
The study aimed at experimentally investigating whether the human body can anticipate future events under improved methodological conditions. Previous studies have reported contradictory results for the phenomenon typically called presentiment. If the positive findings are accurate, they call into doubt our views about human perception, and if they are inaccurate, a plausible conventional explanation might be based on the experimental design of the previous studies, in which expectation due to item sequences was misinterpreted as presentiment. To address these points, we opted to collect several physiological variables, to test different randomization types and to manipulate subjective significance individually. For the latter, we combined a mock crime scenario, in which participants had to steal specific items, with a concealed information test (CIT), in which the participants had to conceal their knowledge when interrogated about items they had stolen or not stolen. We measured electrodermal activity, respiration, finger pulse, heart rate (HR), and reaction times. The participants (n = 154) were assigned randomly to four different groups. Items presented in the CIT were either drawn with replacement (full) or without replacement (pseudo) and were either presented category-wise (cat) or regardless of categories (nocat). To understand how these item sequences influence expectation and modulate physiological reactions, we compared the groups with respect to effect sizes for stolen vs. not stolen items. Group pseudo_cat yielded the highest effect sizes, and pseudo_nocat yielded the lowest. We could not find any evidence of presentiment but did find evidence of physiological correlates of expectation. Due to the design differing fundamentally from previous studies, these findings do not allow for conclusions on the question whether the expectation bias is being confounded with presentiment. PMID:26500600
NASA Astrophysics Data System (ADS)
Robertson, Duncan A.; Macfarlane, David G.; Bryllert, Tomas
2016-05-01
We present a 220 GHz 3D imaging `Pathfinder' radar developed within the EU FP7 project CONSORTIS (Concealed Object Stand-Off Real-Time Imaging for Security) which has been built to address two objectives: (i) to de-risk the radar hardware development and (ii) to enable the collection of phenomenology data with ~1 cm3 volumetric resolution. The radar combines a DDS-based chirp generator and self-mixing multiplier technology to achieve a 30 GHz bandwidth chirp with such high linearity that the raw point response is close to ideal and only requires minor nonlinearity compensation. The single transceiver is focused with a 30 cm lens mounted on a gimbal to acquire 3D volumetric images of static test targets and materials.
The association between concealing emotions at work and medical utilization in Korea.
Seok, Hongdeok; Yoon, Jin-Ha; Lee, Wanhyung; Lee, June-Hee; Jung, Pil Kyun; Kim, Inah; Won, Jong-Uk; Roh, Jaehoon
2014-01-01
We aimed to investigate the association between concealing emotions at work and medical utilization. Data from the 2007-2009 4th Korea National Health and Nutrition Examination Survey (KNHANES IV) was used, 7,094 participants (3,837 males, 3,257 females) aged between 20 and 54 who were economically active and completed all necessary questionnaire items were included. Odds ratios (ORs) and 95% confidence intervals (95% CI) for differences in hospitalization, outpatient visits, and pharmaceutical drug use between those who concealed their emotions and those who did not were investigated using logistic regression models with and without gender stratification. Among those who concealed their emotions (n = 2,763), 47.4% were females, and 50.1% had chronic disease. In addition, 9.7% of the concealing emotions group had been hospitalized within the last year, 24.8% had been outpatients in the last two weeks, and 28.3% had used pharmaceutical drugs in the last two weeks. All ORs represent the odds of belonging to the concealing emotions group over the non-concealing emotions group. After adjustment for individual, occupational, socioeconomic and disease factors, the adjusted ORs (95% CI) in hospitalization are 1.29 (1.08 ~ 1.53) in the total population, 1.25 (0.98 ~ 1.60) in males and 1.30 (1.02 ~ 1.66) in females, in outpatient visits are 1.15 (1.02 ~ 1.29) in the total population, 1.05 (0.88 ~ 1.24) in males and 1.25 (1.06 ~ 1.47) in females and in pharmaceutical drug use are 1.12 (1.01 ~ 1.25) in the total population, 1.08 (0.92 ~ 1.27) in males and 1.14 (0.98 ~ 1.33) in females. Those who concealed their emotions at work were more likely to use medical services. Moreover, the health effects of concealing emotions at work might be more detrimental in women than in men.
Concealing a shiny facial skin appearance by an Aerogel-based formula. In vitro and in vivo studies.
Cassin, G; Diridollou, S; Flament, F; Adam, A S; Pierre, P; Colomb, L; Morancais, J L; Qiu, H
2018-02-01
To explore, in vitro and in vivo, the potential interest of an Aerogel-based formula, in concealing a naturally shiny facial skin. In vitro, various formulae and ingredients were applied as a thin film onto contrast plates and studied through measuring the shine induced following pump spraying of a mixture of oleic acid and mineral water as a sebum/sweat mix model. In such a test, an Aerogel ingredient led to very positive results. In vivo, two different formulae with various concentrations of Aerogel were randomly tested on half side of the face vs. bare side of Chinese women, under some provocative environmental conditions, known to enhance facial shine. These conditions comprised a normal activity under a hot and highly humid summer time followed - or not - by a hamam session. Both studies included comparative evaluations using a half-face procedure (treated/untreated or vehicle). In the first case, evaluations were quantitatively carried out, whereas the second one was based on a quantitative self-evaluations from standardized full-face photographs RESULTS: In vitro, the tested Aerogel, incorporated at 1% or 2% concentration in a common O/W cosmetic emulsion, shows an immediate light scattering effect, thereby masking shine. Such effect appears of much higher amplitude than that of two other tested particulate ingredients (Talc and Perlite). A noticeable remanence of anti-shine effect was confirmed in vivo in extreme conditions. The latter was self-perceived by all participants in the second study. This result is likely related to the super hydrophobic behaviour of the Aerogel. As cosmetic ingredient, this new Aerogel appears as a highly promising ingredient for concealing the facial skin shine, a source of complaint from many consumers living in hot and humid regions. © 2017 Society of Cosmetic Scientists and the Société Française de Cosmétologie.
Drug concealment in custody deaths--two cases.
Busuttil, A
1994-06-01
Internal concealment of drugs of abuse is a well established method of transporting such substances to avoid detection while they are being smuggled across international frontier lines.(1,2) The same method has been used by dealers and 'pushers' in between purchases on their selling rounds to avoid detection by the police. These methods of hiding drugs may be used by persons taken into short-term custody, in their belief that potential withdrawal effects would thus be avoided by continued availability of their drugs. Two cases are reported in which such concealment was discovered at autopsy after death had occurred while in police custody. In one case the drug concealed was dihydrocodeine and was directly responsible for the death.
Weisz, Bradley M; Quinn, Diane M; Williams, Michelle K
2016-12-01
This research examined whether the relationship between perceived social support and health would be moderated by level of outness for people living with different concealable stigmatized identities (mental illness, substance abuse, domestic violence, rape, or childhood abuse). A total of 394 people living with a concealable stigmatized identity completed a survey. Consistent with hypotheses, at high levels of outness, social support predicted better health; at low levels of outness, social support was less predictive of health. People concealing a stigmatized identity may only be able to reap the health benefits of social support if they are "out" about the stigmatized identity. © The Author(s) 2015.
Concealed wire tracing apparatus
Kronberg, J.W.
1994-05-31
An apparatus and method that combines a signal generator and a passive signal receiver to detect and record the path of partially or completely concealed electrical wiring without disturbing the concealing surface is disclosed. The signal generator applies a series of electrical pulses to the selected wiring of interest. The applied pulses create a magnetic field about the wiring that can be detected by a coil contained within the signal receiver. An audible output connected to the receiver and driven by the coil reflects the receivers position with respect to the wiring. The receivers audible signal is strongest when the receiver is directly above the wiring and the long axis of the receivers coil is parallel to the wiring. A marking means is mounted on the receiver to mark the location of the wiring as the receiver is directed over the wiring's concealing surface. Numerous marks made on various locations of the concealing surface will trace the path of the wiring of interest. 4 figs.
Detection of a concealed object
Keller, Paul E [Richland, WA; Hall, Thomas E [Kennewick, WA; McMakin, Douglas L [Richland, WA
2010-11-16
Disclosed are systems, methods, devices, and apparatus to determine if a clothed individual is carrying a suspicious, concealed object. This determination includes establishing data corresponding to an image of the individual through interrogation with electromagnetic radiation in the 200 MHz to 1 THz range. In one form, image data corresponding to intensity of reflected radiation and differential depth of the reflecting surface is received and processed to detect the suspicious, concealed object.
Detection of a concealed object
Keller, Paul E [Richland, WA; Hall, Thomas E [Kennewick, WA; McMakin, Douglas L [Richland, WA
2008-04-29
Disclosed are systems, methods, devices, and apparatus to determine if a clothed individual is carrying a suspicious, concealed object. This determination includes establishing data corresponding to an image of the individual through interrogation with electromagnetic radiation in the 200 MHz to 1 THz range. In one form, image data corresponding to intensity of reflected radiation and differential depth of the reflecting surface is received and processed to detect the suspicious, concealed object.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tuemer, T.O.; Doan, L.; Su, C.W.
2000-07-01
A Compact Integrated Narcotics Detection Instrument (CINDI) has been developed at NOVA R and D, Inc., in cooperation with the US Coast Guard. This detector utilizes neutrons emitted from {sup 252}Cf. Neutrons emitted from the front face of CINDI penetrate dense compartment barrier materials with little change in energy but are backscattered by hydrogen-rich materials such as drugs. The backscattered neutrons are detected, and the rate is displayed by a microprocessor-controller integrated into CINDI. The operator guides the detector along a suspected area and receives immediate feedback from the state-of-the-art electronics. For user safety, the device incorporates a highly sensitivemore » detection scheme to permit the use of a very weak radioactive source, without compromising detectability. CINDI is capable of detecting narcotics effectively behind panels made of steel, wood, fiberglass, or even lead-lined materials. This makes it useful for inspecting marine vessels, ship bulkheads, automobiles, structure walls, or small sealed containers. Figure 2 shows three views of the CINDI instrument. CINDI responds strongly to hydrogen-rich materials such as narcotics. It has been tested at NOVA, the US Coast Guard, and Brewt Power Systems. The results of the tests show excellent response and specificity to narcotics. CINDI has led to a new technology that shows promise for identifying the concealed contraband. The new technique uses a fusion of two independent but complementary signals for detecting and possibly identifying concealed drugs in a variety of carriers such as vehicles, marine vessels, airplanes, containers, cargo, and luggage. The carriers will be scanned using both neutron and gamma-ray sources. The signal from both the neutron and gamma-ray backscattering and/or transmission can be used simultaneously to detect and possibly identify the contrabands it has been trained for. A system that can produce three-dimensional images for both signals may also be developed. The two images may be combined and analyzed by a fast host computer to detect concealed contraband. The two independent signatures when analyzed simultaneously may help determine the type of concealed contraband.« less
Pachankis, John E.; Hatzenbuehler, Mark L.; Hickson, Ford; Weatherburn, Peter; Berg, Rigmor C.; Marcus, Ulrich; Schmidt, Axel J.
2016-01-01
Objective Substantial country-level variation exists in prejudiced attitudes towards male homosexuality and in the extent to which countries promote the unequal treatment of MSM through discriminatory laws. The impact and underlying mechanisms of country-level stigma on odds of diagnosed HIV, sexual opportunities, and experience of HIV-prevention services, needs and behaviours have rarely been examined, however. Design Data come from the European MSM Internet Survey (EMIS), which was administered between June and August 2010 across 38 European countries (N =174 209). Methods Country-level stigma was assessed using a combination of national laws and policies affecting sexual minorities and a measure of attitudes held by the citizens of each country. We also assessed concealment, HIV status, number of past 12-month male sex partners, and eight HIV-preventive services, knowledge, and behavioural outcomes. Results MSM living in countries with higher levels of stigma had reduced odds of diagnosed HIV and fewer partners but higher odds of sexual risk behaviour, unmet prevention needs, not using testing services, and not discussing their sexuality in testing services. Sexual orientation concealment mediated associations between country-level stigma and these outcomes. Conclusion Country-level stigma may have historically limited HIV transmission opportunities among MSM, but by restricting MSM’s public visibility, it also reduces MSM’s ability to access HIV-preventive services, knowledge and precautionary behaviours. These findings suggest that MSM in European countries with high levels of stigma are vulnerable to HIV infection. Although they have less opportunity to identify and contact other MSM, this might change with emerging technologies. PMID:26035323
The Family Dynamics of Intellectual Development.
ERIC Educational Resources Information Center
Zajonc, R. B.
2001-01-01
Birth order effects on intellectual performance show both positive and negative results. Considers the intellectual aspects of siblings' changing environments, explaining that birth order and family size effects depend crucially on the age at which children are tested. Within-family data conceal patterns of aggregate effects that are revealed by…
Bartos, Daniel C; Giudicessi, John R; Tester, David J; Ackerman, Michael J; Ohno, Seiko; Horie, Minoru; Gollob, Michael H; Burgess, Don E; Delisle, Brian P
2014-03-01
Type 1 long QT syndrome (LQT1) is caused by loss-of-function mutations in the KCNQ1-encoded Kv7.1 channel that conducts the slowly activating component of the delayed rectifier K(+) current (IKs). Clinically, the diagnosis of LQT1 is complicated by variable phenotypic expressivity, whereby approximately 25% of genotype-positive individuals present with concealed LQT1 (resting corrected QT [QTc] interval ≤460 ms). To determine whether a specific molecular mechanism contributes to concealed LQT1. We identified a multigenerational LQT1 family whereby 79% of the patients genotype-positive for p.Ile235Asn-KCNQ1 (I235N-Kv7.1) have concealed LQT1. We assessed the effect I235N-Kv7.1 has on IKs and the ventricular action potential (AP) by using in vitro analysis and computational simulations. Clinical data showed that all 10 patients with I235N-Kv7.1 have normal resting QTc intervals but abnormal QTc interval prolongation during the recovery phase of an electrocardiographic treadmill stress test. Voltage-clamping HEK293 cells coexpressing wild-type Kv7.1 and I235N-Kv7.1 (to mimic the patients' genotypes) showed that I235N-Kv7.1 generated relatively normal functioning Kv7.1 channels but were insensitive to protein kinase A (PKA) activation. Phosphomimetic and quinidine sensitivity studies suggest that I235N-Kv7.1 limits the conformational changes in Kv7.1 channels, which are necessary to upregulate IKs after PKA phosphorylation. Computational ventricular AP simulations predicted that the PKA insensitivity of I235N-Kv7.1 is primarily responsible for prolonging the AP with β-adrenergic stimulation, especially at slower cycle lengths. KCNQ1 mutations that generate relatively normal Kv7.1 channels, but limit the upregulation of IKs by PKA activation, likely contribute to concealed LQT1. Copyright © 2014 Heart Rhythm Society. Published by Elsevier Inc. All rights reserved.
[Silence pact from the perspective of caretakers of palliative care patients].
Cejudo López, Ángela; López López, Begoña; Duarte Rodríguez, Miguel; Crespo Serván, María Pilar; Coronado Illescas, Concepción; de la Fuente Rodríguez, Carlota
2015-01-01
To determine why terminally-ill patients, family caregivers and health care providers make a pact of silence about the terminal status of the patient, and to identify the attitudes, experiences and opinions of family caregivers concerning the conspiracy of silence in palliative care. A qualitative phenomenological study based on an interpretive analysis, conducted in Primary Health Care, Seville, Spain. Study dimensions: knowledge of the diagnosis and prognosis of the condition; disclosure of information; reaction to information received, feelings and approach to death; information disclosed to the patient and reasons behind partial disclosure; communication between patients, families, and health care providers. Family caregivers of patients on palliative care suspicious about a pact of silence. Family caregivers hamper professional-patient communication; use of deceit to conceal the truth; suspicion that the patient knows the truth; the clinician conceals the truth; paternalist attitudes; feelings of sadness, grief, resignation, acceptance of the disease. The pact of silence has negative effects on coping with death, quality of life in the last days of life, and mourning. Communication between patients, health care providers, and families should be improved to prevent the pact of silence, and help patients cope with death. Copyright © 2015 Elsevier España, S.L.U. All rights reserved.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-13
... Executive Order of February 5, 2012 (``Blocking Property of the Government of Iran and Iranian Financial...''), issued a new Executive Order (``Blocking Property of the Government of Iran and Iranian Financial... practices of the Central Bank of Iran and other Iranian banks to conceal transactions of sanctioned parties...
ERIC Educational Resources Information Center
Ryshina-Pankova, Marianna
2011-01-01
Negotiating stance and carrying on social interaction in writing in educational contexts has been characterized by the choice of linguistic means away from explicit expressions of opinion representative of the informal relationship with the addressee towards the language that strives to conceal a subjective viewpoint and construes a formal…
Relationship authenticity partially mediates the effects of attachment on relationship satisfaction.
Rasco, Danney; Warner, Rebecca M
2017-01-01
Individuals with anxious and avoidant attachment tend to experience less satisfaction in their relationships. Past research suggests the negative effects of attachment on relationship satisfaction may be partially mediated by self-disclosure and self-concealment; the present study evaluated relationship authenticity as a potential additional mediator. Confirmatory factor analysis indicated that relationship authenticity is distinct from self-disclosure and self-concealment. Relationship authenticity predicted additional variance in relationship satisfaction controlling for attachment, self-disclosure, and self-concealment. The results were consistent with relationship authenticity, along with self-disclosure and self-concealment, partially mediating the effects of attachment on relationship satisfaction. These findings suggest that relationship authenticity may play a unique role in understanding how attachment influences relationship satisfaction. Theoretical and clinical implications are discussed.
Optimizing countershading camouflage.
Cuthill, Innes C; Sanghera, N Simon; Penacchio, Olivier; Lovell, Paul George; Ruxton, Graeme D; Harris, Julie M
2016-11-15
Countershading, the widespread tendency of animals to be darker on the side that receives strongest illumination, has classically been explained as an adaptation for camouflage: obliterating cues to 3D shape and enhancing background matching. However, there have only been two quantitative tests of whether the patterns observed in different species match the optimal shading to obliterate 3D cues, and no tests of whether optimal countershading actually improves concealment or survival. We use a mathematical model of the light field to predict the optimal countershading for concealment that is specific to the light environment and then test this prediction with correspondingly patterned model "caterpillars" exposed to avian predation in the field. We show that the optimal countershading is strongly illumination-dependent. A relatively sharp transition in surface patterning from dark to light is only optimal under direct solar illumination; if there is diffuse illumination from cloudy skies or shade, the pattern provides no advantage over homogeneous background-matching coloration. Conversely, a smoother gradation between dark and light is optimal under cloudy skies or shade. The demonstration of these illumination-dependent effects of different countershading patterns on predation risk strongly supports the comparative evidence showing that the type of countershading varies with light environment.
Factors that influence disclosure of hearing loss in the workplace.
Southall, Kenneth; Jennings, Mary Beth; Gagné, Jean-Pierre
2011-10-01
The objective of the study was to identify factors that lead individuals to conceal or disclose their hearing loss in the workplace. A qualitative research paradigm called qualitative description was selected to address this issue. Twelve people who had an adult onset hearing loss, and were gainfully employed, participated in audio-recorded semi-structured interviews designed to probe issues related to disclosure of hearing loss. A photo elicitation interview technique was employed during the interviews. Content analyses were used to extract pertinent information from verbatim transcripts. Five recurring themes emerged as important considerations in relation to this topic: (1) perceived importance of the situation; (2) perceived sense of control; (3) community affiliation; (4) burden of communication; and (5) coexisting issues related to hearing loss. The findings are discussed in relation to other concealable stigmatizing traits, stigma-theory, and social-cognitive theory. The clinical implications of these findings are discussed, with particular emphasis placed on worker self-efficacy.
The "Darknet": The new street for street drugs.
Pergolizzi, J V; LeQuang, J A; Taylor, R; Raffa, R B
2017-12-01
The "Darknet" ("dark web") has emerged as a means by which illegal drug buys and deliveries can be arranged with apparent anonymity and impunity. Healthcare providers should be aware of this growing source of illicit drugs. The "Darknet" refers to networks isolated from the Internet that cannot be accessed via conventional search engines. They require special software that is protected by special encryption. The initial legitimate use of a "Darknet" to conceal personal information against misuse or political reprisal is being exploited to conceal the identity of buyers and sellers in illegal drug transactions. Instructions on how to obtain access to the "Darknet" are readily available on conventional Internet web pages. The "Darknet" has changed the paradigm of illegal drug importation and distribution by providing a difficult-to-trace transaction, and delivery via legitimate couriers directly to the home. © 2017 John Wiley & Sons Ltd.
Remote laser drilling and sampling system for the detection of concealed explosives
NASA Astrophysics Data System (ADS)
Wild, D.; Pschyklenk, L.; Theiß, C.; Holl, G.
2017-05-01
The detection of hazardous materials like explosives is a central issue in national security in the field of counterterrorism. One major task includes the development of new methods and sensor systems for the detection. Many existing remote or standoff methods like infrared or raman spectroscopy find their limits, if the hazardous material is concealed in an object. Imaging technologies using x-ray or terahertz radiation usually yield no information about the chemical content itself. However, the exact knowledge of the real threat potential of a suspicious object is crucial for disarming the device. A new approach deals with a laser drilling and sampling system for the use as verification detector for suspicious objects. Central part of the system is a miniaturised, diode pumped Nd:YAG laser oscillator-amplifier. The system allows drilling into most materials like metals, synthetics or textiles with bore hole diameters in the micron scale. During the drilling process, the hazardous material can be sampled for further investigation with suitable detection methods. In the reported work, laser induced breakdown spectroscopy (LIBS) is used to monitor the drilling process and to classify the drilled material. Also experiments were carried out to show the system's ability to not ignite even sensitive explosives like triacetone triperoxide (TATP). The detection of concealed hazardous material is shown for different explosives using liquid chromatography and ion mobility spectrometry.
Cancer survivors' concealment or disclosure of diagnosis: Implications for return to work.
Morrison, T L; Thomas, R L
2015-01-01
The ability to return to work (RTW) is a significant quality of life indicator for many working aged cancer survivors. In the void of available support, many are left to independently navigate the RTW process which includes such important considerations as disclosure or concealment of diagnosis with concomitant sequellae. This article reviews participants' variable approaches to concealment, disclosure, or even an open educative stance as well as the associated benefits and limitations. Photovoice methods combined with interviewing. While most participants disclosed their diagnosis and many extolled the benefits of an open, educative stance, there were drawbacks experienced. Similarly, those who concealed their diagnosis also experienced benefits and challenges. In the current void of appropriate cancer rehabilitation supports, cancer survivors must independently negotiate their RTW process. Although most participants openly disclosed their diagnosis and associated limitations, a few concealed or camouflaged. There are benefits and limitations to both approaches of which survivors should be made aware at the outset as such will shape their RTW experience. Multidisciplinary rehabilitation support services would best guide survivors' management of the myriad of factors that will impact their work reintegration.
Heimann, Marco; Girotto, Vittorio; Legrenzi, Paolo; Bonnefon, Jean-François
2013-01-01
We introduce the Conceal or Reveal Dilemma, in which individuals receive unfair benefits, and must decide whether to conceal or to reveal this unfair advantage. This dilemma has two important characteristics: it does not lend itself easily to cost-benefit analysis, neither to the application of any strong universal norm. As a consequence, it is ideally suited to the study of interindividual and intercultural variations in moral-economic norms. In this paper we focus on interindividual variations, and we report four studies showing that individuals cannot be swayed by financial incentives to conceal or to reveal, and follow instead fixed, idiosyncratic strategies. We discuss how this result can be extended to individual and cultural variations in the tendency to display or to hide unfair rewards. PMID:24066040
Heimann, Marco; Girotto, Vittorio; Legrenzi, Paolo; Bonnefon, Jean-François
2013-01-01
We introduce the Conceal or Reveal Dilemma, in which individuals receive unfair benefits, and must decide whether to conceal or to reveal this unfair advantage. This dilemma has two important characteristics: it does not lend itself easily to cost-benefit analysis, neither to the application of any strong universal norm. As a consequence, it is ideally suited to the study of interindividual and intercultural variations in moral-economic norms. In this paper we focus on interindividual variations, and we report four studies showing that individuals cannot be swayed by financial incentives to conceal or to reveal, and follow instead fixed, idiosyncratic strategies. We discuss how this result can be extended to individual and cultural variations in the tendency to display or to hide unfair rewards.
Academic Dishonesty: Behaviors, Sanctions, and Retention of Adjudicated College Students
ERIC Educational Resources Information Center
Olafson, Lori; Schraw, Gregory; Kehrwald, Nicholas
2014-01-01
Academic dishonesty, also known as academic misconduct, includes a variety of actions such as plagiarism, cheating on tests using text messaging or concealed notes, exchanging work with other students, buying essays from students or on the Internet, and having other students write examinations (Diekhoff, LaBeff, Shinohara, & Yasukawa, 1999;…
Small threat and contraband detection with TNA-based systems.
Shaw, T J; Brown, D; D'Arcy, J; Liu, F; Shea, P; Sivakumar, M; Gozani, T
2005-01-01
The detection of small threats, such as explosives, drugs, and chemical weapons, concealed or encased in surrounding material, is a major concern in areas from security checkpoints to UneXploded Ordnance (UXO) clearance. Techniques such as X-ray and trace detection are often ineffectual in these applications. Thermal neutron analysis (TNA) provides an effective method for detecting concealed threats. This paper shows the effectiveness of Ancore's SPEDS, based on TNA, in detecting concealed liquid threats and differentiating live from inert mortar shells.
2007-01-01
Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the...George Featherstonhaugh linked mineral availability with national defense. He suggested to Secretary of War Lewis Cass that a geological map of the...from military tactical vehicle armor (ArmorWorks) to concealable armor protection for civilians (Point Blank Body Armor, Inc. and PACA Body Armor
Knowledge of display rules in prelingually deaf and hearing children.
Hosie, J A; Russell, P A; Gray, C D; Scott, C; Hunter, N; Banks, J S; Macaulay, M C
2000-03-01
Deaf children of elementary and secondary school age participated in a study designed to examine their understanding of display rules, the principles governing the expression and concealment of emotion in social situations. The results showed that deaf children's knowledge of display rules, as measured by their reported concealment of emotion, was comparable to that of hearing children of the same age. However, deaf children were less likely to report that they would conceal happiness and anger. They were also less likely to produce reasons for concealing emotion and a smaller proportion of their reasons were prosocial, that is, relating to the feelings of others. The results suggest that the understanding of display rules (which function to protect the feelings of other people) may develop more gradually in deaf children raised in a spoken language environment than it does in hearing children.
Determinants of felt stigma in epilepsy.
Aydemir, N; Kaya, B; Yıldız, G; Öztura, I; Baklan, B
2016-05-01
The present study aimed to determine the level of felt stigma, overprotection, concealment, and concerns related to epilepsy in different life domains by using culturally-specific scales for Turkish individuals with epilepsy. Also, it aimed to detect relations among the study variables and to determine the variables which predict felt stigma. For this purpose, felt stigma scale, overprotection scale, concealment of epilepsy scale, and concerns of epilepsy scale were administered to two hundred adult persons with epilepsy (PWE). The results showed that almost half of the participants reported felt stigma, overprotection, concealment of epilepsy, concerns related to future occupation, and concerns related to social life. Almost all the study variables show correlations with each other. Concealment of epilepsy, concerns related to social life, and concerns related to future occupation were found as the predictors of felt stigma. Copyright © 2016 Elsevier Inc. All rights reserved.
Hrcek, Jan; Miller, Scott E; Whitfield, James B; Shima, Hiroshi; Novotny, Vojtech
2013-10-01
The processes maintaining the enormous diversity of herbivore-parasitoid food webs depend on parasitism rate and parasitoid host specificity. The two parameters have to be evaluated in concert to make conclusions about the importance of parasitoids as natural enemies and guide biological control. We document parasitism rate and host specificity in a highly diverse caterpillar-parasitoid food web encompassing 266 species of lepidopteran hosts and 172 species of hymenopteran or dipteran parasitoids from a lowland tropical forest in Papua New Guinea. We found that semi-concealed hosts (leaf rollers and leaf tiers) represented 84% of all caterpillars, suffered a higher parasitism rate than exposed caterpillars (12 vs. 5%) and their parasitoids were also more host specific. Semi-concealed hosts may therefore be generally more amenable to biological control by parasitoids than exposed ones. Parasitoid host specificity was highest in Braconidae, lower in Diptera: Tachinidae, and, unexpectedly, the lowest in Ichneumonidae. This result challenges the long-standing view of low host specificity in caterpillar-attacking Tachinidae and suggests higher suitability of Braconidae and lower suitability of Ichneumonidae for biological control of caterpillars. Semi-concealed hosts and their parasitoids are the largest, yet understudied component of caterpillar-parasitoid food webs. However, they still remain much closer in parasitism patterns to exposed hosts than to what literature reports on fully concealed leaf miners. Specifically, semi-concealed hosts keep an equally low share of idiobionts (2%) as exposed caterpillars.
Concealing with structured light.
Sun, Jingbo; Zeng, Jinwei; Wang, Xi; Cartwright, Alexander N; Litchinitser, Natalia M
2014-02-13
While making objects less visible (or invisible) to a human eye or a radar has captured people's imagination for centuries, current attempts towards realization of this long-awaited functionality range from various stealth technologies to recently proposed cloaking devices. A majority of proposed approaches share a number of common deficiencies such as design complexity, polarization effects, bandwidth, losses and the physical size or shape requirement complicating their implementation especially at optical frequencies. Here we demonstrate an alternative way to conceal macroscopic objects by structuring light itself. In our approach, the incident light is transformed into an optical vortex with a dark core that can be used to conceal macroscopic objects. Once such a beam passed around the object it is transformed back into its initial Gaussian shape with minimum amplitude and phase distortions. Therefore, we propose to use that dark core of the vortex beam to conceal an object that is macroscopic yet small enough to fit the dark (negligibly low intensity) region of the beam. The proposed concealing approach is polarization independent, easy to fabricate, lossless, operates at wavelengths ranging from 560 to 700 nm, and can be used to hide macroscopic objects providing they are smaller than vortex core.
Cycles of abuse nurtured by concealment: a clinical report.
Wijma, Barbro; Thapar-Björkert, Suruchi; Hammarström, Nevija Cah; Swahnberg, Katarina
2007-09-01
At present, health care staff do not seem to have sufficient knowledge about their patients' abusive experiences. The aim of the present study is to analyze and discuss what the implications might be for the encounter between patients and health care professionals, when experiences of abuse are concealed. The methodology of this article is varied: a personal narrative, medical records, sociological theoretical literature and empirical evidence. From the narrative we learn that concealment of abuse was devastating for the patient. She was "treated" in vain as a correct diagnosis was not made, while abuse by her father continued. Health care staff also violated her, which she told her therapist, but her protests were not acknowledged. Ten years of treatment thus made her even more sick. This case story focuses on the mechanisms which nurture concealment of a patient's history of abuse, such as structural and symbolic violence. We also suggest ways to break "cycles of abuse". Help the patient to stop concealing also means that she/he leaves a victim role, gets in charge of the situation and takes a first step towards empowerment. In this way, health care settings can become enabling and empowering environments.
Sato, Yoshiharu; Nagata, Hirofumi; Inoda, Ayako; Miura, Hiroko; Watanabe, Yoko; Suzuki, Kenji
2014-10-01
We report a case of paroxysmal supraventricular tachycardia (PSVT) that occurred during video-assisted thoracoscopic (VATS) lobectomy in a patient with concealed Wolff-Parkinson-White (WPW) syndrome. A 59-year-old man with lung cancer was scheduled for VATS lobectomy under general anesthesia. After inserting a thoracic epidural catheter, general anesthesia was induced with intravenous administration of propofol. Anesthesia was maintained with inhalation of desfurane in an air/oxygen mixture and intravenous infusion of remifentanil. Recurrent PSVT occurred three times, and the last episode of PSVT continued for 50 minutes regardless of administration of antiarrhythmic drugs. Synchronized electric shock via adhesive electrode pads on the patient's chest successfully converted PSVT back to normal sinus rhythm. The remaining course and postoperative period were uneventful. An electrophysiological study performed after hospital discharge detected concealed WPW syndrome, which had contributed to the development of atrioventricular reciprocating tachycardia. Concealed WPW syndrome is a rare, but critical complication that could possibly cause lethal atrial tachyarrhythmias during the perioperative period. In the present case, cardioversion using adhesive electrode pads briefly terminated PSVT in a patient with concealed WPW syndrome.
Cramer, Robert J; Golom, Frank D; Gemberling, Tess M; Trost, Kristen; Lewis, Robin; Wright, Susan
2018-05-01
The present study contributes to a growing body of literature developing psychometrically and theoretically grounded measures of sexual orientation minority identity. We tested psychometric properties and construct validity of a 27-item measure, the Lesbian, Gay, and Bisexual Identity Scale (LGBIS). The sample consisted of 475 adult (178 male, 237 female, 16 male-to-female, 14 female-to-male, and 30 gender queer persons) members of a special interest group, the National Coalition for Sexual Freedom. Participants completed a health needs questionnaire. Prominent findings included (1) confirmatory factor-analytic, internal consistency, and inter-correlation patterns support two LGBIS factor structures; (2) men, compared primarily to women, reported elevated scores on Acceptance Concerns, Concealment Motivation, Difficulty Process, and Negative Identity; (3) queer-identifying persons tended to report low Concealment Motivation, and high Identity Affirmation and Identity Centrality scores; (4) experimenting/fluid-identifying individuals tended toward higher Identity Uncertainty and Negative Identity, and lower Identity Centrality scores; (5) LGB community involvement was negatively associated with Concealment Motivation, Identity Uncertainty, and Negative Identity, and positively associated with Identity Superiority, Identity Affirmation, and Identity Centrality scores; and (6) Acceptance Concerns, Identity Uncertainty, and Internalized Homonegativity displayed significant positive associations with such mental health symptoms as general anxiety and posttraumatic stress. The LGBIS represents a useful approach to evaluating sexual orientation minority identity. Implications for identity theory, research, and practice are provided.
Authenticating concealed private data while maintaining concealment
Thomas, Edward V [Albuquerque, NM; Draelos, Timothy J [Albuquerque, NM
2007-06-26
A method of and system for authenticating concealed and statistically varying multi-dimensional data comprising: acquiring an initial measurement of an item, wherein the initial measurement is subject to measurement error; applying a transformation to the initial measurement to generate reference template data; acquiring a subsequent measurement of an item, wherein the subsequent measurement is subject to measurement error; applying the transformation to the subsequent measurement; and calculating a Euclidean distance metric between the transformed measurements; wherein the calculated Euclidean distance metric is identical to a Euclidean distance metric between the measurement prior to transformation.
NASA Astrophysics Data System (ADS)
Polom, Ulrich; Mueller, Christof; Krawczyk, CharLotte M.
2016-04-01
The Mw 7.1 Darfield Earthquake in September 2010 ruptured the surface along the Greendale Fault that was not known prior to the earthquake. The subsequent Mw 6.3 Christchurch earthquake in February 2011 demonstrated that concealed active faults have a significant risk potential for urban infrastructure and human life in New Zealand if they are located beneath or close to such areas. Mapping exposures and analysis of active faults incorporated into the National Seismic Hazard Model (NSHM) suggests that several thousands of these active structures are yet to be identified and have the potential to generate moderate to large magnitude earthquakes (i.e. magnitudes >5). Geological mapping suggests that active faults pass beneath, or within many urban areas in New Zealand, including Auckland, Blenheim, Christchurch, Hastings/Napier, Nelson, Rotorua, Taupo, Wellington, and Whakatane. Since no established methodology for routinely locating and assessing the earthquake hazard posed by concealed active faults is available, the principal objective of the presented study was to evaluate the usefulness of high-resolution shear wave seismic reflection profiling using a land streamer to locate buried faults in urban areas of New Zealand. During the survey carried out in the city of Whakatane in February 2015, the method was first tested over a well known surface outcrop of the Edgecumbe Fault 30 km south-west of Whakatane city. This allowed further to investigate the principle shear wave propagation characteristics in the unknown sediments, consisting mainly of effusive rock material of the Taupo volcanic zone mixed with marine transgression units. Subsequently the survey was continued within Whakatane city using night operation time slots to reduce the urban noise. In total, 11 profiles of 5.7 km length in high data quality were acquired, which clearly show concealed rupture structures of obviously different age in the shallow sediments down to 100 m depth. Subject to depth verification by drillings normal fault displacements of up to 15 m are visible in depths of 20-40 m, deeper rupture structures show displacements of up to 20 m. Furthermore, indications of strike-slip fault activities are visible. The concealed rupture structures found are not aligned along former estimated fault lineaments or main surface structures like the Whakatane river bed. Correlations exist with small topographic variations detected by LIDAR imaging and surface signatures on a historic map of 1867.
Predictive value of ADAMTS-13 on concealed chronic renal failure in COPD patients
Zeng, Mian; Chen, Qingui; Liang, Wenjie; He, Wanmei; Zheng, Haichong; Huang, Chunrong
2017-01-01
Background Impaired renal function is often neglected in COPD patients. Considering that COPD patients usually have an ongoing prothrombotic state and systemic inflammation status, we investigated the association among them and explored the predictive value of a disintegrin and metalloproteinase with a thrombospondin type 1 motif, member 13 (ADAMTS-13), on concealed chronic renal failure (CRF) in COPD patients. Methods COPD patients were recruited from the First Affiliated Hospital of Sun Yat-Sen University between January 2015 and December 2016. Control was selected from contemporaneous hospitalized patients without COPD and matched by age and gender at a ratio of 1:1. Estimated glomerular filtration rate (eGFR) was calculated by using the Chronic Kidney Disease Epidemiology Collaboration formula, and all subjects were categorized as having normal renal function (eGFR ≥60 mL min−1 1.73 m−2) and having concealed CRF (normal serum creatinine while eGFR <60 mL min−1 1.73 m−2). Independent correlates of concealed CRF were investigated by logistic regression analysis, and receiver operating characteristic (ROC) curves were used to determine the predictive value of ADAMTS-13. Results In total, 106 COPD and 106 non-COPD patients were finally recruited, and the incidences of concealed CRF were 19.81% and 7.55%, respectively. ADAMTS-13 (odds ratio [OR] =0.858, 95% CI =0.795–0.926), D-dimer (OR =1.095, 95% CI =1.027–1.169), and C-reactive protein (OR =1.252, 95% CI =1.058–1.480) were significantly associated with concealed CRF. Sensitivity and specificity at an ADAMTS-13 cutoff of 318.72 ng/mL were 100% and 81.2%, respectively. The area under the ROC curve was 0.959. Conclusion Prothrombotic state and systemic inflammation status might contribute to explaining the high incidence of concealed CRF in COPD, and plasma ADAMTS-13 levels may serve as a strong predictor. PMID:29255356
Concealed renal failure and adverse drug reactions in older patients with type 2 diabetes mellitus.
Corsonello, Andrea; Pedone, Claudio; Corica, Francesco; Mazzei, Bruno; Di Iorio, Angelo; Carbonin, Pierugo; Incalzi, Raffaele Antonelli
2005-09-01
In elderly patients serum creatinine may be normal despite decreased glomerular filtration rate (GFR). The aim of this study was to evaluate the prevalence of this "concealed" renal failure, i.e., renal failure with normal serum creatinine levels, in elderly diabetic patients, and to verify whether it is a risk factor for adverse drug reactions (ADR) to hydrosoluble drugs. We used data on 2257 hospitalized patients with type 2 diabetes mellitus enrolled in the Gruppo Italiano di Farmacovigilanza nell'Anziano study. On the basis of serum creatinine and calculated GFR, patients were grouped as follows: normal renal function (normal serum creatinine levels and normal GFR), concealed (normal serum creatinine levels and reduced GFR), or overt (increased creatinine levels and reduced GFR) renal failure. GFR was calculated using the Modification of Diet in Renal Disease (MDRD) equation. The outcome of the study was the incidence of ADR to hydrosoluble drugs during the hospital stay. The relationship between renal function and ADR was evaluated using Cox regression analysis including potential confounders. Concealed renal failure was observed in 363 (16.1%) of patients studied. Patients with concealed or overt renal failure were older, had more frequently cognitive impairment and polypharmacy, and had lower serum albumin levels than did those with normal renal function. Both concealed (hazard ratio = 1.90; 95% confidence interval, 1.04-3.48; p =.036) and overt (hazard ratio = 2.23; 95% confidence interval, 1.40-3.55; p =.001) renal failure were significantly associated with ADR to hydrosoluble drugs. The use of more than four drugs also qualified as an independent risk factor for ADRs to hydrosoluble drugs during hospital stay. Older diabetic patients should be systematically screened to ascertain the presence of concealed renal failure in an attempt to optimize the pharmacological treatment and reduce the risk of ADRs.
Testing the tenets of minority stress theory in workplace contexts.
Velez, Brandon L; Moradi, Bonnie; Brewster, Melanie E
2013-10-01
The links of minority stressors (workplace discrimination, expectations of stigma, internalized heterosexism, and identity management strategies) with psychological distress and job satisfaction were examined in a sample of 326 sexual minority employees. Drawing from minority stress theory and the literature on the vocational experiences of sexual minority people, patterns of mediation and moderation were tested. Minority stressors were associated with greater distress and lower job satisfaction. A mediation model was supported in which the links of discrimination and internalized heterosexism with psychological distress were mediated by a concealment-focused identity management strategy (i.e., avoiding), and the links of discrimination, expectations of stigma, and internalized heterosexism with job satisfaction were mediated by a disclosure-focused identity management strategy (i.e., integrating). Tests of moderation indicated that for sexual minority women (but not men), the positive association of discrimination with distress was stronger at higher levels of internalized heterosexism than at lower levels. In addition, lower levels of internalized heterosexism and concealment strategies (i.e., counterfeiting and avoiding) and higher levels of a disclosure strategy (i.e., integrating) were associated with higher job satisfaction in the context of low discrimination, but this buffering effect disappeared as level of discrimination increased. The implications of these findings for minority stress research are discussed, and clinical recommendations are made.
Psychological and social correlates of HIV status disclosure: the significance of stigma visibility.
Stutterheim, Sarah E; Bos, Arjan E R; Pryor, John B; Brands, Ronald; Liebregts, Maartje; Schaalma, Herman P
2011-08-01
HIV-related stigma, psychological distress, self-esteem, and social support were investigated in a sample comprising people who have concealed their HIV status to all but a selected few (limited disclosers), people who could conceal but chose to be open (full disclosers), and people who had visible symptoms that made concealing difficult (visibly stigmatized). The visibly stigmatized and full disclosers reported significantly more stigma experiences than limited disclosers, but only the visibly stigmatized reported more psychological distress, lower self-esteem, and less social support than limited disclosers. This suggests that having a visible stigma is more detrimental than having a concealable stigma. Differences in psychological distress and self-esteem between the visibly stigmatized and full disclosers were mediated by social support while differences between the visibly stigmatized and limited disclosers were mediated by both social support and stigma. These findings suggest that social support buffers psychological distress in people with HIV.
Information We Collect: Surveillance and Privacy in the Implementation of Google Apps for Education
ERIC Educational Resources Information Center
Lindh, Maria; Nolin, Jan
2016-01-01
The aim of this study is to show how Google's business model is concealed within Google Apps for Education (GAFE) as well as how such a bundle is perceived within one educational organisation, consisting of approximately 30 schools. The study consists of two parts: 1) a rhetorical analysis of Google policy documents and 2) an interview study in a…
Questions abound as start-up nears for physician data bank.
Gardner, E; Wagner, L; Burda, D
1990-07-02
The start-up of the National Practitioner Data Bank is only weeks away, but hospitals and physicians still are raising questions about the system's pros and cons. While most laud the data bank's original mission--to prevent practitioners from concealing a history of incompetence--many physicians claim the scope of the system has grown too big and fear abuse of the information.
Remote sensing based on hyperspectral data analysis
NASA Astrophysics Data System (ADS)
Sharifahmadian, Ershad
In remote sensing, accurate identification of far objects, especially concealed objects is difficult. In this study, to improve object detection from a distance, the hyperspecral imaging and wideband technology are employed with the emphasis on wideband radar. As the wideband data includes a broad range of frequencies, it can reveal information about both the surface of the object and its content. Two main contributions are made in this study: 1) Developing concept of return loss for target detection: Unlike typical radar detection methods which uses radar cross section to detect an object, it is possible to enhance the process of detection and identification of concealed targets using the wideband radar based on the electromagnetic characteristics --conductivity, permeability, permittivity, and return loss-- of materials. During the identification process, collected wideband data is evaluated with information from wideband signature library which has already been built. In fact, several classes (e.g. metal, wood, etc.) and subclasses (ex. metals with high conductivity) have been defined based on their electromagnetic characteristics. Materials in a scene are then classified based on these classes. As an example, materials with high electrical conductivity can be conveniently detected. In fact, increasing relative conductivity leads to a reduction in the return loss. Therefore, metals with high conductivity (ex. copper) shows stronger radar reflections compared with metals with low conductivity (ex. stainless steel). Thus, it is possible to appropriately discriminate copper from stainless steel. 2) Target recognition techniques: To detect and identify targets, several techniques have been proposed, in particular the Multi-Spectral Wideband Radar Image (MSWRI) which is able to localize and identify concealed targets. The MSWRI is based on the theory of robust capon beamformer. During identification process, information from wideband signature library is utilized. The WB signature library includes such parameters as conductivity, permeability, permittivity, and return loss at different frequencies for possible materials related to a target. In the MSWRI approach, identification procedure is performed by calculating the RLs at different selected frequencies. Based on similarity of the calculated RLs and RL from WB signature library, targets are detected and identified. Based on the simulation and experimental results, it is concluded that the MSWRI technique is a promising approach for standoff target detection.
Mansh, Matthew; White, William; Gee-Tong, Lea; Lunn, Mitchell R; Obedin-Maliver, Juno; Stewart, Leslie; Goldsmith, Elizabeth; Brenman, Stephanie; Tran, Eric; Wells, Maggie; Fetterman, David; Garcia, Gabriel
2015-05-01
To assess identity disclosure among sexual and gender minority (SGM) students pursuing undergraduate medical training in the United States and Canada. From 2009 to 2010, a survey was made available to all medical students enrolled in the 176 MD- and DO-granting medical schools in the United States and Canada. Respondents were asked about their sexual and gender identity, whether they were "out" (i.e., had publicly disclosed their identity), and, if they were not, their reasons for concealing their identity. The authors used a mixed-methods approach and analyzed quantitative and qualitative survey data. Of 5,812 completed responses (of 101,473 eligible respondents; response rate 5.7%), 920 (15.8%) students from 152 (of 176; 86.4%) institutions identified as SGMs. Of the 912 sexual minorities, 269 (29.5%) concealed their sexual identity in medical school. Factors associated with sexual identity concealment included sexual minority identity other than lesbian or gay, male gender, East Asian race, and medical school enrollment in the South or Central regions of North America. The most common reasons for concealing one's sexual identity were "nobody's business" (165/269; 61.3%), fear of discrimination in medical school (117/269; 43.5%), and social or cultural norms (110/269; 40.9%). Of the 35 gender minorities, 21 (60.0%) concealed their gender identity, citing fear of discrimination in medical school (9/21; 42.9%) and lack of support (9/21; 42.9%). SGM students continue to conceal their identity during undergraduate medical training. Medical institutions should adopt targeted policies and programs to better support these individuals.
NASA Astrophysics Data System (ADS)
Nguyen, Lam; Wong, David; Ressler, Marc; Koenig, Francois; Stanton, Brian; Smith, Gregory; Sichina, Jeffrey; Kappra, Karl
2007-04-01
The U.S. Army Research Laboratory (ARL), as part of a mission and customer funded exploratory program, has developed a new low-frequency, ultra-wideband (UWB) synthetic aperture radar (SAR) for forward imaging to support the Army's vision of an autonomous navigation system for robotic ground vehicles. These unmanned vehicles, equipped with an array of imaging sensors, will be tasked to help detect man-made obstacles such as concealed targets, enemy minefields, and booby traps, as well as other natural obstacles such as ditches, and bodies of water. The ability of UWB radar technology to help detect concealed objects has been documented in the past and could provide an important obstacle avoidance capability for autonomous navigation systems, which would improve the speed and maneuverability of these vehicles and consequently increase the survivability of the U. S. forces on the battlefield. One of the primary features of the radar is the ability to collect and process data at combat pace in an affordable, compact, and lightweight package. To achieve this, the radar is based on the synchronous impulse reconstruction (SIRE) technique where several relatively slow and inexpensive analog-to-digital (A/D) converters are used to sample the wide bandwidth of the radar signals. We conducted an experiment this winter at Aberdeen Proving Ground (APG) to support the phenomenological studies of the backscatter from positive and negative obstacles for autonomous robotic vehicle navigation, as well as the detection of concealed targets of interest to the Army. In this paper, we briefly describe the UWB SIRE radar and the test setup in the experiment. We will also describe the signal processing and the forward imaging techniques used in the experiment. Finally, we will present imagery of man-made obstacles such as barriers, concertina wires, and mines.
Microwave Technique for Detecting and Locating Concealed Weapons
DOT National Transportation Integrated Search
1971-12-01
The subject of this report is the evaluation of a microwave technique for detecting and locating weapons concealed under clothing. The principal features of this technique are: persons subjected to search are not exposed to 'objectional' microwave ra...
Digital Stratigraphy: Contextual Analysis of File System Traces in Forensic Science.
Casey, Eoghan
2017-12-28
This work introduces novel methods for conducting forensic analysis of file allocation traces, collectively called digital stratigraphy. These in-depth forensic analysis methods can provide insight into the origin, composition, distribution, and time frame of strata within storage media. Using case examples and empirical studies, this paper illuminates the successes, challenges, and limitations of digital stratigraphy. This study also shows how understanding file allocation methods can provide insight into concealment activities and how real-world computer usage can complicate digital stratigraphy. Furthermore, this work explains how forensic analysts have misinterpreted traces of normal file system behavior as indications of concealment activities. This work raises awareness of the value of taking the overall context into account when analyzing file system traces. This work calls for further research in this area and for forensic tools to provide necessary information for such contextual analysis, such as highlighting mass deletion, mass copying, and potential backdating. © 2017 American Academy of Forensic Sciences.
Gaussian private quantum channel with squeezed coherent states
Jeong, Kabgyun; Kim, Jaewan; Lee, Su-Yong
2015-01-01
While the objective of conventional quantum key distribution (QKD) is to secretly generate and share the classical bits concealed in the form of maximally mixed quantum states, that of private quantum channel (PQC) is to secretly transmit individual quantum states concealed in the form of maximally mixed states using shared one-time pad and it is called Gaussian private quantum channel (GPQC) when the scheme is in the regime of continuous variables. We propose a GPQC enhanced with squeezed coherent states (GPQCwSC), which is a generalization of GPQC with coherent states only (GPQCo) [Phys. Rev. A 72, 042313 (2005)]. We show that GPQCwSC beats the GPQCo for the upper bound on accessible information. As a subsidiary example, it is shown that the squeezed states take an advantage over the coherent states against a beam splitting attack in a continuous variable QKD. It is also shown that a squeezing operation can be approximated as a superposition of two different displacement operations in the small squeezing regime. PMID:26364893
Fast, High-Resolution Terahertz Radar Imaging at 25 Meters
NASA Technical Reports Server (NTRS)
Cooper, Ken B.; Dengler, Robert J.; Llombart, Nuria; Talukder, Ashit; Panangadan, Anand V.; Peay, Chris S.; Siegel, Peter H.
2010-01-01
We report improvements in the scanning speed and standoff range of an ultra-wide bandwidth terahertz (THz) imaging radar for person-borne concealed object detection. Fast beam scanning of the single-transceiver radar is accomplished by rapidly deflecting a flat, light-weight subreflector in a confocal Gregorian optical geometry. With RF back-end improvements also implemented, the radar imaging rate has increased by a factor of about 30 compared to that achieved previously in a 4 m standoff prototype instrument. In addition, a new 100 cm diameter ellipsoidal aluminum reflector yields beam spot diameters of approximately 1 cm over a 50x50 cm field of view at a range of 25 m, although some aberrations are observed that probably arise from misaligned optics. Through-clothes images of a concealed threat at 25 m range, acquired in 5 seconds, are presented, and the impact of reduced signal-to-noise from an even faster frame rate is analyzed. These results inform the system requirements for eventually achieving sub-second or video-rate THz radar imaging.
Gaussian private quantum channel with squeezed coherent states.
Jeong, Kabgyun; Kim, Jaewan; Lee, Su-Yong
2015-09-14
While the objective of conventional quantum key distribution (QKD) is to secretly generate and share the classical bits concealed in the form of maximally mixed quantum states, that of private quantum channel (PQC) is to secretly transmit individual quantum states concealed in the form of maximally mixed states using shared one-time pad and it is called Gaussian private quantum channel (GPQC) when the scheme is in the regime of continuous variables. We propose a GPQC enhanced with squeezed coherent states (GPQCwSC), which is a generalization of GPQC with coherent states only (GPQCo) [Phys. Rev. A 72, 042313 (2005)]. We show that GPQCwSC beats the GPQCo for the upper bound on accessible information. As a subsidiary example, it is shown that the squeezed states take an advantage over the coherent states against a beam splitting attack in a continuous variable QKD. It is also shown that a squeezing operation can be approximated as a superposition of two different displacement operations in the small squeezing regime.
The use of far infra-red radiation for the detection of concealed metal objects
DOT National Transportation Integrated Search
1971-11-01
The use of infrared radiation for the detection of concealed metal objects has been investigated both theoretically and experimentally. The investigation was divided into two phases, one which considered passive techniques, and another which involved...
The use of far infra-red radiation for the detection of concealed metal objects.
DOT National Transportation Integrated Search
1971-11-01
Abstract The use of infrared radiation for the detection : of concealed metal objects has been investigated both : theoretically and experimentally. The investigation was : divided into two phases, one which considered passive : techniques, and anoth...
20 CFR 404.502 - Overpayments.
Code of Federal Regulations, 2010 CFR
2010-04-01
... representative payee for payments made after the beneficiary's death. We will not recover such overpayments from... intentional false statement or representation, or willful concealment of, or deliberate failure to furnish... individual's intentional false statement or representation, or willful concealment of, or deliberate failure...
Management of concealed penis with modified penoplasty.
Xu, Jian-Guo; Lv, Chuan; Wang, Yu-Chong; Zhu, Ji; Xue, Chun-Yu
2015-03-01
To investigate the effect of penile degloving in combination with penoscrotal angle reconstruction for the correction of concealed penis. A foreskin circumcision incision was made along the coronal sulcus. After a sharp dissection under the superficial layer of tunica albuginea, the penile shaft was degloved to release the fibrous bands of the tunica dartos. Through a longitudinal incision or Z-plasty at the penoscrotal junction, securing of the tunica albuginea to the proximal tunica dartos was performed. The penoscrotal angle was reconstructed. This procedure effectively corrected the concealed penis, while correcting other problems such as phimosis. From August 2008 to August 2013, we performed 41 procedures for concealed penis. Correction was successful in all patients with an improved median length of 2.1 cm in the flaccid state. Follow-up ranged from 6 months to 2 years, and satisfactory cosmetic outcomes were obtained without scars or erectile discomfort. Our technique includes degloving and penoscrotal angle reconstruction, which provides proper visualization for fixation of the penile base. The longitudinal or Z-plasty incision also opened the degloving dead cavity, which was good for drainage. The procedure is straight forward with good functional and cosmetic outcomes and is thus ideal for correction of the concealed penis. Copyright © 2015 Elsevier Inc. All rights reserved.
Modified penoplasty for concealed penis in children.
Yang, Tianyou; Zhang, Liyu; Su, Cheng; Li, Zhongmin; Wen, Yingquan
2013-09-01
To report a modified penoplasty technique for concealed penis in children. Between January 2006 and June 2012, 201 cases of concealed penis were surgically repaired with modified penoplasty. The modified penoplasty technique consisted of 3 major steps: (1) degloved the penile skin and excised the inner prepuce, (2) advanced penoscrotal skin to cover penile shaft, and (3) fixed the penis base and reconstructed the penoscrotal angle. Two hundred one cases of concealed penis were enrolled in this study over a period of 6 years. Mean age at the time of surgery was 5.3 years (range 1-13 years) and mean operative time was 40 minutes (range 30-65minutes). All patients were routinely followed up at 1, 3, and 6 months after surgery. Most patients developed postoperative edema and were resolved within 1 month, whereas 20 cases developed prolonged postoperative edema, especially at the site of frenulum, which took 3 months to be resolved. Ten cases had retraction after surgery. No erection difficulties were recorded. Patients/parents reported better hygiene and improved visualization and accessibility of penis after surgery and were satisfied with the cosmetic outcome. The result of this study shows that the modified penoplasty technique is a simple, safe, and effective procedure for concealed penis with satisfied cosmetic outcome. Copyright © 2013 Elsevier Inc. All rights reserved.
Hiding and finding: the relationship between visual concealment and visual search.
Smilek, Daniel; Weinheimer, Laura; Kwan, Donna; Reynolds, Mike; Kingstone, Alan
2009-11-01
As an initial step toward developing a theory of visual concealment, we assessed whether people would use factors known to influence visual search difficulty when the degree of concealment of objects among distractors was varied. In Experiment 1, participants arranged search objects (shapes, emotional faces, and graphemes) to create displays in which the targets were in plain sight but were either easy or hard to find. Analyses of easy and hard displays created during Experiment 1 revealed that the participants reliably used factors known to influence search difficulty (e.g., eccentricity, target-distractor similarity, presence/absence of a feature) to vary the difficulty of search across displays. In Experiment 2, a new participant group searched for the targets in the displays created by the participants in Experiment 1. Results indicated that search was more difficult in the hard than in the easy condition. In Experiments 3 and 4, participants used presence versus absence of a feature to vary search difficulty with several novel stimulus sets. Taken together, the results reveal a close link between the factors that govern concealment and the factors known to influence search difficulty, suggesting that a visual search theory can be extended to form the basis of a theory of visual concealment.
Lyons, Anthony; Pepping, Christopher A
2017-09-01
Middle-aged and older gay men experience higher rates of depression and anxiety compared to their heterosexual counterparts, with internalized homonegativity and sexual identity concealment known to be major stress-related contributors. This study examined the prospective effect of different types and sources of social support on internalized homonegativity and sexual identity concealment experienced among middle-aged and older gay men. A longitudinal survey involving two waves of data collection separated by 12 months was conducted among a cohort of 186 gay-identified men aged 40 years and older. Two types of social support were found to be important. Greater baseline tangible or practical support independently predicted lower internalized homonegativity at 12-month follow-up, while greater baseline emotional or psychological support independently predicted a lower tendency toward sexual identity concealment at 12-month follow-up. Greater baseline support from community or government agencies, such as health services and support organizations, predicted higher internalized homonegativity at 12-month follow-up. These findings suggest that tangible and emotional support may be beneficial in reducing internalized homonegativity and sexual identity concealment among middle-aged and older gay men. Ensuring that services provide environments that do not compound the stressful impact of stigma also appears to be important.
ERIC Educational Resources Information Center
Parker, Jeffrey G.; Gottman, John M.
A novel paradigm was developed and two studies conducted to test the contribution of six conversational skills to children's friendship formation. In study 1, 4- and 5-year-olds individually played for 30 minutes with a 2-foot-tall talking doll. The doll contained a wireless hidden receiver/speaker enabling a concealed female assistant to converse…
The use of far infra-red radiation for the detection of concealed metal objects.
DOT National Transportation Integrated Search
1971-11-01
The use of infra-red radiation for the detection : of conceal ed metal objects has been investiga ted both : theoretically and experimentally. The investigation was : divided into two phases, one which considered passive : techniques, and another whi...
George, Mathew Sunil; Lambert, Helen
2015-01-01
In HIV prevention and care programmes, disclosure of status by HIV-positive individuals is generally encouraged to contain the infection and provide adequate support to the person concerned. Lack of disclosure is generally framed as a barrier to preventive behaviours and accessing support. The assumption that disclosure is beneficial is also reflected in studies that aim to identify determinants of disclosure and recommend individual-level measures to promote disclosure. However, in contexts where HIV infection is stigmatised and there is fear of rejection and discrimination among those living with HIV, concealment of status becomes a way to try and regain as much as possible the life that was disrupted by the discovery of HIV infection. In this study of HIV-positive women and children in India, concealment was considered essential by individuals and families of those living with HIV to re-establish and maintain their normal lives in an environment where stigma and discrimination were prevalent. This paper describes why women and care givers of children felt the need to conceal HIV status, the various ways in which people tried to do so and the implications for treatment of people living with HIV. We found that while women were generally willing to disclose their status to their husband or partner, they were very keen to conceal their status from all others, including family members. Parents and carers with an HIV-positive child were not willing to disclose this status to the child or to others. Understanding the different rationales for concealment would help policy makers and programme managers to develop more appropriate care management strategies and train care providers to assist clients in accessing care and support without disrupting their lives.
George, Mathew Sunil; Lambert, Helen
2015-01-01
In HIV prevention and care programmes, disclosure of status by HIV-positive individuals is generally encouraged to contain the infection and provide adequate support to the person concerned. Lack of disclosure is generally framed as a barrier to preventive behaviours and accessing support. The assumption that disclosure is beneficial is also reflected in studies that aim to identify determinants of disclosure and recommend individual-level measures to promote disclosure. However, in contexts where HIV infection is stigmatised and there is fear of rejection and discrimination among those living with HIV, concealment of status becomes a way to try and regain as much as possible the life that was disrupted by the discovery of HIV infection. In this study of HIV-positive women and children in India, concealment was considered essential by individuals and families of those living with HIV to re-establish and maintain their normal lives in an environment where stigma and discrimination were prevalent. This paper describes why women and care givers of children felt the need to conceal HIV status, the various ways in which people tried to do so and the implications for treatment of people living with HIV. We found that while women were generally willing to disclose their status to their husband or partner, they were very keen to conceal their status from all others, including family members. Parents and carers with an HIV-positive child were not willing to disclose this status to the child or to others. Understanding the different rationales for concealment would help policy makers and programme managers to develop more appropriate care management strategies and train care providers to assist clients in accessing care and support without disrupting their lives. PMID:25706959
The inconspicuous penis in children.
Cimador, Marcello; Catalano, Pieralba; Ortolano, Rita; Giuffrè, Mario
2015-04-01
The term 'inconspicuous penis' refers to a group of anatomical abnormalities in which the penis looks smaller than is expected. Micropenis can be defined as 'true micropenis'--which results from a defect in the hypothalamic-pituitary-gonadal axis--and 'micropenis secondary to congenital anatomical anomalies of the surrounding and overlying structures'--also known as 'concealed penis'. The different forms of concealed penis include webbed penis, congenital megaprepuce and partially hidden penis caused by prepubic adiposity. This disorder can also have iatrogenic causes resulting from adhesions that are secondary to circumcision--this type of concealed penis is known as 'trapped penis'. However, in both groups, micropenis is defined as a stretched penile length that is at least 2.5 SD below the mean for the patient's age, but without any other penile defects. Patients with true micropenis can be managed with testosterone, which has demonstrated good penile elongation results in the long term. Surgery also has a pivotal role in reconstruction for elongating the penis and for correction of anatomical abnormalities in concealed penis.
Vitamin D and musculoskeletal status in Nova Scotian women who wear concealing clothing.
Ojah, Rani C I; Welch, Jo M
2012-05-01
Bone and muscle weakness due to vitamin D deficiency is common among Muslim women who reside in sunny, equatorial countries. The purpose of this study was to determine if living in a northern maritime location additionally disadvantages women who wear concealing clothes. A cross-sectional matched pair design was used to compare women who habitually wore concealing clothing with women who dressed according to western norms. Each premenopausal hijab-wearing woman (n = 11) was matched by age, height, weight and skin tone with a western-dressed woman. Subjects were tested by hand grip dynamometry to assess muscular strength and by quantitative ultrasound at the calcaneus to assess bone status. Nutritional intake was obtained by 24 h recall. Serum 25-hydroxyvitamin D (s-25(OH)D) status was determined in seven matched pairs. The hijab group had lower s-25(OH)D than women who wore western clothes (40 ± 28 vs. 81 ± 32 nmol/L, p= 0.01). Grip strength in the right hand was lower in the hijab-wearing women (p = 0.05) but this appeared to be due to less participation in intense exercise. Bone status did not differ between groups (p= 0.9). Dietary intake of vitamin D was lower in the hijab-wearers (316 ± 353 vs. 601 ± 341 IU/day, p= 0.001). This pilot study suggests that women living in a northern maritime location appear to be at risk for vitamin D insufficiency and therefore should consider taking vitamin D supplements.
The effects of dictatorship on health: the case of Turkmenistan
Rechel, Bernd; McKee, Martin
2007-01-01
Background There is a health crisis in Turkmenistan similar to, but more severe than, in other Central Asian countries. This paper asks whether the health crisis in Turkmenistan is attributable to the consequences of the dictatorship under president Niyazov, who died in 2006. Methods The basis for this paper was a series of semi-structured in-depth interviews with key informants complemented by an iterative search of internet sites, initially published as a report in April 2005, and subsequently updated with feedback on the report as well as a comprehensive search of secondary information sources and databases. Results This paper describes in depth three areas in which the dictatorship in Turkmenistan had a negative impact on population health: the regime's policy of secrecy and denial, which sees the "solution" to health care problems in concealment rather than prevention; its complicity in the trafficking of drugs from Afghanistan; and the neglect of its health care system. Conclusion The paper concludes that dictatorship has contributed to the health crisis facing Turkmenistan. One of the first tests of the new regime will be whether it can address this crisis. PMID:17663794
The effects of dictatorship on health: the case of Turkmenistan.
Rechel, Bernd; McKee, Martin
2007-07-30
There is a health crisis in Turkmenistan similar to, but more severe than, in other Central Asian countries. This paper asks whether the health crisis in Turkmenistan is attributable to the consequences of the dictatorship under president Niyazov, who died in 2006. The basis for this paper was a series of semi-structured in-depth interviews with key informants complemented by an iterative search of internet sites, initially published as a report in April 2005, and subsequently updated with feedback on the report as well as a comprehensive search of secondary information sources and databases. This paper describes in depth three areas in which the dictatorship in Turkmenistan had a negative impact on population health: the regime's policy of secrecy and denial, which sees the "solution" to health care problems in concealment rather than prevention; its complicity in the trafficking of drugs from Afghanistan; and the neglect of its health care system. The paper concludes that dictatorship has contributed to the health crisis facing Turkmenistan. One of the first tests of the new regime will be whether it can address this crisis.
The "double life" of bulimia: patients' experiences in daily life interactions.
Pettersen, Gunn; Rosenvinge, Jan H; Ytterhus, Borgunn
2008-01-01
This qualitative study, using interviews with 38 subjects, explored how and why they conceal bulimic symptoms and the understanding of concealing in terms of social interaction. A "double life" was described as a dichotomy between being active and outgoing versus performing shameful bulimic behaviors and constantly living with fear of stigmatization, and striving against exposure. Concealing was well planned to avoid such fear, and to preserve dignity. Bulimia may be understood as volitional exertion of interaction control, not just as a result of poor impulse regulation. Understanding the meaning of secrecy and "double life" may facilitate help seeking behavior and guide treatment.
Sampson, Jay A.; Rodriguez, Brian D.
2010-01-01
The Sunnyside porphyry copper system is part of the concealed San Rafael Valley porphyry system located in the Patagonia Mountains of Arizona. The U.S. Geological Survey is conducting a series of multidisciplinary studies as part of the Assessment Techniques for Concealed Mineral Resources project. To help characterize the size, resistivity, and skin depth of the polarizable mineral deposit concealed beneath thick overburden, a regional east-west audio-magnetotelluric sounding profile was acquired. The purpose of this report is to release the audio-magnetotelluric sounding data collected along that east-west profile. No interpretation of the data is included.
College Students' Reasons for Concealing Suicidal Ideation
ERIC Educational Resources Information Center
Burton Denmark, Adryon; Hess, Elaine; Becker, Martin Swanbrow
2012-01-01
Self-reported reasons for concealing suicidal ideation were explored using data from a national survey of undergraduate and graduate students: 558 students indicated that they seriously considered attempting suicide during the previous year and did not tell anyone about their suicidal thoughts. Content analysis of students' qualitative responses…
Behavioral Indicators of Legal and Illegal Gun Carrying
2015-05-01
wide variety of handguns , in a wide variety of sizes and shapes, made of a wide variety of materials , and this variation is likely to have a subtle...Under Clothing/Belt ..................................................................................................... 23 Concealment of Handgun ...in Center of Chest ..................................................................................... 24 Concealment of Handgun in Groin Area with
Devine, Eric G; Peebles, Kristina R; Martini, Valeria
2017-03-01
Clinical trials within the US face an increasing challenge with the recruitment of quality candidates. One readily available group of subjects that have high rates of participation in clinical research are subjects who enroll in multiple trials for the purpose of generating income through study payments. Aside from issues of safety and generalizability, evidence suggests that these subjects employ methods of deception to qualify for the strict entrance criteria of some studies, including concealing information and fabricating information. Including these subjects in research poses a significant risk to the integrity of data quality and study designs. Strategies to limit enrollment of subjects whose motivation is generating income have not been systematically addressed in the literature. The present paper is intended to provide investigators with a range of strategies for developing and implementing a study protocol with protections to minimize the enrollment of subjects whose primary motivation for enrolling is to generate income. This multifaceted approach includes recommendations for advertising strategies, payment strategies, telephone screening strategies, and baseline screening strategies. The approach also includes recommendations for attending to inconsistent study data and subject motivation. Implementing these strategies may be more or less important depending upon the vulnerability of the study design to subject deception. Although these strategies may help researchers exclude subjects with a higher rate of deceptive practices, widespread adoption of subject registries would go a long way to decrease the chances of subjects enrolling in multiple studies or more than once in the same study.
Clark, Jesse L.; Perez-Brumer, Amaya; Salazar, Ximena
2015-01-01
Previous analyses of Partner Notification (PN) have addressed individual, interpersonal, social, and structural issues influencing PN outcomes but have paid less attention to the conceptual framework of PN itself. We conducted 18 individual interviews and 8 group discussions, in a two-stage qualitative research process, to explore the meanings and contexts of PN for sexually transmitted infections (STI) among men who have sex with men (MSM) and men who have sex with men and women (MSMW) in Lima, Peru. Participants described PN as the open disclosure of private, potentially stigmatizing information that could strengthen or disrupt a partnership, structured by the tension between concealment and revelation. In addition to informing partners of an STI diagnosis, the act of PN was believed to reveal other potentially stigmatizing information related to sexual identity and practices such as homosexuality, promiscuity, and HIV co-infection. In this context, the potential development of visible, biological STI symptoms represented a risk for disruption of the boundary between secrecy and disclosure that could result in involuntary disclosure of STI status. To address the conflict between concealment and disclosure, participants cited efforts to “manejar la situacion” [manage the situation] by controlling the biological risks of STI exposure without openly disclosing STI status. We use this concept of “managing the situation” as a practical and theoretical framework for comprehensive Partner Management for HIV/STI control systems among MSM in Latin America. PMID:25821149
Clark, Jesse L; Perez-Brumer, Amaya; Salazar, Ximena
2015-12-01
Previous analyses of partner notification (PN) have addressed individual, interpersonal, social, and structural issues influencing PN outcomes but have paid less attention to the conceptual framework of PN itself. We conducted 18 individual interviews and 8 group discussions, in a two-stage qualitative research process, to explore the meanings and contexts of PN for sexually transmitted infections (STI) among men who have sex with men (MSM) and men who have sex with men and women (MSMW) in Lima, Peru. Participants described PN as the open disclosure of private, potentially stigmatizing information that could strengthen or disrupt a partnership, structured by the tension between concealment and revelation. In addition to informing partners of an STI diagnosis, the act of PN was believed to reveal other potentially stigmatizing information related to sexual identity and practices such as homosexuality, promiscuity, and HIV co-infection. In this context, the potential development of visible, biological STI symptoms represented a risk for disruption of the boundary between secrecy and disclosure that could result in involuntary disclosure of STI status. To address the conflict between concealment and disclosure, participants cited efforts to "manejar la situacion" (manage the situation) by controlling the biological risks of STI exposure without openly disclosing STI status. We use this concept of "managing the situation" as a practical and theoretical framework for comprehensive Partner Management for HIV/STI control systems among MSM in Latin America.
A non-imaging polarized terahertz passive system for detecting and identifying concealed explosives
NASA Astrophysics Data System (ADS)
Karam, Mostafa A.; Meyer, Doug
2011-06-01
Existing terahertz THz systems for detecting concealed explosives are not capable of identifying explosive type which leads to higher false alarm rates. Moreover, some of those systems are imaging systems that invade personal privacy, and require more processing and computational resources. Other systems have no polarization preference which makes them incapable of capturing the geometric features of an explosive. In this study a non-imaging polarized THz passive system for detecting and identifying concealed explosives overcoming the forgoing shortcomings is developed. The system employs a polarized passive THz sensor in acquiring emitted data from a scene that may have concealed explosives. The acquired data are decomposed into their natural resonance frequencies, and the number of those frequencies is used as criteria in detecting the explosive presence. If the presence of an explosive is confirmed, a set of physically based retrieval algorithms is used in extracting the explosive dielectric constant/refractive index value from natural resonance frequencies and amplitudes of associated signals. Comparing the refractive index value against a database of refractive indexes of known explosives identifies the explosive type. As an application, a system having a dual polarized radiometer operating within the frequency band of 0.62- 0.82 THz is presented and used in detecting and identifying person borne C-4 explosive concealed under a cotton garment. The system showed higher efficiencies in detecting and identifying the explosive.
Anxiety and Related Disorders and Concealment in Sexual Minority Young Adults.
Cohen, Jeffrey M; Blasey, Christine; Barr Taylor, C; Weiss, Brandon J; Newman, Michelle G
2016-01-01
Sexual minorities face greater exposure to discrimination and rejection than heterosexuals. Given these threats, sexual minorities may engage in sexual orientation concealment in order to avoid danger. This social stigma and minority stress places sexual minorities at risk for anxiety and related disorders. Given that three fourths of anxiety disorder onset occurs before the age of 24, the current study investigated the symptoms of generalized anxiety disorder, social phobia, panic disorder, posttraumatic stress disorder, and depression in sexual minority young adults relative to their heterosexual peers. Secondarily, the study investigated sexual orientation concealment as a predictor of anxiety and related disorders. A sample of 157 sexual minority and 157 heterosexual young adults matched on age and gender completed self-report measures of the aforementioned disorders, and indicated their level of sexual orientation concealment. Results revealed that sexual minority young adults reported greater symptoms relative to heterosexuals across all outcome measures. There were no interactions between sexual minority status and gender, however, women had higher symptoms across all disorders. Sexual minority young women appeared to be at the most risk for clinical levels of anxiety and related disorders. In addition, concealment of sexual orientation significantly predicted symptoms of social phobia. Implications are offered for the cognitive and behavioral treatment of anxiety and related disorders in this population. Copyright © 2015. Published by Elsevier Ltd.
ERIC Educational Resources Information Center
Okamoto-Barth, Sanae; Tomonaga, Masaki; Tanaka, Masayuki; Matsuzawa, Tetsuro
2008-01-01
The use of gaze shifts as social cues has various evolutionary advantages. To investigate the developmental processes of this ability, we conducted an object-choice task by using longitudinal methods with infant chimpanzees tested from 8 months old until 3 years old. The experimenter used one of six gestures towards a cup concealing food; tapping,…
27 CFR 447.62 - False statements or concealment of facts.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 27 Alcohol, Tobacco Products and Firearms 3 2011-04-01 2010-04-01 true False statements or concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION IMPORTATION OF ARMS, AMMUNITION AND...
27 CFR 447.62 - False statements or concealment of facts.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false False statements or concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION IMPORTATION OF ARMS, AMMUNITION AND...
27 CFR 447.62 - False statements or concealment of facts.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 27 Alcohol, Tobacco Products and Firearms 3 2012-04-01 2010-04-01 true False statements or concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION IMPORTATION OF ARMS, AMMUNITION AND...
27 CFR 447.62 - False statements or concealment of facts.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 27 Alcohol, Tobacco Products and Firearms 3 2013-04-01 2013-04-01 false False statements or concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION IMPORTATION OF ARMS, AMMUNITION AND...
27 CFR 447.62 - False statements or concealment of facts.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 27 Alcohol, Tobacco Products and Firearms 3 2014-04-01 2014-04-01 false False statements or concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION IMPORTATION OF ARMS, AMMUNITION AND...
Concealed Questions. In Search of Answers
ERIC Educational Resources Information Center
Frana, Ilaria
2010-01-01
This dissertation examines the semantic interpretation of various types of DPs in so-called concealed-question (CQ) constructions, as "Bill's phone number" in the sentence "John knows Bill's phone number". The peculiar characteristic of DP-CQs is that they are interpreted as having the meaning of an embedded question. So, for instance, the…
Hard x-ray focusing optics for concealed object detection
NASA Astrophysics Data System (ADS)
Jannson, Tomasz; Gertsenshteyn, Michael
2006-05-01
In this paper, we discuss hard x-ray optics, in general, and lobster-eye focusing optics, in particular, for concealed object detection, at longer distances. The longer distance (~50m) scenario is important for Improvised Explosives Detection (IED), "seeing through walls," "seeing objects under ground," and related applications.
Ground roost resource selection for Merriam's wild turkeys
Chad P. Lehman; Daniel J. Thompson; Mark A. Rumble
2010-01-01
Concealment cover is important for ground-roosting wild turkey (Meleagris gallopavo) poults immediately following hatch during the vulnerable, preflight stage. We compared concealment cover resources selected at ground roosts to those of nest sites and available resources for Merriam's turkeys (Meleagris gallopavo merriami) in the Black Hills of South Dakota, USA...
Smith, Stephanie A; Brunner, Steven R
2016-01-01
This research study examined Bud Goodall's online health narrative as a case study through the use of a thematic analysis to investigate the presence of communication privacy management (CPM) theory. Emergent themes of humor as a privacy management strategy, legitimization of co-owners, shifting privacy rules at end of life, and metaphors as privacy protection were used to recount Goodall's cancer experience on his personal blog, connecting to the components of CPM. The themes the authors analyzed represent the push-pull dialectical tension experienced to reveal and conceal information, conceptualization of private information, shared boundaries, and boundary linkages.
Further evidence for GHB naturally occurring in common non-alcoholic beverages.
Elliott, Simon P; Fais, Paolo
2017-08-01
GHB has been implicated in many cases of suspected surreptitious administration with the purpose of increasing victim vulnerability to sexual assault. Low amounts of endogenous (or naturally occurring) GHB, which do not reach pharmacologically active levels, have been detected in alcoholic and non-alcoholic beverages. Due to the continued requirement to obtain data on the presence of endogenous GHB in various beverage types, GHB concentrations were measured in a series of non-alcoholic beverages. Tonic water and lemon flavoured tonic water beverages were analysed at 0, 24 and 96h after the bottle opening using gas chromatography coupled to tandem mass spectrometry (GC-MS/MS) on an Agilent 6890/7000C Triple Quadrupole. GHB was detected in all beverages at very low amounts ranging from 89 to 145ng/mL (0.089-0.145mg/L) and did not demonstrate a general trend of variation for concentration along the tested time span (96h). The presented data provide additional evidence for the endogenous nature of GHB in non-alcoholic beverages at very low concentrations, which are many orders of magnitude lower than those described to produce any pharmacological effect on the subject. However, when considering a case of alleged drug-facilitated sexual assault, a low level of GHB detected in a drink may be related both to a surreptitiously GHB administration with subsequent dilution for concealment or to the presence of endogenous GHB. On this basis, a comprehensive analysis of all the available information, including circumstantial data demonstrating possible attempts to conceal GHB administration and an assessment of levels of endogenous GHB in the suspected beverage type, is of the utmost importance for a proper interpretation of the toxicological results. Copyright © 2017 Elsevier B.V. All rights reserved.
Identifying the location of a concealed object through unintentional eye movements
Neuman, Yair; Assaf, Dan; Israeli, Navot
2015-01-01
In some investigative and interrogative contexts, the investigator is seeking to identify the location of an object (e.g., implanted bomb) which is known to a given subject (e.g., a terrorist). In this paper, we present a non-intrusive methodology for uncovering the loci of a concealed object by analyzing the subject's eye movements. Using a combination of eye tracking, psychological manipulation and a search algorithm, we have performed two experiments. In the first experiment, we have gained 58% hit rate in identifying the location of the concealed object and in the second experiment 56% hit rate. The pros and cons of the methodology for forensic investigation are discussed. PMID:25904879
Williams, Charlotte J; Cropley, Mark
2014-10-01
If perfectionists avoid engaging in preventive health behaviours, they may be putting their long-term health and well-being at risk. Correlational analyses based on a sample of 370 university students identified maladaptive perfectionism to be associated with decreased levels of engagement in preventive health behaviours, life satisfaction and well-being and increased levels of self-concealment and psychological distress. Adaptive perfectionism was associated with higher levels of engagement in preventive health behaviours. Self-concealment was identified as a partial mediator in the relationship between maladaptive perfectionism and both engagement in preventive health behaviours and psychological distress. Implications of the findings are discussed. © The Author(s) 2013.
Do Children Understand That People Selectively Conceal or Express Emotion?
ERIC Educational Resources Information Center
Hayashi, Hajimu; Shiomi, Yuki
2015-01-01
This study examined whether children understand that people selectively conceal or express emotion depending upon the context. We prepared two contexts for a verbal display task for 70 first-graders, 80 third-graders, 64 fifth-graders, and 71 adults. In both contexts, protagonists had negative feelings because of the behavior of the other…
The Psychological Implications of Concealing a Stigma: A Cognitive-Affective-Behavioral Model
ERIC Educational Resources Information Center
Pachankis, John E.
2007-01-01
Many assume that individuals with a hidden stigma escape the difficulties faced by individuals with a visible stigma. However, recent research has shown that individuals with a concealable stigma also face considerable stressors and psychological challenges. The ambiguity of social situations combined with the threat of potential discovery makes…
The Cost of Question Concealment: Eye-Tracking and MEG Evidence
ERIC Educational Resources Information Center
Harris, Jesse; Pylkkanen, Liina; McElree, Brian; Frisson, Steven
2008-01-01
Although natural language appears to be largely compositional, the meanings of certain expressions cannot be straightforwardly recovered from the meanings of their parts. This study examined the online processing of one such class of expressions: "concealed questions", in which the meaning of a complex noun phrase ("the proof of the theorem")…
Turkey habitat use and nesting characteristics in ponderosa pine
Mark A. Rumble; Stanley H. Anderson
1987-01-01
Turkeys (Meleagris gallapovo) selected nest sites that provided good horizontal concealment. Rock or rock outcrops were selected most frequently for nest concealment on first-nest attempts. Renest attempts showed a selection preference for shrubs as nest cover; most of these were located in meadows. Nesting success doubled for renests versus first...
Gender-specific health implications of minority stress among lesbians and gay men.
Bariola, Emily; Lyons, Anthony; Leonard, William
2016-12-01
Lesbians and gay men are exposed to unique minority stressors. We examined the health implications of one type of distal minority stressor (victimisation) and one type of proximal minority stressor (sexual identity concealment due to anticipated stigma) among lesbians and gay men. Gender-specific health implications were assessed. Data were collected via an online survey involving an Australian sample of 1,470 gay men and 1,264 lesbians. Survey questions assessed demographics, experiences of different forms of sexual identity-related victimisation and sexual identity concealment in a variety of contexts. Health outcomes included self-reported general health, illicit drug use, frequency of alcohol consumption, smoking status, and weight status. Gay men reported higher rates of victimisation and identity concealment than lesbians. Controlling for demographic differences, experiences of victimisation were associated with poorer self-rated health, illicit drug use, and smoking among both gay men and lesbians. In contrast, identity concealment was linked with poorer health outcomes among lesbians only. Our findings offer new insights into the potential antecedents of the health inequalities that have previously been reported for these populations. © 2016 Public Health Association of Australia.
Image fusion based on millimeter-wave for concealed weapon detection
NASA Astrophysics Data System (ADS)
Zhu, Weiwen; Zhao, Yuejin; Deng, Chao; Zhang, Cunlin; Zhang, Yalin; Zhang, Jingshui
2010-11-01
This paper describes a novel multi sensors image fusion technology which is presented for concealed weapon detection (CWD). It is known to all, because of the good transparency of the clothes at millimeter wave band, a millimeter wave radiometer can be used to image and distinguish concealed contraband beneath clothes, for example guns, knives, detonator and so on. As a result, we adopt the passive millimeter wave (PMMW) imaging technology for airport security. However, in consideration of the wavelength of millimeter wave and the single channel mechanical scanning, the millimeter wave image has law optical resolution, which can't meet the need of practical application. Therefore, visible image (VI), which has higher resolution, is proposed for the image fusion with the millimeter wave image to enhance the readability. Before the image fusion, a novel image pre-processing which specifics to the fusion of millimeter wave imaging and visible image is adopted. And in the process of image fusion, multi resolution analysis (MRA) based on Wavelet Transform (WT) is adopted. In this way, the experiment result shows that this method has advantages in concealed weapon detection and has practical significance.
TeraSCREEN: multi-frequency multi-mode Terahertz screening for border checks
NASA Astrophysics Data System (ADS)
Alexander, Naomi E.; Alderman, Byron; Allona, Fernando; Frijlink, Peter; Gonzalo, Ramón; Hägelen, Manfred; Ibáñez, Asier; Krozer, Viktor; Langford, Marian L.; Limiti, Ernesto; Platt, Duncan; Schikora, Marek; Wang, Hui; Weber, Marc Andree
2014-06-01
The challenge for any security screening system is to identify potentially harmful objects such as weapons and explosives concealed under clothing. Classical border and security checkpoints are no longer capable of fulfilling the demands of today's ever growing security requirements, especially with respect to the high throughput generally required which entails a high detection rate of threat material and a low false alarm rate. TeraSCREEN proposes to develop an innovative concept of multi-frequency multi-mode Terahertz and millimeter-wave detection with new automatic detection and classification functionalities. The system developed will demonstrate, at a live control point, the safe automatic detection and classification of objects concealed under clothing, whilst respecting privacy and increasing current throughput rates. This innovative screening system will combine multi-frequency, multi-mode images taken by passive and active subsystems which will scan the subjects and obtain complementary spatial and spectral information, thus allowing for automatic threat recognition. The TeraSCREEN project, which will run from 2013 to 2016, has received funding from the European Union's Seventh Framework Programme under the Security Call. This paper will describe the project objectives and approach.
Radiological and practical aspects of body packing
Reginelli, A; Pinto, F; Sica, G; Scaglione, M; Berger, F H; Romano, L; Brunese, L
2014-01-01
Body packing represents the concealment of illegal substances in a person's body with the aim of smuggling. “Body packers” either swallow drug-filled packets or introduce drug-filled packets into their bodies rectally or vaginally with the purpose of concealing them. The three main smuggled drugs are cocaine, heroin and cannabis products. Body packing represents a serious risk of acute narcotic toxicity from drug exposure, intestinal obstruction owing to pellet impaction and bowel perforation with consequent abdominal sepsis. A suspected body packer is generally admitted to hospital to perform imaging investigations and confirm the presence of drugs in his/her body. Radiological imaging methods are essential to diagnose body packing and to detect potential complications. Increasing sophistication of traffickers and improvements in packaging add to the detection difficulty. Radiologists should be aware of the appearance of drug packets in a range of imaging modalities. This article informs physicians about the challenging aspects of body packing, its background and medicolegal issues, what imaging methods can be used and what criteria are necessary to perform a correct diagnosis. PMID:24472727
Effects of modified penoplasty for concealed penis in children.
Chen, Chao; Li, Ning; Luo, Yi-Ge; Wang, Hong; Tang, Xian-Ming; Chen, Jia-Bo; Dong, Chun-Qiang; Liu, Qiang; Dong, Kun; Su, Cheng; Yang, Ti-Quan
2016-10-01
To evaluate the effect of modified penoplasty in the management of concealed penis. We retrospectively reviewed 96 consecutive patients with concealed penis, which had been surgically corrected between July 2013 and July 2015. All patients underwent modified Shiraki phalloplasty. All patients were scheduled for regular follow-up at 1, 3, and 6 months after the surgery. Data on the patients' age, operative time, postoperative complications, and parents' satisfaction grade were collected and analyzed. The mean follow-up period was 17.4 months (range 7-31 months). The mean operative time was 63.2 ± 8.7 min. The mean perpendicular penile length was 1.89 ± 0.77 cm preoperatively and 4.42 ± 0.87 cm postoperatively, with an improved mean length of 2.5 ± 0.68 cm in the flaccid state postoperatively (p < 0.05). The patients' satisfaction grades after the surgery were improved significantly (p < 0.05). Fifty-two patients had penile lymphedema postoperatively; however, it disappeared spontaneously within 3 months. Additionally, postoperative wound infection occurred in two patients. There were no complications such as flap necrosis, penile shaft contracture, voiding difficulty, and erection difficulties. The modified Shiraki phalloplasty for concealed penis can achieve maximum utilization of prepuce to assure coverage of the exposed penile shaft. It has fewer complications, achieving marked asthetics, and functional improvement. It is a relatively ideal means for treating concealed penis.
Asha, Stephen Edward; Cooke, Andrew
2015-09-01
Suspected body packers may be brought to emergency departments (EDs) close to international airports for abdominal computed tomography (CT) scanning. Senior emergency clinicians may be asked to interpret these CT scans. Missing concealed drug packages have important clinical and forensic implications. The accuracy of emergency clinician interpretation of abdominal CT scans for concealed drugs is not known. Limited evidence suggests that accuracy for identification of concealed packages can be increased by viewing CT images on "lung window" settings. To determine the accuracy of senior emergency clinicians in interpreting abdominal CT scans for concealed drugs, and to determine if this accuracy was improved by viewing scans on both abdominal and lung window settings. Emergency clinicians blinded to all patient identifiers and the radiology report interpreted CT scans of suspected body packers using standard abdominal window settings and then with the addition of lung window settings. The reference standard was the radiologist's report. Fifty-five emergency clinicians reported 235 CT scans. The sensitivity, specificity, and accuracy of interpretation using abdominal windows was 89.9% (95% confidence interval [CI] 83.0-94.7), 81.9% (95% CI 73.7-88.4), and 86.0% (95% CI 81.5-90.4), respectively, and with both window settings was 94.1% (95% CI 88.3-97.6), 76.7% (95% CI 68.0-84.1), 85.5% (95% CI 81.0-90.0), respectively. Diagnostic accuracy was similar regardless of the clinician's experience. Interrater reliability was moderate (kappa 0.46). The accuracy of interpretation of abdominal CT scans performed for the purpose of detecting concealed drug packages by emergency clinicians is not high enough to safely discharge these patients from the ED. The use of lung windows improved sensitivity, but at the expense of specificity. Crown Copyright © 2015. Published by Elsevier Inc. All rights reserved.
Toma, Claudia; Butera, Fabrizio
2009-06-01
Two experiments investigated the differential impact of cooperation and competition on strategic information sharing and use in a three-person group decision-making task. Information was distributed in order to create a hidden profile so that disconfirmation of group members' initial preferences was required to solve the task. Experiment 1 revealed that competition, compared to cooperation, led group members to withhold unshared information, a difference that was not significant for shared information. In competition, compared to cooperation, group members were also more reluctant to disconfirm their initial preferences. Decision quality was lower in competition than in cooperation, this effect being mediated by disconfirmation use and not by information sharing. Experiment 2 replicated these findings and revealed the role of mistrust in predicting strategic information sharing and use in competition. These results support a motivated information processing approach of group decision making.
To, Matthew J; Jones, Jennifer; Emara, Mohamed; Jadad, Alejandro R
2013-01-01
Inadequate reporting undermines findings of randomized controlled trials (RCTs). This study assessed and compared articles published in high-impact general medical and specialized journals. Reports of RCTs published in high-impact general and specialized medical journals were identified through a search of MEDLINE from January to March of 1995, 2000, 2005, and 2010. Articles that provided original data on adult patients diagnosed with chronic conditions were included in the study. Data on trial characteristics, reporting of allocation concealment, quality score, and the presence of a trial flow diagram were extracted independently by two reviewers, and discrepancies were resolved by consensus or independent adjudication. Descriptive statistics were used for quantitative variables. Comparisons between general medical and specialized journals, and trends over time were performed using Chi-square tests. Reports of 284 trials were analyzed. There was a significantly higher proportion of RCTs published with adequate reporting of allocation concealment (p = 0.003), presentation of a trial flow diagram (p<0.0001) and high quality scores (p = 0.038) over time. Trials published in general medical journals had higher quality scores than those in specialized journals (p = 0.001), reported adequate allocation concealment more often (p = 0.013), and presented a trial flow diagram more often (p<0.001). We found significant improvements in reporting quality of RCTs published in high-impact factor journals over the last fifteen years. These improvements are likely attributed to concerted international efforts to improve reporting quality such as CONSORT. There is still much room for improvement, especially among specialized journals.
Vitamin D and Musculoskeletal Status in Nova Scotian Women Who Wear Concealing Clothing
Ojah, Rani C. I.; Welch, Jo M.
2012-01-01
Bone and muscle weakness due to vitamin D deficiency is common among Muslim women who reside in sunny, equatorial countries. The purpose of this study was to determine if living in a northern maritime location additionally disadvantages women who wear concealing clothes. A cross-sectional matched pair design was used to compare women who habitually wore concealing clothing with women who dressed according to western norms. Each premenopausal hijab-wearing woman (n = 11) was matched by age, height, weight and skin tone with a western-dressed woman. Subjects were tested by hand grip dynamometry to assess muscular strength and by quantitative ultrasound at the calcaneus to assess bone status. Nutritional intake was obtained by 24 h recall. Serum 25-hydroxyvitamin D (s-25(OH)D) status was determined in seven matched pairs. The hijab group had lower s-25(OH)D than women who wore western clothes (40 ± 28 vs. 81 ± 32 nmol/L, p= 0.01). Grip strength in the right hand was lower in the hijab-wearing women (p = 0.05) but this appeared to be due to less participation in intense exercise. Bone status did not differ between groups (p= 0.9). Dietary intake of vitamin D was lower in the hijab-wearers (316 ± 353 vs. 601 ± 341 IU/day, p= 0.001). This pilot study suggests that women living in a northern maritime location appear to be at risk for vitamin D insufficiency and therefore should consider taking vitamin D supplements. PMID:22690323
NASA Astrophysics Data System (ADS)
Liu, Shuang; Hu, Xiangyun; Zhu, Rixiang
2018-07-01
The Mengku iron deposit is one of the largest magnetite deposits in Xinjiang Province, northwestern China. It is important to accurately delineate the positions and shapes of concealed orebodies for drillhole layout and resource quantity evaluations. Total-field surface and three-component borehole magnetic measurements were carried out in the deposit. We made a joint inversion of the surface and borehole magnetic data to investigate the characteristics of the orebodies. We recovered the distributions of the magnetization intensity using a preconditioned conjugate gradient algorithm. Synthetic examples show that the reconstructed models of the joint inversion yield a better consistency with the true models than those recovered using independent inversion. By using joint inversion, more accurate information is obtained on the position and shape of the orebodies in the Mengku iron deposit. The magnetization distribution of Line 135 reveals that the major magnetite orebodies occur at 200-400 m depth with a lenticular cross-section dipping north-east. The orebodies of Line 143 are modified and buried at 100-200 m depth with an elliptical cross-section caused by fault activities at north-northeast directions. This information is verified by well logs. The borehole component anomalies are combined with surface data to reconstruct the physical property model and improve the ability to distinguish vertical and horizontal directions, which provides an effective approach to prospect buried orebodies.
Concealment of Child Sexual Abuse in Sports
ERIC Educational Resources Information Center
Hartill, Mike
2013-01-01
When the sexual abuse of children is revealed, it is often found that other nonabusing adults were aware of the abuse but failed to act. During the past twenty years or so, the concealment of child sexual abuse (CSA) within organizations has emerged as a key challenge for child protection work. Recent events at Pennsylvania State University (PSU)…
ERIC Educational Resources Information Center
Price, James H.; Thompson, Amy; Khubchandani, Jagdish; Dake, Joseph; Payton, Erica; Teeple, Karen
2014-01-01
Objective: To assess the perceptions and practices of a national sample of college and university presidents regarding their support for concealed handguns being carried on college campuses. Participants: The sample for this study consisted of a national random sample of 900 college or university presidents. Methods: In the spring of 2013, a…
Guns on Campus: A Current Debate. E-Fact Sheet
ERIC Educational Resources Information Center
Higher Education Center for Alcohol, Drug Abuse, and Violence Prevention, 2010
2010-01-01
Almost all U.S. college campuses ban concealed weapons. But in the aftermath of the tragic shooting deaths at Virginia Tech in 2007, the debate on whether guns should be permitted at colleges and universities has intensified. Dozens of states have considered proposals to lift bans on concealed weapons at colleges and universities, but so far none…
A hybrid frame concealment algorithm for H.264/AVC.
Yan, Bo; Gharavi, Hamid
2010-01-01
In packet-based video transmissions, packets loss due to channel errors may result in the loss of the whole video frame. Recently, many error concealment algorithms have been proposed in order to combat channel errors; however, most of the existing algorithms can only deal with the loss of macroblocks and are not able to conceal the whole missing frame. In order to resolve this problem, in this paper, we have proposed a new hybrid motion vector extrapolation (HMVE) algorithm to recover the whole missing frame, and it is able to provide more accurate estimation for the motion vectors of the missing frame than other conventional methods. Simulation results show that it is highly effective and significantly outperforms other existing frame recovery methods.
Rhumorbarbe, Damien; Staehli, Ludovic; Broséus, Julian; Rossy, Quentin; Esseiva, Pierre
2016-10-01
Darknet markets, also known as cryptomarkets, are websites located on the Darknet and designed to allow the trafficking of illicit products, mainly drugs. This study aims at presenting the added value of combining digital, chemical and physical information to reconstruct sellers' activities. In particular, this research focuses on Evolution, one of the most popular cryptomarkets active from January 2014 to March 2015. Evolution source code files were analysed using Python scripts based on regular expressions to extract information about listings (i.e., sales proposals) and sellers. The results revealed more than 48,000 listings and around 2700 vendors claiming to send illicit drug products from 70 countries. The most frequent categories of illicit drugs offered by vendors were cannabis-related products (around 25%) followed by ecstasy (MDA, MDMA) and stimulants (cocaine, speed). The cryptomarket was then especially studied from a Swiss point of view. Illicit drugs were purchased from three sellers located in Switzerland. The purchases were carried out to confront digital information (e.g., the type of drug, the purity, the shipping country and the concealment methods mentioned on listings) with the physical analysis of the shipment packaging and the chemical analysis of the received product (purity, cutting agents, chemical profile based on minor and major alkaloids, chemical class). The results show that digital information, such as concealment methods and shipping country, seems accurate. But the illicit drugs purity is found to be different from the information indicated on their respective listings. Moreover, chemical profiling highlighted links between cocaine sold online and specimens seized in Western Switzerland. This study highlights that (1) the forensic analysis of the received products allows the evaluation of the accuracy of digital data collected on the website, and (2) the information from digital and physical/chemical traces are complementary to evaluate the practices of the online selling of illicit drugs on cryptomarkets. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Pendulum detector testing device
Gonsalves, J.M.
1997-09-30
A detector testing device is described which provides consistent, cost-effective, repeatable results. The testing device is primarily constructed of PVC plastic and other non-metallic materials. Sensitivity of a walk-through detector system can be checked by: (1) providing a standard test object simulating the mass, size and material content of a weapon or other contraband, (2) suspending the test object in successive positions, such as head, waist and ankle levels, simulating where the contraband might be concealed on a person walking through the detector system; and (3) swinging the suspended object through each of the positions, while operating the detector system and observing its response. The test object is retained in a holder in which the orientation of the test device or target can be readily changed, to properly complete the testing requirements. 5 figs.
Pendulum detector testing device
Gonsalves, John M.
1997-01-01
A detector testing device which provides consistent, cost-effective, repeatable results. The testing device is primarily constructed of PVC plastic and other non-metallic materials. Sensitivity of a walk-through detector system can be checked by: 1) providing a standard test object simulating the mass, size and material content of a weapon or other contraband, 2) suspending the test object in successive positions, such as head, waist and ankle levels, simulating where the contraband might be concealed on a person walking through the detector system; and 3) swinging the suspended object through each of the positions, while operating the detector system and observing its response. The test object is retained in a holder in which the orientation of the test device or target can be readily changed, to properly complete the testing requirements.
Gates, Allison; Hartling, Lisa; Vandermeer, Ben; Caldwell, Patrina; Contopoulos-Ioannidis, Despina G; Curtis, Sarah; Fernandes, Ricardo M; Klassen, Terry P; Williams, Katrina; Dyson, Michele P
2018-02-01
For child health randomized controlled trials (RCTs) published in 2012, we aimed to describe design and reporting characteristics and evaluate changes since 2007; assess the association between trial design and registration and risk of bias (RoB); and assess the association between RoB and effect size. For 300 RCTs, we extracted design and reporting characteristics and assessed RoB. We assessed 5-year changes in design and reporting (based on 300 RCTs we had previously analyzed) using the Fisher exact test. We tested for associations between design and reporting characteristics and overall RoB and registration using the Fisher exact, Cochran-Armitage, Kruskal-Wallis, and Jonckheere-Terpstra tests. We pooled effect sizes and tested for differences by RoB using the χ 2 test for subgroups in meta-analysis. The 2012 and 2007 RCTs differed with respect to many design and reporting characteristics. From 2007 to 2012, RoB did not change for random sequence generation and improved for allocation concealment (P < .001). Fewer 2012 RCTs were rated high overall RoB and more were rated unclear (P = .03). Only 7.3% of 2012 RCTs were rated low overall RoB. Trial registration doubled from 2007 to 2012 (23% to 46%) (P < .001) and was associated with lower RoB (P = .009). Effect size did not differ by RoB (P = .43) CONCLUSIONS: Random sequence generation and allocation concealment were not often reported, and selective reporting was prevalent. Measures to increase trialists' awareness and application of existing reporting guidance, and the prospective registration of RCTs is needed to improve the trustworthiness of findings from this field. Copyright © 2017 The Author(s). Published by Elsevier Inc. All rights reserved.
Gauld, Cassandra S; Lewis, Ioni; White, Katherine M
2014-01-01
Making a conscious effort to hide the fact that you are texting while driving (i.e., concealed texting) is a deliberate and risky behaviour involving attention diverted away from the road. As the most frequent users of text messaging services and mobile phones while driving, young people appear at heightened risk of crashing from engaging in this behaviour. This study investigated the phenomenon of concealed texting while driving, and utilised an extended Theory of Planned Behaviour (TPB) including the additional predictors of moral norm, mobile phone involvement, and anticipated regret to predict young drivers' intentions and subsequent behaviour. Participants (n=171) were aged 17-25 years, owned a mobile phone, and had a current driver's licence. Participants completed a questionnaire measuring their intention to conceal texting while driving, and a follow-up questionnaire a week later to report their behavioural engagement. The results of hierarchical multiple regression analyses showed overall support for the predictive utility of the TPB with the standard constructs accounting for 69% of variance in drivers' intentions, and the extended predictors contributing an additional 6% of variance in intentions over and above the standard constructs. Attitude, subjective norm, PBC, moral norm, and mobile phone involvement emerged as significant predictors of intentions; and intention was the only significant predictor of drivers' self-reported behaviour. These constructs can provide insight into key focal points for countermeasures including advertising and other public education strategies aimed at influencing young drivers to reconsider their engagement in this risky behaviour. Copyright © 2013 Elsevier Ltd. All rights reserved.
C-130 Corrosion Prevention and Control Program
2011-08-01
hexavalent chrome … Warner Robins Air Logistics Center People First…Mission Always SIBR Projects Back Scatter X-Ray NDI Detect concealed...Projects Listing Future Projects Chrome -Free Coating Systems Flight Tests • AkzoNobel (Sep-Oct 2011) – PreKote – Aerodur 2100 magnesium rich...primer (MgRP) – Aerodur 5000 topcoat color #36173 • Deft (June 2012) – Rare earth conversion coating (RECC) 1015/3021 – 02-GN-093 chrome -free
Role of radiology in a national initiative to interdict drug smuggling: the Dutch experience.
Algra, Paul R; Brogdon, Byron G; Marugg, Roque C
2007-08-01
The purpose of this pictorial essay is to describe the role of radiology in a national initiative to intercept illegal narcotics concealed within the bodies of human transporters. Radiologic examination is increasingly important in identifying intracorporeal drug smuggling as improved wrapping techniques undermine the usefulness of blood and urine testing and clinical observation. Detection rates of high accuracy, sensitivity, and specificity are achieved by experienced radiologists.
Detecting concealed objects at a checkpoint
McMakin, Douglas L [Richland, WA; Hall, Thomas E [Kennewick, WA; Sheen, David M [Richland, WA; Severtsen, Ronald H [Richland, WA
2008-07-29
Disclosed are systems, methods, devices, and apparatus to interrogate a clothed individual with electromagnetic radiation to determine if a concealed object is being carried. This determination includes establishing data corresponding to an image of the individual with a pair of opposed, semi-cylindrical array panels each configured to interrogate the individual with electromagnetic radiation in the 200 MHz to 1 THz range.
ERIC Educational Resources Information Center
Chaudoir, Stephenie R.; Fisher, Jeffrey D.
2010-01-01
Disclosure is a critical aspect of the experience of people who live with concealable stigmatized identities. This article presents the disclosure processes model (DPM)--a framework with which to examine when and why interpersonal disclosure may be beneficial. The DPM suggests that antecedent goals representing approach and avoidance motivational…
ERIC Educational Resources Information Center
Bouffard, Jeffrey A.; Nobles, Matt R.; Wells, William; Cavanaugh, Michael R.
2012-01-01
Among other arguments, advocates for lifting bans on carrying concealed handguns on campus propose that this would increase the prevalence of legitimately carried handguns, which might then deter crimes or be used to intervene in campus shooting incidents like the one that took place at Virginia Tech in 2007. Opponents suggest that increased…
ERIC Educational Resources Information Center
Masuda, Akihiko; Boone, Matthew S.
2011-01-01
The present study examined whether mental health stigma (i.e., negative attitudes toward people with a psychological disorder) and self-concealment are unique predictors of help-seeking attitudes in Asian American and European American college students with no history of seeking professional psychological services. The Asian American group had…
ERIC Educational Resources Information Center
Jorgensen, Lisa J.; Ellis, Gary D.; Ruddell, Edward
2013-01-01
This research examined the effect of concealment (environmental cues), presence or absence of people recreating (social cues), and gender on individuals' fear of crime in a community park setting. Using a 7-point single-item indicator, 732 participants from two samples (540 park visitors and 192 college students) rated their estimates of fear of…
ERIC Educational Resources Information Center
Mendoza, Hadrian; Masuda, Akihiko; Swartout, Kevin M.
2015-01-01
The study examined whether mental health stigma and self-concealment are uniquely related to various dimensions of attitudes toward seeking professional psychological services (i.e., help-seeking attitudes) in Latina/o college students. Data from 129 Latina/o undergraduates (76% female) were used in the analysis. Results revealed that mental…
Self-stigma among concealable minorities in Hong Kong: conceptualization and unified measurement.
Mak, Winnie W S; Cheung, Rebecca Y M
2010-04-01
Self-stigma refers to the internalized stigma that individuals may have toward themselves as a result of their minority status. Not only can self-stigma dampen the mental health of individuals, it can deter them from seeking professional help lest disclosing their minority status lead to being shunned by service providers. No unified instrument has been developed to measure consistently self-stigma that could be applied to different concealable minority groups. The present study presented findings based on 4 studies on the development and validation of the Self-Stigma Scale, conducted in Hong Kong with community samples of mental health consumers, recent immigrants from Mainland China, and sexual minorities. Upon a series of validation procedures, a 9-item Self-Stigma Scale-Short Form was developed. Initial support on its reliability and construct validity (convergent and criterion validities) were found among 3 stigmatized groups. Utility of this unified measure was to establish an empirical basis upon which self-stigma of different concealable minority groups could be assessed under the same dimensions. Health-care professionals could make use of this short scale to assess potential self-stigmatization among concealable minorities, which may hamper their treatment process as well as their overall well-being.
[Half-gloving cordectomy: a modified procedure for concealed penis].
Sun, Wei-Gui; Zheng, Qi-Chuan; Jiang, Kun
2012-06-01
To search for a simple surgical procedure for the treatment of concealed penis that may have better effect and less complications. We used a modified surgical method in the treatment of 58 patients with concealed penis aged from 3 to 15 (mean 6.8) years. The operation was simplified and involved the following steps: wholly unveiling the penis glans, half-degloving the foreskins, cutting off all the adhesive fibers up to the penile suspensory ligaments, and liberating the external penis. The operation was successful in all the patients, with the operative time of 15 -45 (mean 33) minutes, hospital stay of 2 - 5 (mean 3.5) days, but no complications except mild foreskin edema in 5 cases. The external penis was prolonged from 0.5 - 2.8 (mean 1.4) cm preoperatively to 3.2 - 8.5 (mean 3.9) cm postoperatively. The patients were followed up for 1 -3 years, all satisfied with the length and appearance of the penis, and their sexual and reproductive functions were normal. The modified surgical procedure for concealed penis is simple and effective, with desirable outcomes, few postoperative complications and no damage to sexual and reproductive functions.
2014-06-13
CAPE CANAVERAL, Fla. -- This great egret may be trying to hide in the tall grass on NASA's Kennedy Space Center in Florida to conceal the fact that it is molting. The undeveloped property on Kennedy Space Center is managed by the U.S. Fish and Wildlife Service through the Merritt Island National Wildlife Refuge. The refuge provides a habitat for a plethora of wildlife, including 330 species of birds. For information on the refuge, visit http://www.fws.gov/merrittisland/Index.html. Photo credit: NASA/Daniel Casper
'Nosing Around' the human skin: what information is concealed in skin odour?
Kippenberger, Stefan; Havlíček, Jan; Bernd, August; Thaçi, Diamant; Kaufmann, Roland; Meissner, Markus
2012-09-01
In today's world, natural body odour is mostly considered as being unpleasant and combated by intensive cleansing, deodorants and perfumes. However, there is evidence that volatile body compounds provide the recipient with important information. Here, we present the chemical identity of odorous compounds derived from odourless precursors within sweat and sebum. Moreover, distinct volatile markers may be relevant for the clinical diagnosis of disease. Interestingly, ageing seems to correlate with the appearance of specific compounds that convey the so-called old man smell. Finally, it is discussed if human skin odour has the quality to act as pheromone transmitting information between individuals in terms of major histocompatibility complex type or reproductive status. © 2012 John Wiley & Sons A/S.
Open-area concealed-weapon detection system
NASA Astrophysics Data System (ADS)
Pati, P.; Mather, P.
2011-06-01
Concealed Weapon Detection (CWD) has become a significant challenge to present day security needs; individuals carrying weapons into airplanes, schools, and secured establishments are threat to public security. Although controlled screening, of people for concealed weapons, has been employed in many establishments, procedures and equipment are designed to work in restricted environments like airport passport control, military checkpoints, hospitals, school and university entrance. Furthermore, screening systems do not effectively decipher between threat and non-threat metal objects, thus leading to high rate of false alarms which can become a liability to daily operational needs of establishments. Therefore, the design and development of a new CWD system to operate in a large open area environment with large numbers of people reduced incidences of false alarms and increased location accuracy is essential.
Could plate tectonics on Venus be concealed by volcanic deposits
NASA Technical Reports Server (NTRS)
Kaula, W. M.; Muradian, L. M.
1982-01-01
The present investigation is supplementary to a study reported by Kaula and Phillips (1981). From an analysis of Pioneer Venus altimetry, Kaula and Phillips had inferred that any heat loss from the planet by plate tectonics must be small compared to that from the earth. However, it has been suggested by others that plate tectonic may exist on Venus, but that the expected 'square root of s' dependence of the topographic drop off is not observed because it is concealed by lava flows. The present investigation has the objective to conduct an examination whether this suggestion of concealment by lava flow is correct. On the basis of the performed analysis, it is concluded that the results obtained by Kaula and Phillips appear to be well justified.
Promissory accounts of personalisation in the commercialisation of genomic knowledge.
Arribas-Ayllon, Michael; Sarangi, Srikant; Clarke, Angus
2011-01-01
As part of personalised medicine emerging from the human genomics revolution, many websites now offer direct-to-consumer genetic testing. Here, we examine three personal genomics companies--Navigenics, deCODEme and 23andMe--each of which represents contrasting registers of 'personalisation'. We identify three distinctive registers in these websites: a paternalistic (medical) register; a translational (scientific) register and a democratic (consumerist) register. We explore in detail the rhetorical and discourse devices employed in these websites to assess how personalised healthcare is promised to the public. Promising information that will empower prevention of common complex diseases and ensure better quality of life is conflated with promising greater access to personal information. The presence and absence of scientific legitimacy is related to concerns about accuracy and validity on the one side, and fears of paternalism and elitism on the other. Nevertheless, a common strategy uniting these different styles of personalisation is consumer empowerment. Finally, we consider the tension between the drive of translational medicine to make human genomic research practically relevant, and the intrinsic uncertainties of scientific research and show how, in the commercial domain, future risks are transformed into discourses of promise by concealing these uncertainties.
The use of patterns to disguise environmental cues during an anticipatory judgment task.
Causer, Joe; Williams, A Mark
2015-02-01
A number of novel manipulations to the design of playing uniforms were used to try to disguise the actions of penalty takers in soccer. Skilled and less-skilled soccer goalkeepers were required to anticipate penalty kick outcome while their opponent wore one of three different uniform designs that were intended to disguise the availability of potentially key information from the hip region. Variations of shapes/patterns were designed to conceal the actual alignment of the hips. Three occlusion points were used in the test film: -160 ms, -80 ms before, and at foot-ball contact. Skilled individuals reported higher accuracy scores than their less-skilled counterparts (p < .05). There were no performance decrements for the less-skilled group across the different uniform conditions (p > .05); however, the skilled group decreased their accuracy on the experimental conditions compared with the control (p < .05). Findings highlight the potential benefits of designing playing uniforms that facilitate disguise in sport.
Strydom, Reuben; Srinivasan, Mandyam V
2017-09-21
The aim of this study is to derive a guidance law by which an unmanned aerial system(s) (UAS) can pursue a moving target at a constant distance, while concealing its own motion. We derive a closed-form solution for the trajectory of the UAS by imposing two key constraints: (1) the shadower moves in such a way as to be perceived as a stationary object by the shadowee, and (2) the distance between the shadower and shadowee is kept constant. Additionally, the theory presented in this paper considers constraints on the maximum achievable speed and acceleration of the shadower. Our theory is tested through Matlab simulations, which validate the camouflage strategy for both 2D and 3D conditions. Furthermore, experiments using a realistic vision-based implementation are conducted in a virtual environment, where the results demonstrate that even with noisy state information it is possible to remain well camouflaged using the constant distance motion camouflage technique.
Fey, David L.; Granitto, Matthew; Giles, Stuart A.; Smith, Steven M.; Eppinger, Robert G.; Kelley, Karen D.
2008-01-01
In the summer of 2007, the U.S. Geological Survey (USGS) began an exploration geochemical research study over the Pebble porphyry copper-gold-molydenum (Cu-Au-Mo) deposit in southwest Alaska. The Pebble deposit is extremely large and is almost entirely concealed by tundra, glacial deposits, and post-Cretaceous volcanic and volcaniclastic rocks. The deposit is presently being explored by Northern Dynasty Minerals, Ltd., and Anglo-American LLC. The USGS undertakes unbiased, broad-scale mineral resource assessments of government lands to provide Congress and citizens with information on national mineral endowment. Research on known deposits is also done to refine and better constrain methods and deposit models for the mineral resource assessments. The Pebble deposit was chosen for this study because it is concealed by surficial cover rocks, it is relatively undisturbed (except for exploration company drill holes), it is a large mineral system, and it is fairly well constrained at depth by the drill hole geology and geochemistry. The goals of the USGS study are (1) to determine whether the concealed deposit can be detected with surface samples, (2) to better understand the processes of metal migration from the deposit to the surface, and (3) to test and develop methods for assessing mineral resources in similar concealed terrains. This report presents analytical results for geochemical samples collected in 2007 from the Pebble deposit and surrounding environs. The analytical data are presented digitally both as an integrated Microsoft 2003 Access? database and as Microsoft 2003 Excel? files. The Pebble deposit is located in southwestern Alaska on state lands about 30 km (18 mi) northwest of the village of Illiamna and 320 km (200 mi) southwest of Anchorage (fig. 1). Elevations in the Pebble area range from 287 m (940 ft) at Frying Pan Lake just south of the deposit to 1146 m (3760 ft) on Kaskanak Mountain about 5 km (5 mi) to the west. The deposit is in an area of relatively subdued topographic relief with an elevation of around 300 m (1000 ft). This portion of Alaska is part of the subarctic regime mountains division, Yukon intermontane plateaus-tayga-meadow province ecoregion, as defined by Bailey (U.S. Forest Service, 2007). Between June 28th and July 12th, 2007, scientists from the USGS collected soil, water, stream sediment, vegetation, heavy-mineral concentrate, till, and rock samples from the deposit area. This report contains analytical results for soil, water, stream sediment, and vegetation samples. Analyses for the heavy-mineral concentrate, till, and rock samples are still in progress. The sampling was undertaken during relatively dry and stable weather conditions. Only minor scattered rain showers occurred during the sampling period, so surface conditions were largely unaffected by weather. The predominant sample media collected were soils and surface waters. Soil and water (mostly from ponds and springs, some from small creeks) samples were collected along a single 7.8 km-long (4.8 mi) east-west traverse across the Pebble East and Pebble West zones and from more distal background areas around Koktuli and Kaskanak Mountains. Sample sites are shown on figure 2 and plate 1, and locality coordinates are provided in the accompanying Access and Excel files named FieldSite. Water samples were analyzed by USGS laboratories with one subset analyzed by Activation Laboratories (Actlabs), as indicated below. Soils and stream sediments were analyzed for their total content by SGS Minerals Services under a contract with the USGS. Soil samples were also leached by selected partial-extraction leaching procedures and then analyzed by several commercial laboratories, as described below. Vegetation samples were analyzed as indicated below.
ERIC Educational Resources Information Center
Schrimshaw, Eric W.; Siegel, Karolynn; Downing, Martin J., Jr.; Parsons, Jeffrey T.
2013-01-01
Objective: Although bisexual men report lower levels of mental health relative to gay men, few studies have examined the factors that contribute to bisexual men's mental health. Bisexual men are less likely to disclose, and more likely to conceal (i.e., a desire to hide), their sexual orientation than gay men. Theory suggests that this may…
Non-Linear Acoustic Concealed Weapons Detector
2006-05-01
signature analysis 8 the interactions of the beams with concealed objects. The Khokhlov- Zabolotskaya-Kuznetsov ( KZK ) equation is the most widely used...Hamilton developed a finite difference method based on the KZK equation to model pulsed acoustic emissions from axial symmetric sources. Using a...College of William & Mary, we have developed a simulation code using the KZK equation to model non-linear acoustic beams and visualize beam patterns
ERIC Educational Resources Information Center
McKenna-Buchanan, Tim; Munz, Stevie; Rudnick, Justin
2015-01-01
Lesbian, gay, and queer (LGQ) teachers often deal with the tension between disclosing and concealing their sexual orientations in the college classroom. This article presents the results of a qualitative interview study with 29 self-identified LGQ college teachers about their choices to disclose or conceal their sexual identities. Using…
Bultman, Mark W.
2002-01-01
This report tests the usefulness of airborne time-domain electromagnetic (TEM) data on three mineral-resource-related issues: (1) to test whether known mineral deposits at or near the surface display any signal in the TEM data; 2) determine whether TEM data can be used to locate bedrock concealed by basin fill; and (3) if the exposed mineral deposits display a signal in the TEM data, to determine if whether deposits are recognizable at depth in outcropping bedrock or in bedrock concealed beneath basin fill. Because Earth's total-intensity magnetic field data are also acquired with the TEM data, these data are included in the analysis. The Cottonwood Canyon area in Santa Cruz County, Arizona, contains several polymetallic vein deposits, including those of the Tyndall, Salero, and Wrightson mining districts, all of which have had significant mineral production. Polymetallic vein deposits, which generally consist of veins of disseminated metallic minerals, commonly exhibit a response to electrical geophysical methods. Also, on the basis of other studies, the conditions that produced the polymetallic vein mineralization in the region are believed to extend offshore into the bedrock concealed by basin fill. The polymetallic vein deposits of the Cottonwood Canyon area all display a geophysical signature in the TEM data. These deposits occur in bedrock that has, in general, a very low resistivity. The polymetallic vein deposits are associated with high-conductivity regions that extend from deep in the bedrock to the surface. These high-conductivity regions can be quite narrow (100 m) or quite wide (1 km); most are relatively narrow. Every known mineral deposit or prospect is associated with a high-conductivity feature. High-conductivity regions can also occur without an association with known mineral deposits. Airborne TEM data appear to be able to locate the basin fill/bedrock contact beneath basin fill. The basin fill (both dry and saturated) is generally more conductive than the bedrock. The low conductivity of the bedrock ensures that no signal from the bedrock is received from under the basin fill in most places. Therefore, in most areas of basin fill, the bedrock is interpreted to be the bottom of the signal in the conductivity-depth transforms (CDTs). Although the CDTs locate the basin-fill/bedrock contact, on the basis of a comparison with a recent report, they mostly overstate its depth by a factor of at least 2. Because CDTs based on airborne TEM data do not see into bedrock below basin fill, it is impossible to detect mineralization in the bedrock concealed by such fill. Although the geophysical signature of polymetallic vein deposits is seen at depth in outcropping bedrock, the existence of this geophysical signal does not guarantee the occurrence of polymetallic vein deposits.
Holographic radar imaging privacy techniques utilizing dual-frequency implementation
NASA Astrophysics Data System (ADS)
McMakin, Douglas L.; Hall, Thomas E.; Sheen, David M.
2008-04-01
Over the last 15 years, the Pacific Northwest National Laboratory has performed significant research and development activities to enhance the state of the art of holographic radar imaging systems to be used at security checkpoints for screening people for concealed threats hidden under their garments. These enhancement activities included improvements to privacy techniques to remove human features and providing automatic detection of body-worn concealed threats. The enhanced privacy and detection methods used both physical and software imaging techniques. The physical imaging techniques included polarization-diversity illumination and reception, dual-frequency implementation, and high-frequency imaging at 60 GHz. Software imaging techniques to enhance the privacy of the person under surveillance included extracting concealed threat artifacts from the imagery to automatically detect the threat. This paper will focus on physical privacy techniques using dual-frequency implementation.
Liu, Huijie; Li, Nianqiang; Zhao, Qingchun
2015-05-10
Optical chaos generated by chaotic lasers has been widely used in several important applications, such as chaos-based communications and high-speed random-number generators. However, these applications are susceptible to degradation by the presence of time-delay (TD) signature identified from the chaotic output. Here we propose to achieve the concealment of TD signature, along with the enhancement of chaos bandwidth, in three-cascaded vertical-cavity surface-emitting lasers (VCSELs). The cascaded system is composed of an external-cavity master VCSEL, a solitary intermediate VCSEL, and a solitary slave VCSEL. Through mapping the evolutions of TD signature and chaos bandwidth in the parameter space of the injection strength and frequency detuning, photonic generation of polarization-resolved wideband chaos with TD concealment is numerically demonstrated for wide regions of the injection parameters.
Holographic Radar Imaging Privacy Techniques Utilizing Dual-Frequency Implementation
DOE Office of Scientific and Technical Information (OSTI.GOV)
McMakin, Douglas L.; Hall, Thomas E.; Sheen, David M.
2008-04-18
Over the last 15 years, the Pacific Northwest National Laboratory has performed significant research and development activities to enhance the state of the art of holographic radar imaging systems to be used at security checkpoints for screening people for concealed threats hidden under their garments. These enhancement activities included improvements to privacy techniques to remove human features and providing automatic detection of body-worn concealed threats. The enhanced privacy and detection methods used both physical and software imaging techniques. The physical imaging techniques included polarization-diversity illumination and reception, dual-frequency implementation, and high-frequency imaging at 60 GHz. Software imaging techniques to enhancemore » the privacy of the person under surveillance included extracting concealed threat artifacts from the imagery to automatically detect the threat. This paper will focus on physical privacy techniques using dual-frequency implementation.« less
How Men Manage Bulbar Urethral Stricture by Concealing Urinary Symptoms.
Whybrow, Paul; Rapley, Tim; Pickard, Robert; Hrisos, Susan
2015-10-01
In this article, we present findings from research conducted as part of a multi-center surgical trial. Bulbar urethral stricture, a narrowing of the middle urethra, is a common cause of urinary problems in men that can have a profound impact on their lives. Semi-structured interviews were conducted with a sample of 19 men seeking treatment for urethral stricture. The findings reveal how men tend to develop routines and tactics to adapt to their symptoms and hide them from others rather than seek help. We argue that this concealment becomes an inseparable part of how the disease is managed and is an additional hidden practical and emotional burden for these men. In addition, we suggest that the patients only sought curative treatments once practices of social concealment are no longer viable. © The Author(s) 2015.
Induction detection of concealed bulk banknotes
NASA Astrophysics Data System (ADS)
Fuller, Christopher; Chen, Antao
2012-06-01
The smuggling of bulk cash across borders is a serious issue that has increased in recent years. In an effort to curb the illegal transport of large numbers of paper bills, a detection scheme has been developed, based on the magnetic characteristics of bank notes. The results show that volumes of paper currency can be detected through common concealing materials such as plastics, cardboard, and fabrics making it a possible potential addition to border security methods. The detection scheme holds the potential of also reducing or eliminating false positives caused by metallic materials found in the vicinity, by observing the stark difference in received signals caused by metal and currency. The detection scheme holds the potential to detect for both the presence and number of concealed bulk notes, while maintaining the ability to reduce false positives caused by metal objects.
Design of a steganographic virtual operating system
NASA Astrophysics Data System (ADS)
Ashendorf, Elan; Craver, Scott
2015-03-01
A steganographic file system is a secure file system whose very existence on a disk is concealed. Customarily, these systems hide an encrypted volume within unused disk blocks, slack space, or atop conventional encrypted volumes. These file systems are far from undetectable, however: aside from their ciphertext footprint, they require a software or driver installation whose presence can attract attention and then targeted surveillance. We describe a new steganographic operating environment that requires no visible software installation, launching instead from a concealed bootstrap program that can be extracted and invoked with a chain of common Unix commands. Our system conceals its payload within innocuous files that typically contain high-entropy data, producing a footprint that is far less conspicuous than existing methods. The system uses a local web server to provide a file system, user interface and applications through a web architecture.
Lim, Meng-Hui; Teoh, Andrew Beng Jin; Toh, Kar-Ann
2013-06-01
Biometric discretization is a key component in biometric cryptographic key generation. It converts an extracted biometric feature vector into a binary string via typical steps such as segmentation of each feature element into a number of labeled intervals, mapping of each interval-captured feature element onto a binary space, and concatenation of the resulted binary output of all feature elements into a binary string. Currently, the detection rate optimized bit allocation (DROBA) scheme is one of the most effective biometric discretization schemes in terms of its capability to assign binary bits dynamically to user-specific features with respect to their discriminability. However, we learn that DROBA suffers from potential discriminative feature misdetection and underdiscretization in its bit allocation process. This paper highlights such drawbacks and improves upon DROBA based on a novel two-stage algorithm: 1) a dynamic search method to efficiently recapture such misdetected features and to optimize the bit allocation of underdiscretized features and 2) a genuine interval concealment technique to alleviate crucial information leakage resulted from the dynamic search. Improvements in classification accuracy on two popular face data sets vindicate the feasibility of our approach compared with DROBA.
Mental stress test: a rapid, simple, and efficient test to unmask long QT syndrome.
Etienne, Pauline; Huchet, François; Gaborit, Nathalie; Barc, Julien; Thollet, Aurélie; Kyndt, Florence; Guyomarch, Béatrice; Le Marec, Hervé; Charpentier, Flavien; Schott, Jean-Jacques; Redon, Richard; Probst, Vincent; Gourraud, Jean-Baptiste
2018-04-20
QT prolongation during mental stress test (MST) has been associated with familial idiopathic ventricular fibrillation. In long QT syndrome (LQTS), up to 30% of mutation carriers have normal QT duration. Our aim was to assess the QT response during MST, and its accuracy in the diagnosis of concealed LQTS. All patients who are carrier of a KCNQ1 or KCNH2 mutations without QT prolongation were enrolled. A control group was constituted of patients with negative exercise and epinephrine tests. Electrocardiogram were recorded at rest and at the maximum heart rate during MST and reviewed by two physicians. Among the 70 patients enrolled (median age 41±2.1 years, 46% male), 36 were mutation carrier for LQTS (20 KCNQ1 and 16 KCNH2), and 34 were controls. KCNQ1 and KCNH2 mutation carriers presented a longer QT interval at baseline [405(389; 416) and 421 (394; 434) ms, respectively] compared with the controls [361(338; 375)ms; P < 0.0001]. QT duration during MST varied by 9 (4; 18) ms in KCNQ1, 3 (-6; 16) ms in KCNH2, and by -22 (-29; -17) ms in controls (P < 0.0001). These QT variations were independent of heart rate (P < 0.3751). Receiver operating characteristic curve analysis identified a cut-off value of QT variation superior to -11 ms as best predictor of LQTS. It provided 97% sensitivity and 97% specificity of QT prolongation in the diagnosis of LQTS. We identified a paradoxical response of the QT interval during MST in LQTS. Easy to assess, MST may be efficient to unmask concealed LQTS in patients at risk of this pathology.
Protection of Public Figures. Symposium Proceedings, May 16-18, 1972
1972-01-01
192 EXPLOSIVE TRACE VAPOR DETECTION, Maryland D. Keyrw, USAMERDC.. 194 ATOMIC AND MOLECULAR DETECTION...subject through a doorway, a hallway, a portal, a fence, and thus subject him to co- vert surveillance for weapons or explosives concealed on his person...who has weapons or conceal- ed explosives on his person. So insofar as 4ERDC is concerned, the two broad scenarios that we will be talking about are
Ferrante di Ruffano, Lavinia; Dinnes, Jacqueline; Sitch, Alice J; Hyde, Chris; Deeks, Jonathan J
2017-02-24
There is a growing recognition for the need to expand our evidence base for the clinical effectiveness of diagnostic tests. Many international bodies are calling for diagnostic randomized controlled trials to provide the most rigorous evidence of impact to patient health. Although these so-called test-treatment RCTs are very challenging to undertake due to their methodological complexity, they have not been subjected to a systematic appraisal of their methodological quality. The extent to which these trials may be producing biased results therefore remains unknown. We set out to address this issue by conducting a methodological review of published test-treatment trials to determine how often they implement adequate methods to limit bias and safeguard the validity of results. We ascertained all test-treatment RCTs published 2004-2007, indexed in CENTRAL, including RCTs which randomized patients to diagnostic tests and measured patient outcomes after treatment. Tests used for screening, monitoring or prognosis were excluded. We assessed adequacy of sequence generation, allocation concealment and intention-to-treat, appropriateness of primary analyses, blinding and reporting of power calculations, and extracted study characteristics including the primary outcome. One hundred three trials compared 105 control with 119 experimental interventions, and reported 150 primary outcomes. Randomization and allocation concealment were adequate in 57 and 37% of trials. Blinding was uncommon (patients 5%, clinicians 4%, outcome assessors 21%), as was an adequate intention-to-treat analysis (29%). Overall 101 of 103 trials (98%) were at risk of bias, as judged using standard Cochrane criteria. Test-treatment trials are particularly susceptible to attrition and inadequate primary analyses, lack of blinding and under-powering. These weaknesses pose much greater methodological and practical challenges to conducting reliable RCT evaluations of test-treatment strategies than standard treatment interventions. We suggest a cautious approach that first examines whether a test-treatment intervention can accommodate the methodological safeguards necessary to minimize bias, and highlight that test-treatment RCTs require different methods to ensure reliability than standard treatment trials. Please see the companion paper to this article: http://bmcmedresmethodol.biomedcentral.com/articles/10.1186/s12874-016-0286-0 .
Krajčovič, Jozef; Janík, Martin; Novomeský, František; Straka, Lubomír; Hejna, Petr
2014-11-01
In forensic assessment, denial and concealment of pregnancy has wide-ranging implications including criminal abortions, extramural deliveries, concealment of birth, newborn infant abandonment or even neonaticide. Clarification of whether a newborn was born alive is the most important factor when evaluating an abandoned neonate or concealment of birth. Other points that need to be addressed are determination of viability and maturity of the newborn infant, and the identity of the mother. A prolonged postmortem interval following illegal disposal of a dead body often leads to advanced decomposition, making postmortem elucidation difficult. We report an exceptionally uncommon autopsy case of a well-preserved female newborn, which was accidentally found after eight years in a home freezer. Despite the prolonged postmortem interval, tissue preservation was sufficient for a meaningful autopsy including a comprehensive histopathological study. The purpose of the present investigations was to expand our understanding of thanatological processes, as well as detectability of particular histological findings on the remains of a newborn after extremely prolonged storage in an artificially frozen environment. In addition, this article discusses forensically important issues regarding concealment of newborn infant under specific conditions. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.
Concealed neuroanatomy in Michelangelo's Separation of Light From Darkness in the Sistine Chapel.
Suk, Ian; Tamargo, Rafael J
2010-05-01
Michelangelo Buonarroti (1475-1564) was a master anatomist as well as an artistic genius. He dissected cadavers numerous times and developed a profound understanding of human anatomy. From 1508 to 1512, Michelangelo painted the ceiling of the Sistine Chapel in Rome. His Sistine Chapel frescoes are considered one of the monumental achievements of Renaissance art. In the winter of 1511, Michelangelo entered the final stages of the Sistine Chapel project and painted 4 frescoes along the longitudinal apex of the vault, which completed a series of 9 central panels depicting scenes from the Book of Genesis. It is reported that Michelangelo concealed an image of the brain in the first of these last 4 panels, namely, the Creation of Adam. Here we present evidence that he concealed another neuronanatomic structure in the final panel of this series, the Separation of Light From Darkness, specifically a ventral view of the brainstem. The Separation of Light From Darkness is an important panel in the Sistine Chapel iconography because it depicts the beginning of Creation and is located directly above the altar. We propose that Michelangelo, a deeply religious man and an accomplished anatomist, intended to enhance the meaning of this iconographically critical panel and possibly document his anatomic accomplishments by concealing this sophisticated neuroanatomic rendering within the image of God.
NASA Astrophysics Data System (ADS)
Sun, Wei; Li, Shiyong
2014-08-01
This paper presents an unobservable single-server queueing system with three types of uncertainty, where the service rate, or waiting cost or service quality is random variable that may obtain n(n > 2) values. The information about the realised values of parameters is only known to the server. We are concerned about the server's behaviour: revealing or concealing the information to customers. The n-value assumption and the server's behaviour enable us to consider various pricing strategies. In this paper, we analyse the effect of information and uncertainty on profits and make comparisons between the profits under different pricing strategies. Moreover, as for parameter variability reflected by the number of each parameter's possible choices n, we observe the effect of variable n on all types of profits and find that revealing the parameter information can much more benefit the server with the increase of n.
Mufenda, Josef; Gebhardt, Stefan; van Rooyen, Rita; Theron, Gerhard
2015-01-01
UmbiFlow™ is a mobile-connected Doppler device that utilises a continuous waveform to measure resistance in the umbilical artery. The main aim of this pilot study was to determine whether the use of UmbiFlow™ for umbilical artery Doppler in patients with a suspected decreased symphysis fundal (SF) growth could safely lead to a decreased number of patients requiring referral to a more specialised level of care. A secondary aim of the study was to evaluate the effectiveness of UmbiFlow™ Doppler as a screening tool for concealed placental insufficiency in late bookers by using a single screening cut-off value that will be abnormal for any gestation >28 weeks. The cohort comprised two groups of patients: The first group included all follow-up patients with suspected intra-uterine growth restriction (a decreased symphysis-fundus measurement based on serial assessment) who underwent on-site UmbiFlow™Doppler testing performed by the midwife directly after the clinical examination. The second group included late bookers, where gestation was uncertain; but estimated >28 weeks based on clinical grounds. This group was comprised of unselected patients who report to antenatal care late for the first time and received an UmbiFlow™Doppler test for concealed placental insufficiency. UmbiFlow™Doppler could reduce the number of false referrals to hospital by 55%. A single UmbiFlow™Doppler test in late bookers appeared to identify a group of women at moderate risk of lower birth weight babies.
Passive millimeter-wave concealed weapon detection
NASA Astrophysics Data System (ADS)
Sinclair, Gordon N.; Anderton, Rupert N.; Appleby, Roger
2001-02-01
A method of detecting weapons concealed under clothing using passive millimeter wave imaging is described. The optical properties of clothing are discussed and examples given of the spectral reflectivity and transmission. The transmission tends to be constant from 60 to 150 GHz above which it decreases for some clothing materials. The transmission of a cotton T-shirt is typically 95% and of a leather jacket up to 85% at lower frequencies. A model is presented for calculating the contrast of a metallic concealed weapon when hidden under clothing and it indicates contrasts as large as 200 K can be realized outdoors. The advantages of real time over static frame imagery are discussed. It is concluded that real time imagery offers considerable advantages as weapons can be very varied in size, position and orientation and movement offers vital clues to the human observer which aid the recognition process.
2005-04-14
of Joensuu, Finland. These take the form of collections of dielectric cylinders, with detailed information concerning sapwood and heartwood dimensions...centre, and at 3km height above the minimum height of the DEM. The imaged area was 91m square, with pixels spaced at 0.5m. A Hamming weighted PSF was...correlation length was 0.1510m. Wood permittivity ranged from 2.2-i0.4 (deadwood) to 26.8-i5.3 ( sapwood ) via 6.7-i1.9 (heartwood). Total attenuation
Social networking technologies as an emerging tool for HIV prevention: a cluster randomized trial.
Young, Sean D; Cumberland, William G; Lee, Sung-Jae; Jaganath, Devan; Szekeres, Greg; Coates, Thomas
2013-09-03
Social networking technologies are an emerging tool for HIV prevention. To determine whether social networking communities can increase HIV testing among African American and Latino men who have sex with men (MSM). Randomized, controlled trial with concealed allocation. (ClinicalTrials.gov: NCT01701206). Online. 112 MSM based in Los Angeles, more than 85% of whom were African American or Latino. Sixteen peer leaders were randomly assigned to deliver information about HIV or general health to participants via Facebook groups over 12 weeks. After participants accepted a request to join the group, participation was voluntary. Group participation and engagement were monitored. Participants could request a free, home-based HIV testing kit and completed questionnaires at baseline and 12-week follow-up. Participant acceptance of and engagement in the intervention and social network participation, rates of home-based HIV testing, and sexual risk behaviors. Almost 95% of intervention participants and 73% of control participants voluntarily communicated using the social platform. Twenty-five of 57 intervention participants (44%) requested home-based HIV testing kits compared with 11 of 55 control participants (20%) (difference, 24 percentage points [95% CI, 8 to 41 percentage points]). Nine of the 25 intervention participants (36%) who requested the test took it and mailed it back compared with 2 of the 11 control participants (18%) who requested the test. Retention at study follow-up was more than 93%. Only 2 Facebook communities were included for each group. Social networking communities are acceptable and effective tools to increase home-based HIV testing among at-risk populations. National Institute of Mental Health.
Temporal Processing in the Visual Cortex of the Awake and Anesthetized Rat.
Aasebø, Ida E J; Lepperød, Mikkel E; Stavrinou, Maria; Nøkkevangen, Sandra; Einevoll, Gaute; Hafting, Torkel; Fyhn, Marianne
2017-01-01
The activity pattern and temporal dynamics within and between neuron ensembles are essential features of information processing and believed to be profoundly affected by anesthesia. Much of our general understanding of sensory information processing, including computational models aimed at mathematically simulating sensory information processing, rely on parameters derived from recordings conducted on animals under anesthesia. Due to the high variety of neuronal subtypes in the brain, population-based estimates of the impact of anesthesia may conceal unit- or ensemble-specific effects of the transition between states. Using chronically implanted tetrodes into primary visual cortex (V1) of rats, we conducted extracellular recordings of single units and followed the same cell ensembles in the awake and anesthetized states. We found that the transition from wakefulness to anesthesia involves unpredictable changes in temporal response characteristics. The latency of single-unit responses to visual stimulation was delayed in anesthesia, with large individual variations between units. Pair-wise correlations between units increased under anesthesia, indicating more synchronized activity. Further, the units within an ensemble show reproducible temporal activity patterns in response to visual stimuli that is changed between states, suggesting state-dependent sequences of activity. The current dataset, with recordings from the same neural ensembles across states, is well suited for validating and testing computational network models. This can lead to testable predictions, bring a deeper understanding of the experimental findings and improve models of neural information processing. Here, we exemplify such a workflow using a Brunel network model.
Informed renesting decisions: the effect of nest predation risk.
Pakanen, Veli-Matti; Rönkä, Nelli; Thomson, Robert L; Koivula, Kari
2014-04-01
Animals should cue on information that predicts reproductive success. After failure of an initial reproductive attempt, decisions on whether or not to initiate a second reproductive attempt may be affected by individual experience and social information. If the prospects of breeding success are poor, long-lived animals in particular should not invest in current reproductive success (CRS) in case it generates costs to future reproductive success (FRS). In birds, predation risk experienced during breeding may provide a cue for renesting success. Species having a high FRS potential should be flexible and take predation risk into account in their renesting decisions. We tested this prediction using breeding data of a long-lived wader, the southern dunlin Calidris alpina schinzii. As predicted, dunlin cued on predation risk information acquired from direct experience of nest failure due to predation and ambient nest predation risk. While the overall renesting rate was low (34.5%), the early season renesting rate was high but declined with season, indicating probable temporal changes in the costs and benefits of renesting. We develop a conceptual cost-benefit model to describe the effects of the phase and the length of breeding season on predation risk responses in renesting. We suggest that species investing in FRS should not continue breeding in short breeding seasons in response to predation risk but without time constraints, their response should be similar to species investing in CRS, e.g. within-season dispersal and increased nest concealment.
Temporal Processing in the Visual Cortex of the Awake and Anesthetized Rat
Aasebø, Ida E. J.; Stavrinou, Maria; Nøkkevangen, Sandra; Einevoll, Gaute
2017-01-01
Abstract The activity pattern and temporal dynamics within and between neuron ensembles are essential features of information processing and believed to be profoundly affected by anesthesia. Much of our general understanding of sensory information processing, including computational models aimed at mathematically simulating sensory information processing, rely on parameters derived from recordings conducted on animals under anesthesia. Due to the high variety of neuronal subtypes in the brain, population-based estimates of the impact of anesthesia may conceal unit- or ensemble-specific effects of the transition between states. Using chronically implanted tetrodes into primary visual cortex (V1) of rats, we conducted extracellular recordings of single units and followed the same cell ensembles in the awake and anesthetized states. We found that the transition from wakefulness to anesthesia involves unpredictable changes in temporal response characteristics. The latency of single-unit responses to visual stimulation was delayed in anesthesia, with large individual variations between units. Pair-wise correlations between units increased under anesthesia, indicating more synchronized activity. Further, the units within an ensemble show reproducible temporal activity patterns in response to visual stimuli that is changed between states, suggesting state-dependent sequences of activity. The current dataset, with recordings from the same neural ensembles across states, is well suited for validating and testing computational network models. This can lead to testable predictions, bring a deeper understanding of the experimental findings and improve models of neural information processing. Here, we exemplify such a workflow using a Brunel network model. PMID:28791331
Tanum, L; Malt, U F
2000-09-01
We investigated the relationship between personality traits and response to treatment with the tetracyclic antidepressant mianserin or placebo in patients with functional gastrointestinal disorder (FGD) without psychopathology. Forty-eight patients completed the Buss-Durkee Hostility Inventory, Neuroticism Extroversion Openness -Personality Inventory (NEO-PI), and Eysenck Personality Questionnaire (EPQ), neuroticism + lie subscales, before they were consecutively allocated to a 7-week double-blind treatment study with mianserin or placebo. Treatment response to pain and target symptoms were recorded daily with the Visual Analogue Scale and Clinical Global Improvement Scale at every visit. A low level of neuroticism and little concealed aggressiveness predicted treatment outcome with the antidepressant drug mianserin in non-psychiatric patients with FGD. Inversely, moderate to high neuroticism and marked concealed aggressiveness predicted poor response to treatment. These findings were most prominent in women. Personality traits were better predictors of treatment outcome than serotonergic sensitivity assessed with the fenfluramine test. Assessment of the personality traits negativism, irritability, aggression, and neuroticism may predict response to drug treatment of FGD even when serotonergic sensitivity is controlled for. If confirmed in future studies, the findings point towards a more differential psychopharmacologic treatment of FGD.
NASA Astrophysics Data System (ADS)
Chen, Wen-Yuan; Liu, Chen-Chung
2006-01-01
The problems with binary watermarking schemes are that they have only a small amount of embeddable space and are not robust enough. We develop a slice-based large-cluster algorithm (SBLCA) to construct a robust watermarking scheme for binary images. In SBLCA, a small-amount cluster selection (SACS) strategy is used to search for a feasible slice in a large-cluster flappable-pixel decision (LCFPD) method, which is used to search for the best location for concealing a secret bit from a selected slice. This method has four major advantages over the others: (a) SBLCA has a simple and effective decision function to select appropriate concealment locations, (b) SBLCA utilizes a blind watermarking scheme without the original image in the watermark extracting process, (c) SBLCA uses slice-based shuffling capability to transfer the regular image into a hash state without remembering the state before shuffling, and finally, (d) SBLCA has enough embeddable space that every 64 pixels could accommodate a secret bit of the binary image. Furthermore, empirical results on test images reveal that our approach is a robust watermarking scheme for binary images.
Review of terahertz technology development at INO
NASA Astrophysics Data System (ADS)
Dufour, Denis; Marchese, Linda; Terroux, Marc; Oulachgar, Hassane; Généreux, Francis; Doucet, Michel; Mercier, Luc; Tremblay, Bruno; Alain, Christine; Beaupré, Patrick; Blanchard, Nathalie; Bolduc, Martin; Chevalier, Claude; D'Amato, Dominic; Desroches, Yan; Duchesne, François; Gagnon, Lucie; Ilias, Samir; Jerominek, Hubert; Lagacé, François; Lambert, Julie; Lamontagne, Frédéric; Le Noc, Loïc; Martel, Anne; Pancrati, Ovidiu; Paultre, Jacques-Edmond; Pope, Tim; Provençal, Francis; Topart, Patrice; Vachon, Carl; Verreault, Sonia; Bergeron, Alain
2015-10-01
Over the past decade, INO has leveraged its expertise in the development of uncooled microbolometer detectors for infrared imaging to produce terahertz (THz) imaging systems. By modifying its microbolometer-based focal plane arrays to enhance absorption in the THz bands and by developing custom THz imaging lenses, INO has developed a leading-edge THz imaging system, the IRXCAM-THz-384 camera, capable of exploring novel applications in the emerging field of terahertz imaging and sensing. Using appropriate THz sources, results show that the IRXCAM-THz-384 camera is able to image a variety of concealed objects of interest for applications such as non-destructive testing and weapons detections. By using a longer wavelength (94 GHz) source, it is also capable of sensing the signatures of various objects hidden behind a drywall panel. This article, written as a review of THz research at INO over the past decade, describes the technical components that form the IRXCAM-THz-384 camera and the experimental setup used for active THz imaging. Image results for concealed weapons detection experiments, an exploration of wavelength choice on image quality, and the detection of hidden objects behind drywall are also presented.
Coincident disruptive coloration
Cuthill, Innes C.; Székely, Aron
2008-01-01
Even if an animal matches its surroundings perfectly in colour and texture, any mismatch between the spatial phase of its pattern and that of the background, or shadow created by its three-dimensional relief, is potentially revealing. Nevertheless, for camouflage to be fully broken, the shape must be recognizable. Disruptive coloration acts against object recognition by the use of high-contrast internal colour boundaries to break up shape and form. As well as the general outline, characteristic features such as eyes and limbs must also be concealed; this can be achieved by having the colour patterns on different, but adjacent, body parts aligned to match each other (i.e. in phase). Such ‘coincident disruptive coloration’ ensures that there is no phase disjunction where body parts meet, and causes different sections of the body to blend perceptually. We tested this theory using field experiments with predation by wild birds on artificial moth-like targets, whose wings and (edible pastry) bodies had colour patterns that were variously coincident or not. We also carried out an experiment with humans searching for analogous targets on a computer screen. Both experiments show that coincident disruptive coloration is an effective mechanism for concealing an otherwise revealing body form. PMID:18990668
Beam Width Robustness of a 670 GHz Imaging Radar
NASA Technical Reports Server (NTRS)
Cooper, K. B.; Llombart, N.; Dengler, R. J.; Siegel, P. H.
2009-01-01
Detection of a replica bomb belt concealed on a mannequin at 4 m standoff range is achieved using a 670 GHz imaging radar. At a somewhat larger standoff range of 4.6 m, the radar's beam width increases substantially, but the through-shirt image quality remains good. This suggests that a relatively modest increase in aperture size over the current design will be sufficient to detect person-borne concealed weapons at ranges exceeding 25 meters.
2016-06-01
media sources on the public discourse. This research compares and contrasts the roles and importance of traditional and social media in the public...alternative media , social media 15. NUMBER OF PAGES 73 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY...importance of traditional and social media in the public sphere today, as evidenced by the coverage of concealed-carry laws and related stories. The
Kinoshita, Shinji; Katoh, Takakazu; Yoshida, Hiroshi
2010-05-01
In 1974, Kinoshita reported a case of 'irregular parasystole' due to type I second-degree entrance block. Since then, many cases of such 'irregular' parasystole have been reported by us. To explain the mechanism of 'irregular' parasystole, two theories have been suggested, namely, 'electrotonic modulation' by Jalife and Moe, and 'type I second-degree entrance block' by us. On the contrary, in 1960, Kinoshita et al. reported a case of concealed bigeminy for the first time. The electrocardiographic findings in concealed bigeminy have suggested that there are dual re-entrant pathways with markedly long effective refractory periods in the re-entrant pathway. We have suggested that parasystole may be caused by re-entry in such re-entrant pathways. In this article, attempts are made to explain the mechanism of all the electrocardiographic findings in our cases of parasystole by 'parasystole due to re-entry'. Using 24 studies on parasystole and 21 studies on concealed extrasystoles that we have reported over 50 years, as well as three exemplary cases in this article, attempts are made to explain all electrocardiographic findings in parasystole by 'parasystole due to re-entry'. The electrocardiographic findings in our previous clinical cases of parasystole and concealed extrasystoles, as well as exemplary cases and diagrams in the present article, strongly suggest 'parasystole due to re-entry' as the mechanism of ventricular parasystole with second-degree entrance block.
[Concealed penis and its surgical correction: a report of 63 cases].
Cheng, Fan; Zhang, Xiaobin; Liu, Xiuheng; Zhou, Jiangqiao; Xia, Yue; Ge, Minghuan
2004-02-01
To evaluate the basic principles of surgical correction of concealed penis. From Jan. 1999 to Dec. 2002, 63 cases of concealed penis, aged from 1 year and 6 months to 19 years with a mean age of 7 years and 2 months, were corrected with two different approaches: 37 cases of group A with obesity were corrected by anchoring micrus tissue onto the pubis at the base of the penis, and 26 cases of group B by fixing the subcutateous tissues at both sides of the penile shaft to the deep tunica albuginea at the penile root. Then prepuce plasty was carried out. Six-month postoperative follow-up found adequate exposure of the penis in all of group A, prepuce oedema in 7 cases, abdomen fat liquidization in 3 cases, unsatisfactory recovery of incision hollow in 3 cases and patchy numbness of the glans in 1 case. The 25 cases of group B had satisfactory exposure of the penis, with no obvious prepuce oedema, 1 case with retraction of the penis 7 days after operation. Various surgical procedures could be adopted for concealed penis, and the key to the satisfactory appearance is the restoration of penile tunicae and the fixation at the base of the penis. Further study is needed to determine the natural history of these disorders as well as which conditions and what age will benefit most from surgical intervention.
Micro-topography mediates interactions between corals, algae, and herbivorous fishes on coral reefs
NASA Astrophysics Data System (ADS)
Brandl, S. J.; Hoey, A. S.; Bellwood, D. R.
2014-06-01
Processes occurring during the early life stages of corals are important for the replenishment of coral assemblages and the resilience of coral reefs. However, the factors influencing early life stages of corals are not well understood, and the role of micro-topographic complexity for habitat associations of juvenile corals is largely unexplored. This study investigated the microhabitat distribution patterns of early life stages of corals and a potential macroalgal competitor ( Turbinaria ornata) across two reef zones (reef crest and outer reef flat) on Lizard Island, Great Barrier Reef. In both reef zones, both corals and T. ornata were significantly more abundant in concealed microhabitats than in semi-concealed or open microhabitats (GLMM: P < 0.001). The prevalence of juvenile corals and T. ornata within concealed environments suggests that they might be effective refuges from grazing by herbivorous fishes. The density of juvenile corals was positively related, and density of T. ornata negatively related to the abundance of two groups of herbivorous fishes, pairing rabbitfishes, and surgeonfishes in the genus Zebrasoma (BEST ENV-BIO: r s = 0.72, P < 0.01), which feed in concealed microhabitats. This correlative evidence suggests that crevices may be important for early life stages of both coral and macroalgae, and that a specific suite of crevice-feeding fishes may influence benthic community dynamics in these microhabitats.
Everyday bat vocalizations contain information about emitter, addressee, context, and behavior
Prat, Yosef; Taub, Mor; Yovel, Yossi
2016-01-01
Animal vocal communication is often diverse and structured. Yet, the information concealed in animal vocalizations remains elusive. Several studies have shown that animal calls convey information about their emitter and the context. Often, these studies focus on specific types of calls, as it is rarely possible to probe an entire vocal repertoire at once. In this study, we continuously monitored Egyptian fruit bats for months, recording audio and video around-the-clock. We analyzed almost 15,000 vocalizations, which accompanied the everyday interactions of the bats, and were all directed toward specific individuals, rather than broadcast. We found that bat vocalizations carry ample information about the identity of the emitter, the context of the call, the behavioral response to the call, and even the call’s addressee. Our results underline the importance of studying the mundane, pairwise, directed, vocal interactions of animals. PMID:28005079
Artemisinin derivatives for treating severe malaria.
McIntosh, H M; Olliaro, P
2000-01-01
Artemisinin derivatives may have advantages over quinoline drugs for treating severe malaria since they are fast acting and effective against quinine resistant malaria parasites. The objective of this review was to assess the effects of artemisinin drugs for severe and complicated falciparum malaria in adults and children. We searched the Cochrane Infectious Diseases Group trials register, Cochrane Controlled Trials Register, Medline, Embase, Science Citation Index, Lilacs, African Index Medicus, conference abstracts and reference lists of articles. We contacted organisations, researchers in the field and drug companies. Randomised and pseudo-randomised trials comparing artemisinin drugs (rectal, intramuscular or intravenous) with standard treatment, or comparisons between artemisinin derivatives in adults or children with severe or complicated falciparum malaria. Eligibility, trial quality assessment and data extraction were done independently by two reviewers. Study authors were contacted for additional information. Twenty three trials are included, allocation concealment was adequate in nine. Sixteen trials compared artemisinin drugs with quinine in 2653 patients. Artemisinin drugs were associated with better survival (mortality odds ratio 0.61, 95% confidence interval 0.46 to 0.82, random effects model). In trials where concealment of allocation was adequate (2261 patients), this was barely statistically significant (odds ratio 0.72, 95% CI 0.54 to 0.96, random effects model). In 1939 patients with cerebral malaria, mortality was also lower with artemisinin drugs overall (odds ratio 0.63, 95% CI 0.44 to 0.88, random effects model). The difference was not significant however when only trials reporting adequate concealment of allocation were analysed (odds ratio 0.78, 95% CI 0.55 to 1.10, random effects model) based on 1607 patients. No difference in neurological sequelae was shown. Compared with quinine, artemisinin drugs showed faster parasite clearance from the blood and similar adverse effects. The evidence suggests that artemisinin drugs are no worse than quinine in preventing death in severe or complicated malaria. No artemisinin derivative appears to be better than the others.
Cars, CONSORT 2010, and clinical practice.
Williams, Hywel C
2010-03-24
Just like you would not buy a car without key information such as service history, you would not "buy" a clinical trial report without key information such as concealment of allocation. Implementation of the updated CONSORT 2010 statement enables the reader to see exactly what was done in a trial, to whom and when. A fully "CONSORTed" trial report does not necessarily mean the trial is a good one, but at least the reader can make a judgement. Clear reporting is a pre-requisite for judgement of study quality. The CONSORT statement evolves as empirical research moves on. CONSORT 2010 is even clearer than before and includes some new items with a particular emphasis on selective reporting of outcomes. The challenge is for everyone to use it.
Habitat drives dispersal and survival of translocated juvenile desert tortoises
Nafus, Melia G.; Esque, Todd C.; Averill-Murray, Roy C.; Nussear, Kenneth E.; Swaisgood, Ronald R.
2017-01-01
5.Synthesis and applications. Resource managers using translocations as a conservation tool should prioritize acquiring data linking habitat to fitness. In particular, for species that depend on avoiding detection, refuges such as burrows and habitat that improved concealment had notable ability to improve survival and dispersal. Our study on juvenile Mojave desert tortoises showed that refuge availability or the distributions of habitat appropriate for concealment are important considerations for identifying translocation sites for species highly dependent on crypsis, camouflage, or other forms of habitat matching.
Training Objectives for Tank Platoon Leaders Covering Tasks Performed during Four Armor Operations
1983-01-01
screens to conceal their movement to covered and concealed positions. The M250 grenade launcher consists of two six-barreled dischargers wired for two...generates smoke by the injestion of fuel onto the hot engine exhaust system. The smoke screen generated by VEESS is used to compli- ment the M250 smoke...grenade system by reinforcing and sustaining the screen created by the M250 system. The purpose of the smoke producing systems is to make it more
Bowen, Raven; Bungay, Vicky
2016-01-01
As part of a larger study examining the effects of the design of the off-street sex industry on sex worker's health and safety practices, eight sex work experts who had experience as sex workers and as advocates and service providers were interviewed to garner their community engagement expertise in shaping the research. During narrative interviews, these experts discussed how stigma influenced their personal lives and their social justice work among sex workers. Their insights into stigma are unique to the literature because our experts simultaneously confronted direct instances of stigma that were a part of their personal and professional lives, sometimes concealing their sex work histories during the course of their professional support and advocacy work. As a result of this concealment, and because of how sex workers are sometimes mistreated, experts experienced stigma vicariously (indirectly) when their own sex work histories were not apparent. As a result of these experiences, participants became proficient at managing discrediting information about themselves when in the presence of those they mistrusted. They supported sex workers through stigmatising ordeals by using knowledge gained from these intersecting direct and vicarious experiences stigma, continuously building capacity within themselves and among other sex workers to resist stigma.
A quality assessment of randomized controlled trial reports in endodontics.
Lucena, C; Souza, E M; Voinea, G C; Pulgar, R; Valderrama, M J; De-Deus, G
2017-03-01
To assess the quality of the randomized clinical trial (RCT) reports published in Endodontics between 1997 and 2012. Retrieval of RCTs in Endodontics was based on a search of the Thomson Reuters Web of Science (WoS) database (March 2013). Quality evaluation was performed using a checklist based on the Jadad criteria, CONSORT (Consolidated Standards of Reporting Trials) statement and SPIRIT (Standard Protocol Items: Recommendations for Interventional Trials). Descriptive statistics were used for frequency distribution of data. Student's t-test and Welch test were used to identify the influence of certain trial characteristics upon report quality (α = 0.05). A total of 89 RCTs were evaluated, and several methodological flaws were found: only 45% had random sequence generation at low risk of bias, 75% did not provide information on allocation concealment, and 19% were nonblinded designs. Regarding statistics, only 55% of the RCTs performed adequate sample size estimations, only 16% presented confidence intervals, and 25% did not provide the exact P-value. Also, 2% of the articles used no statistical tests, and in 87% of the RCTs, the information provided was insufficient to determine whether the statistical methodology applied was appropriate or not. Significantly higher scores were observed for multicentre trials (P = 0.023), RCTs signed by more than 5 authors (P = 0.03), articles belonging to journals ranked above the JCR median (P = 0.03), and articles complying with the CONSORT guidelines (P = 0.000). The quality of RCT reports in key areas for internal validity of the study was poor. Several measures, such as compliance with the CONSORT guidelines, are important in order to raise the quality of RCTs in Endodontics. © 2016 International Endodontic Journal. Published by John Wiley & Sons Ltd.
Saklofske, Donald H; Austin, Elizabeth J; Yan, Gonggu; Smith, Martin M
2016-02-01
The English-language version of the Managing the Emotions of Others (MEOS) scale has been found to have a six-factor structure. This includes two pairs (Enhance, Divert and Worsen, Inauthentic) that respectively describe prosocial and non-prosocial interpersonal emotion management, together with an emotional concealment factor (Conceal) and a factor assessing poor self-rated emotional skills. A Mandarin translation of the MEOS was completed by 277 Chinese student participants. Factor analysis indicated a four-factor structure comprising a merged Enhance/Divert factor, together with Worsen, Inauthentic and Conceal factors. The emergence of a different factor structure compared to Western samples may be related to culture-dependent attitudes to emotional expression. The associations of the MEOS factors with Five-Factor model personality, the Dark Triad and trait emotional intelligence (EI) were examined; these were similar to but generally weaker than those found for the English-language version. © 2015 International Union of Psychological Science.
Body packing and intra-vaginal body pushing of cocaine: A case report.
Wankhade, Vishwajit Kishor; Chikhalkar, B G
2018-03-01
Drug trafficking is an international problem. The prevalence of drug trafficking and newer concealing methods has been ever increasing. Body packing is described as using the abdominal or pelvic cavity for concealing illegal drugs. Body pushers smuggle illicit drugs by inserting them into rectum or vagina. These cases are either presented to the emergency departments as Body Packer Syndrome or as asymptomatic cases for observation, detained for alleged possession of contraband substances. We report a unique case of an asymptomatic white female who was detained at Mumbai International Airport under suspicion and brought to hospital for observation. X ray and CT scan examination revealed 7 wrapped packets in gastrointestinal track and 1 large packet in vagina. A case of female body packer using multiple modalities of concealment especially in vagina is rare in India so it is becomes imperative to present this case in the light of body packing and body pushing of contraband substances. Copyright © 2017 Elsevier B.V. All rights reserved.
Minority Stress and Same-Sex Relationship Satisfaction: The Role of Concealment Motivation.
Pepping, Christopher A; Cronin, Timothy J; Halford, W Kim; Lyons, Anthony
2018-04-30
Most lesbian, gay, and bisexual (LGB) people want a stable, satisfying romantic relationship. Although many of the predictors of relationship outcomes are similar to those of heterosexual couples, same-sex couples face some additional challenges associated with minority stress that also impact upon relationship quality. Here, we investigate the association between minority stressors and relationship quality in a sample of 363 adults (M age = 30.37, SD = 10.78) currently in a same-sex romantic relationship. Internalized homophobia and difficulties accepting one's LGB identity were each negatively associated with relationship satisfaction via heightened concealment motivation. We also examined the protective role of identity affirmation on relationship quality, finding a direct positive relationship between the two variables. Minority stressors were negatively associated with couple relationship satisfaction via heightened concealment motivation. The finding that identity affirmation directly predicted increased couple satisfaction also highlights the important role of protective factors in same-sex couple relationships. © 2018 Family Process Institute.
Sampson, Jay A.; Rodriguez, Brian D.
2011-01-01
The Revett-type deposits at Rock Creek are part of the concealed stratabound copper-silver deposits located in the Cabinet Mountains Wilderness of Montana. The U.S. Geological Survey is conducting a series of multidisciplinary studies as part of the Assessment Techniques for Concealed Mineral Resources project. Geologic, geochemical, geophysical, and mineral resources data are being evaluated with existing and new mineral deposit models to predict the possibility and probability of undiscovered deposits in covered terranes. To help characterize the size, resistivity, and depth of the mineral deposit concealed beneath thick overburden, a regional southwest-northeast audiomagnetotelluric sounding profile was acquired. Further studies will attempt to determine if induced polarization parameters can be extracted from the magnetotelluric data to determine the size of the mineralized area. The purpose of this report is to release the audiomagnetotelluric sounding data collected along that southwest-northeast profile. No interpretation of the data is included.
Display methods of electronic patient record screens: patient privacy concerns.
Niimi, Yukari; Ota, Katsumasa
2013-01-01
To provide adequate care, medical professionals have to collect not only medical information but also information that may be related to private aspects of the patient's life. With patients' increasing awareness of information privacy, healthcare providers have to pay attention to the patients' right of privacy. This study aimed to clarify the requirements of the display method of electronic patient record (EPR) screens in consideration of both patients' information privacy concerns and health professionals' information needs. For this purpose, semi-structured group interviews were conducted of 78 medical professionals. They pointed out that partial concealment of information to meet patients' requests for privacy could result in challenges in (1) safety in healthcare, (2) information sharing, (3) collaboration, (4) hospital management, and (5) communication. They believed that EPRs should (1) meet the requirements of the therapeutic process, (2) have restricted access, (3) provide convenient access to necessary information, and (4) facilitate interprofessional collaboration. This study provides direction for the development of display methods that balance the sharing of vital information and protection of patient privacy.
Resolving social conflict among females without overt aggression.
Cant, Michael A; Young, Andrew J
2013-01-01
Members of animal societies compete over resources and reproduction, but the extent to which such conflicts of interest are resolved peacefully (without recourse to costly or wasteful acts of aggression) varies widely. Here, we describe two theoretical mechanisms that can help to understand variation in the incidence of overt behavioural conflict: (i) destruction competition and (ii) the use of threats. The two mechanisms make different assumptions about the degree to which competitors are socially sensitive (responsive to real-time changes in the behaviour of their social partners). In each case, we discuss how the model assumptions relate to biological reality and highlight the genetic, ecological and informational factors that are likely to promote peaceful conflict resolution, drawing on empirical examples. We suggest that, relative to males, reproductive conflict among females may be more frequently resolved peacefully through threats of punishment, rather than overt acts of punishment, because (i) offspring are more costly to produce for females and (ii) reproduction is more difficult to conceal. The main need now is for empirical work to test whether the mechanisms described here can indeed explain how social conflict can be resolved without overt aggression.
Al-Dmour, Hayat; Al-Ani, Ahmed
2016-04-01
The present work has the goal of developing a secure medical imaging information system based on a combined steganography and cryptography technique. It attempts to securely embed patient's confidential information into his/her medical images. The proposed information security scheme conceals coded Electronic Patient Records (EPRs) into medical images in order to protect the EPRs' confidentiality without affecting the image quality and particularly the Region of Interest (ROI), which is essential for diagnosis. The secret EPR data is converted into ciphertext using private symmetric encryption method. Since the Human Visual System (HVS) is less sensitive to alterations in sharp regions compared to uniform regions, a simple edge detection method has been introduced to identify and embed in edge pixels, which will lead to an improved stego image quality. In order to increase the embedding capacity, the algorithm embeds variable number of bits (up to 3) in edge pixels based on the strength of edges. Moreover, to increase the efficiency, two message coding mechanisms have been utilized to enhance the ±1 steganography. The first one, which is based on Hamming code, is simple and fast, while the other which is known as the Syndrome Trellis Code (STC), is more sophisticated as it attempts to find a stego image that is close to the cover image through minimizing the embedding impact. The proposed steganography algorithm embeds the secret data bits into the Region of Non Interest (RONI), where due to its importance; the ROI is preserved from modifications. The experimental results demonstrate that the proposed method can embed large amount of secret data without leaving a noticeable distortion in the output image. The effectiveness of the proposed algorithm is also proven using one of the efficient steganalysis techniques. The proposed medical imaging information system proved to be capable of concealing EPR data and producing imperceptible stego images with minimal embedding distortions compared to other existing methods. In order to refrain from introducing any modifications to the ROI, the proposed system only utilizes the Region of Non Interest (RONI) in embedding the EPR data. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Lin, Junshan; Li, Dumiao; Zhang, Jianxing; Wu, Qiang; Xu, Yali; Lin, Li
2015-09-01
To investigate effectiveness of advanced skin flap and V-shaped ventral incision along the root of penile shaft for concealed penis in children. Between July 2007 and January 2015, 121 boys with concealed penis were treated with advanced skin flap and V-shaped ventral incision along the root of penile shaft. The age varied from 18 months to 13 years (mean, 7.2 years). Repair was based on a vertical incision in median raphe, complete degloving of penis and tacking its base to the dermis of the skin. Advanced skin flap and a V-shaped ventral incision along the root of penile shaft were used to cover the penile shaft. The operation time ranged from 60 to 100 minutes (mean, 75 minutes). Disruption of wound occurred in 1 case, and was cured after dressing change; and primary healing of incision was obtained in the others. The follow-up period ranged from 3 months to 7 years (median, 24 months). All patients achieved good to excellent cosmetic results with a low incidence of complications. The results were satisfactory in exposure of penis and prepuce appearance. No obvious scar was observed. The penis had similar appearance to that after prepuce circumcision. A combination of advanced skin flap and V-shaped ventral incision along the root of penile shaft is a simple, safe, and effective procedure for concealed penis with a similar appearance result to the prepuce circumcision.
Concealed Accessory Pathways with a Single Ventricular and Two Discrete Atrial Insertion Sites.
Kipp, Ryan T; Abu Sham'a, Raed; Hiroyuki, Ito; Han, Frederick T; Refaat, Marwan; Hsu, Jonathan C; Field, Michael E; Kopp, Douglas E; Marcus, Gregory M; Scheinman, Melvin M; Hoffmayer, Kurt S
2017-03-01
Atrioventricular reciprocating tachycardia (AVRT) utilizing a concealed accessory pathway is common. It is well appreciated that some patients may have multiple accessory pathways with separate atrial and ventricular insertion sites. We present three cases of AVRT utilizing concealed pathways with evidence that each utilizing a single ventricular insertion and two discrete atrial insertion sites. In case one, two discrete atrial insertion sites were mapped in two separate procedures, and only during the second ablation was the Kent potential identified. Ablation of the Kent potential at this site remote from the two atrial insertion sites resulted in the termination of the retrograde conduction in both pathways. Case two presented with supraventricular tachycardia (SVT) with alternating eccentric atrial activation patterns without alteration in the tachycardia cycle length. The two distinct atrial insertion sites during orthodromic AVRT and ventricular pacing were targeted and each of the two atrial insertion sites were successfully mapped and ablated. In case three, retrograde decremental conduction utilizing both atrial insertion sites was identified prior to ablation. After mapping and ablation of the first discrete atrial insertion site, tachycardia persisted utilizing the second atrial insertion site. Only after ablation of the second atrial insertion site was SVT noninducible, and VA conduction was no longer present. Concealed retrograde accessory pathways with discrete atrial insertion sites may have a common ventricular insertion site. Identification and ablation of the ventricular insertion site or the separate discrete atrial insertion sites result in successful treatment. © 2017 Wiley Periodicals, Inc.
A definitional framework for the human/biometric sensor interaction model
NASA Astrophysics Data System (ADS)
Elliott, Stephen J.; Kukula, Eric P.
2010-04-01
Existing definitions for biometric testing and evaluation do not fully explain errors in a biometric system. This paper provides a definitional framework for the Human Biometric-Sensor Interaction (HBSI) model. This paper proposes six new definitions based around two classifications of presentations, erroneous and correct. The new terms are: defective interaction (DI), concealed interaction (CI), false interaction (FI), failure to detect (FTD), failure to extract (FTX), and successfully acquired samples (SAS). As with all definitions, the new terms require a modification to the general biometric model developed by Mansfield and Wayman [1].
Placebo Effects and Informed Consent.
Alfano, Mark
2015-01-01
The concepts of placebos and placebo effects refer to extremely diverse phenomena. I recommend dissolving the concepts of placebos and placebo effects into loosely related groups of specific mechanisms, including (potentially among others) expectation-fulfillment, classical conditioning, and attentional-somatic feedback loops. If this approach is on the right track, it has three main implications for the ethics of informed consent. First, because of the expectation-fulfillment mechanism, the process of informing cannot be considered independently from the potential effects of treatment. Obtaining informed consent influences the effects of treatment. This provides support for the authorized concealment and authorized deception paradigms, and perhaps even for outright deceptive placebo use. Second, doctors may easily fail to consider the potential benefits of conditioning, leading them to misjudge the trade-off between beneficence and autonomy. Third, how attentional-somatic feedback loops play out depends not only on the content of the informing process but also on its framing. This suggests a role for libertarian paternalism in clinical practice.
NASA Astrophysics Data System (ADS)
Jiang, Zhuo; Xie, Chengjun
2013-12-01
This paper improved the algorithm of reversible integer linear transform on finite interval [0,255], which can realize reversible integer linear transform in whole number axis shielding data LSB (least significant bit). Firstly, this method use integer wavelet transformation based on lifting scheme to transform the original image, and select the transformed high frequency areas as information hiding area, meanwhile transform the high frequency coefficients blocks in integer linear way and embed the secret information in LSB of each coefficient, then information hiding by embedding the opposite steps. To extract data bits and recover the host image, a similar reverse procedure can be conducted, and the original host image can be lossless recovered. The simulation experimental results show that this method has good secrecy and concealment, after conducted the CDF (m, n) and DD (m, n) series of wavelet transformed. This method can be applied to information security domain, such as medicine, law and military.
Correction of concealed penis with preservation of the prepuce.
Valioulis, I A; Kallergis, I C; Ioannidou, D C
2015-10-01
By definition, congenital concealed penis presents at birth. Children are usually referred to physicians because of parental anxiety caused by their child's penile size. Several surgical procedures have been described to treat this condition, but its correction is still technically challenging. The present study reports a simple surgical approach, which allows preservation of the prepuce. During the last 6 years, 18 children with concealed penis (according to the classification by Maizels et al.) have been treated in the present department (mean age 4.5 years, range 3-12 years). Patients with other conditions that caused buried penis were excluded from the study. The operation was performed through a longitudinal midline ventral incision, which was extended hemi-circumferentially at the penile base. The dysgenetic dartos was identified and its distal part was resected. Dissection of the corpora cavernosa was carried down to the suspensory ligament, which was sectioned. Buck's fascia was fixed to Scarpa's fascia and shaft skin was approximated in the midline. Penoscrotal angle was fashioned by Z-plasty or V-Y plasty. The median follow-up was 24 months (range 8-36). The postoperative edema was mild and resolved within a week. All children had good to excellent outcomes. The median pre-operative to postoperative difference in penile length in the flaccid state was 2.6 cm (range 2.0-3.5). No serious complications or recurrent penile retraction were noted. Recent literature mostly suggests that concealed penis is due to deficient proximal attachments of dysgenetic dartos. Consequences of this include: difficulties in maintaining proper hygiene, balanitis, voiding difficulties with prepuce ballooning and urine spraying, and embarrassment among peers. Surgical treatment for congenital concealed penis is warranted in children aged 3 years or older. The basis of the technique is the perception that in boys with congenital concealed penis, the penile integuments are normal but they have abnormal attachments, and that incision of the skin and dartos will allow the shaft to extend. Furthermore, incisions of the fundiform and suspensory ligaments facilitate this maneuver. With this technique, the blood supply of the penile skin is not interrupted and postoperative lymphedema, a difficult complication to deal with, is prevented. One major advantage is the preservation of the prepuce, giving a normal penile appearance and an excellent cosmetic result. The method proposed here is simple and has no serious complications. It is suggested that this condition be treated in pre-school-aged children in order to prevent psychological impairment. Copyright © 2015 Journal of Pediatric Urology Company. Published by Elsevier Ltd. All rights reserved.
Olszynko-Gryn, Jesse
2017-09-01
This article uses the case of pregnancy testing in Britain to investigate the process whereby new and often controversial reproductive technologies are made visible and normalized in mainstream entertainment media. It shows how in the 1980s and 1990s the then nascent product placement industry was instrumental in embedding pregnancy testing in British cinema and television's dramatic productions. In this period, the pregnancy-test close-up became a conventional trope and the thin blue lines associated with Unilever's Clearblue rose to prominence in mainstream consumer culture. This article investigates the aestheticization of pregnancy testing and shows how increasingly visible public concerns about 'schoolgirl mums', abortion and the biological clock, dramatized on the big and small screen, propelled the commercial rise of Clearblue. It argues that the Clearblue close-up ambiguously concealed as much as it revealed; abstraction, ambiguity and flexibility were its keys to success.
Social networking technologies as emerging tools for HIV prevention: A Cluster Randomized Trial
Young, Sean D.; Cumberland, William G.; Lee, Sung-Jae; Jaganath, Devan; Szekeres, Greg; Coates, Thomas
2013-01-01
Background Social networking technologies are an emerging tool for HIV prevention. Objective To determine whether social networking communities can increase HIV testing among African American and Latino men who have sex with men (MSM). Design Randomized; controlled trial with concealed allocation (ClinicalTrials.gov: NCT01701206). Setting Online. Patients 112 MSM based in Los Angeles, more than 85% of whom were African American or Latino. Intervention Sixteen peer leaders were randomly assigned to deliver information about HIV or general health to participants via Facebook groups over 12 weeks. After participants accepted a request to join the group, participation was voluntary. Group participation and engagement was monitored. Participants could request a free home-based HIV testing kit and completed questionnaires at baseline and 12-week follow-up. Measurements Participant acceptance of and engagement in the intervention and social network participation, rates of home-based HIV testing, and sexual risk behaviors. Results Almost 95% of intervention participants and 73% of control participants voluntarily communicated using the social platform. Twenty-five of the 57 intervention participants (44%) requested home-based HIV testing kits compared with 11 of 55 control participants (20%) (difference, 24 percentage points [95% CI, 8 to 41 percentage points]). Nine of the 25 intervention participants (36%) who requested the test took it and mailed it back compared with 2 of the 11 control participants (18%) who requested the test. Retention at study follow-up was more 93%. Limitations Only 2 Facebook communities were included for each group. Conclusions Social networking communities are acceptable and effective tools to increase home-based HIV testing among at-risk populations. Primary funding source National Institute of Mental Health ClinicalTrials.gov Identifier (NCT01701206) PMID:24026317
COSMETIC CAMOUFLAGE IN VITILIGO
Sarveswari, K N
2010-01-01
Vitiligo is not a life–threatening nor a contagious disease. But the disfigurement of vitiligo can be devastating to its sufferers, especially dark-skinned individuals. Available treatment options are disappointing and sufferers often use various forms of camouflage. Remedial cosmetic cover creams help conceal the blemish of vitiligo at least temporarily. A high concentration of pigment is incorporated into water–free or anhydrous foundations to give a color that matches the patient’s skin, thereby concealing vitiligo patches. The article highlights the content and technique of application of these creams. PMID:21063508
A call for policy guidance on psychometric testing in doping control in sport.
Petróczi, Andrea; Backhouse, Susan H; Barkoukis, Vassilis; Brand, Ralf; Elbe, Anne-Marie; Lazuras, Lambros; Lucidi, Fabio
2015-11-01
One of the fundamental challenges in anti-doping is identifying athletes who use, or are at risk of using, prohibited performance enhancing substances. The growing trend to employ a forensic approach to doping control aims to integrate information from social sciences (e.g., psychology of doping) into organised intelligence to protect clean sport. Beyond the foreseeable consequences of a positive identification as a doping user, this task is further complicated by the discrepancy between what constitutes a doping offence in the World Anti-Doping Code and operationalized in doping research. Whilst psychology plays an important role in developing our understanding of doping behaviour in order to inform intervention and prevention, its contribution to the array of doping diagnostic tools is still in its infancy. In both research and forensic settings, we must acknowledge that (1) socially desirable responding confounds self-reported psychometric test results and (2) that the cognitive complexity surrounding test performance means that the response-time based measures and the lie detector tests for revealing concealed life-events (e.g., doping use) are prone to produce false or non-interpretable outcomes in field settings. Differences in social-cognitive characteristics of doping behaviour that are tested at group level (doping users vs. non-users) cannot be extrapolated to individuals; nor these psychometric measures used for individual diagnostics. In this paper, we present a position statement calling for policy guidance on appropriate use of psychometric assessments in the pursuit of clean sport. We argue that, to date, both self-reported and response-time based psychometric tests for doping have been designed, tested and validated to explore how athletes feel and think about doping in order to develop a better understanding of doping behaviour, not to establish evidence for doping. A false 'positive' psychological profile for doping affects not only the individual 'clean' athlete but also their entourage, their organisation and sport itself. The proposed policy guidance aims to protect the global athletic community against social, ethical and legal consequences from potential misuse of psychological tests, including erroneous or incompetent applications as forensic diagnostic tools in both practice and research. Copyright © 2015 Elsevier B.V. All rights reserved.
Krauth, David; Woodruff, Tracey J.
2013-01-01
Background: Results from animal toxicology studies are critical to evaluating the potential harm from exposure to environmental chemicals or the safety of drugs prior to human testing. However, there is significant debate about how to evaluate the methodology and potential biases of the animal studies. There is no agreed-upon approach, and a systematic evaluation of current best practices is lacking. Objective: We performed a systematic review to identify and evaluate instruments for assessing the risk of bias and/or other methodological criteria of animal studies. Method: We searched Medline (January 1966–November 2011) to identify all relevant articles. We extracted data on risk of bias criteria (e.g., randomization, blinding, allocation concealment) and other study design features included in each assessment instrument. Discussion: Thirty distinct instruments were identified, with the total number of assessed risk of bias, methodological, and/or reporting criteria ranging from 2 to 25. The most common criteria assessed were randomization (25/30, 83%), investigator blinding (23/30, 77%), and sample size calculation (18/30, 60%). In general, authors failed to empirically justify why these or other criteria were included. Nearly all (28/30, 93%) of the instruments have not been rigorously tested for validity or reliability. Conclusion: Our review highlights a number of risk of bias assessment criteria that have been empirically tested for animal research, including randomization, concealment of allocation, blinding, and accounting for all animals. In addition, there is a need for empirically testing additional methodological criteria and assessing the validity and reliability of a standard risk of bias assessment instrument. Citation: Krauth D, Woodruff TJ, Bero L. 2013. Instruments for assessing risk of bias and other methodological criteria of published animal studies: a systematic review. Environ Health Perspect 121:985–992 (2013); http://dx.doi.org/10.1289/ehp.1206389 PMID:23771496
Fast multi-scale feature fusion for ECG heartbeat classification
NASA Astrophysics Data System (ADS)
Ai, Danni; Yang, Jian; Wang, Zeyu; Fan, Jingfan; Ai, Changbin; Wang, Yongtian
2015-12-01
Electrocardiogram (ECG) is conducted to monitor the electrical activity of the heart by presenting small amplitude and duration signals; as a result, hidden information present in ECG data is difficult to determine. However, this concealed information can be used to detect abnormalities. In our study, a fast feature-fusion method of ECG heartbeat classification based on multi-linear subspace learning is proposed. The method consists of four stages. First, baseline and high frequencies are removed to segment heartbeat. Second, as an extension of wavelets, wavelet-packet decomposition is conducted to extract features. With wavelet-packet decomposition, good time and frequency resolutions can be provided simultaneously. Third, decomposed confidences are arranged as a two-way tensor, in which feature fusion is directly implemented with generalized N dimensional ICA (GND-ICA). In this method, co-relationship among different data information is considered, and disadvantages of dimensionality are prevented; this method can also be used to reduce computing compared with linear subspace-learning methods (PCA). Finally, support vector machine (SVM) is considered as a classifier in heartbeat classification. In this study, ECG records are obtained from the MIT-BIT arrhythmia database. Four main heartbeat classes are used to examine the proposed algorithm. Based on the results of five measurements, sensitivity, positive predictivity, accuracy, average accuracy, and t-test, our conclusion is that a GND-ICA-based strategy can be used to provide enhanced ECG heartbeat classification. Furthermore, large redundant features are eliminated, and classification time is reduced.
Polo-Cavia, Nuria; Gomez-Mestre, Ivan
2017-01-01
In heterogeneous environments, the capacity for colour change can be a valuable adaptation enhancing crypsis against predators. Alternatively, organisms might achieve concealment by evolving preferences for backgrounds that match their visual traits, thus avoiding the costs of plasticity. Here we examined the degree of plasticity in pigmentation of newt larvae (Lissotriton boscai) in relation to predation risk. Furthermore, we tested for associated metabolic costs and pigmentation-dependent background choice behaviour. Newt larvae expressed substantial changes in pigmentation so that light, high-reflecting environment induced depigmentation whereas dark, low-reflecting environment induced pigmentation in just three days of exposure. Induced pigmentation was completely reversible upon switching microhabitats. Predator cues, however, did not enhance cryptic phenotypes, suggesting that environmental albedo induces changes in pigmentation improving concealment regardless of the perceived predation risk. Metabolic rate was higher in heavily pigmented individuals from dark environments, indicating a high energetic requirement of pigmentation that could impose a constraint to larval camouflage in dim habitats. Finally, we found partial evidence for larvae selecting backgrounds matching their induced phenotypes. However, in the presence of predator cues, larvae increased the time spent in light environments, which may reflect a escape response towards shallow waters rather than an attempt at increasing crypsis. PMID:28051112
Chew, Elizabeth; Griva, Konstadina; Cheung, Peter P
2016-11-01
To evaluate coping strategies of Asian RA patients and their associations with health-related quality of life (HRQoL). A cross-sectional sample of patients with established RA was evaluated using measures of coping (Coping in Rheumatoid Arthritis Questionnaire [C-RAQ]; appraisal of coping effectiveness and helplessness), HRQoL (Mental and Physical Components [MCS/PCS] of the Short Form 12v2; Rheumatoid Arthritis Impact of Disease score [RAID]) and clinical/laboratory assessments. Principal component analysis was conducted to identify coping strategies. Multiple linear regression analyses were performed to evaluate the associations between coping strategies and HRQoL outcomes. The study sample comprised 101 patients, 81% female, 72.3% Chinese, mean age 54.2 ± 12.6 years. Five coping strategies were identified: Active problem solving (E = 5.36), Distancing (E = 2.30), Concealment (E = 1.89), Cognitive reframing (E = 1.55) and Emotional expression (E = 1.26). Concealment was consistently associated with PCS (r s = -0.23, P = 0.049), MCS (r s = -0.24, P = 0.04) and RAID (r s = 0.39, P < 0.001), and was significant in the multivariate model to explain lower disease-specific HRQoL (RAID) even after adjusting for disease activity, coping effectiveness and helplessness (β = 0.20, P = 0.04). Emotional expression was associated with poorer physical HRQoL (PCS), after adjusting for disease severity, body mass index, coping effectiveness, helplessness and Concealment (β = -0.39, P < 0.001). Perceived coping-related helplessness was significant in multivariate correlates for PCS (β = -0.25, P = 0.036), MCS (β = -0.29, P = 0.02) and RAID (β = 0.53, P < 0.001), after adjusting for covariates. Concealment and Emotional expression are associated with lower disease-specific HRQoL and physical HRQoL respectively, with the former coping strategy likely to be culture-specific. Interventions should tailor psychosocial support needs to address not only coping strategies, but patients' perception of their coping. © 2016 Asia Pacific League of Associations for Rheumatology and John Wiley & Sons Australia, Ltd.
[Ladder step strategy for surgical repair of congenital concealed penis in children].
Wang, Fu-Ran; Zhong, Hong-Ji; Chen, Yi; Zhao, Jun-Feng; Li, Yan
2016-11-01
To assess the feasibility of the ladder step strategy in surgical repair of congenital concealed penis in children. This study included 52 children with congenital concealed penis treated in the past two years by surgical repair using the ladder step strategy, which consists of five main steps: cutting the narrow ring of the foreskin, degloving the penile skin, fixing the penile skin at the base, covering the penile shaft, and reshaping the prepuce. The perioperative data of the patients were prospectively collected and statistically described. Of the 52 patients, 20 needed remodeling of the frenulum and 27 received longitudinal incision in the penoscrotal junction to expose and deglove the penile shaft. The advanced scrotal flap technique was applied in 8 children to cover the penile shaft without tension, the pedicled foreskin flap technique employed in 11 to repair the penile skin defect, and excision of the webbed skin of the ventral penis performed in another 44 to remodel the penoscrotal angle. The operation time, blood loss, and postoperative hospital stay were 40-100 minutes, 5-30 ml, and 3-6 days, respectively. Wound bleeding and infection occurred in 1 and 5 cases, respectively. Follow-up examinations at 3 and 6 months after surgery showed that all the children had a satisfactory penile appearance except for some minor complications (2 cases of penile retraction, 2 cases of redundant ventral skin, and 1 case of iatrogenic penile curvature). The ladder step strategy for surgical repair of congenital concealed penis in children is a simple procedure with minor injury and satisfactory appearance of the penis.
Electromagnetic induction imaging of concealed metallic objects by means of resonating circuits
NASA Astrophysics Data System (ADS)
Guilizzoni, R.; Watson, J. C.; Bartlett, P. A.; Renzoni, F.
2016-05-01
An electromagnetic induction system, suitable for 2D imaging of metallic samples of different electrical conductivities, has been developed. The system is based on a parallel LCR circuit comprising a ferrite-cored coil (7.8 mm x 9.5 mm, L=680 μH at 1 KHz), a variable resistor and capacitor. The working principle of the system is based on eddy current induction inside a metallic sample when this is introduced into the AC magnetic field created by the coil. The inductance of the LCR circuit is modified due to the presence of the sample, to an extent that depends on its conductivity. Such modification is known to increase when the system is operated at its resonant frequency. Characterizing different metals based on their values of conductivity is therefore possible by utilizing a suitable system operated at resonance. Both imaging and material characterization were demonstrated by means of the proposed electromagnetic induction technique. Furthermore, the choice of using a system with an adjustable resonant frequency made it possible to select resonances that allow magnetic-field penetration through conductive screens. Investigations on the possibility of imaging concealed metals by penetrating such shields have been carried out. A penetration depth of δ~3 mm through aluminium (Al) was achieved. This allowed concealed metallic samples- having conductivities ranging from 0.54 to 59.77 MSm-1 and hidden behind 1.5-mm-thick Al shields- to be imaged. Our results demonstrate that the presence of the concealed metallic objects can be revealed. The technique was thus shown to be a promising detection tool for security applications.
Passive millimeter-wave imaging for concealed article detection
NASA Astrophysics Data System (ADS)
Lovberg, John A.; Galliano, Joseph A., Jr.; Clark, Stuart E.
1997-02-01
Passive-millimeter-wave imaging (PMI) provides a powerful sensing tool for law enforcement, allowing an unobtrusive means for detecting concealed weapons, explosives, or contraband on persons or in baggage. Natural thermal emissions at millimeter wavelengths from bodies, guns, explosives, and other articles pass easily through clothing or other concealment materials, where they can be detected and converted into conventional 2-dimensional images. A new implementation of PMI has demonstrated a large-area, near- real-time staring capability for personnel inspection at standoff ranges of greater than 10 meters. In this form, PMI does not require operator cuing based on subjective 'profiles' of suspicious appearance or behaviors, which may otherwise be construed as violations of civil rights. To the contrary, PMI detects and images heat generated by any object with no predisposition as to its nature or function (e.g. race or gender of humans). As a totally passive imaging tool, it generates no radio-frequency or other radiation which might raise public health concerns. Specifics of the new PMI architecture are presented along with a host of imaging data representing the current state- of-the-art.
Extremely High-Frequency Holographic Radar Imaging of Personnel and Mail
DOE Office of Scientific and Technical Information (OSTI.GOV)
McMakin, Douglas L.; Sheen, David M.; Griffin, Jeffrey W.
2006-08-01
The awareness of terrorists covertly transporting chemical warfare (CW) and biological warfare (BW) agents into government, military, and civilian facilities to harm the occupants has increased dramatically since the attacks of 9/11. Government and civilian security personnel have a need for innovative surveillance technology that can rapidly detect these lethal agents, even when they are hidden away in sealed containers and concealed either under clothing or in hand-carried items such as mailed packages or handbags. Sensor technology that detects BW and CW agents in mail or sealed containers carried under the clothing are under development. One promising sensor technology presentlymore » under development to defeat these threats is active millimeter-wave holographic radar imaging, which can readily image concealed items behind paper, cardboard, and clothing. Feasibility imaging studies at frequencies greater than 40 GHz have been conducted to determine whether simulated biological or chemical agents concealed in mail packages or under clothing could be detected using this extremely high-frequency imaging technique. The results of this imaging study will be presented in this paper.« less
Chaudoir, Stephenie R.; Earnshaw, Valerie A.; Andel, Stephanie
2013-01-01
In his classic treatise, Goffman (1963) delineates between people who are discredited—whose stigma is clearly known or visible—and people who are discreditable—whose stigma is unknown and can be concealable. To what extent has research in the past 50 years advanced Goffman’s original ideas regarding the impact of concealability on stigma management strategies and outcomes? In the current article, we outline a framework that articulates how stigma can “get under the skin” in order to lead to psychological and physical health disparities. Further, we consider when and to what degree concealability moderates these effects, creating divergent outcomes for the discredited and discreditable. Does the stigmatized individual assume his differentness is known about already or is evident on the spot, or does he assume it is neither known about by those present nor immediately perceivable by them? In the first case one deals with the plight of the discredited, in the second with that of the discreditable. This is an important difference.— Goffman (1963, p. 4) PMID:23729948
Sweet, Monica A; Heyman, Gail D; Fu, Genyue; Lee, Kang
2010-07-01
This study explored the effects of collectivism on lying to conceal a group transgression. Seven-, 9-, and 11-year-old US and Chinese children (N = 374) were asked to evaluate stories in which protagonists either lied or told the truth about their group's transgression and were then asked about either the protagonist's motivations or justification for their own evaluations. Previous research suggests that children in collectivist societies such as China find lying for one's group to be more acceptable than do children from individualistic societies such as the United States. The current study provides evidence that this is not always the case: Chinese children in this study viewed lies told to conceal a group's transgressions less favourably than did US children. An examination of children's reasoning about protagonists' motivations for lying indicated that children in both countries focused on an impact to self when discussing motivations for protagonists to lie for their group. Overall, results suggest that children living in collectivist societies do not always focus on the needs of the group.
Camouflage and visual perception
Troscianko, Tom; Benton, Christopher P.; Lovell, P. George; Tolhurst, David J.; Pizlo, Zygmunt
2008-01-01
How does an animal conceal itself from visual detection by other animals? This review paper seeks to identify general principles that may apply in this broad area. It considers mechanisms of visual encoding, of grouping and object encoding, and of search. In most cases, the evidence base comes from studies of humans or species whose vision approximates to that of humans. The effort is hampered by a relatively sparse literature on visual function in natural environments and with complex foraging tasks. However, some general constraints emerge as being potentially powerful principles in understanding concealment—a ‘constraint’ here means a set of simplifying assumptions. Strategies that disrupt the unambiguous encoding of discontinuities of intensity (edges), and of other key visual attributes, such as motion, are key here. Similar strategies may also defeat grouping and object-encoding mechanisms. Finally, the paper considers how we may understand the processes of search for complex targets in complex scenes. The aim is to provide a number of pointers towards issues, which may be of assistance in understanding camouflage and concealment, particularly with reference to how visual systems can detect the shape of complex, concealed objects. PMID:18990671
Sweet, Monica A.; Heyman, Gail D.; Fu, Genyue; Lee, Kang
2010-01-01
This study explored the effects of collectivism on lying to conceal a group transgression. Seven-, 9-, and 11-year-old US and Chinese children (N = 374) were asked to evaluate stories in which protagonists either lied or told the truth about their group’s transgression and were then asked about either the protagonist’s motivations or justification for their own evaluations. Previous research suggests that children in collectivist societies such as China find lying for one’s group to be more acceptable than do children from individualistic societies such as the United States. The current study provides evidence that this is not always the case: Chinese children in this study viewed lies told to conceal a group’s transgressions less favourably than did US children. An examination of children’s reasoning about protagonists’ motivations for lying indicated that children in both countries focused on an impact to self when discussing motivations for protagonists to lie for their group. Overall, results suggest that children living in collectivist societies do not always focus on the needs of the group. PMID:20953286
Portable concealed weapon detection using millimeter-wave FMCW radar imaging
NASA Astrophysics Data System (ADS)
Johnson, Michael A.; Chang, Yu-Wen
2001-02-01
Unobtrusive detection of concealed weapons on persons or in abandoned bags would provide law enforcement a powerful tool to focus resources and increase traffic throughput in high- risk situations. We have developed a fast image scanning 94 GHz radar system that is suitable for portable operation and remote viewing of radar data. This system includes a novel fast image-scanning antenna that allows for the acquisition of medium resolution 3D millimeter wave images of stationary targets with frame times on order of one second. The 3D radar data allows for potential isolation of concealed weapons from body and environmental clutter such as nearby furniture or other people. The radar is an active system so image quality is not affected indoors, emitted power is however very low so there are no health concerns for operator or targets. The low power operation is still sufficient to penetrate heavy clothing or material. Small system size allows for easy transport and rapid deployment of the system as well as an easy migration path to future hand held systems.
Thakur, I S; Kamal; Mishra, S
1991-06-01
Allergoids of Prosopis juliflora pollen were prepared by formalinization of crude allergen and glycoprotein. Fractionation of crude allergen and allergoids on Sephadex G-100 resulted in separation of proteins of varying molecular size and a glycoprotein of 81 to 13 KD. Allergoids prepared from the glycoprotein fractionated into two proteins of approximately 200 KD and more than 200 KD. Crossed immunoelectrophoresis indicated 12 and gel diffusion test 3 precipitating antigens incrude allergen extract; by these tests allergoids depicted 8 and 3 precipitin bands, respectively. The precipitin analysis showed heterogeneity of allergenic determinants and also variation in cross-immunogenicity of the formalinized derivatives. The skin prick and radioallergosorbent tests depicted greater activity of fractionated crude allergens than the allergoids. The above tests suggest altered and concealed antigenic determinants as result of formalinization of P. juliflora pollen which, however, showed reduced allergenic activity relative to the native allergen.
Reexamination of quantum bit commitment: The possible and the impossible
DOE Office of Scientific and Technical Information (OSTI.GOV)
D'Ariano, Giacomo Mauro; Kretschmann, Dennis; Institut fuer Mathematische Physik, Technische Universitaet Braunschweig, Mendelssohnstrasse 3, 38106 Braunschweig
2007-09-15
Bit commitment protocols whose security is based on the laws of quantum mechanics alone are generally held to be impossible. We give a strengthened and explicit proof of this result. We extend its scope to a much larger variety of protocols, which may have an arbitrary number of rounds, in which both classical and quantum information is exchanged, and which may include aborts and resets. Moreover, we do not consider the receiver to be bound to a fixed 'honest' strategy, so that 'anonymous state protocols', which were recently suggested as a possible way to beat the known no-go results, aremore » also covered. We show that any concealing protocol allows the sender to find a cheating strategy, which is universal in the sense that it works against any strategy of the receiver. Moreover, if the concealing property holds only approximately, the cheat goes undetected with a high probability, which we explicitly estimate. The proof uses an explicit formalization of general two-party protocols, which is applicable to more general situations, and an estimate about the continuity of the Stinespring dilation of a general quantum channel. The result also provides a natural characterization of protocols that fall outside the standard setting of unlimited available technology and thus may allow secure bit commitment. We present such a protocol whose security, perhaps surprisingly, relies on decoherence in the receiver's laboratory.« less
Hiding Information Using different lighting Color images
NASA Astrophysics Data System (ADS)
Majead, Ahlam; Awad, Rash; Salman, Salema S.
2018-05-01
The host medium for the secret message is one of the important principles for the designers of steganography method. In this study, the best color image was studied to carrying any secret image.The steganography approach based Lifting Wavelet Transform (LWT) and Least Significant Bits (LSBs) substitution. The proposed method offers lossless and unnoticeable changes in the contrast carrier color image and imperceptible by human visual system (HVS), especially the host images which was captured in dark lighting conditions. The aim of the study was to study the process of masking the data in colored images with different light intensities. The effect of the masking process was examined on the images that are classified by a minimum distance and the amount of noise and distortion in the image. The histogram and statistical characteristics of the cover image the results showed the efficient use of images taken with different light intensities in hiding data using the least important bit substitution method. This method succeeded in concealing textual data without distorting the original image (low light) Lire developments due to the concealment process.The digital image segmentation technique was used to distinguish small areas with masking. The result is that smooth homogeneous areas are less affected as a result of hiding comparing with high light areas. It is possible to use dark color images to send any secret message between two persons for the purpose of secret communication with good security.
Detection and classification of concealed weapons using a magnetometer-based portal
NASA Astrophysics Data System (ADS)
Kotter, Dale K.; Roybal, Lyle G.; Polk, Robert E.
2002-08-01
A concealed weapons detection technology was developed through the support of the National Institute of Justice (NIJ) to provide a non intrusive means for rapid detection, location, and archiving of data (including visual) of potential suspects and weapon threats. This technology, developed by the Idaho National Engineering and Environmental Laboratory (INEEL), has been applied in a portal style weapons detection system using passive magnetic sensors as its basis. This paper will report on enhancements to the weapon detection system to enable weapon classification and to discriminate threats from non-threats. Advanced signal processing algorithms were used to analyze the magnetic spectrum generated when a person passes through a portal. These algorithms analyzed multiple variables including variance in the magnetic signature from random weapon placement and/or orientation. They perform pattern recognition and calculate the probability that the collected magnetic signature correlates to a known database of weapon versus non-weapon responses. Neural networks were used to further discriminate weapon type and identify controlled electronic items such as cell phones and pagers. False alarms were further reduced by analyzing the magnetic detector response by using a Joint Time Frequency Analysis digital signal processing technique. The frequency components and power spectrum for a given sensor response were derived. This unique fingerprint provided additional information to aid in signal analysis. This technology has the potential to produce major improvements in weapon detection and classification.
Digital image modification detection using color information and its histograms.
Zhou, Haoyu; Shen, Yue; Zhu, Xinghui; Liu, Bo; Fu, Zigang; Fan, Na
2016-09-01
The rapid development of many open source and commercial image editing software makes the authenticity of the digital images questionable. Copy-move forgery is one of the most widely used tampering techniques to create desirable objects or conceal undesirable objects in a scene. Existing techniques reported in the literature to detect such tampering aim to improve the robustness of these methods against the use of JPEG compression, blurring, noise, or other types of post processing operations. These post processing operations are frequently used with the intention to conceal tampering and reduce tampering clues. A robust method based on the color moments and other five image descriptors is proposed in this paper. The method divides the image into fixed size overlapping blocks. Clustering operation divides entire search space into smaller pieces with similar color distribution. Blocks from the tampered regions will reside within the same cluster since both copied and moved regions have similar color distributions. Five image descriptors are used to extract block features, which makes the method more robust to post processing operations. An ensemble of deep compositional pattern-producing neural networks are trained with these extracted features. Similarity among feature vectors in clusters indicates possible forged regions. Experimental results show that the proposed method can detect copy-move forgery even if an image was distorted by gamma correction, addictive white Gaussian noise, JPEG compression, or blurring. Copyright © 2016. Published by Elsevier Ireland Ltd.
Kaposi's sarcoma concealed by stasis dermatitis in a patient with psoriasis.
Erdoğan, Hilal Kaya; Bulur, Işıl; Saraçoğlu, Zeynep Nurhan; Karapınar, Tekden; Arık, Deniz
2017-09-01
Kaposi's sarcoma (KS) is a multifocal and angioproliferative neoplasm. KS may be accompanied by psoriasis; however, in most of these cases the main mechanism involves iatrogenic KS associated with the immunosuppressive drugs that are used in psoriasis treatment. In angioproliferative lesions as a result of venous insufficiency and stasis dermatitis, acroangiodermatitis (pseudo-KS) is initially considered. However, the concurrent occurrence of psoriasis, stasis dermatitis, and KS has not been previously reported. We report a case of classic-type KS in an 83-year-old man that was concealed by stasis dermatitis and accompanied by psoriasis.
Rodriguez, Brian D.; Sampson, Jay A.
2010-01-01
The Sunnyside porphyry copper system is part of the concealed San Rafael Valley porphyry system located in the Patagonia Mountains of Arizona. The U.S. Geological Survey is conducting a series of multidisciplinary studies as part of the Assessment Techniques for Concealed Mineral Resources project. To help characterize the size and resistivity of the mineralized area beneath overburden, a regional east-west magnetotelluric sounding profile was acquired. This is a data release report of the magnetotelluric sounding data collected along the east-west profile; no interpretation of the data is included.
Managing age discrimination: an examination of the techniques used when seeking employment.
Berger, Ellie D
2009-06-01
This article examines the age-related management techniques used by older workers in their search for employment. Data are drawn from interviews with individuals aged 45-65 years (N = 30). Findings indicate that participants develop "counteractions" and "concealments" to manage perceived age discrimination. Individuals counteract employers' ageist stereotypes by maintaining their skills and changing their work-related expectations and conceal age by altering their résumés, physical appearance, and language used. This research suggests that there is a need to reexamine the hiring practices of employers and to improve legislation in relation to their accountability.
Publicity, Privacy, and Permanence of Information
NASA Astrophysics Data System (ADS)
Bennett, Charles H.
2006-11-01
The quantum principles of superposition and entanglement have led to a recasting of the foundations of information and computation theory, and are especially helpful in understanding the nature of privacy. The most private information, exemplified by a quantum eraser experiment, is best regarded as existing only conditionally and temporarily-after the experiment is over no trace remains. Less private is classically-secret information-quantum information that has decohered, and thus become recoverable in principle, though not in practice, from portions of the environment. Finally there is public information, which has been replicated so thoroughly throughout the environment as to be infeasible to conceal. The Internet has caused an explosion of public information, with the beneficial side effect of making it harder for despots to rewrite the history of their misdeeds, and it is tempting to hope that all macroscopic information is permanent, making such cover-ups impossible in principle if not in practice. However, by comparing entropy flows into and out of the Earth with estimates of the planet's storage capacity, we conclude that most macroscopic information-for example the pattern of sand grains on an ancient beach-is impermanent, in the sense of becoming irrecoverable in principle from the Earth though still recorded in the Universe.
Impulse radar imaging system for concealed object detection
NASA Astrophysics Data System (ADS)
Podd, F. J. W.; David, M.; Iqbal, G.; Hussain, F.; Morris, D.; Osakue, E.; Yeow, Y.; Zahir, S.; Armitage, D. W.; Peyton, A. J.
2013-10-01
Electromagnetic systems for imaging concealed objects at checkpoints typically employ radiation at millimetre and terahertz frequencies. These systems have been shown to be effective and provide a sufficiently high resolution image. However there are difficulties and current electromagnetic systems have limitations particularly in accurately differentiating between threat and innocuous objects based on shape, surface emissivity or reflectivity, which are indicative parameters. In addition, water has a high absorption coefficient at millimetre wavelength and terahertz frequencies, which makes it more difficult for these frequencies to image through thick damp clothing. This paper considers the potential of using ultra wideband (UWB) in the low gigahertz range. The application of this frequency band to security screening appears to be a relatively new field. The business case for implementing the UWB system has been made financially viable by the recent availability of low-cost integrated circuits operating at these frequencies. Although designed for the communication sector, these devices can perform the required UWB radar measurements as well. This paper reports the implementation of a 2 to 5 GHz bandwidth linear array scanner. The paper describes the design and fabrication of transmitter and receiver antenna arrays whose individual elements are a type of antipodal Vivaldi antenna. The antenna's frequency and angular response were simulated in CST Microwave Studio and compared with laboratory measurements. The data pre-processing methods of background subtraction and deconvolution are implemented to improve the image quality. The background subtraction method uses a reference dataset to remove antenna crosstalk and room reflections from the dataset. The deconvolution method uses a Wiener filter to "sharpen" the returned echoes which improves the resolution of the reconstructed image. The filter uses an impulse response reference dataset and a signal-to-noise parameter to determine how the frequencies contained in the echo dataset are normalised. The chosen image reconstruction algorithm is based on the back-projection method. The algorithm was implemented in MATLAB and uses a pre-calculated sensitivity matrix to increase the computation speed. The results include both 2D and 3D image datasets. The 3D datasets were obtained by scanning the dual sixteen element linear antenna array over the test object. The system has been tested on both humans and mannequin test objects. The front surface of an object placed on the human/mannequin torso is clearly visible, but its presence is also seen from a tell-tale imaging characteristic. This characteristic is caused by a reduction in the wave velocity as the electromagnetic radiation passes through the object, and manifests as an indentation in the reconstructed image that is readily identifiable. The prototype system has been shown to easily detect a 12 mm x 30 mm x70 mm plastic object concealed under clothing.
Integration of potential-field and digital geologic data for two North American geoscience transects
Phillips, J.D.
1990-01-01
Two North American contributions to the Global Geoscience Transects Program, the Quebec-Maine-Gulf of Maine transect and the Great Lakes portion of the United States-Canadian Border transect, are among the first to produce digital geology in a form that can be combined with gridded gravity and aeromagnetic data. Maps of shaded relief and color-composite bandpass-filtered potential-field data combined with overlays of digitized geologic contacts and faults reveal significant new geologic information, including the relative thickness of plutons, the structure of poorly exposed or concealed magnetic units, and possible evidence for mineralized ground. -from Author
Factors influencing nesting success of king eiders on northern Alaska's Coastal Plain
Bentzen, R.L.; Powell, A.N.; Suydam, R.S.
2008-01-01
King eider (Somateria spectabilis) populations have declined markedly in recent decades for unknown reasons. Nest survival is one component of recruitment, and a female's chance of reproductive success increases with her ability to choose an appropriate nesting strategy. We estimated variation in daily nest survival of king eiders at 2 sites, Teshekpuk and Kuparuk, Alaska, USA, 2002-2005. We evaluated both a priori and exploratory competing models of nest survival that considered importance of nest concealment, seclusion, and incubation constancy as strategies to avoid 2 primary egg predators, avian (Larus spp., Stercorarius spp., and Corvus corax) and fox (Alopex lagopus). We used generalized nonlinear techniques to examine factors affecting nest survival rates and information-theoretic approaches to select among competing models. Estimated nest survival, accounting for a nest visitation effect, varied considerably across sites and years (0.21-0.57); however, given our small sample size, much of this variation maybe attributable to sampling variation (??process = 0.007, 95% CI: 0.003-0.070). Nest survival was higher at Kuparuk than Teshekpuk in all years; however, due to the correlative nature of our data, we cannot determine the underlying causes with any certainty. We found mixed support for the concealed breeding strategy, females derived no benefit from nesting in areas with more willow (Salix spp.; measure of concealment) except that the observer effect diminished as willow cover increased. We suggest these patterns are due to conflicting predation pressures. Nest survival was not higher on islands (measure of seclusion) or with increased incubation constancy but was higher post-fox removal, indicating that predator control on breeding grounds could be a viable management option. Nest survival was negatively affected by our nest visitations, most likely by exposing the nest to avian scavengers. We recommend precautions be taken to limit the effects of nest visits in future studies and to consider them as a possible negative bias in estimated nest survival. Future models of the impacts of development within the breeding grounds of king eider should consider the influence of humans in the vicinity of nests.
Disposition and health outcomes among infants born to mothers with no prenatal care.
Friedman, Susan Hatters; Heneghan, Amy; Rosenthal, Miriam
2009-02-01
This study assessed infant disposition and health outcomes among offspring born to mothers without prenatal care, based on maternal characteristics and the reason for lack of prenatal care (i.e., denial of pregnancy, concealment of pregnancy, primary substance use, financial barriers and multiparity). A retrospective record review was completed at an urban academic medical center. Subjects were women who presented at delivery or immediately postpartum with no history of prenatal care (N=211), and their infants. Infants of mothers with substance use problems had the highest rates of referral to child protective services and out-of-home placement at discharge, though mothers with other reasons for no prenatal care also experienced both referral and placement. Infants born to mothers using substances experienced the highest rates of neonatal intensive care unit admission, and the lowest mean birth weight. Though those without prenatal care experienced a variety of adverse outcomes, substance use problems were most frequently correlated with adverse infant outcomes. Mothers who either had lost custody of other children or with substance use problems were at highest risk of losing custody of their infants. Those who denied or concealed their pregnancy still frequently retained custody. Among mothers without prenatal care, those with substance use problems were least likely to retain custody of their infant at hospital discharge. Custody status of the mother's other children was also independently associated with infant custody. Mothers who denied or concealed their pregnancy still often retained custody. Referrals of mothers with no prenatal care for psychiatric evaluation were rare, though referrals to social work were frequent. Child protective services occasionally did not investigate referrals in the denial and concealment groups. Healthcare providers should be aware of the medical and psychological needs of this vulnerable population of infants and mothers.
NASA Astrophysics Data System (ADS)
Hu, Taiyang; Xiao, Zelong; Li, Hao; Lv, Rongchuan; Lu, Xuan
2014-11-01
The increasingly emerging terrorism attacks and violence crimes around the world have posed severe threats to public security, so carrying out relevant research on advanced experimental methods of personnel concealed contraband detection is crucial and meaningful. All of the advantages of imaging covertly, avoidance of interference with other systems, intrinsic property of being safe to persons under screening , and the superior ability of imaging through natural or manmade obscurants, have significantly combined to enable millimeter-wave (MMW) radiometric imaging to offer great potential in personnel concealed contraband detection. Based upon the current research status of MMW radiometric imaging and urgent demands of personnel security screening, this paper mainly focuses on the experimental methods of indoor MMW radiometric imaging. The reverse radiation noise resulting from super-heterodyne receivers seriously affects the image experiments carried out at short range, so both the generation mechanism and reducing methods of this noise are investigated. Then, the benefit of sky illumination no longer exists for the indoor radiometric imaging, and this leads to the decrease in radiometric temperature contrast between target and background. In order to enhance the radiometric temperature contrast for improving indoor imaging performance, the noise illumination technique is adopted in the indoor imaging scenario. In addition, the speed and accuracy of concealed contraband detection from acquired MMW radiometric images are usually restricted to the deficiencies in traditional artificial interpretation by security inspectors, thus an automatic recognition and location algorithm by integrating improved Fuzzy C-means clustering with moment invariants is put forward. A series of original results are also presented to demonstrate the significance and validity of these methods.
New opportunities for quality enhancing of images captured by passive THz camera
NASA Astrophysics Data System (ADS)
Trofimov, Vyacheslav A.; Trofimov, Vladislav V.
2014-10-01
As it is well-known, the passive THz camera allows seeing concealed object without contact with a person and this camera is non-dangerous for a person. Obviously, efficiency of using the passive THz camera depends on its temperature resolution. This characteristic specifies possibilities of the detection for concealed object: minimal size of the object; maximal distance of the detection; image quality. Computer processing of the THz image may lead to many times improving of the image quality without any additional engineering efforts. Therefore, developing of modern computer code for its application to THz images is urgent problem. Using appropriate new methods one may expect such temperature resolution which will allow to see banknote in pocket of a person without any real contact. Modern algorithms for computer processing of THz images allow also to see object inside the human body using a temperature trace on the human skin. This circumstance enhances essentially opportunity of passive THz camera applications for counterterrorism problems. We demonstrate opportunities, achieved at present time, for the detection both of concealed objects and of clothes components due to using of computer processing of images captured by passive THz cameras, manufactured by various companies. Another important result discussed in the paper consists in observation of both THz radiation emitted by incandescent lamp and image reflected from ceramic floorplate. We consider images produced by THz passive cameras manufactured by Microsemi Corp., and ThruVision Corp., and Capital Normal University (Beijing, China). All algorithms for computer processing of the THz images under consideration in this paper were developed by Russian part of author list. Keywords: THz wave, passive imaging camera, computer processing, security screening, concealed and forbidden objects, reflected image, hand seeing, banknote seeing, ceramic floorplate, incandescent lamp.
NASA Astrophysics Data System (ADS)
Murrill, Steven R.; Jacobs, Eddie L.; Franck, Charmaine C.; Petkie, Douglas T.; De Lucia, Frank C.
2015-10-01
The U.S. Army Research Laboratory (ARL) has continued to develop and enhance a millimeter-wave (MMW) and submillimeter- wave (SMMW)/terahertz (THz)-band imaging system performance prediction and analysis tool for both the detection and identification of concealed weaponry, and for pilotage obstacle avoidance. The details of the MATLAB-based model which accounts for the effects of all critical sensor and display components, for the effects of atmospheric attenuation, concealment material attenuation, and active illumination, were reported on at the 2005 SPIE Europe Security and Defence Symposium (Brugge). An advanced version of the base model that accounts for both the dramatic impact that target and background orientation can have on target observability as related to specular and Lambertian reflections captured by an active-illumination-based imaging system, and for the impact of target and background thermal emission, was reported on at the 2007 SPIE Defense and Security Symposium (Orlando). Further development of this tool that includes a MODTRAN-based atmospheric attenuation calculator and advanced system architecture configuration inputs that allow for straightforward performance analysis of active or passive systems based on scanning (single- or line-array detector element(s)) or staring (focal-plane-array detector elements) imaging architectures was reported on at the 2011 SPIE Europe Security and Defence Symposium (Prague). This paper provides a comprehensive review of a newly enhanced MMW and SMMW/THz imaging system analysis and design tool that now includes an improved noise sub-model for more accurate and reliable performance predictions, the capability to account for postcapture image contrast enhancement, and the capability to account for concealment material backscatter with active-illumination- based systems. Present plans for additional expansion of the model's predictive capabilities are also outlined.
Marginal regression analysis of recurrent events with coarsened censoring times.
Hu, X Joan; Rosychuk, Rhonda J
2016-12-01
Motivated by an ongoing pediatric mental health care (PMHC) study, this article presents weakly structured methods for analyzing doubly censored recurrent event data where only coarsened information on censoring is available. The study extracted administrative records of emergency department visits from provincial health administrative databases. The available information of each individual subject is limited to a subject-specific time window determined up to concealed data. To evaluate time-dependent effect of exposures, we adapt the local linear estimation with right censored survival times under the Cox regression model with time-varying coefficients (cf. Cai and Sun, Scandinavian Journal of Statistics 2003, 30, 93-111). We establish the pointwise consistency and asymptotic normality of the regression parameter estimator, and examine its performance by simulation. The PMHC study illustrates the proposed approach throughout the article. © 2016, The International Biometric Society.
Resolving social conflict among females without overt aggression
Cant, Michael A.; Young, Andrew J.
2013-01-01
Members of animal societies compete over resources and reproduction, but the extent to which such conflicts of interest are resolved peacefully (without recourse to costly or wasteful acts of aggression) varies widely. Here, we describe two theoretical mechanisms that can help to understand variation in the incidence of overt behavioural conflict: (i) destruction competition and (ii) the use of threats. The two mechanisms make different assumptions about the degree to which competitors are socially sensitive (responsive to real-time changes in the behaviour of their social partners). In each case, we discuss how the model assumptions relate to biological reality and highlight the genetic, ecological and informational factors that are likely to promote peaceful conflict resolution, drawing on empirical examples. We suggest that, relative to males, reproductive conflict among females may be more frequently resolved peacefully through threats of punishment, rather than overt acts of punishment, because (i) offspring are more costly to produce for females and (ii) reproduction is more difficult to conceal. The main need now is for empirical work to test whether the mechanisms described here can indeed explain how social conflict can be resolved without overt aggression. PMID:24167306
NASA Astrophysics Data System (ADS)
Sinha, Vaibhav; Srivastava, Anjali; Koo Lee, Hyoung
2014-06-01
A novel method for non-destructive analysis has been developed using a neutron/X-ray combined computed tomography (NXCT) system at the Missouri University of Science and Technology Reactor (MSTR). This imaging system takes advantage of the fact that neutrons and X-rays have characteristically different interactions with same materials. NXCT fuses the imaging capabilities of both systems at one location and allows instant evaluation for nondestructive testing (NDT) applications. This technique promises viable advances in the field of NDT. In this paper, the complete design criteria and procedures are provided. The described design criteria and procedures can effectively be utilized to design and develop advanced combined computed tomography system. The successful operation of the high resolution X-ray and neutron computed tomography has been demonstrated in this paper. The utility and importance of the NXCT system has been shown by nondestructive evaluation of various phantoms constituting different materials, geometrical, structural and compositional information. The concept of NXCT can be useful for concealed material detection, material characterization, investigation of complex geometries involving different atomic number materials and real time imaging for in-situ studies.
NASA Astrophysics Data System (ADS)
Morgan, John S.
2005-05-01
Law enforcement agencies play a key role in protecting the nation from and responding to terrorist attacks. Preventing terrorism and promoting the nation"s security is the Department of Justice"s number one strategic priority. This is reflected in its technology development efforts, as well as its operational focus. The National Institute of Justice (NIJ) is the national focal point for the research, development, test and evaluation of technology for law enforcement. In addition to its responsibilities in supporting day-to-day criminal justice needs in areas such as less lethal weapons and forensic science, NIJ also provides critical support for counter-terrorism capacity improvements in state and local law enforcement in several areas. The most important of these areas are bomb response, concealed weapons detection, communications and information technology, which together offer the greatest potential benefit with respect to improving the ability to law enforcement agencies to respond to all types of crime including terrorist acts. NIJ coordinates its activities with several other key federal partners, including the Department of Homeland Security"s Science and Technology Directorate, the Technical Support Working Group, and the Department of Defense.
Richardson, Lyndsay Ann; El-Zein, Mariam; Ramanakumar, Agnihotram V; Ratnam, Samuel; Sangwa-Lugoma, Ghislain; Longatto-Filho, Adhemar; Cardoso, Marly Augusto; Coutlée, Francois; Franco, Eduardo L
2015-12-01
Knowledge of cervical human papillomavirus (HPV) status might influence a cytotechnician's assessment of cellular abnormalities. The authors compared original cytotechnicians' Papanicolaou (Pap) readings for which HPV status was concealed with Pap rereads for which HPV status was revealed separately for 3 screening populations. Previously collected cervical Pap smears and clinical data were obtained from the Canadian Cervical Cancer Screening Trial (study A), the Democratic Republic of Congo Community-Based Screening Study (study B), and the Brazilian Investigation into Nutrition and Cervical Cancer Prevention (study C). Smears were reread with knowledge of HPV status for all HPV-positive women as well as a sample of HPV-negative women. Diagnostic performance of Pap cytology was compared between original readings and rereads. A total of 1767 Pap tests were reread. Among 915 rereads for HPV-positive women, the contrast between "revealed" and "concealed" Pap readings demonstrated revisions from negative to positive results for 109 women (cutoff was atypical squamous cells of undetermined significance or worse) and 124 women (cutoff was low-grade squamous intraepithelial lesions [LSIL] or worse). For a disease threshold of cervical intraepithelial neoplasia of grade 2 or worse, specificity significantly declined at the atypical squamous cells of undetermined significance cutoff for studies A (86.6% to 75.3%) and C (42.5% to 15.5%), and at the LSIL cutoff for study C (61.9% to 37.6%). Sensitivity remained nearly unchanged between readings, except in study C, in which reread performance was superior (91.3% vs 71.9% for the LSIL cutoff). A reduction in the diagnostic accuracy of Pap cytology was observed when revealing patients' cervical HPV status, possibly due to a heightened awareness of potential abnormalities, which led to more false-positive results. © 2015 American Cancer Society.
Hair camouflage: A comprehensive review.
Saed, Stephanie; Ibrahim, Omer; Bergfeld, Wilma F
2016-12-01
Hair is venerated, cherished, and desired in societies throughout the world. Both women and men express their individual identities through their hairstyles. Healthy hair contributes to successful social assimilation, employment, and overall quality of life. Therefore, hair loss can have detrimental effects on almost every aspect of a person's life. In this review, we discuss the myriad of options that aid in concealing and camouflaging hair loss to facilitate a healthier-appearing scalp. Camouflage options for patients who suffer from hair loss include full or partial wigs, hair extensions, concealing powders and sprays, surgical tattoos, and hair transplants. We describe these modalities in detail and discuss their respective advantages and disadvantages.
Hair camouflage: A comprehensive review.
Saed, Stephanie; Ibrahim, Omer; Bergfeld, Wilma F
2017-03-01
Hair is venerated, cherished, and desired in societies throughout the world. Both women and men express their individual identities through their hairstyles. Healthy hair contributes to successful social assimilation, employment, and overall quality of life. Therefore, hair loss can have detrimental effects on almost every aspect of a person's life. In this review, we discuss the myriad of options that aid in concealing and camouflaging hair loss to facilitate a healthier-appearing scalp. Camouflage options for patients who suffer from hair loss include full or partial wigs, hair extensions, concealing powders and sprays, surgical tattoos, and hair transplants. We describe these modalities in detail and discuss their respective advantages and disadvantages.
Three-dimensional radar imaging techniques and systems for near-field applications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sheen, David M.; Hall, Thomas E.; McMakin, Douglas L.
2016-05-12
The Pacific Northwest National Laboratory has developed three-dimensional holographic (synthetic aperture) radar imaging techniques and systems for a wide variety of near-field applications. These applications include radar cross-section (RCS) imaging, personnel screening, standoff concealed weapon detection, concealed threat detection, through-barrier imaging, ground penetrating radar (GPR), and non-destructive evaluation (NDE). Sequentially-switched linear arrays are used for many of these systems to enable high-speed data acquisition and 3-D imaging. In this paper, the techniques and systems will be described along with imaging results that demonstrate the utility of near-field 3-D radar imaging for these compelling applications.
Detecting persons concealed in a vehicle
Tucker, Jr., Raymond W.
2005-03-29
An improved method for detecting the presence of humans or animals concealed within in a vehicle uses a combination of the continuous wavelet transform and a ratio-based energy calculation to determine whether the motion detected using seismic sensors placed on the vehicle is due to the presence of a heartbeat within the vehicle or is the result of motion caused by external factors such as the wind. The method performs well in the presence of light to moderate ambient wind levels, producing far fewer false alarm indications. The new method significantly improves the range of ambient environmental conditions under which human presence detection systems can reliably operate.
Strategies for nest-site selection by king eiders
Bentzen, R.L.; Powell, A.N.; Suydam, R.S.
2009-01-01
Nest site selection is a critical component of reproduction and has presumably evolved in relation to predation, local resources, and microclimate. We investigated nest-site choice by king eiders (Somateria spectabilis) on the coastal plain of northern Alaska, USA, 2003-2005. We hypothesized that nest-site selection is driven by predator avoidance and that a variety of strategies including concealment, seclusion, and conspecific or inter-specific nest defense might lead to improved nesting success. We systematically searched wetland basins for king eider nests and measured habitat and social variables at nests (n = 212) and random locations (n = 493). King eiders made use of both secluded and concealed breeding strategies; logistic regression models revealed that females selected nests close to water, on islands, and in areas with high willow (Salix spp.) cover but did not select sites near conspecific or glaucous gull (Larus hyperboreus) nests. The most effective nest-placement strategy may vary depending on density and types of nest predators; seclusion is likely a mammalian-predator avoidance tactic whereas concealment may provide protection from avian predators. We recommend that managers in northern Alaska attempt to maintain wetland basins with islands and complex shorelines to provide potential nest sites in the vicinity of water. ?? The Wildlife Society.
JPEG2000-coded image error concealment exploiting convex sets projections.
Atzori, Luigi; Ginesu, Giaime; Raccis, Alessio
2005-04-01
Transmission errors in JPEG2000 can be grouped into three main classes, depending on the affected area: LL, high frequencies at the lower decomposition levels, and high frequencies at the higher decomposition levels. The first type of errors are the most annoying but can be concealed exploiting the signal spatial correlation like in a number of techniques proposed in the past; the second are less annoying but more difficult to address; the latter are often imperceptible. In this paper, we address the problem of concealing the second class or errors when high bit-planes are damaged by proposing a new approach based on the theory of projections onto convex sets. Accordingly, the error effects are masked by iteratively applying two procedures: low-pass (LP) filtering in the spatial domain and restoration of the uncorrupted wavelet coefficients in the transform domain. It has been observed that a uniform LP filtering brought to some undesired side effects that negatively compensated the advantages. This problem has been overcome by applying an adaptive solution, which exploits an edge map to choose the optimal filter mask size. Simulation results demonstrated the efficiency of the proposed approach.
Dechartres, Agnes; Trinquart, Ludovic; Atal, Ignacio; Moher, David; Dickersin, Kay; Boutron, Isabelle; Perrodeau, Elodie; Altman, Douglas G; Ravaud, Philippe
2017-06-08
Objective To examine how poor reporting and inadequate methods for key methodological features in randomised controlled trials (RCTs) have changed over the past three decades. Design Mapping of trials included in Cochrane reviews. Data sources Data from RCTs included in all Cochrane reviews published between March 2011 and September 2014 reporting an evaluation of the Cochrane risk of bias items: sequence generation, allocation concealment, blinding, and incomplete outcome data. Data extraction For each RCT, we extracted consensus on risk of bias made by the review authors and identified the primary reference to extract publication year and journal. We matched journal names with Journal Citation Reports to get 2014 impact factors. Main outcomes measures We considered the proportions of trials rated by review authors at unclear and high risk of bias as surrogates for poor reporting and inadequate methods, respectively. Results We analysed 20 920 RCTs (from 2001 reviews) published in 3136 journals. The proportion of trials with unclear risk of bias was 48.7% for sequence generation and 57.5% for allocation concealment; the proportion of those with high risk of bias was 4.0% and 7.2%, respectively. For blinding and incomplete outcome data, 30.6% and 24.7% of trials were at unclear risk and 33.1% and 17.1% were at high risk, respectively. Higher journal impact factor was associated with a lower proportion of trials at unclear or high risk of bias. The proportion of trials at unclear risk of bias decreased over time, especially for sequence generation, which fell from 69.1% in 1986-1990 to 31.2% in 2011-14 and for allocation concealment (70.1% to 44.6%). After excluding trials at unclear risk of bias, use of inadequate methods also decreased over time: from 14.8% to 4.6% for sequence generation and from 32.7% to 11.6% for allocation concealment. Conclusions Poor reporting and inadequate methods have decreased over time, especially for sequence generation and allocation concealment. But more could be done, especially in lower impact factor journals. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
Vavken, P; Culen, G; Dorotka, R
2008-01-01
The demand to routinely apply evidence-based methods in orthopedic surgery increases steadily. In order to do so, however, the validity and reliability of the "evidence" has to be scrutinized. The object of this study was to assess the quality of the most recent orthopedic evidence and to determine variables that have an influence on quality. All 2006 controlled trials from orthopedic journals with high impact factors were analysed in a cross-sectional study. A score based on the CONSORT statement was used to assess study quality. Selected variables were tested for their influence on the quality of the study. Two independent blinded observers reviewed 126 studies. The overall quality was moderate to high. The most neglected parameters were power analysis, intention-to-treat, and concealment. The participation of a methodologically trained investigator increases study quality significantly. There was no difference in study quality irrespective of whether or not there was statistically significant result. Using our quality score we were able show fairly good results for recent orthopedic studies. The most frequently neglected issues in orthopedic research are blinding, power analysis, and intention-to-treat. This may distort the results of clinical investigations considerably and, especially, lack of concealment causes false-positive findings. Our data show furthermore that participation of a methodologist significantly increases quality of the study and consequently strengthens the reliability of results.
Jung, Eun-hong; Jang, Seok-heun; Lee, Jae-won
2011-01-01
Purpose The aim of this study was to categorize concealed penis and buried penis by preoperative physical examination including the manual prepubic compression test and to describe a simple surgical technique to correct buried penis that was based on surgical experience and comprehension of the anatomical components. Materials and Methods From March 2007 to November 2010, 17 patients were diagnosed with buried penis after differentiation of this condition from concealed penis. The described surgical technique consisted of a minimal incision and simple fixation of the penile shaft skin and superficial fascia to the prepubic deep fascia, without degloving the penile skin. Results The mean age of the patients was 10.2 years, ranging from 8 years to 15 years. The median follow-up was 19 months (range, 5 to 49 months). The mean penile lengths were 1.8 cm (range, 1.1 to 2.5 cm) preoperatively and 4.5 cm (range, 3.3 to 5.8 cm) postoperatively. The median difference between preoperative and postoperative penile lengths was 2.7 cm (range, 2.1 to 3.9 cm). There were no serious intra- or postoperative complications. Conclusions With the simple anchoring of the penopubic skin to the prepubic deep fascia, we obtained successful subjective and objective outcomes without complications. We suggest that this is a promising surgical method for selected patients with buried penis. PMID:22195270
A thermal after-effect of UV irradiation of muscle glycogen phosphorylase b
Eronina, Tatiana B.; Chebotareva, Natalia A.; Kleymenov, Sergey Yu.; Shubin, Vladimir V.; Kurganov, Boris I.
2017-01-01
Different test systems are used to characterize the anti-aggregation efficiency of molecular chaperone proteins and of low-molecular-weight chemical chaperones. Test systems based on aggregation of UV-irradiated protein are of special interest because they allow studying the protective action of different agents at physiological temperatures. The kinetics of UV-irradiated glycogen phosphorylase b (UV-Phb) from rabbit skeletal muscle was studied at 37°C using dynamic light scattering in a wide range of protein concentrations. It has been shown that the order of aggregation with respect to the protein is equal to unity. A conclusion has been made that the rate-limiting stage of the overall process of aggregation is heat-induced structural reorganization of a UV-Phb molecule, which contains concealed damage. PMID:29216272
Wang, Dunling; Fiessel, Wanda
2008-01-01
This study evaluated three different dehydrated media for simultaneous detection and enumeration of total coliform (TC) and Escherichia coli in drinking water samples with a standard membrane filtration procedure. The experiment indicated that the differential coliform agar (DCA) medium was the most effective among the tested media in enumerating TC and E. coli, without the need for extensive accompanying confirmation tests. The results for DCA medium were highly reproducible for both TC and E. coli with standard deviation of 6.0 and 6.1, respectively. A high agreement (82%) was found between DCA and m-Endo media on 152 drinking water samples in terms of TC positive. The DCA medium also reduced concealment of background bacteria.
Communication About Maternal Breast Cancer With Children: A Qualitative Study.
Huang, Xiaoyan; O'Connor, Margaret; Hu, Yan; Gao, Hongyun; Lee, Susan
Communication with children is a major concern for mothers with breast cancer. Chinese people have specific understanding of cancer and death, which may affect their way of communication. The aim of this study is to explore how Chinese mothers with breast cancer communicate about their illness with their children. An interpretive description study was conducted. Forty mothers with nonterminal breast cancer in mainland China were interviewed individually. The data were analyzed using 3 steps of coding: free coding, descriptive coding, and interpretive coding. Four themes were identified: breaking the news, explaining to children, disclosing versus concealing, and information needs. Most Chinese mothers disclosed their diagnosis of breast cancer to their children mainly because it was impossible to conceal the truth. They explained illness in a factual manner; however, they tended to allow children to observe their physical changes and overhear conversations between adults. This was because they did not know how to communicate appropriately with their children, and they preferred to allow children to understand the event in a natural way. The communication about maternal breast cancer between mothers and children was influenced by traditional culture. Quantitative studies with large sample sizes should be conducted to compare the opinions of mothers of different characteristics and to investigate the factors predicting communication. Resources should be developed to help mothers with breast cancer communicate appropriately with their children about their illness. Healthcare professionals, especially nurses, need education to provide consultation services to these mothers and children.
5. Credit USAF, ca. 1944. Original housed in the Muroc ...
5. Credit USAF, ca. 1944. Original housed in the Muroc Flight Test Base, Unit History, 1 September 1942 - 30 June 1945. Alfred F. Simpson Historical Research Agency. United States Air Force. Maxwell AFB, Alabama. Interior view of hangar, looking north northwest. Note exposed wooden construction. Two jet engines lie partially concealed by tarpaulins in the background, along with a combustion chamber assembly (horizontal cylinders in a circular array). On the workbench in the foreground lie an engine rotor hub and what appears to be an engine fuel line assembly. - Edwards Air Force Base, North Base, Hangar No. 1, First & B Streets, Boron, Kern County, CA
U.S. responses to Japanese wartime inhuman experimentation after World War II.
Brody, Howard; Leonard, Sarah E; Nie, Jing-Bao; Weindling, Paul
2014-04-01
In 1945-46, representatives of the U.S. government made similar discoveries in both Germany and Japan, unearthing evidence of unethical experiments on human beings that could be viewed as war crimes. The outcomes in the two defeated nations, however, were strikingly different. In Germany, the United States, influenced by the Canadian physician John Thompson, played a key role in bringing Nazi physicians to trial and publicizing their misdeeds. In Japan, the United States played an equally key role in concealing information about the biological warfare experiments and in securing immunity from prosecution for the perpetrators. The greater force of appeals to national security and wartime exigency help to explain these different outcomes.
Lee, Andy H; Zhou, Xu; Kang, Deying; Luo, Yanan; Liu, Jiali; Sun, Xin
2018-01-01
Objective To assess risk of bias and to investigate methodological issues concerning the design, conduct and analysis of randomised controlled trials (RCTs) testing acupuncture for knee osteoarthritis (KOA). Methods PubMed, EMBASE, Cochrane Central Register of Controlled Trials and four major Chinese databases were searched for RCTs that investigated the effect of acupuncture for KOA. The Cochrane tool was used to examine the risk of bias of eligible RCTs. Their methodological details were examined using a standardised and pilot-tested questionnaire of 48 items, together with the association between four predefined factors and important methodological quality indicators. Results A total of 248 RCTs were eligible, of which 39 (15.7%) used computer-generated randomisation sequence. Of the 31 (12.5%) trials that stated the allocation concealment, only one used central randomisation. Twenty-five (10.1%) trials mentioned that their acupuncture procedures were standardised, but only 18 (7.3%) specified how the standardisation was achieved. The great majority of trials (n=233, 94%) stated that blinding was in place, but 204 (87.6%) did not clarify who was blinded. Only 27 (10.9%) trials specified the primary outcome, for which 7 used intention-to-treat analysis. Only 17 (6.9%) trials included details on sample size calculation; none preplanned an interim analysis and associated stopping rule. In total, 46 (18.5%) trials explicitly stated that loss to follow-up occurred, but only 6 (2.4%) provided some information to deal with the issue. No trials prespecified, conducted or reported any subgroup or adjusted analysis for the primary outcome. Conclusion The overall risk of bias was high among published RCTs testing acupuncture for KOA. Methodological limitations were present in many important aspects of design, conduct and analyses. These findings inform the development of evidence-based methodological guidance for future trials assessing the effect of acupuncture for KOA. PMID:29511016
Physicians and Insider Trading.
Kesselheim, Aaron S; Sinha, Michael S; Joffe, Steven
2015-12-01
Although insider trading is illegal, recent high-profile cases have involved physicians and scientists who are part of corporate governance or who have access to information about clinical trials of investigational products. Insider trading occurs when a person in possession of information that might affect the share price of a company's stock uses that information to buy or sell securities--or supplies that information to others who buy or sell--when the person is expected to keep such information confidential. The input that physicians and scientists provide to business leaders can serve legitimate social functions, but insider trading threatens to undermine any positive outcomes of these relationships. We review insider-trading rules and consider approaches to securities fraud in the health care field. Given the magnitude of the potential financial rewards, the ease of concealing illegal conduct, and the absence of identifiable victims, the temptation for physicians and scientists to engage in insider trading will always be present. Minimizing the occurrence of insider trading will require robust education, strictly enforced contractual provisions, and selective prohibitions against high-risk conduct, such as participation in expert consulting networks and online physician forums, by those individuals with access to valuable inside information.
Study on multispectral imaging detection and recognition
NASA Astrophysics Data System (ADS)
Jun, Wang; Na, Ding; Gao, Jiaobo; Yu, Hu; Jun, Wu; Li, Junna; Zheng, Yawei; Fei, Gao; Sun, Kefeng
2009-07-01
Multispectral imaging detecting technology use target radiation character in spectral spatial distribution and relation between spectral and image to detect target and remote sensing measure. Its speciality is multi channel, narrow bandwidth, large amount of information, high accuracy. The ability of detecting target in environment of clutter, camouflage, concealment and beguilement is improved. At present, spectral imaging technology in the range of multispectral and hyperspectral develop greatly. The multispectral imaging equipment of unmanned aerial vehicle can be used in mine detection, information, surveillance and reconnaissance. Spectral imaging spectrometer operating in MWIR and LWIR has already been applied in the field of remote sensing and military in the advanced country. The paper presents the technology of multispectral imaging. It can enhance the reflectance, scatter and radiation character of the artificial targets among nature background. The targets among complex background and camouflage/stealth targets can be effectively identified. The experiment results and the data of spectral imaging is obtained.
Natural and Strategic Generosity as Signals of Trustworthiness
Gambetta, Diego; Przepiorka, Wojtek
2014-01-01
We exploit the fact that generosity and trustworthiness are highly correlated and the former can thus be a sign of the latter. Subjects decide between a generous and a mean split in a dictator game. Some of them are informed from the start that afterwards they will participate in a trust game and that their choice in the dictator game may matter; others are not informed in advance. In the trust game, before trusters decide whether or not to trust, some trustees can reveal (or conceal) only their true choice in the dictator game, while others can say to trusters, truthfully or otherwise, what they chose. We find that a generous choice made naturally by uninformed trustees and reliably revealed is more effective in persuading trusters to trust than a generous choice that could be strategic or a lie. Moreover, we find that, when they can, mean subjects lie and go on to be untrustworthy. PMID:24831097
Biological versus electronic adaptive coloration: how can one inform the other?
Kreit, Eric; Mäthger, Lydia M.; Hanlon, Roger T.; Dennis, Patrick B.; Naik, Rajesh R.; Forsythe, Eric; Heikenfeld, Jason
2013-01-01
Adaptive reflective surfaces have been a challenge for both electronic paper (e-paper) and biological organisms. Multiple colours, contrast, polarization, reflectance, diffusivity and texture must all be controlled simultaneously without optical losses in order to fully replicate the appearance of natural surfaces and vividly communicate information. This review merges the frontiers of knowledge for both biological adaptive coloration, with a focus on cephalopods, and synthetic reflective e-paper within a consistent framework of scientific metrics. Currently, the highest performance approach for both nature and technology uses colourant transposition. Three outcomes are envisioned from this review: reflective display engineers may gain new insights from millions of years of natural selection and evolution; biologists will benefit from understanding the types of mechanisms, characterization and metrics used in synthetic reflective e-paper; all scientists will gain a clearer picture of the long-term prospects for capabilities such as adaptive concealment and signalling. PMID:23015522
Millimetre wave and terahertz technology for the detection of concealed threats: a review
NASA Astrophysics Data System (ADS)
Kemp, Michael C.
2006-09-01
There has been intense interest in the use of millimetre wave and terahertz technology for the detection of concealed weapons, explosives and other threats. Electromagnetic waves at these frequencies are safe, penetrate barriers and have short enough wavelengths to allow discrimination between objects. In addition, many solids including explosives have characteristic spectroscopic signatures at terahertz wavelengths which can be used to identify them. This paper reviews the progress which has been made in recent years and identifies the achievements, challenges and prospects for these technologies in checkpoint people screening, stand off detection of improvised explosive devices (IEDs) and suicide bombers as well as more specialized screening tasks.
Imaging terahertz radar for security applications
NASA Astrophysics Data System (ADS)
Semenov, Alexei; Richter, Heiko; Böttger, Ute; Hübers, Heinz-Wilhelm
2008-04-01
Detection of concealed threats is a key issue in public security. In short range applications, passive imagers operating at millimeter wavelengths fulfill this task. However, for larger distances, they will suffer from limited spatial resolution. We will describe the design and performance of 0.8-THz imaging radar that is capable to detect concealed objects at a distance of more than 20 meter. The radar highlights the target with the built-in cw transmitter and analyses the returned signal making use of a heterodyne receiver with a single superconducting hot-electron bolometric mixer. With an integration time of 0.3 sec, the receiver distinguishes a temperature difference of 2 K at the 20 m distance. Both the transmitter and the receiver use the same modified Gregorian telescope consisting from two offset elliptic mirrors. The primary mirror defines limits the lateral resolution of the radar to 2 cm at 20 m distance. At this distance, the field of view of the radar has the diameter 0.5 m. It is sampled with a high-speed conical scanner that allows for a frame time less than 5 sec. The transmitter delivers to the target power with a density less than ten microwatt per squared centimeter, which is harmless for human beings. The radar implements a sensor fusion technique that greatly improves the ability to identify concealed objects.
The successively temporal error concealment algorithm using error-adaptive block matching principle
NASA Astrophysics Data System (ADS)
Lee, Yu-Hsuan; Wu, Tsai-Hsing; Chen, Chao-Chyun
2014-09-01
Generally, the temporal error concealment (TEC) adopts the blocks around the corrupted block (CB) as the search pattern to find the best-match block in previous frame. Once the CB is recovered, it is referred to as the recovered block (RB). Although RB can be the search pattern to find the best-match block of another CB, RB is not the same as its original block (OB). The error between the RB and its OB limits the performance of TEC. The successively temporal error concealment (STEC) algorithm is proposed to alleviate this error. The STEC procedure consists of tier-1 and tier-2. The tier-1 divides a corrupted macroblock into four corrupted 8 × 8 blocks and generates a recovering order for them. The corrupted 8 × 8 block with the first place of recovering order is recovered in tier-1, and remaining 8 × 8 CBs are recovered in tier-2 along the recovering order. In tier-2, the error-adaptive block matching principle (EA-BMP) is proposed for the RB as the search pattern to recover remaining corrupted 8 × 8 blocks. The proposed STEC outperforms sophisticated TEC algorithms on average PSNR by 0.3 dB on the packet error rate of 20% at least.
Ultra-wide-band 3D microwave imaging scanner for the detection of concealed weapons
NASA Astrophysics Data System (ADS)
Rezgui, Nacer-Ddine; Andrews, David A.; Bowring, Nicholas J.
2015-10-01
The threat of concealed weapons, explosives and contraband in footwear, bags and suitcases has led to the development of new devices, which can be deployed for security screening. To address known deficiencies of metal detectors and x-rays, an UWB 3D microwave imaging scanning apparatus using FMCW stepped frequency working in the K and Q bands and with a planar scanning geometry based on an x y stage, has been developed to screen suspicious luggage and footwear. To obtain microwave images of the concealed weapons, the targets are placed above the platform and the single transceiver horn antenna attached to the x y stage is moved mechanically to perform a raster scan to create a 2D synthetic aperture array. The S11 reflection signal of the transmitted sweep frequency from the target is acquired by a VNA in synchronism with each position step. To enhance and filter from clutter and noise the raw data and to obtain the 2D and 3D microwave images of the concealed weapons or explosives, data processing techniques are applied to the acquired signals. These techniques include background subtraction, Inverse Fast Fourier Transform (IFFT), thresholding, filtering by gating and windowing and deconvolving with the transfer function of the system using a reference target. To focus the 3D reconstructed microwave image of the target in range and across the x y aperture without using focusing elements, 3D Synthetic Aperture Radar (SAR) techniques are applied to the post-processed data. The K and Q bands, between 15 to 40 GHz, show good transmission through clothing and dielectric materials found in luggage and footwear. A description of the system, algorithms and some results with replica guns and a comparison of microwave images obtained by IFFT, 2D and 3D SAR techniques are presented.
Common IED exploitation target set ontology
NASA Astrophysics Data System (ADS)
Russomanno, David J.; Qualls, Joseph; Wowczuk, Zenovy; Franken, Paul; Robinson, William
2010-04-01
The Common IED Exploitation Target Set (CIEDETS) ontology provides a comprehensive semantic data model for capturing knowledge about sensors, platforms, missions, environments, and other aspects of systems under test. The ontology also includes representative IEDs; modeled as explosives, camouflage, concealment objects, and other background objects, which comprise an overall threat scene. The ontology is represented using the Web Ontology Language and the SPARQL Protocol and RDF Query Language, which ensures portability of the acquired knowledge base across applications. The resulting knowledge base is a component of the CIEDETS application, which is intended to support the end user sensor test and evaluation community. CIEDETS associates a system under test to a subset of cataloged threats based on the probability that the system will detect the threat. The associations between systems under test, threats, and the detection probabilities are established based on a hybrid reasoning strategy, which applies a combination of heuristics and simplified modeling techniques. Besides supporting the CIEDETS application, which is focused on efficient and consistent system testing, the ontology can be leveraged in a myriad of other applications, including serving as a knowledge source for mission planning tools.
Noise analysis for near field 3-D FM-CW radar imaging systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sheen, David M.
2015-06-19
Near field radar imaging systems are used for several applications including concealed weapon detection in airports and other high-security venues. Despite the near-field operation, phase noise and thermal noise can limit the performance in several ways including reduction in system sensitivity and reduction of image dynamic range. In this paper, the effects of thermal noise, phase noise, and processing gain are analyzed in the context of a near field 3-D FM-CW imaging radar as might be used for concealed weapon detection. In addition to traditional frequency domain analysis, a time-domain simulation is employed to graphically demonstrate the effect of thesemore » noise sources on a fast-chirping FM-CW system.« less
Concealment tactics among HIV-positive nurses in Uganda.
Kyakuwa, Margaret; Hardon, Anita
2012-01-01
This paper is based on two-and-a-half years of ethnographic fieldwork in two rural Ugandan health centres during a period of ART scale-up. Around one-third of the nurses in these two sites were themselves HIV-positive but most concealed their status. We describe how a group of HIV-positive nurses set up a secret circle to talk about their predicament as HIV-positive healthcare professionals and how they developed innovative care technologies to overcome the skin rashes caused by ART that threatened to give them away. Together with patients and a traditional healer, the nurses resisted hegemonic biomedical norms denouncing herbal medicines and then devised and advocated for a herbal skin cream treatment to be included in the ART programme.
Non-invasive detection of cocaine dissolved in beverages using displaced Raman spectroscopy.
Eliasson, C; Macleod, N A; Matousek, P
2008-01-21
We demonstrate the potential of Raman spectroscopy to detect cocaine concealed inside transparent glass bottles containing alcoholic beverages. A clear Raman signature of cocaine with good signal-to-noise was obtained from a approximately 300 g solution of adulterated cocaine (purity 75%) in a 0.7 L authentic brown bottle of rum with 1 s acquisition time. The detection limit was estimated to be of the order of 9 g of pure cocaine per 0.7 L (approximately 0.04 moles L(-1)) with 1 s acquisition time. The technique holds great promise for the fast, non-invasive, detection of concealed illicit compounds inside beverages using portable Raman instruments, thus permitting drug trafficking to be combated more effectively.
Courtesy stigma: A concealed consternation among caregivers of people affected by leprosy.
Dako-Gyeke, Mavis
2018-01-01
This study explored experiences of courtesy stigma among caregivers of people affected by leprosy. Using a qualitative research approach, twenty participants were purposively selected and in-depth interviews conducted. The interviews were audio-recorded, transcribed, and analyzed to identify emerging themes that addressed objectives of the study. The findings indicated that caregivers of people affected by leprosy experienced courtesy stigma. Evidence showed that fear of contagion underpinned caregivers' experiences, especially in employment and romantic relationships. In addition, participants adopted different strategies (disregarding, concealment, education, faith-based trust) to handle courtesy stigma. The findings demonstrate that psychosocial support and financial assistance to caregivers are necessary considerations for attainment of effective care for people affected by leprosy. Copyright © 2017 Elsevier Ltd. All rights reserved.
Induction detection of concealed bulk banknotes
NASA Astrophysics Data System (ADS)
Fuller, Christopher; Chen, Antao
2011-10-01
Bulk cash smuggling is a serious issue that has grown in volume in recent years. By building on the magnetic characteristics of paper currency, induction sensing is found to be capable of quickly detecting large masses of banknotes. The results show that this method is effective in detecting bulk cash through concealing materials such as plastics, cardboards, fabrics and aluminum foil. The significant difference in the observed phase between the received signals caused by conducting materials and ferrite compounds, found in banknotes, provides a good indication that this process can overcome the interference by metal objects in a real sensing application. This identification strategy has the potential to not only detect the presence of banknotes, but also the number, while still eliminating false positives caused by metal objects.
NASA Astrophysics Data System (ADS)
Dufaux, Frederic
2011-06-01
The issue of privacy in video surveillance has drawn a lot of interest lately. However, thorough performance analysis and validation is still lacking, especially regarding the fulfillment of privacy-related requirements. In this paper, we first review recent Privacy Enabling Technologies (PET). Next, we discuss pertinent evaluation criteria for effective privacy protection. We then put forward a framework to assess the capacity of PET solutions to hide distinguishing facial information and to conceal identity. We conduct comprehensive and rigorous experiments to evaluate the performance of face recognition algorithms applied to images altered by PET. Results show the ineffectiveness of naïve PET such as pixelization and blur. Conversely, they demonstrate the effectiveness of more sophisticated scrambling techniques to foil face recognition.
Brody, Howard; Leonard, Sarah E.; Nie, Jing-Bao; Weindling, Paul
2015-01-01
In 1945-46, representatives of the United States government made similar discoveries in both Germany and Japan, unearthing evidence of unethical experiments on human beings that could be viewed as war crimes. The outcomes in the two defeated nations, however, were strikingly different. In Germany, the U.S., influenced by the Canadian physician John Thompson, played a key role in bringing Nazi physicians to trial and publicizing their misdeeds. In Japan, the U.S. played an equally key role in concealing information about the biological warfare experiments and securing immunity from prosecution for the perpetrators. The greater force of appeals to national security and wartime exigency help to explain these different outcomes. PMID:24534743
Rockwell, Barnaby W.; Knepper, Daniel H.; Horton, John D.
2015-01-01
The image products derived from Landsat TM and ASTER data enable the delineation of mineral groups across wide areas based on color response. Guides are provided that allow users to interpret these colors as to mineral group occurrence over lithologic units and known deposits. This information can be extrapolated to other geologically permissive tracts for various deposit types in the search for similar mineralogic responses that may be indicative of concealed deposits.
Measurement errors in voice-key naming latency for Hiragana.
Yamada, Jun; Tamaoka, Katsuo
2003-12-01
This study makes explicit the limitations and possibilities of voice-key naming latency research on single hiragana symbols (a Japanese syllabic script) by examining three sets of voice-key naming data against Sakuma, Fushimi, and Tatsumi's 1997 speech-analyzer voice-waveform data. Analysis showed that voice-key measurement errors can be substantial in standard procedures as they may conceal the true effects of significant variables involved in hiragana-naming behavior. While one can avoid voice-key measurement errors to some extent by applying Sakuma, et al.'s deltas and by excluding initial phonemes which induce measurement errors, such errors may be ignored when test items are words and other higher-level linguistic materials.
Kawai, Nobuyuki; He, Hongshen
2016-01-01
Humans and non-human primates are extremely sensitive to snakes as exemplified by their ability to detect pictures of snakes more quickly than those of other animals. These findings are consistent with the Snake Detection Theory, which hypothesizes that as predators, snakes were a major source of evolutionary selection that favored expansion of the visual system of primates for rapid snake detection. Many snakes use camouflage to conceal themselves from both prey and their own predators, making it very challenging to detect them. If snakes have acted as a selective pressure on primate visual systems, they should be more easily detected than other animals under difficult visual conditions. Here we tested whether humans discerned images of snakes more accurately than those of non-threatening animals (e.g., birds, cats, or fish) under conditions of less perceptual information by presenting a series of degraded images with the Random Image Structure Evolution technique (interpolation of random noise). We find that participants recognize mosaic images of snakes, which were regarded as functionally equivalent to camouflage, more accurately than those of other animals under dissolved conditions. The present study supports the Snake Detection Theory by showing that humans have a visual system that accurately recognizes snakes under less discernible visual conditions.
Jansari, Ashok; Miller, Scott; Pearce, Laura; Cobb, Stephanie; Sagiv, Noam; Williams, Adrian L.; Tree, Jeremy J.; Hanley, J. Richard
2015-01-01
We report the case of an individual with acquired prosopagnosia who experiences extreme difficulties in recognizing familiar faces in everyday life despite excellent object recognition skills. Formal testing indicates that he is also severely impaired at remembering pre-experimentally unfamiliar faces and that he takes an extremely long time to identify famous faces and to match unfamiliar faces. Nevertheless, he performs as accurately and quickly as controls at identifying inverted familiar and unfamiliar faces and can recognize famous faces from their external features. He also performs as accurately as controls at recognizing famous faces when fracturing conceals the configural information in the face. He shows evidence of impaired global processing but normal local processing of Navon figures. This case appears to reflect the clearest example yet of an acquired prosopagnosic patient whose familiar face recognition deficit is caused by a severe configural processing deficit in the absence of any problems in featural processing. These preserved featural skills together with apparently intact visual imagery for faces allow him to identify a surprisingly large number of famous faces when unlimited time is available. The theoretical implications of this pattern of performance for understanding the nature of acquired prosopagnosia are discussed. PMID:26236212
Hydrologic control of carbon cycling and aged carbon discharge in the Congo River basin
NASA Astrophysics Data System (ADS)
Schefuß, Enno; Eglinton, Timothy I.; Spencer-Jones, Charlotte L.; Rullkötter, Jürgen; de Pol-Holz, Ricardo; Talbot, Helen M.; Grootes, Pieter M.; Schneider, Ralph R.
2016-09-01
The age of organic material discharged by rivers provides information about its sources and carbon cycling processes within watersheds. Although elevated ages in fluvially transported organic matter are usually explained by erosion of soils and sedimentary deposits, it is commonly assumed that mainly young organic material is discharged from flat tropical watersheds due to their extensive plant cover and rapid carbon turnover. Here we present compound-specific radiocarbon data of terrigenous organic fractions from a sedimentary archive offshore the Congo River, in conjunction with molecular markers for methane-producing land cover reflecting wetland extent. We find that the Congo River has been discharging aged organic matter for several thousand years, with apparently increasing ages from the mid- to the Late Holocene. This suggests that aged organic matter in modern samples is concealed by radiocarbon from atmospheric nuclear weapons testing. By comparison to indicators for past rainfall changes we detect a systematic control of organic matter sequestration and release by continental hydrology, mediating temporary carbon storage in wetlands. As aridification also leads to exposure and rapid remineralization of large amounts of previously stored labile organic matter, we infer that this process may cause a profound direct climate feedback that is at present underestimated in carbon cycle assessments.
He, Hongshen
2016-01-01
Humans and non-human primates are extremely sensitive to snakes as exemplified by their ability to detect pictures of snakes more quickly than those of other animals. These findings are consistent with the Snake Detection Theory, which hypothesizes that as predators, snakes were a major source of evolutionary selection that favored expansion of the visual system of primates for rapid snake detection. Many snakes use camouflage to conceal themselves from both prey and their own predators, making it very challenging to detect them. If snakes have acted as a selective pressure on primate visual systems, they should be more easily detected than other animals under difficult visual conditions. Here we tested whether humans discerned images of snakes more accurately than those of non-threatening animals (e.g., birds, cats, or fish) under conditions of less perceptual information by presenting a series of degraded images with the Random Image Structure Evolution technique (interpolation of random noise). We find that participants recognize mosaic images of snakes, which were regarded as functionally equivalent to camouflage, more accurately than those of other animals under dissolved conditions. The present study supports the Snake Detection Theory by showing that humans have a visual system that accurately recognizes snakes under less discernible visual conditions. PMID:27783686
Exploring the disclosure decisions made by physiotherapists with a specific learning difficulty.
Yeowell, G; Rooney, J; Goodwin, P C
2018-06-01
To explore the disclosure decisions made in the workplace by physiotherapy staff with a specific learning difficulty (SpLD). An exploratory qualitative design was used, which was informed by the social model of disability. The research was undertaken in North West England. It is presented according to the Consolidated Criteria for Reporting Qualitative Research. A purposive sample of eight physiotherapists recognised as having a SpLD were recruited. All participants had studied on one of two programmes at a university in England between 2004-2012. Their NHS workplace experience was from across the UK. In-depth, semi-structured interviews were undertaken within the university setting or via telephone. Interviews lasted 40 to 70minutes and were digitally recorded. An interview guide was used to direct the interview. Interview data were transcribed verbatim and analysed using thematic analysis. Four participants were female. The mean number of years qualified as a physiotherapist was 4.5years (SD=2.27). Three themes were identified: 'Disclosing during the workplace application'; 'Positive about disabled people scheme'; 'Disclosing in the workplace'. Disclosure of dyslexia is a selective process and is a central dilemma in the lives of individuals who have a concealable stigmatised identity. As a consequence, physiotherapy staff with dyslexia may choose to conceal their disability and not disclose to their employer. In order for staff with dyslexia to get the support they need in the workplace, disclosure is recommended. A number of recommendations have been made to facilitate the disclosure process. Copyright © 2017 Chartered Society of Physiotherapy. Published by Elsevier Ltd. All rights reserved.
NASA Astrophysics Data System (ADS)
Zamani, K.; Bombardelli, F. A.
2014-12-01
Verification of geophysics codes is imperative to avoid serious academic as well as practical consequences. In case that access to any given source code is not possible, the Method of Manufactured Solution (MMS) cannot be employed in code verification. In contrast, employing the Method of Exact Solution (MES) has several practical advantages. In this research, we first provide four new one-dimensional analytical solutions designed for code verification; these solutions are able to uncover the particular imperfections of the Advection-diffusion-reaction equation, such as nonlinear advection, diffusion or source terms, as well as non-constant coefficient equations. After that, we provide a solution of Burgers' equation in a novel setup. Proposed solutions satisfy the continuity of mass for the ambient flow, which is a crucial factor for coupled hydrodynamics-transport solvers. Then, we use the derived analytical solutions for code verification. To clarify gray-literature issues in the verification of transport codes, we designed a comprehensive test suite to uncover any imperfection in transport solvers via a hierarchical increase in the level of tests' complexity. The test suite includes hundreds of unit tests and system tests to check vis-a-vis the portions of the code. Examples for checking the suite start by testing a simple case of unidirectional advection; then, bidirectional advection and tidal flow and build up to nonlinear cases. We design tests to check nonlinearity in velocity, dispersivity and reactions. The concealing effect of scales (Peclet and Damkohler numbers) on the mesh-convergence study and appropriate remedies are also discussed. For the cases in which the appropriate benchmarks for mesh convergence study are not available, we utilize symmetry. Auxiliary subroutines for automation of the test suite and report generation are designed. All in all, the test package is not only a robust tool for code verification but it also provides comprehensive insight on the ADR solvers capabilities. Such information is essential for any rigorous computational modeling of ADR equation for surface/subsurface pollution transport. We also convey our experiences in finding several errors which were not detectable with routine verification techniques.
Benson, Ailbhe; O'Toole, Stephanie; Lambert, Veronica; Gallagher, Pamela; Shahwan, Amre; Austin, Joan K
2016-09-01
This paper presents the stigma experiences of children with epilepsy (CWE) and their parents and outlines the relationship between CWE's and parents' stigma perceptions, demographic and seizure variables, and epilepsy-related communication within and external to the family. A mixed-method design was employed. In phase one, 33 CWE and 40 parents participated in qualitative interviews. In phase two, 47 CWE and 72 parents completed a cross-sectional survey. CWE and their parents experience felt and enacted stigma via social exclusion, activity restriction, teasing/bullying, internalised negative feelings to epilepsy, concealment of epilepsy and parental stigma-coaching. Higher CWE and parent stigma perceptions were significantly correlated with greater epilepsy concealment from others outside the family and greater negative affect around epilepsy-related communication within the home. As CWE and their parents grapple with epilepsy-related stigma they may inadvertently contribute to the silence encircling epilepsy through diagnosis concealment, stigma-coaching and/or by engaging in limited family dialogue about epilepsy. Healthcare professionals need to be cognisant of broaching the sensitive topic of epilepsy-related stigma during their engagements with families living with epilepsy. Assisting families to appropriately engage in dialogue surrounding epilepsy is likely to improve the psychosocial wellbeing of CWE and their parents. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Concealing of facial expressions by a wild Barbary macaque (Macaca sylvanus).
Thunström, Maria; Kuchenbuch, Paul; Young, Christopher
2014-07-01
Behavioural research on non-vocal communication among non-human primates and its possible links to the origin of human language is a long-standing research topic. Because human language is under voluntary control, it is of interest whether this is also true for any communicative signals of other species. It has been argued that the behaviour of hiding a facial expression with one's hand supports the idea that gestures might be under more voluntary control than facial expressions among non-human primates, and it has also been interpreted as a sign of intentionality. So far, the behaviour has only been reported twice, for single gorilla and chimpanzee individuals, both in captivity. Here, we report the first observation of concealing of facial expressions by a monkey, a Barbary macaque (Macaca sylvanus), living in the wild. On eight separate occasions between 2009 and 2011 an adult male was filmed concealing two different facial expressions associated with play and aggression ("play face" and "scream face"), 22 times in total. The videos were analysed in detail, including gaze direction, hand usage, duration, and individuals present. This male was the only individual in his group to manifest this behaviour, which always occurred in the presence of a dominant male. Several possible interpretations of the function of the behaviour are discussed. The observations in this study indicate that the gestural communication and cognitive abilities of monkeys warrant more research attention.
Menstrual symptoms: the importance of social factors in women's experiences
O'Flynn, Norma
2006-01-01
Background Menstrual disorders are a common presentation in primary care. Heavy menstrual bleeding is the most common concern, and is often treated by medical and surgical means despite lack of pathology. Aim To explore women's experiences of menstrual disorders. Design of study Two qualitative studies using semi-structured interviews. Setting Inner-city London. Method An initial study recruited women with heavy menstrual bleeding via their GPs. A follow-up study recruited women with a variety of menstrual problems via general practice and the community. Interviews were taped and transcribed then analysed using the constant comparative method. Results Management of menstruation was a prominent theme in interviews. Women acted to comply with a strong social message that menstruation should be concealed, although this behaviour was often ‘taken for granted.’ The need to conceal evidence or reminders of menstrual bleeding was particularly important. Onset of menstrual symptoms often challenged established strategies for menstrual management. Menstrual management then became a conscious problem and a source of continuing stress. The breakdown of management strategies, by real or threatened episodes of leaking or staining, influenced consultation behaviour and decisions about treatment. Conclusion The social pressure to maintain concealment of menstruation is a strong influence on women's health-related behaviour in response to menstrual concerns. Women's choices may be better understood if attention is paid to the social context in which they live. PMID:17132384
Brož, Jan; Brabec, Marek; Janíčková Žďárská, Denisa; Fedáková, Zuzana; Hoskovcová, Lucie; You, Jee Young; Doničová, Viera; Hlaďo, Petr; Rahelić, Dario; Kvapil, Milan; Polák, Jan
2015-01-01
Under current European Union legislation, two severe hypoglycemic events within 12 months is grounds for driving license withdrawal. The aim of the study reported here was to determine whether fear of such a withdrawal could lead to patients concealing severe hypoglycemia from physicians, which could negatively impact further treatment decisions. A total of 663 patients with insulin-treated diabetes were anonymously surveyed about whether they would conceal severe hypoglycemic events from their physicians, if revealing them could result in driving license withdrawal. This investigation utilized an adapted and expanded questionnaire by Graveling et al. Of all diabetic patients surveyed, 26.17% would most likely not report hypoglycemia, and 25.86% were undecided. In a group of patients with type 1 diabetes, 31.83% would likely not report hypoglycemic events, and 25.06% were undecided. The patients least likely to report severe hypoglycemic events were those who indicated that vehicles were partly essential for work, and who also had more than two hypoglycemic events monthly. A considerable percentage of diabetic patients would likely conceal severe hypoglycemic events from their physicians due to fear of driving license withdrawal. Patient failure to report severe hypoglycemic events can potentially lead to physicians being misinformed regarding the patient's condition, which could lead to inadequate monitoring and treatment.
Multiplexed Sequence Encoding: A Framework for DNA Communication.
Zakeri, Bijan; Carr, Peter A; Lu, Timothy K
2016-01-01
Synthetic DNA has great propensity for efficiently and stably storing non-biological information. With DNA writing and reading technologies rapidly advancing, new applications for synthetic DNA are emerging in data storage and communication. Traditionally, DNA communication has focused on the encoding and transfer of complete sets of information. Here, we explore the use of DNA for the communication of short messages that are fragmented across multiple distinct DNA molecules. We identified three pivotal points in a communication-data encoding, data transfer & data extraction-and developed novel tools to enable communication via molecules of DNA. To address data encoding, we designed DNA-based individualized keyboards (iKeys) to convert plaintext into DNA, while reducing the occurrence of DNA homopolymers to improve synthesis and sequencing processes. To address data transfer, we implemented a secret-sharing system-Multiplexed Sequence Encoding (MuSE)-that conceals messages between multiple distinct DNA molecules, requiring a combination key to reveal messages. To address data extraction, we achieved the first instance of chromatogram patterning through multiplexed sequencing, thereby enabling a new method for data extraction. We envision these approaches will enable more widespread communication of information via DNA.
... can conceal sharp objects underwater. People living with diabetes should never go barefoot, even indoors, because their nervous system may not ... Use your current position? {{ps.position.alert.message}} Getting your location, one ...
Gådin, Katja Gillander
2012-06-01
The aim of this study was to enhance the understanding of young girls' experiences of peer sexual harassment in elementary school and of normalizing processes of school-related sexualized violence. Six focus group interviews with girls in Grade 1 through 6 were carried out in an elementary school in the northern part of Sweden. A content analyses showed that young girls experienced verbal, nonverbal, and sexual assault behaviors at school. Sexual harassment as a concealed phenomenon and manifest within a romantic discourse were themes found in the analysis. A conclusion is that schools have to acknowledge behaviors related to sexual harassment as a potential problem even in young ages and develop methods to approach the subject also for this age group.
Maximizing the security of chaotic optical communications.
Hou, T T; Yi, L L; Yang, X L; Ke, J X; Hu, Y; Yang, Q; Zhou, P; Hu, W S
2016-10-03
The practical application of chaotic optical communications has been limited by two aspects: the difficulty in concealing the time delay - a critical security parameter in feedback chaotic systems, and the difficulty of significantly enlarging the key space without complicating the implementation. Here we propose an architecture to break the above limits. By introducing a frequency-dependent group delay module with frequency tuning resolution of 1 MHz into the chaotic feedback loop, we demonstrate excellent time delay concealment effect, and an additional huge key space of 1048 can be achieved at the same time. The effectiveness is proved by both numerical simulation and experiment. Besides, the proposed scheme is compatible with the existing commercial optical communication systems, thus pave the way for high-speed secure optical communications.
Parenting beliefs and practices of opiate-addicted parents: concealment and taboo.
Hogan, Diane M
2003-07-01
The lifestyle associated with opiate dependence, including drug taking, the buying and selling of drugs, and contact with other drug users, carries potential risks for the safety and well-being of children of drug-using parents. Based on a qualitative interview study conducted with 50 opiate-dependent parents in Dublin, Ireland, the parenting beliefs and practices in relation to children's exposure to drugs and the associated lifestyle are described. Parents saw their lifestyle as potentially risky for their children and their families. The most common strategy adopted by parents was to conceal their drug-related activities and maintain a strict family taboo about these activities. Intervention programmes should be offered to support effective family communication about parental drug dependence. Copyright 2003 S. Karger AG, Basel
Zeichner, A
2001-11-01
Experiments were carried out to assess the danger of concealing GSR particles by skin debris using the tape-lift method for sampling GSR from hands. Thirty discrete spherical particles (from GSR and from the debris of oxygen cutting of steel) sized from 8 to 30 microns were mounted on a double-side adhesive coated stubs in known locations using a stereomicroscope. These stubs were then used for dabbing hands 50 times. Some of the particles or parts thereof were covered by skin flakes, however, all particles could be detected using the backscattered electron image (BEI) in the scanning electron microscope (SEM). Also, all could be identified by the energy dispersive X-ray spectroscopy (EDX).
McCrorie, Alan David; Chen, Jingwen Jessica; Weller, Ross; McGlade, Kieran John; Donnelly, Conan
2018-06-01
Infographics represent a potential means of improving public knowledge about cancer. However, there is little experimental evidence of their efficacy. This preliminary study investigates whether infographics are superior to text for the communication of information about cancer risk in old age via a three armed randomized controlled trial. Trial involved allocation concealment and block randomization of 30 male participants aged over 50 to receive text information (control) or one of two infographics (interventions). Participants who viewed an infographic were more likely to know the correct association between cancer risk and old age compared with those viewing text information (risk ratio = 3.0, 95% confidence interval 0.82-10.90). Participants had limited understanding of the phrases "cancer incidence" and "cancer prevalence" but good understanding of the phrases "cancer risk factor" and "cancer stage." Possession of good numerical skills appears to be a key determinant of ability to extract meaning from statistical information provided; regardless of format. Initial results suggest icon array infographics may be more effective communication mediums than text but further study with more participants and an updated infographic is necessary to confirm this finding. ISRCTN33951209.
Mothers who kill their offspring: testing evolutionary hypothesis in a 110-case Italian sample.
Camperio Ciani, Andrea S; Fontanesi, Lilybeth
2012-06-01
This research aimed to identify incidents of mothers in Italy killing their own children and to test an adaptive evolutionary hypothesis to explain their occurrence. 110 cases of mothers killing 123 of their own offspring from 1976 to 2010 were analyzed. Each case was classified using 13 dichotomic variables. Descriptive statistics and hierarchical cluster analysis were performed both for cases and variables, and significant differences between clusters were analyzed. The Italian sample of neonaticides (killings of children within the first day of life) was found to satisfy all evolutionary predictions for an evolved behavioral, emotional and motivational pattern to increase fitness, showing a consistent profile for offending mothers. Relatively young, poor women with no partner kill their offspring non-violently, either directly or through abandonment, and they attempt to conceal the body. These women have no psychopathologies and never attempt suicide after killing their children. All neonaticide cases fall in a single cluster that is distinct from all other offspring killings by mothers. Infanticide (killing of children within the first year of life) and filicide (killing of children after the first year of life) do not significantly differ according to any of the variables measured. The common profile of mothers who have committed infanticide or filicide includes psychopathology, suicide or attempted suicide after killing their children, violent killing of their victims, and no attempt to conceal the victims' bodies. These results suggest that maternal infanticide and filicide represent an improper functioning of adaptation, and their profile are much more variable than those of neonaticide offenders. Our study confirms that only neonaticide is an adaptive reproductive disinvestment, possibly evolved in the remote past, to increase the biological fitness of the mother by eliminating an unwanted newborn and saving resources for future offspring born in better conditions. Neonaticide is shown to be clearly distinct from infanticide and filicide and therefore should be approached, prevented, and judged differently. Copyright © 2012 Elsevier Ltd. All rights reserved.
Morris, H.T.; Lovering, Thomas Seward; Mogensen, A.P.; Shepard, W.M.; Perry, L.I.; Smith, S.M.
1979-01-01
This report is a study of the rocks, geologic structures, and mines of a highly productive silver, gold, and base-metal mining district in the east-central Great Basin. The East Tintic mining district is in the east-central part of the East Tintic Mountains, near the east margin of the Basin and Range province in Utah and Juab Counties, Utah. The district occupies the northeastern part of the Eureka quadrangle and is about 5 mi (8 km) wide and 6 mi (9.7 km) long. Officially it is within the designated boundaries of the Tintic mining district, but it generally though erroneously has been regarded as a separate district since the late 1800's.Prospecting was first undertaken in East Tintic in 1870; although small quantities of ore were produced in 1899 and from 1909 to 1913, the district first achieved prominence in 1916 with the discovery of the totally concealed Central ore body of the Tintic Standard mine. Within a few years of this discovery, the Tintic Standard became one of the most productive silver mines in the world. Additional discoveries of important concealed ore deposits have continued to be made in the district, including the North Lily mine in 1927, the Eureka Lilly and Eureka Standard mines in 1928, the Burgin mine in 1958, and the Trixie mine in 1969.To December 31, 1975, the East Tintic mining district has yielded approximately 4.83 million short tons (4.38 million tonnes) of silver, gold, and base-metal ores, largely from concealed deposits overlain by many hundreds of feet of barren rocks. These ores have a gross valuation of approximately $231 million. The district first achieved prominence in 1916 with the discovery of the ore bodies of the Tintic Standard mine, which for a time was the world's richest silver producer (Lindgren, 1933, p. 588). By 1946 this deposit and a number of other deposits discovered and developed nearby had been exhausted, and the district became dormant. A dramatic revival of, mining activities in the East Tintic district began in 1956 after the discovery and subsequent development of the concealed Burgin ore bodies in an area 1 mile (1.6 km) southeast of the Tintic Standard that previously had been only superficially prospected. As in the earlier history of the district, the Burgin development has led to the discovery of other concealed deposits, focusing international attention on the revitalization of a nearly abandoned mining district by the application of geologic and geochemical techniques.
Gulson, B.L.; Church, S.E.; Mizon, K.J.; Meier, A.L.
1992-01-01
Lead isotopes from Fe and Mn oxides that coat stream pebbles from around the Mount Emmons porphyry molybdenum deposit in Colorado were studied to assess the feasibility of using Pb isotopes to detect concealed mineral deposits. The Fe/Mn oxide coatings were analyzed to determine their elemental concentrations using ICP-AES. The Pb isotope compositions of solutions from a selected suite of samples were measured, using both thermal ionization and ICP mass spectrometry, to compare results determined by the two analytical methods. Heavy mineral concentrates from the same sites were also analyzed to compare the Pb isotope compositions of the Fe/Mn coatings with those found in panned concentrates. The Fe/Mn and 206Pb/204Pb ratios of the oxide coatings are related to the lithology of the host rocks; Fe/Mn oxide coatings on pebbles of black shale have higher Fe/Mn values than do the coatings on either sandstone or igneous rocks. The shale host rocks have a more radiogenic signature (e.g. higher 206Pb/ 204Pb) than the sandstone or igneous host rocks. The Pb isotope data from sandstone and igneous hosts can detect concealed mineralized rock on both a regional and local scale, even though there are contributions from: (1) metals from the main-stage molybdenite ore deposit; (2) metals from the phyllic alteration zone which has a more radiogenic Pb isotope signature reflecting hydrothermal leaching of Pb from the Mancos Shale; (3) Pb-rich base metal veins with a highly variable Pb isotope signature; and (4) sedimentary country rocks which have a more radiogenic Pb isotope signature. An investigation of within-stream variation shows that the Pb isotope signature of the molybdenite ore zone is retained in the Fe/Mn oxide coatings and is not camouflaged by contributions from Pb-rich base-metal veins that crop out upstream. In another traverse, the Pb isotope data from Fe/Mn oxide coatings reflect a complex mixing of Pb from the molybdenite ore zone and its hornfels margin, Pb-rich base-metal veins, and sedimentary country rocks. Stream-sediment anomalies detected using oxalic acid leaches can be evaluated using Pb isotope analysesof selected geochemical anomalies. Such an evaluation procedure, given regional target Pb isotope signatures for concealed mineralization, can greatly reduce the cost of exploration for undiscovered ore deposits concealed beneath barren overburden. Lead isotope measurements on aliquots of the same solutions showed that ICP-MS determinations are of low precision and vary non-systematically when compared with the Pb isotope values of the higher precision thermal ionization method. These variations and lower precision of the ICP-MS measurements are attributed to matrix effects. ?? 1992.
Abdulhameed, Hunida E; Hammami, Muhammad M; Mohamed, Elbushra A Hameed
2011-08-01
The consistency of codes governing disclosure of terminal illness to patients and families in Islamic countries has not been studied until now. To review available codes on disclosure of terminal illness in Islamic countries. DATA SOURCE AND EXTRACTION: Data were extracted through searches on Google and PubMed. Codes related to disclosure of terminal illness to patients or families were abstracted, and then classified independently by the three authors. Codes for 14 Islamic countries were located. Five codes were silent regarding informing the patient, seven allowed concealment, one mandated disclosure and one prohibited disclosure. Five codes were silent regarding informing the family, four allowed disclosure and five mandated/recommended disclosure. The Islamic Organization for Medical Sciences code was silent on both issues. Codes regarding disclosure of terminal illness to patients and families differed markedly among Islamic countries. They were silent in one-third of the codes, and tended to favour a paternalistic/utilitarian, family-centred approach over an autonomous, patient-centred approach.
A covert authentication and security solution for GMOs.
Mueller, Siguna; Jafari, Farhad; Roth, Don
2016-09-21
Proliferation and expansion of security risks necessitates new measures to ensure authenticity and validation of GMOs. Watermarking and other cryptographic methods are available which conceal and recover the original signature, but in the process reveal the authentication information. In many scenarios watermarking and standard cryptographic methods are necessary but not sufficient and new, more advanced, cryptographic protocols are necessary. Herein, we present a new crypto protocol, that is applicable in broader settings, and embeds the authentication string indistinguishably from a random element in the signature space and the string is verified or denied without disclosing the actual signature. Results show that in a nucleotide string of 1000, the algorithm gives a correlation of 0.98 or higher between the distribution of the codon and that of E. coli, making the signature virtually invisible. This algorithm may be used to securely authenticate and validate GMOs without disclosing the actual signature. While this protocol uses watermarking, its novelty is in use of more complex cryptographic techniques based on zero knowledge proofs to encode information.
Concealed d -wave pairs in the s ± condensate of iron-based superconductors
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ong, Tzen; Coleman, Piers; Schmalian, Jörg
A central question in iron-based superconductivity is the mechanism by which the paired electrons minimize their strong mutual Coulomb repulsion. In most unconventional superconductors, Coulomb repulsion is minimized through the formation of higher angular momentum Cooper pairs, with Fermi surface nodes in the pair wavefunction. The apparent absence of such nodes in the iron-based superconductors has led to a belief they form an s-wave (s ±) singlet state, which changes sign between the electron and hole pockets. However, the multiorbital nature of these systems opens an alternative possibility. In this paper, we propose a new class of s ± statemore » containing a condensate of d-wave Cooper pairs, concealed by their entanglement with the iron orbitals. By combining the d-wave (L=2) motion of the pairs with the internal angular momenta I =2 of the iron orbitals to make a singlet (J =L+I =0), an s ± superconductor with a nontrivial topology is formed. This scenario allows us to understand the development of octet nodes in potassium-doped Ba 1$-$xK XFe 2As 2 as a reconfiguration of the orbital and internal angular momentum into a high spin (J =L+I =4) state; the reverse transition under pressure into a fully gapped state can then be interpreted as a return to the low-spin singlet. Finally, the formation of orbitally entangled pairs is predicted to give rise to a shift in the orbital content at the Fermi surface, which can be tested via laser-based angle-resolved photoemission spectroscopy.« less
Concealed d -wave pairs in the s ± condensate of iron-based superconductors
Ong, Tzen; Coleman, Piers; Schmalian, Jörg
2016-05-02
A central question in iron-based superconductivity is the mechanism by which the paired electrons minimize their strong mutual Coulomb repulsion. In most unconventional superconductors, Coulomb repulsion is minimized through the formation of higher angular momentum Cooper pairs, with Fermi surface nodes in the pair wavefunction. The apparent absence of such nodes in the iron-based superconductors has led to a belief they form an s-wave (s ±) singlet state, which changes sign between the electron and hole pockets. However, the multiorbital nature of these systems opens an alternative possibility. In this paper, we propose a new class of s ± statemore » containing a condensate of d-wave Cooper pairs, concealed by their entanglement with the iron orbitals. By combining the d-wave (L=2) motion of the pairs with the internal angular momenta I =2 of the iron orbitals to make a singlet (J =L+I =0), an s ± superconductor with a nontrivial topology is formed. This scenario allows us to understand the development of octet nodes in potassium-doped Ba 1$-$xK XFe 2As 2 as a reconfiguration of the orbital and internal angular momentum into a high spin (J =L+I =4) state; the reverse transition under pressure into a fully gapped state can then be interpreted as a return to the low-spin singlet. Finally, the formation of orbitally entangled pairs is predicted to give rise to a shift in the orbital content at the Fermi surface, which can be tested via laser-based angle-resolved photoemission spectroscopy.« less
Concealed d-wave pairs in the s± condensate of iron-based superconductors.
Ong, Tzen; Coleman, Piers; Schmalian, Jörg
2016-05-17
A central question in iron-based superconductivity is the mechanism by which the paired electrons minimize their strong mutual Coulomb repulsion. In most unconventional superconductors, Coulomb repulsion is minimized through the formation of higher angular momentum Cooper pairs, with Fermi surface nodes in the pair wavefunction. The apparent absence of such nodes in the iron-based superconductors has led to a belief they form an s-wave ([Formula: see text]) singlet state, which changes sign between the electron and hole pockets. However, the multiorbital nature of these systems opens an alternative possibility. Here, we propose a new class of [Formula: see text] state containing a condensate of d-wave Cooper pairs, concealed by their entanglement with the iron orbitals. By combining the d-wave ([Formula: see text]) motion of the pairs with the internal angular momenta [Formula: see text] of the iron orbitals to make a singlet ([Formula: see text]), an [Formula: see text] superconductor with a nontrivial topology is formed. This scenario allows us to understand the development of octet nodes in potassium-doped Ba1-x KXFe2As2 as a reconfiguration of the orbital and internal angular momentum into a high spin ([Formula: see text]) state; the reverse transition under pressure into a fully gapped state can then be interpreted as a return to the low-spin singlet. The formation of orbitally entangled pairs is predicted to give rise to a shift in the orbital content at the Fermi surface, which can be tested via laser-based angle-resolved photoemission spectroscopy.
41 CFR 102-41.20 - What definitions apply to this part?
Code of Federal Regulations, 2010 CFR
2010-07-01
..., compounding, converting, concealing, processing, preparing, or introducing into the human body a controlled... oil, PCP, or amphetamines into the human body. Eleemosynary institution means any nonprofit health or...
41 CFR 102-41.20 - What definitions apply to this part?
Code of Federal Regulations, 2011 CFR
2011-01-01
..., compounding, converting, concealing, processing, preparing, or introducing into the human body a controlled... oil, PCP, or amphetamines into the human body. Eleemosynary institution means any nonprofit health or...
27 CFR 19.605 - Additional marks on portable containers.
Code of Federal Regulations, 2010 CFR
2010-04-01
... manufacturing bonded warehouses, transfer to foreign-trade zones or supplies for certain vessels and aircraft... plant control data. However, marks or attachments shall not conceal, obscure, interfere with or conflict...
A novel quantum LSB-based steganography method using the Gray code for colored quantum images
NASA Astrophysics Data System (ADS)
Heidari, Shahrokh; Farzadnia, Ehsan
2017-10-01
As one of the prevalent data-hiding techniques, steganography is defined as the act of concealing secret information in a cover multimedia encompassing text, image, video and audio, imperceptibly, in order to perform interaction between the sender and the receiver in which nobody except the receiver can figure out the secret data. In this approach a quantum LSB-based steganography method utilizing the Gray code for quantum RGB images is investigated. This method uses the Gray code to accommodate two secret qubits in 3 LSBs of each pixel simultaneously according to reference tables. Experimental consequences which are analyzed in MATLAB environment, exhibit that the present schema shows good performance and also it is more secure and applicable than the previous one currently found in the literature.
Mismatches in genetic markers in a large family study.
Ashton, G C
1980-01-01
The Hawaii Family Study of Cognition provided an opportunity to investigate the frequency and implications of non-agreement, or mismatches, between observed and expected genetic marker phenotypes of husbands, wives, and children. Mismatch data from 68 families in which one or both spouses were known not to be a biological parent were used to determine the rate of undeclared nonparentage in 1,748 families in which conventional relationships were claimed. Two independent approaches gave consistent estimates, suggesting that approximately 2.3% of the 2,839 tested children from these families were probably the result of infidelity, concealed adoption, or another event. About two-thirds of the mismatches detected were probably due to properties of the techniques employed. PMID:6930820
32 CFR 228.7 - Prohibition on weapons and explosives.
Code of Federal Regulations, 2012 CFR
2012-07-01
... entering or while on protected property shall carry or possess, either openly or concealed, firearms, any....) on protected property in circumstances that do not include an immediate and unlawful threat of...
32 CFR 228.7 - Prohibition on weapons and explosives.
Code of Federal Regulations, 2011 CFR
2011-07-01
... entering or while on protected property shall carry or possess, either openly or concealed, firearms, any....) on protected property in circumstances that do not include an immediate and unlawful threat of...
32 CFR 228.7 - Prohibition on weapons and explosives.
Code of Federal Regulations, 2013 CFR
2013-07-01
... entering or while on protected property shall carry or possess, either openly or concealed, firearms, any....) on protected property in circumstances that do not include an immediate and unlawful threat of...
Being seen or being watched? A psychoanalytic perspective on body dysmorphia.
Lemma, Alessandra
2009-08-01
The focus of this paper is on individuals who present as excessively preoccupied with their body, perceiving some aspect(s) to be 'ugly' such that they feel compelled to alter and/or conceal this 'ugly' body part. These difficulties are understood as symptoms of an underlying narcissistic disturbance. The author suggests that the relative pervasiveness of an identification with a 'super'-ego accounts for the degree of severity of the disturbance (increasing the compulsion to alter and/or conceal the hated body part) and that it has implications for the patient's accessibility in analytic treatment. Understanding the vicissitudes of the development of the body-self in the context of the earliest relationship with the 'object of desire' is core to helping these patients because of the quality of the identifications that ensue and that are then enacted the transference.
Flawed gun policy research could endanger public safety.
Webster, D W; Vernick, J S; Ludwig, J; Lester, K J
1997-01-01
A highly publicized recent study by Lott and Mustard concludes that laws easing restrictions on licenses for carrying concealed firearms in public substantially reduce violent crime. Several serious flaws in the study render the authors' conclusions insupportable. These flaws include misclassification of gun-carrying laws, endogeneity of predictor variables, omission of confounding variables, and failure to control for the cyclical nature of crime trends. Most of these problems should bias results toward overestimating the crime-reducing effects of laws making it easier to carry concealed firearms in public. Lott and Mustard's statistical models produce findings inconsistent with criminological theories and well-established facts about crime, and subsequent reanalysis of their data challenges their conclusions. Public health professionals should understand the methodological issues raised in this commentary, particularly when flawed research could influence the introduction of policies with potentially deleterious consequences. PMID:9224169
NASA Astrophysics Data System (ADS)
Mu, Penghua; Pan, Wei; Yan, Lianshan; Luo, Bin; Zou, Xihua
2017-04-01
In this contribution, the effects of two key internal parameters, i.e. the linewidth-enhancement factor (α) and gain nonlinearity (𝜀), on time-delay signatures (TDS) concealment of two mutually-coupled semiconductor lasers (MCSLs) are numerically investigated. In particular, the influences of α and 𝜀 on the TDS concealment are compared and discussed systematically by setting different values of frequency detuning (Δf) and injection strength (η). The results show that the TDS can be better suppressed with high α or lower 𝜀 in the MCSLs. Two sets of desired optical chaos with TDS being strongly suppressed can be generated simultaneously in a wide injection parameter plane provided that α and 𝜀 are properly chosen, indicating that optimizing TDS suppression through controlling internal parameters can be generalized to any delayed-coupled laser systems.
Development of an ultra wide band microwave radar based footwear scanning system
NASA Astrophysics Data System (ADS)
Rezgui, Nacer Ddine; Bowring, Nicholas J.; Andrews, David A.; Harmer, Stuart W.; Southgate, Matthew J.; O'Reilly, Dean
2013-10-01
At airports, security screening can cause long delays. In order to speed up screening a solution to avoid passengers removing their shoes to have them X-ray scanned is required. To detect threats or contraband items hidden within the shoe, a method of screening using frequency swept signals between 15 to 40 GHz has been developed, where the scan is carried out whilst the shoes are being worn. Most footwear is transparent to microwaves to some extent in this band. The scans, data processing and interpretation of the 2D image of the cross section of the shoe are completed in a few seconds. Using safe low power UWB radar, scattered signals from the shoe can be observed which are caused by changes in material properties such as cavities, dielectric or metal objects concealed within the shoe. By moving the transmission horn along the length of the shoe a 2D image corresponding to a cross section through the footwear is built up, which can be interpreted by the user, or automatically, to reveal the presence of concealed threat within the shoe. A prototype system with a resolution of 6 mm or less has been developed and results obtained for a wide range of commonly worn footwear, some modified by the inclusion of concealed material. Clear differences between the measured images of modified and unmodified shoes are seen. Procedures for enhancing the image through electronic image synthesis techniques and image processing methods are discussed and preliminary performance data presented.
Tectonic setting of the Wooded Island earthquake swarm, eastern Washington
Blakely, Richard J.; Sherrod, Brian L.; Weaver, Craig S.; Rohay, Alan C.; Wells, Ray E.
2012-01-01
Magnetic anomalies provide insights into the tectonic implications of a swarm of ~1500 shallow (~1 km deep) earthquakes that occurred in 2009 on the Hanford site,Washington. Epicenters were concentrated in a 2 km2 area nearWooded Island in the Columbia River. The largest earthquake (M 3.0) had first motions consistent with slip on a northwest-striking reverse fault. The swarm was accompanied by 35 mm of vertical surface deformation, seen in satellite interferometry (InSAR), interpreted to be caused by ~50 mm of slip on a northwest-striking reverse fault and associated bedding-plane fault in the underlying Columbia River Basalt Group (CRBG). A magnetic anomaly over exposed CRBG at Yakima Ridge 40 km northwest of Wooded Island extends southeastward beyond the ridge to the Columbia River, suggesting that the Yakima Ridge anticline and its associated thrust fault extend southeastward in the subsurface. In map view, the concealed anticline passes through the earthquake swarm and lies parallel to reverse faults determined from first motions and InSAR data. A forward model of the magnetic anomaly near Wooded Island is consistent with uplift of concealed CRBG, with the top surface <200 m below the surface. The earthquake swarm and the thrust and bedding-plane faults modeled from interferometry all fall within the northeastern limb of the faulted anticline. Although fluids may be responsible for triggering the Wooded Island earthquake swarm, the seismic and aseismic deformation are consistent with regional-scale tectonic compression across the concealed Yakima Ridge anticline.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Blakely, R. J.; Sherrod, B. L.; Weaver, C. S.
Magnetic anomalies provide insights into the tectonic implications of a swarm of ~1500 shallow (~1 km deep) earthquakes that occurred in 2009 on the Hanford site, Washington. Epicenters were concentrated in a 2 km 2 area near Wooded Island in the Columbia River. The largest earthquake (M 3.0) had first motions consistent with slip on a northwest-striking reverse fault. The swarm was accompanied by 35 mm of vertical surface deformation, seen in satellite interferometry (InSAR), interpreted to be caused by ~50 mm of slip on a northwest-striking reverse fault and associated bedding-plane fault in the underlying Columbia River Basalt Groupmore » (CRBG). A magnetic anomaly over exposed CRBG at Yakima Ridge 40 km northwest of Wooded Island extends southeastward beyond the ridge to the Columbia River, suggesting that the Yakima Ridge anticline and its associated thrust fault extend southeastward in the subsurface. In map view, the concealed anticline passes through the earthquake swarm and lies parallel to reverse faults determined from first motions and InSAR data. A forward model of the magnetic anomaly near Wooded Island is consistent with uplift of concealed CRBG, with the top surface <200 m below the surface. The earthquake swarm and the thrust and bedding-plane faults modeled from interferometry all fall within the northeastern limb of the faulted anticline. Finally, although fluids may be responsible for triggering the Wooded Island earthquake swarm, the seismic and aseismic deformation are consistent with regional-scale tectonic compression across the concealed Yakima Ridge anticline.« less
Walter, Garry; Soh, Nerissa Li-Wey; Norgren Jaconelli, Sanna; Lampe, Lisa; Malhi, Gin S; Hunt, Glenn
2013-06-01
To descriptively assess medical students' concerns for their mental and emotional state, perceived need to conceal mental problems, perceived level of support at university, knowledge and use of student support services, and experience of stresses of daily life. From March to September 2011, medical students at an Australian university were invited to complete an anonymous online survey. 475 responses were received. Students rated study and examinations (48.9%), financial concerns (38.1%), isolation (19.4%) and relationship concerns (19.2%) as very or extremely stressful issues. Knowledge of available support services was high, with 90.8% indicating they were aware of the university's medical centre. Treatment rates were modest (31.7%). Students' concerns about their mental state were generally low, but one in five strongly felt they needed to conceal their emotional problems. Despite widespread awareness of appropriate support services, a large proportion of students felt they needed to conceal mental and emotional problems. Overall treatment rates for students who were greatly concerned about their mental and emotional state appeared modest, and, although comparable with those of similarly aged community populations, may reflect undertreatment. It would be appropriate for universities to address stressors identified by students. Strategies for encouraging distressed students to obtain appropriate assessment and treatment should also be explored. Those students who do seek healthcare are most likely to see a primary care physician, suggesting an important screening role for these health professionals.
Grendelmeier, Alex; Arlettaz, Raphaël; Gerber, Michael; Pasinelli, Gilberto
2015-01-01
Identifying factors influencing a species' ecological niche and demography is a prerequisite for species conservation. However, our understanding of the interplay between demographic rates and biotic/abiotic factors is still poor for most species of conservation concern. We evaluated relevance of eight hypotheses relating to timing of breeding, temporal nest exposure, nest concealment, topography, tree structure, predation risk and disturbance, density dependence and weather for explaining variation in reproductive performance of the declining wood warbler Phylloscopus sibilatrix in northern Switzerland. Reproductive performance was monitored with cameras at 136 nests from 2010 to 2012 and was associated to temporal exposure, timing of breeding and concealment of nests. Daily nest survival was positively related to the number of grass and sedge tussocks, nest concealment and nest age. Clutch size and number of fledglings decreased, the later in the season a nest was initiated. Nest survival over an average nesting period of 31 days was 46.9 ± 0.07% (mean ± SE), daily nest survival rate was 0.976 ± 0.002. As for many ground-breeding birds, nest predation was the principal cause of nest failure, accounting for 79% of all nest losses. Conservation measures should aim at increasing the area of relatively homogenous forest stands featuring suitable habitats characterized by abundant and accessible grass and sedge tussocks. In managed forests, such conditions can be found in stands of middle age (i.e. pole wood) with little to no shrub layer. PMID:26172954
NASA Astrophysics Data System (ADS)
Retsky, Michael
2008-04-01
Explosively formed projectiles (EFP) are a major problem in terrorism and asymmetrical warfare. EFPs are often triggered by ordinary infrared motion detectors. A potential weak link is that such electronics are not hardened to ionizing radiation and can latch-up or enter other inoperative states after exposure to a single short event of ionizing radiation. While these can often be repaired with a power restart, they also can produce shorts and permanent damage. A problem of course is that we do not want to add radiation exposure to the long list of war related hazards. Biological systems are highly sensitive to integrated dosage but show no particular sensitivity to short pulses. There may be a way to generate short pulsed subsoil radiation to deactivate concealed electronics without introducing radiation hazards to military personnel and civilian bystanders. Electron beams of 30 MeV that can be produced by portable linear accelerators (linacs) propagate >20 m in air and 10-12 cm in soil. X-radiation is produced by bremsstrahlung and occurs subsoil beneath the point of impact and is mostly forward directed. Linacs 1.5 m long can produce 66 MWatt pulses of subsoil x-radiation 1 microsecond or less in duration. Untested as yet, such a device could be mounted on a robotic vehicle that precedes a military convoy and deactivates any concealed electronics within 10-20 meters on either side of the road.
Grendelmeier, Alex; Arlettaz, Raphaël; Gerber, Michael; Pasinelli, Gilberto
2015-01-01
Identifying factors influencing a species' ecological niche and demography is a prerequisite for species conservation. However, our understanding of the interplay between demographic rates and biotic/abiotic factors is still poor for most species of conservation concern. We evaluated relevance of eight hypotheses relating to timing of breeding, temporal nest exposure, nest concealment, topography, tree structure, predation risk and disturbance, density dependence and weather for explaining variation in reproductive performance of the declining wood warbler Phylloscopus sibilatrix in northern Switzerland. Reproductive performance was monitored with cameras at 136 nests from 2010 to 2012 and was associated to temporal exposure, timing of breeding and concealment of nests. Daily nest survival was positively related to the number of grass and sedge tussocks, nest concealment and nest age. Clutch size and number of fledglings decreased, the later in the season a nest was initiated. Nest survival over an average nesting period of 31 days was 46.9 ± 0.07% (mean ± SE), daily nest survival rate was 0.976 ± 0.002. As for many ground-breeding birds, nest predation was the principal cause of nest failure, accounting for 79% of all nest losses. Conservation measures should aim at increasing the area of relatively homogenous forest stands featuring suitable habitats characterized by abundant and accessible grass and sedge tussocks. In managed forests, such conditions can be found in stands of middle age (i.e. pole wood) with little to no shrub layer.
Jia, Pengli; Tang, Li; Yu, Jiajie; Lee, Andy H; Zhou, Xu; Kang, Deying; Luo, Yanan; Liu, Jiali; Sun, Xin
2018-03-06
To assess risk of bias and to investigate methodological issues concerning the design, conduct and analysis of randomised controlled trials (RCTs) testing acupuncture for knee osteoarthritis (KOA). PubMed, EMBASE, Cochrane Central Register of Controlled Trials and four major Chinese databases were searched for RCTs that investigated the effect of acupuncture for KOA. The Cochrane tool was used to examine the risk of bias of eligible RCTs. Their methodological details were examined using a standardised and pilot-tested questionnaire of 48 items, together with the association between four predefined factors and important methodological quality indicators. A total of 248 RCTs were eligible, of which 39 (15.7%) used computer-generated randomisation sequence. Of the 31 (12.5%) trials that stated the allocation concealment, only one used central randomisation. Twenty-five (10.1%) trials mentioned that their acupuncture procedures were standardised, but only 18 (7.3%) specified how the standardisation was achieved. The great majority of trials (n=233, 94%) stated that blinding was in place, but 204 (87.6%) did not clarify who was blinded. Only 27 (10.9%) trials specified the primary outcome, for which 7 used intention-to-treat analysis. Only 17 (6.9%) trials included details on sample size calculation; none preplanned an interim analysis and associated stopping rule. In total, 46 (18.5%) trials explicitly stated that loss to follow-up occurred, but only 6 (2.4%) provided some information to deal with the issue. No trials prespecified, conducted or reported any subgroup or adjusted analysis for the primary outcome. The overall risk of bias was high among published RCTs testing acupuncture for KOA. Methodological limitations were present in many important aspects of design, conduct and analyses. These findings inform the development of evidence-based methodological guidance for future trials assessing the effect of acupuncture for KOA. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.
Decoration Increases the Conspicuousness of Raptor Nests
Canal, David; Mulero-Pázmány, Margarita; Negro, Juan José; Sergio, Fabrizio
2016-01-01
Avian nests are frequently concealed or camouflaged, but a number of species builds noticeable nests or use conspicuous materials for nest decoration. In most cases, nest decoration has a role in mate choice or provides thermoregulatory or antiparasitic benefits. In territorial species however, decorations may serve additional or complementary functions, such as extended phenotypic signaling of nest-site occupancy and social status to potential intruders. The latter may benefit both signaler and receiver by minimizing the risk of aggressive interactions, especially in organisms with dangerous weaponry. Support for this hypothesis was recently found in a population of black kites (Milvus migrans), a territorial raptor that decorates its nest with white artificial materials. However, the crucial assumption that nest decorations increased nest-site visibility to conspecifics was not assessed, a key aspect given that black kite nests may be well concealed within the canopy. Here, we used an unmanned aircraft system to take pictures of black kite nests, with and without an experimentally placed decoration, from different altitudes and distances simulating the perspective of a flying and approaching, prospecting intruder. The pictures were shown to human volunteers through a standardized routine to determine whether detection rates varied according the nest decoration status and distance. Decorated nests consistently showed a higher detection frequency and a lower detection-latency, compared to undecorated versions of the same nests. Our results confirm that nest decoration in this species may act as a signaling medium that enhances nest visibility for aerial receivers, even at large distances. This finding complements previous work on this communication system, which showed that nest decoration was a threat informing trespassing conspecifics on the social dominance, territory quality and fighting capabilities of the signaler. PMID:27455066
Decoration Increases the Conspicuousness of Raptor Nests.
Canal, David; Mulero-Pázmány, Margarita; Negro, Juan José; Sergio, Fabrizio
2016-01-01
Avian nests are frequently concealed or camouflaged, but a number of species builds noticeable nests or use conspicuous materials for nest decoration. In most cases, nest decoration has a role in mate choice or provides thermoregulatory or antiparasitic benefits. In territorial species however, decorations may serve additional or complementary functions, such as extended phenotypic signaling of nest-site occupancy and social status to potential intruders. The latter may benefit both signaler and receiver by minimizing the risk of aggressive interactions, especially in organisms with dangerous weaponry. Support for this hypothesis was recently found in a population of black kites (Milvus migrans), a territorial raptor that decorates its nest with white artificial materials. However, the crucial assumption that nest decorations increased nest-site visibility to conspecifics was not assessed, a key aspect given that black kite nests may be well concealed within the canopy. Here, we used an unmanned aircraft system to take pictures of black kite nests, with and without an experimentally placed decoration, from different altitudes and distances simulating the perspective of a flying and approaching, prospecting intruder. The pictures were shown to human volunteers through a standardized routine to determine whether detection rates varied according the nest decoration status and distance. Decorated nests consistently showed a higher detection frequency and a lower detection-latency, compared to undecorated versions of the same nests. Our results confirm that nest decoration in this species may act as a signaling medium that enhances nest visibility for aerial receivers, even at large distances. This finding complements previous work on this communication system, which showed that nest decoration was a threat informing trespassing conspecifics on the social dominance, territory quality and fighting capabilities of the signaler.
Tobacco industry lawyers as “disease vectors”
Guardino, Sara D; Daynard, Richard A
2007-01-01
Objective Despite their obligation to do so, tobacco companies often failed to conduct product safety research or, when research was conducted, failed to disseminate the results to the medical community and to the public. The tobacco company lawyers' role in these actions was investigated with a focus on their involvement in company scientific research, claims of attorney‐client privilege and work‐product cover, document concealment, and litigation tactics. Methods Searches of previously secret internal tobacco industry documents located at Tobacco Documents Online. Additional searches included court transcripts, legal cases and articles obtained through Westlaw, PubMed, and the internet. Results Tobacco company lawyers have been involved in activities having little or nothing to do with the practice of law, including gauging and attempting to influence company scientists' beliefs, vetting in‐house scientific research, and instructing in‐house scientists not to publish potentially damaging results. Additionally, company lawyers have taken steps to manufacture attorney‐client privilege and work‐product cover to assist their clients in protecting sensitive documents from disclosure, have been involved in the concealment of such documents, and have employed litigation tactics that have largely prevented successful lawsuits against their client companies. Conclusions Tobacco related diseases have proliferated partly because of tobacco company lawyers. Their tactics have impeded the flow of information about the dangers of smoking to the public and the medical community. Additionally, their extravagantly aggressive litigation tactics have pushed many plaintiffs into dropping their cases before trial, thus reducing the opportunities for changes to be made to company policy in favour of public health. Stricter professional oversight is needed to ensure that this trend does not continue. PMID:17652236
Mah, Kenneth; Tran, Kim T; Gauthier, Lynn R; Rodin, Gary; Zimmermann, Camilla; Warr, David; Librach, S Lawrence; Moore, Malcolm; Shepherd, Frances A; Gagliese, Lucia
2018-03-01
Age differences are not evident in pain-related stoicism and cautiousness in people with cancer pain. Little is known about the factors associated with these pain-related attitudes or age-related patterns in these associations. The present cross-sectional study investigated the biopsychosocial correlates of the attitudes in younger and older patients with advanced cancer. Pain-related stoicism (fortitude, concealment, superiority) and cautiousness (self-doubt, reluctance) were assessed using the Pain Attitudes Questionnaire-Revised (PAQ-R). Participants, 155 younger (younger than 60 years old) and 114 older (60 years old or older) patients with advanced cancer completed the PAQ-R and measures of sociodemographic and medical characteristics, pain intensity, cognitive-affective pain-related responses, physical functioning, psychological distress and well-being, and psychosocial functioning. Backwards regression analyses identified correlates for each PAQ-R factor separately for younger and older patients. Activity engagement was a frequent correlate, but its relationship with concealment was the only association common to both age groups. Younger and older patients exhibited different avoidance-related constructs suggesting relational challenges in the former group (avoidant attachment) and intrapersonal fear in the latter (cognitive avoidance). Medical correlates also showed age differences: younger patients showed symptom-focused correlates, whereas older patients showed aging-related correlates. Findings support a biopsychosocial framework of cancer-pain adaptation incorporating a lifespan-developmental perspective. To our knowledge, this article is the first to identify biopsychosocial correlates of stoic and cautious attitudes toward cancer pain in younger and older patients with advanced cancer. Findings highlight possible age-related motivations for greater pain-related stoicism or cautiousness and can potentially inform interventions addressing challenges in cancer-pain adaptation in advanced cancer. Copyright © 2017 The American Pain Society. Published by Elsevier Inc. All rights reserved.
What do results from coordinate-based meta-analyses tell us?
Albajes-Eizagirre, Anton; Radua, Joaquim
2018-08-01
Coordinate-based meta-analyses (CBMA) methods, such as Activation Likelihood Estimation (ALE) and Seed-based d Mapping (SDM), have become an invaluable tool for summarizing the findings of voxel-based neuroimaging studies. However, the progressive sophistication of these methods may have concealed two particularities of their statistical tests. Common univariate voxelwise tests (such as the t/z-tests used in SPM and FSL) detect voxels that activate, or voxels that show differences between groups. Conversely, the tests conducted in CBMA test for "spatial convergence" of findings, i.e., they detect regions where studies report "more peaks than in most regions", regions that activate "more than most regions do", or regions that show "larger differences between groups than most regions do". The first particularity is that these tests rely on two spatial assumptions (voxels are independent and have the same probability to have a "false" peak), whose violation may make their results either conservative or liberal, though fortunately current versions of ALE, SDM and some other methods consider these assumptions. The second particularity is that the use of these tests involves an important paradox: the statistical power to detect a given effect is higher if there are no other effects in the brain, whereas lower in presence of multiple effects. Copyright © 2018 Elsevier Inc. All rights reserved.
75 FR 52534 - Su Van Ho: Debarment Order
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-26
... Salmonella bacteria, with verification of such exportation or destruction by FDA. Mr. Ho concealed and... with Salmonella bacteria. As a result of his conviction, on June 10, 2010, FDA sent Mr. Ho a notice by...
Respecting States' Rights and Concealed Carry Reciprocity Act of 2013
Rep. Stutzman, Marlin A. [R-IN-3
2013-02-06
House - 02/28/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, And Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
49 CFR 107.402 - Application for designation as a certification agency.
Code of Federal Regulations, 2014 CFR
2014-10-01
... representation, or the knowing and willful concealment of a material fact, may subject the applicant to... fireworks or explosives and a degree in the physical sciences or engineering from an accredited university...
36 CFR 1002.30 - Misappropriation of property and services.
Code of Federal Regulations, 2010 CFR
2010-07-01
... compensation by means of deception or a statement of past, present or future fact that is instrumental in... fraudulently obtained credit cards or paying with negotiable paper on which payment is refused. (4) Concealing...
36 CFR 2.30 - Misappropriation of property and services.
Code of Federal Regulations, 2010 CFR
2010-07-01
... property or services offered for sale or compensation by means of deception or a statement of past, present... paper on which payment is refused. (4) Concealing unpurchased merchandise on or about the person without...
PNNL Expert Doug McMakin Discusses Millimeter Wave Technology
McMakin, Doug
2018-02-13
Electrical Engineer Doug McMakin discusses Millimeter Wave Holographic technology, which uses non-harmful, ultrahigh-frequency radio waves to penetrate clothing to detect and identify concealed objects, as well as obtain accurate body measurements.
Application of data mining in science and technology management information system based on WebGIS
NASA Astrophysics Data System (ADS)
Wu, Xiaofang; Xu, Zhiyong; Bao, Shitai; Chen, Feixiang
2009-10-01
With the rapid development of science and technology and the quick increase of information, a great deal of data is accumulated in the management department of science and technology. Usually, many knowledge and rules are contained and concealed in the data. Therefore, how to excavate and use the knowledge fully is very important in the management of science and technology. It will help to examine and approve the project of science and technology more scientifically and make the achievement transformed as the realistic productive forces easier. Therefore, the data mine technology will be researched and applied to the science and technology management information system to find and excavate the knowledge in the paper. According to analyzing the disadvantages of traditional science and technology management information system, the database technology, data mining and web geographic information systems (WebGIS) technology will be introduced to develop and construct the science and technology management information system based on WebGIS. The key problems are researched in detail such as data mining and statistical analysis. What's more, the prototype system is developed and validated based on the project data of National Natural Science Foundation Committee. The spatial data mining is done from the axis of time, space and other factors. Then the variety of knowledge and rules will be excavated by using data mining technology, which helps to provide an effective support for decisionmaking.
Dolce, Maria C
2011-05-01
To describe the experiences of cancer survivors and caregivers with healthcare providers in the context of the Internet as a source of health information. Qualitative description. Online cancer communities hosted by the Association of Cancer Online Resources. Purposive sample of 488 cancer survivors, with varying cancer types and survivorship stages, and caregivers. Secondary data analysis using Krippendorff's thematic clustering technique of qualitative content analysis. Survivorship, healthcare relationships, and the Internet. Disenchantment with healthcare relationships was associated with failed expectations related to evidence-based practice, clinical expertise, informational support, and therapeutic interpersonal communication. Survivors and caregivers exercised power in healthcare relationships through collaboration, direct confrontation, becoming expert, and endorsement to influence and control care decisions. Disenchantment propelled cancer survivors and caregivers to search the Internet for health information and resources. Conversely, Internet information-seeking precipitated the experience of disenchantment. Through online health information and resources, concealed failures in healthcare relationships were revealed and cancer survivors and caregivers were empowered to influence and control care decisions. The findings highlight failures in cancer survivorship care and underscore the importance of novel interdisciplinary programs and models of care that support evidence-informed decision making, self-management, and improved quality of life. Healthcare professionals need to receive education on survivors' use of the Internet as a source of health information and its impact on healthcare relationships. Future research should include studies examining the relationship between disenchantment and survivorship outcomes.
Watterson, J.R.
1985-01-01
The presence of bacterial spores of the Bacillus cereus group in soils and stream sediments appears to be a sensitive indicator of several types of concealed mineral deposits, including vein-type gold deposits. The B. cereus assay is rapid, inexpensive, and inherently reproducible. The test, currently under investigation for its potential in mineral exploration, is recommended for use on a research basis. Among the aerobic spore-forming bacilli, only B. cereus and closely related strains produce an opaque zone in egg-yolk emulsion agar. This characteristic, also known as the Nagler of lecitho-vitellin reaction, has long been used to rapidly indentify and estimate presumptive B. cereus. The test is here adapted to permit rapid estimation of B. cereus spores in soil and stream-sediment samples. Relative standard deviation was 10.3% on counts obtained from two 40-replicate pour-plate determinations. As many as 40 samples per day can be processed. Enough procedural detail is included to permit investigation of the test in conventional geochemical laboratories using standard microbiological safety precautions. ?? 1985.
ERIC Educational Resources Information Center
Housewright, Mary Kay
1999-01-01
Discusses an art activity that has students create pictures in which they first trace a chameleon pattern and then add camouflage to conceal the chameleon. Explains that different materials and techniques are used for students in grades k-1 and 2-5. (CMK)
ERIC Educational Resources Information Center
Levinger, Esther
1989-01-01
States that the painted words in Jasper Johns' art act in two different capacities: concealed words partake in the artist's interrogation of visual perception; and visible painted words question classical representation. Argues that words are Johns' means of critiquing modernism. (RS)
Indicators: Shallow Water Habitat/In-stream Fish Habitat
Shallow water habitat, also referred to as in-stream fish habitat, refers to areas that fish and other aquatic organisms need for concealment, breeding and feeding. This includes large woody snags, boulders, rock ledges, and undercut banks.
Barry, Declan T; Mizrahi, Trina C
2005-08-01
This study examined the relationship between guarded self-disclosure, psychological distress, and willingness to use psychological services if distressed among 170 (88 male, 82 female) East Asian immigrants in the United States. Participants were administered a battery of psychometrically established measures. Participants who endorsed overall guarded self-disclosure, self-concealment (i.e., unwillingness to reveal affect to others), or conflict avoidance (i.e., maintenance of harmony via suppression of feelings) were significantly more likely to report psychological distress and were significantly less likely to report willingness to use psychological services. While conflict avoidance was a significant independent predictor of psychological distress, self-concealment was a significant independent predictor of willingness to use psychological services. These findings point to the importance of assessing multiple facets of guarded self-disclosure, which appear to be differentially associated with psychological distress and willingness to use psychological services.
LGBTQ Women, Appearance Negotiations, and Workplace Dress Codes.
Reddy-Best, Kelly L
2018-01-01
The purpose of this study was to explore LGBTQ women's experiences with unwritten or formal dress codes at work. I asked: What are LGBTQ women's experiences in the workplace with appearance management, and what are LGBTQ women's experiences navigating the written and unwritten dress codes in the workplace? To answer the research question, interviews were conducted with 24 self-identifying LGBTQ women. Six key themes emerged from the data. Themes included (1) expressed sexual identity in appearance, (2) unwritten dress codes in work environments did not always allow for expression of sexual identity in appearance, (3) motivations for pressure or desire to conceal expression of sexual identity in appearance at work, (4) negotiations of revealing or concealing sexual identity in appearance in the workplace impacted levels of comfort and confidence, (5) verbal and nonverbal negative experiences related to appearance at work, and (6) received compliments about appearance at work.
Pandis, Nikolaos; Polychronopoulou, Argy; Eliades, Theodore
2011-12-01
Randomization is a key step in reducing selection bias during the treatment allocation phase in randomized clinical trials. The process of randomization follows specific steps, which include generation of the randomization list, allocation concealment, and implementation of randomization. The phenomenon in the dental and orthodontic literature of characterizing treatment allocation as random is frequent; however, often the randomization procedures followed are not appropriate. Randomization methods assign, at random, treatment to the trial arms without foreknowledge of allocation by either the participants or the investigators thus reducing selection bias. Randomization entails generation of random allocation, allocation concealment, and the actual methodology of implementing treatment allocation randomly and unpredictably. Most popular randomization methods include some form of restricted and/or stratified randomization. This article introduces the reasons, which make randomization an integral part of solid clinical trial methodology, and presents the main randomization schemes applicable to clinical trials in orthodontics.
Deep Raman spectroscopy for the non-invasive standoff detection of concealed chemical threat agents.
Izake, Emad L; Cletus, Biju; Olds, William; Sundarajoo, Shankaran; Fredericks, Peter M; Jaatinen, Esa
2012-05-30
Deep Raman spectroscopy has been utilized for the standoff detection of concealed chemical threat agents from a distance of 15 m under real life background illumination conditions. By using combined time and space resolved measurements, various explosive precursors hidden in opaque plastic containers were identified non-invasively. Our results confirm that combined time and space resolved Raman spectroscopy leads to higher selectivity towards the sub-layer over the surface layer as well as enhanced rejection of fluorescence from the container surface when compared to standoff spatially offset Raman spectroscopy. Raman spectra that have minimal interference from the packaging material and good signal-to-noise ratio were acquired within 5 s of measurement time. A new combined time and space resolved Raman spectrometer has been designed with nanosecond laser excitation and gated detection, making it of lower cost and complexity than picosecond-based laboratory systems. Copyright © 2012 Elsevier B.V. All rights reserved.
Lin, Frank Cheau-Feng; Yang, Tsung-Lin; Tung, Min-Che; Tsai, Stella Chin-Shaw
2016-06-09
Cystic hygroma is a rare benign abnormality of the lymphatic system generally occurring in young children less than 2 years old. The standard transcervical surgical treatment of cystic hygroma may often leave a permanent scar in the neck region. We report a case of cystic hygroma in a 19-month-old Asian baby girl successfully treated with robot-assisted excision through a hairline neck-lift approach. We present the use of the Yang's retractor as an instrumental advancement to this surgical approach. Treatment options for cystic hygroma may be surgical or nonsurgical. We report a case of cystic hygroma in a 19-month-old child successfully treated with robot-assisted excision through a small concealed retroauricular hairline approach. This is the first report in the medical literature of treating cystic hygroma with a minimally invasive robot-assisted excision via a small, concealed, hairline incision.
Implicit Age Cues in Resumes: Subtle Effects on Hiring Discrimination
Derous, Eva; Decoster, Jeroen
2017-01-01
Anonymous resume screening, as assumed, does not dissuade age discriminatory effects. Building on job market signaling theory, this study investigated whether older applicants may benefit from concealing explicitly mentioned age signals on their resumes (date of birth) or whether more implicit/subtle age cues on resumes (older-sounding names/old-fashioned extracurricular activities) may lower older applicants’ hirability ratings. An experimental study among 610 HR professionals using a mixed factorial design showed hiring discrimination of older applicants based on implicit age cues in resumes. This effect was more pronounced for older raters. Concealing one’s date of birth led to overall lower ratings. Study findings add to the limited knowledge on the effects of implicit age cues on hiring discrimination in resume screening and the usefulness of anonymous resume screening in the context of age. Implications for research and practice are discussed. PMID:28848463
Between Concealing and Revealing Intersexed Bodies: Parental Strategies.
Danon, Limor Meoded; Krämer, Anike
2017-08-01
Parents of intersex children are perceived in many studies as hopeless, highly dependent on the medical system, and as gate keepers of normative gendered bodies. In this article, we challenge these perceptions and argue that parents of intersex children are problematically positioned between their children's needs for care and well-being and the socialmedical forces that aim to "normalize" them. Their in-between position leads them to establish different parental strategies within and outside of traditional sex/gender norms. We focus on three intertwined parental strategy frameworks: bodily dialogue, sex/gender framing, and concealing/revealing practices, and describe how, in each of these strategic frameworks, the parents maneuver, act in accordance with or against, react to, and challenge the medical system, social interactions, and the sex/gender paradigm. This is a comparative study based on narrative interviews with 22 parents of intersex children in Germany and Israel.
Evolutionary aspects of anxiety disorders.
Price, John S
2003-09-01
DANGER AND HARM ARE AVOIDED BY STRATEGIC DECISIONS MADE AT ALL THREE LEVELS OF THE TRIUNE FOREBRAIN: rational (neomammalian), emotional (paleomammalian), and instinctive (reptilian). This applies also to potential harm from conspecifics, which leads to a choice between escalating and de-escalating strategies. Anxiety is a component of de-escalating strategies mediated by the paleomammalian and reptilian forebrains. When the neomammalian (rational) brain fails to deal with the threat of conspecific danger, these more primitive de-escalating strategies may be activated and may present as anxiety disorders. The capacity for concealment of anxiety and other forms of negative affect has also evolved, and excessive concealment may lead to psychopaihology by breaking the negative feedback loop of excessive motivation, leading to impaired performance, leading to signals of distress, and leading to reduced exhortation to succeed on the part of parents and teachers; this situation is illustrated by a model based on the Yerkes-Dodson law.
Evolutionary aspects of anxiety disorders
Price, John S.
2003-01-01
Danger and harm are avoided by strategic decisions made at all three levels of the triune forebrain: rational (neomammalian), emotional (paleomammalian), and instinctive (reptilian). This applies also to potential harm from conspecifics, which leads to a choice between escalating and de-escalating strategies. Anxiety is a component of de-escalating strategies mediated by the paleomammalian and reptilian forebrains. When the neomammalian (rational) brain fails to deal with the threat of conspecific danger, these more primitive de-escalating strategies may be activated and may present as anxiety disorders. The capacity for concealment of anxiety and other forms of negative affect has also evolved, and excessive concealment may lead to psychopaihology by breaking the negative feedback loop of excessive motivation, leading to impaired performance, leading to signals of distress, and leading to reduced exhortation to succeed on the part of parents and teachers; this situation is illustrated by a model based on the Yerkes-Dodson law. PMID:22033473
Tracking the truth: the effect of face familiarity on eye fixations during deception.
Millen, Ailsa E; Hope, Lorraine; Hillstrom, Anne P; Vrij, Aldert
2017-05-01
In forensic investigations, suspects sometimes conceal recognition of a familiar person to protect co-conspirators or hide knowledge of a victim. The current experiment sought to determine whether eye fixations could be used to identify memory of known persons when lying about recognition of faces. Participants' eye movements were monitored whilst they lied and told the truth about recognition of faces that varied in familiarity (newly learned, famous celebrities, personally known). Memory detection by eye movements during recognition of personally familiar and famous celebrity faces was negligibly affected by lying, thereby demonstrating that detection of memory during lies is influenced by the prior learning of the face. By contrast, eye movements did not reveal lies robustly for newly learned faces. These findings support the use of eye movements as markers of memory during concealed recognition but also suggest caution when familiarity is only a consequence of one brief exposure.
Easiness of Legal Access to Concealed Firearm Permits and Homicide Rates in the United States.
Siegel, Michael; Xuan, Ziming; Ross, Craig S; Galea, Sandro; Kalesan, Bindu; Fleegler, Eric; Goss, Kristin A
2017-12-01
To examine the relation of "shall-issue" laws, in which permits must be issued if requisite criteria are met; "may-issue" laws, which give law enforcement officials wide discretion over whether to issue concealed firearm carry permits or not; and homicide rates. We compared homicide rates in shall-issue and may-issue states and total, firearm, nonfirearm, handgun, and long-gun homicide rates in all 50 states during the 25-year period of 1991 to 2015. We included year and state fixed effects and numerous state-level factors in the analysis. Shall-issue laws were significantly associated with 6.5% higher total homicide rates, 8.6% higher firearm homicide rates, and 10.6% higher handgun homicide rates, but were not significantly associated with long-gun or nonfirearm homicide. Shall-issue laws are associated with significantly higher rates of total, firearm-related, and handgun-related homicide.
NASA Astrophysics Data System (ADS)
Mitchell-Thomas, R. C.; McManus, T. M.; Quevedo-Teruel, O.; Horsley, S. A. R.; Hao, Y.
2013-11-01
This Letter presents a method for making an uneven surface behave as a flat surface. This allows an object to be concealed (cloaked) under an uneven portion of the surface, without disturbing the wave propagation on the surface. The cloaks proposed in this Letter achieve perfect cloaking that only relies upon isotropic radially dependent refractive index profiles, contrary to those previously published. In addition, these cloaks are very thin, just a fraction of a wavelength in thickness, yet can conceal electrically large objects. While this paper focuses on cloaking electromagnetic surface waves, the theory is also valid for other types of surface waves. The performance of these cloaks is simulated using dielectric filled waveguide geometries, and the curvature of the surface is shown to be rendered invisible, hiding any object positioned underneath. Finally, a transformation of the required dielectric slab permittivity was performed for surface wave propagation, demonstrating the practical applicability of this technique.
Scattering suppression from arbitrary objects in spatially dispersive layered metamaterials
NASA Astrophysics Data System (ADS)
Shalin, Alexander S.; Ginzburg, Pavel; Orlov, Alexey A.; Iorsh, Ivan; Belov, Pavel A.; Kivshar, Yuri S.; Zayats, Anatoly V.
2015-03-01
Concealing objects by making them invisible to an external electromagnetic probe is coined by the term "cloaking." Cloaking devices, having numerous potential applications, are still facing challenges in realization, especially in the visible spectral range. In particular, inherent losses and extreme parameters of metamaterials required for the cloak implementation are the limiting factors. Here, we numerically demonstrate nearly perfect suppression of scattering from arbitrary-shaped objects in spatially dispersive metamaterial acting as an alignment-free concealing cover. We consider a realization of a metamaterial as a metal-dielectric multilayer and demonstrate suppression of scattering from an arbitrary object in forward and backward directions with perfectly preserved wave fronts and less than 10% absolute intensity change, despite spatial dispersion effects present in the composite metamaterial. Beyond the usual scattering suppression applications, the proposed configuration may be used for a simple realization of scattering-free detectors and sensors.
The outcome of drug smuggling by 'body packers'--the British experience.
Bulstrode, N.; Banks, F.; Shrotria, S.
2002-01-01
Body packing or internal concealment used by drug dealers to smuggle illicit substances, puts the body packer at risk of both imprisonment and death. We report our experience over a 4 year period from January 1996 to December 1999 of suspects presenting to our hospital (the largest series in Europe). A total of 572 cases were assessed radiographically and 180 were shown to be carrying foreign bodies. The commonest reasons for admission were suspected overdose or gastrointestinal obstruction. Thirty-six cases were admitted, of whom 7 required surgical intervention. No deaths occurred. Of all people detained for smuggling by internal concealment into Britain during this period, 27% were seen in our hospital. These cases may present alone or escorted by Her Majesty's Customs and Excise personnel, and one must be aware of this possibility even when situated away from a port of entry. Images Figure 1 PMID:11890624
The outcome of drug smuggling by 'body packers'--the British experience.
Bulstrode, N; Banks, F; Shrotria, S
2002-01-01
Body packing or internal concealment used by drug dealers to smuggle illicit substances, puts the body packer at risk of both imprisonment and death. We report our experience over a 4 year period from January 1996 to December 1999 of suspects presenting to our hospital (the largest series in Europe). A total of 572 cases were assessed radiographically and 180 were shown to be carrying foreign bodies. The commonest reasons for admission were suspected overdose or gastrointestinal obstruction. Thirty-six cases were admitted, of whom 7 required surgical intervention. No deaths occurred. Of all people detained for smuggling by internal concealment into Britain during this period, 27% were seen in our hospital. These cases may present alone or escorted by Her Majesty's Customs and Excise personnel, and one must be aware of this possibility even when situated away from a port of entry.
Chung, Kyeongwoon; McAllister, Andrew; Bilby, David; ...
2015-09-03
Building molecular-design insights for controlling both the intrachain and the interchain properties of conjugated polymers (CPs) is essential to determine their characteristics and to optimize their performance in applications. However, most CP designs have focused on the conjugated main chain to control the intrachain properties, while the design of side chains is usually used to render CPs soluble, even though the side chains critically affect the interchain packing. Here, we present a straightforward and effective design strategy for modifying the optical and electrochemical properties of diketopyrrolopyrrole-based CPs by controlling both the intrachain and interchain properties in a single system. Themore » synthesized polymers, P1, P2 and P3, show almost identical optical absorption spectra in solution, manifesting essentially the same intrachain properties of the three CPs having restricted effective conjugation along the main chain. However, the absorption spectra of CP films are gradually tuned by controlling the interchain packing through the side-chain design. Here, based on the tailored optical properties, we demonstrate the encoding of latent optical information utilizing the CPs as security inks on a silica substrate, which reveals and conceals hidden information upon the reversible aggregation/deaggregation of CPs.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chung, Kyeongwoon; McAllister, Andrew; Bilby, David
Building molecular-design insights for controlling both the intrachain and the interchain properties of conjugated polymers (CPs) is essential to determine their characteristics and to optimize their performance in applications. However, most CP designs have focused on the conjugated main chain to control the intrachain properties, while the design of side chains is usually used to render CPs soluble, even though the side chains critically affect the interchain packing. Here, we present a straightforward and effective design strategy for modifying the optical and electrochemical properties of diketopyrrolopyrrole-based CPs by controlling both the intrachain and interchain properties in a single system. Themore » synthesized polymers, P1, P2 and P3, show almost identical optical absorption spectra in solution, manifesting essentially the same intrachain properties of the three CPs having restricted effective conjugation along the main chain. However, the absorption spectra of CP films are gradually tuned by controlling the interchain packing through the side-chain design. Here, based on the tailored optical properties, we demonstrate the encoding of latent optical information utilizing the CPs as security inks on a silica substrate, which reveals and conceals hidden information upon the reversible aggregation/deaggregation of CPs.« less
Multiplexed Sequence Encoding: A Framework for DNA Communication
Zakeri, Bijan; Carr, Peter A.; Lu, Timothy K.
2016-01-01
Synthetic DNA has great propensity for efficiently and stably storing non-biological information. With DNA writing and reading technologies rapidly advancing, new applications for synthetic DNA are emerging in data storage and communication. Traditionally, DNA communication has focused on the encoding and transfer of complete sets of information. Here, we explore the use of DNA for the communication of short messages that are fragmented across multiple distinct DNA molecules. We identified three pivotal points in a communication—data encoding, data transfer & data extraction—and developed novel tools to enable communication via molecules of DNA. To address data encoding, we designed DNA-based individualized keyboards (iKeys) to convert plaintext into DNA, while reducing the occurrence of DNA homopolymers to improve synthesis and sequencing processes. To address data transfer, we implemented a secret-sharing system—Multiplexed Sequence Encoding (MuSE)—that conceals messages between multiple distinct DNA molecules, requiring a combination key to reveal messages. To address data extraction, we achieved the first instance of chromatogram patterning through multiplexed sequencing, thereby enabling a new method for data extraction. We envision these approaches will enable more widespread communication of information via DNA. PMID:27050646
Gummersbach, Elisabeth; Piccoliori, Giuliano; Zerbe, Cristina Oriol; Altiner, Attila; Othman, Cecile; Rose, Christine; Abholz, Heinz-Harald
2010-08-01
The aim was to find out if information brochures on mammography screening in Germany, Italy, Spain and France contain more information to facilitate informed consent than in similar studies carried out over the last few years in Sweden, Canada, USA and the UK, countries with different medical cultures. We generated a list of essential information items on mammography screening for the purpose of informed consent. We mostly used the same items of information as had been used in previous studies and analysed the information brochures of major national initiatives in Germany and France, and three brochures each from regionalized programmes in Italy and Spain. We cross-checked which of our items were covered in the brochures and if correct numbers were given. We found that the information brochures contained only about half of the information items we defined. Six of the eight brochures mentioned the reduction in breast-cancer fatalities. Four of the eight provided information on false positives, and four of the brochures highlighted the side-effects of radiation. The information on side-effects and risks provided by the brochures was generally of poor quality, and none of them referred to over diagnosis. When numbers were given, they were only indicated in terms of relative numbers. The information brochures currently being used in Germany, Italy, Spain and France are no better than the brochures analysed some years ago. Our results suggest that the providers of mammography screening programmes continue to conceal information from women that is essential when making an informed decision.