Wavelet Fusion for Concealed Object Detection Using Passive Millimeter Wave Sequence Images
NASA Astrophysics Data System (ADS)
Chen, Y.; Pang, L.; Liu, H.; Xu, X.
2018-04-01
PMMW imaging system can create interpretable imagery on the objects concealed under clothing, which gives the great advantage to the security check system. Paper addresses wavelet fusion to detect concealed objects using passive millimeter wave (PMMW) sequence images. According to PMMW real-time imager acquired image characteristics and storage methods firstly, using the sum of squared difference (SSD) as the image-related parameters to screen the sequence images. Secondly, the selected images are optimized using wavelet fusion algorithm. Finally, the concealed objects are detected by mean filter, threshold segmentation and edge detection. The experimental results show that this method improves the detection effect of concealed objects by selecting the most relevant images from PMMW sequence images and using wavelet fusion to enhance the information of the concealed objects. The method can be effectively applied to human body concealed object detection in millimeter wave video.
Hard x-ray focusing optics for concealed object detection
NASA Astrophysics Data System (ADS)
Jannson, Tomasz; Gertsenshteyn, Michael
2006-05-01
In this paper, we discuss hard x-ray optics, in general, and lobster-eye focusing optics, in particular, for concealed object detection, at longer distances. The longer distance (~50m) scenario is important for Improvised Explosives Detection (IED), "seeing through walls," "seeing objects under ground," and related applications.
Detection of a concealed object
Keller, Paul E [Richland, WA; Hall, Thomas E [Kennewick, WA; McMakin, Douglas L [Richland, WA
2010-11-16
Disclosed are systems, methods, devices, and apparatus to determine if a clothed individual is carrying a suspicious, concealed object. This determination includes establishing data corresponding to an image of the individual through interrogation with electromagnetic radiation in the 200 MHz to 1 THz range. In one form, image data corresponding to intensity of reflected radiation and differential depth of the reflecting surface is received and processed to detect the suspicious, concealed object.
Detection of a concealed object
Keller, Paul E [Richland, WA; Hall, Thomas E [Kennewick, WA; McMakin, Douglas L [Richland, WA
2008-04-29
Disclosed are systems, methods, devices, and apparatus to determine if a clothed individual is carrying a suspicious, concealed object. This determination includes establishing data corresponding to an image of the individual through interrogation with electromagnetic radiation in the 200 MHz to 1 THz range. In one form, image data corresponding to intensity of reflected radiation and differential depth of the reflecting surface is received and processed to detect the suspicious, concealed object.
Method for imaging a concealed object
Davidson, James R [Idaho Falls, ID; Partin, Judy K [Idaho Falls, ID; Sawyers, Robert J [Idaho Falls, ID
2007-07-03
A method for imaging a concealed object is described and which includes a step of providing a heat radiating body, and wherein an object to be detected is concealed on the heat radiating body; imaging the heat radiating body to provide a visibly discernible infrared image of the heat radiating body; and determining if the visibly discernible infrared image of the heat radiating body is masked by the presence of the concealed object.
NASA Astrophysics Data System (ADS)
Yeom, Seokwon
2013-05-01
Millimeter waves imaging draws increasing attention in security applications for weapon detection under clothing. In this paper, concealed object segmentation and three-dimensional localization schemes are reviewed. A concealed object is segmented by the k-means algorithm. A feature-based stereo-matching method estimates the longitudinal distance of the concealed object. The distance is estimated by the discrepancy between the corresponding centers of the segmented objects. Experimental results are provided with the analysis of the depth resolution.
The use of far infra-red radiation for the detection of concealed metal objects
DOT National Transportation Integrated Search
1971-11-01
The use of infrared radiation for the detection of concealed metal objects has been investigated both theoretically and experimentally. The investigation was divided into two phases, one which considered passive techniques, and another which involved...
The use of far infra-red radiation for the detection of concealed metal objects.
DOT National Transportation Integrated Search
1971-11-01
Abstract The use of infrared radiation for the detection : of concealed metal objects has been investigated both : theoretically and experimentally. The investigation was : divided into two phases, one which considered passive : techniques, and anoth...
The use of far infra-red radiation for the detection of concealed metal objects.
DOT National Transportation Integrated Search
1971-11-01
The use of infra-red radiation for the detection : of conceal ed metal objects has been investiga ted both : theoretically and experimentally. The investigation was : divided into two phases, one which considered passive : techniques, and another whi...
Microwave Technique for Detecting and Locating Concealed Weapons
DOT National Transportation Integrated Search
1971-12-01
The subject of this report is the evaluation of a microwave technique for detecting and locating weapons concealed under clothing. The principal features of this technique are: persons subjected to search are not exposed to 'objectional' microwave ra...
Detecting concealed objects at a checkpoint
McMakin, Douglas L [Richland, WA; Hall, Thomas E [Kennewick, WA; Sheen, David M [Richland, WA; Severtsen, Ronald H [Richland, WA
2008-07-29
Disclosed are systems, methods, devices, and apparatus to interrogate a clothed individual with electromagnetic radiation to determine if a concealed object is being carried. This determination includes establishing data corresponding to an image of the individual with a pair of opposed, semi-cylindrical array panels each configured to interrogate the individual with electromagnetic radiation in the 200 MHz to 1 THz range.
Induction detection of concealed bulk banknotes
NASA Astrophysics Data System (ADS)
Fuller, Christopher; Chen, Antao
2012-06-01
The smuggling of bulk cash across borders is a serious issue that has increased in recent years. In an effort to curb the illegal transport of large numbers of paper bills, a detection scheme has been developed, based on the magnetic characteristics of bank notes. The results show that volumes of paper currency can be detected through common concealing materials such as plastics, cardboard, and fabrics making it a possible potential addition to border security methods. The detection scheme holds the potential of also reducing or eliminating false positives caused by metallic materials found in the vicinity, by observing the stark difference in received signals caused by metal and currency. The detection scheme holds the potential to detect for both the presence and number of concealed bulk notes, while maintaining the ability to reduce false positives caused by metal objects.
Induction detection of concealed bulk banknotes
NASA Astrophysics Data System (ADS)
Fuller, Christopher; Chen, Antao
2011-10-01
Bulk cash smuggling is a serious issue that has grown in volume in recent years. By building on the magnetic characteristics of paper currency, induction sensing is found to be capable of quickly detecting large masses of banknotes. The results show that this method is effective in detecting bulk cash through concealing materials such as plastics, cardboards, fabrics and aluminum foil. The significant difference in the observed phase between the received signals caused by conducting materials and ferrite compounds, found in banknotes, provides a good indication that this process can overcome the interference by metal objects in a real sensing application. This identification strategy has the potential to not only detect the presence of banknotes, but also the number, while still eliminating false positives caused by metal objects.
New opportunities for quality enhancing of images captured by passive THz camera
NASA Astrophysics Data System (ADS)
Trofimov, Vyacheslav A.; Trofimov, Vladislav V.
2014-10-01
As it is well-known, the passive THz camera allows seeing concealed object without contact with a person and this camera is non-dangerous for a person. Obviously, efficiency of using the passive THz camera depends on its temperature resolution. This characteristic specifies possibilities of the detection for concealed object: minimal size of the object; maximal distance of the detection; image quality. Computer processing of the THz image may lead to many times improving of the image quality without any additional engineering efforts. Therefore, developing of modern computer code for its application to THz images is urgent problem. Using appropriate new methods one may expect such temperature resolution which will allow to see banknote in pocket of a person without any real contact. Modern algorithms for computer processing of THz images allow also to see object inside the human body using a temperature trace on the human skin. This circumstance enhances essentially opportunity of passive THz camera applications for counterterrorism problems. We demonstrate opportunities, achieved at present time, for the detection both of concealed objects and of clothes components due to using of computer processing of images captured by passive THz cameras, manufactured by various companies. Another important result discussed in the paper consists in observation of both THz radiation emitted by incandescent lamp and image reflected from ceramic floorplate. We consider images produced by THz passive cameras manufactured by Microsemi Corp., and ThruVision Corp., and Capital Normal University (Beijing, China). All algorithms for computer processing of the THz images under consideration in this paper were developed by Russian part of author list. Keywords: THz wave, passive imaging camera, computer processing, security screening, concealed and forbidden objects, reflected image, hand seeing, banknote seeing, ceramic floorplate, incandescent lamp.
Detection of hidden objects using a real-time 3-D millimeter-wave imaging system
NASA Astrophysics Data System (ADS)
Rozban, Daniel; Aharon, Avihai; Levanon, Assaf; Abramovich, Amir; Yitzhaky, Yitzhak; Kopeika, N. S.
2014-10-01
Millimeter (mm)and sub-mm wavelengths or terahertz (THz) band have several properties that motivate their use in imaging for security applications such as recognition of hidden objects, dangerous materials, aerosols, imaging through walls as in hostage situations, and also in bad weather conditions. There is no known ionization hazard for biological tissue, and atmospheric degradation of THz radiation is relatively low for practical imaging distances. We recently developed a new technology for the detection of THz radiation. This technology is based on very inexpensive plasma neon indicator lamps, also known as Glow Discharge Detector (GDD), that can be used as very sensitive THz radiation detectors. Using them, we designed and constructed a Focal Plane Array (FPA) and obtained recognizable2-dimensional THz images of both dielectric and metallic objects. Using THz wave it is shown here that even concealed weapons made of dielectric material can be detected. An example is an image of a knife concealed inside a leather bag and also under heavy clothing. Three-dimensional imaging using radar methods can enhance those images since it can allow the isolation of the concealed objects from the body and environmental clutter such as nearby furniture or other people. The GDDs enable direct heterodyning between the electric field of the target signal and the reference signal eliminating the requirement for expensive mixers, sources, and Low Noise Amplifiers (LNAs).We expanded the ability of the FPA so that we are able to obtain recognizable 2-dimensional THz images in real time. We show here that the THz detection of objects in three dimensions, using FMCW principles is also applicable in real time. This imaging system is also shown here to be capable of imaging objects from distances allowing standoff detection of suspicious objects and humans from large distances.
Concealed weapons detection using electromagnetic resonances
NASA Astrophysics Data System (ADS)
Hunt, Allen R.; Hogg, R. Douglas; Foreman, William
1998-12-01
Concealed weapons pose a significant threat to both law enforcement and security agency personnel. The uncontrolled environments associated with peacekeeping and the move toward relaxation of concealed weapons laws here in the U.S. provide a strong motivation for developing weapons detection technologies which are noninvasive and can function noncooperatively. Existing weapons detection systems are primarily oriented to detecting metal and require the cooperation of the person being searched. The new generation of detectors under development that focuses primarily on imaging methods, faces problems associated with privacy issues. There remains a need for a weapons detector which is portable, detects weapons remotely, avoids the issues associated with privacy rights, can tell the difference between car keys and a knife, and is affordable enough that one can be issued to every peacekeeper and law enforcement officer. AKELA is developing a concealed weapons detector that uses wideband radar techniques to excite natural electromagnetic resonances that characterize the size, shape, and material composition of an object. Neural network processing is used to classify the difference between weapons and nuisance objects. We have constructed both time and frequency domain test systems and used them to gather experimental data on a variety of armed and unarmed individuals. These experiments have been performed in an environment similar to the operational environment. Preliminary results from these experiments show that it is possible to detect a weapon being carried by an individual from a distance of 10 to 15 feet, and to detect a weapon being concealed behind the back. The power required is about 100 milliwatts. A breadboard system is being fabricated and will be used by AKELA and our law enforcement partner to gather data in operationally realistic situations. While a laptop computer will control the breadboard system, the wideband radar electronics will fit in a box the size of a CD ROM drive of a computer.
Remote laser drilling and sampling system for the detection of concealed explosives
NASA Astrophysics Data System (ADS)
Wild, D.; Pschyklenk, L.; Theiß, C.; Holl, G.
2017-05-01
The detection of hazardous materials like explosives is a central issue in national security in the field of counterterrorism. One major task includes the development of new methods and sensor systems for the detection. Many existing remote or standoff methods like infrared or raman spectroscopy find their limits, if the hazardous material is concealed in an object. Imaging technologies using x-ray or terahertz radiation usually yield no information about the chemical content itself. However, the exact knowledge of the real threat potential of a suspicious object is crucial for disarming the device. A new approach deals with a laser drilling and sampling system for the use as verification detector for suspicious objects. Central part of the system is a miniaturised, diode pumped Nd:YAG laser oscillator-amplifier. The system allows drilling into most materials like metals, synthetics or textiles with bore hole diameters in the micron scale. During the drilling process, the hazardous material can be sampled for further investigation with suitable detection methods. In the reported work, laser induced breakdown spectroscopy (LIBS) is used to monitor the drilling process and to classify the drilled material. Also experiments were carried out to show the system's ability to not ignite even sensitive explosives like triacetone triperoxide (TATP). The detection of concealed hazardous material is shown for different explosives using liquid chromatography and ion mobility spectrometry.
Camouflage and visual perception
Troscianko, Tom; Benton, Christopher P.; Lovell, P. George; Tolhurst, David J.; Pizlo, Zygmunt
2008-01-01
How does an animal conceal itself from visual detection by other animals? This review paper seeks to identify general principles that may apply in this broad area. It considers mechanisms of visual encoding, of grouping and object encoding, and of search. In most cases, the evidence base comes from studies of humans or species whose vision approximates to that of humans. The effort is hampered by a relatively sparse literature on visual function in natural environments and with complex foraging tasks. However, some general constraints emerge as being potentially powerful principles in understanding concealment—a ‘constraint’ here means a set of simplifying assumptions. Strategies that disrupt the unambiguous encoding of discontinuities of intensity (edges), and of other key visual attributes, such as motion, are key here. Similar strategies may also defeat grouping and object-encoding mechanisms. Finally, the paper considers how we may understand the processes of search for complex targets in complex scenes. The aim is to provide a number of pointers towards issues, which may be of assistance in understanding camouflage and concealment, particularly with reference to how visual systems can detect the shape of complex, concealed objects. PMID:18990671
Optic-null space medium for cover-up cloaking without any negative refraction index materials
Sun, Fei; He, Sailing
2016-01-01
With the help of optic-null medium, we propose a new way to achieve invisibility by covering up the scattering without using any negative refraction index materials. Compared with previous methods to achieve invisibility, the function of our cloak is to cover up the scattering of the objects to be concealed by a background object of strong scattering. The concealed object can receive information from the outside world without being detected. Numerical simulations verify the performance of our cloak. The proposed method will be a great addition to existing invisibility technology. PMID:27383833
Optic-null space medium for cover-up cloaking without any negative refraction index materials.
Sun, Fei; He, Sailing
2016-07-07
With the help of optic-null medium, we propose a new way to achieve invisibility by covering up the scattering without using any negative refraction index materials. Compared with previous methods to achieve invisibility, the function of our cloak is to cover up the scattering of the objects to be concealed by a background object of strong scattering. The concealed object can receive information from the outside world without being detected. Numerical simulations verify the performance of our cloak. The proposed method will be a great addition to existing invisibility technology.
Open-area concealed-weapon detection system
NASA Astrophysics Data System (ADS)
Pati, P.; Mather, P.
2011-06-01
Concealed Weapon Detection (CWD) has become a significant challenge to present day security needs; individuals carrying weapons into airplanes, schools, and secured establishments are threat to public security. Although controlled screening, of people for concealed weapons, has been employed in many establishments, procedures and equipment are designed to work in restricted environments like airport passport control, military checkpoints, hospitals, school and university entrance. Furthermore, screening systems do not effectively decipher between threat and non-threat metal objects, thus leading to high rate of false alarms which can become a liability to daily operational needs of establishments. Therefore, the design and development of a new CWD system to operate in a large open area environment with large numbers of people reduced incidences of false alarms and increased location accuracy is essential.
TeraSCREEN: multi-frequency multi-mode Terahertz screening for border checks
NASA Astrophysics Data System (ADS)
Alexander, Naomi E.; Alderman, Byron; Allona, Fernando; Frijlink, Peter; Gonzalo, Ramón; Hägelen, Manfred; Ibáñez, Asier; Krozer, Viktor; Langford, Marian L.; Limiti, Ernesto; Platt, Duncan; Schikora, Marek; Wang, Hui; Weber, Marc Andree
2014-06-01
The challenge for any security screening system is to identify potentially harmful objects such as weapons and explosives concealed under clothing. Classical border and security checkpoints are no longer capable of fulfilling the demands of today's ever growing security requirements, especially with respect to the high throughput generally required which entails a high detection rate of threat material and a low false alarm rate. TeraSCREEN proposes to develop an innovative concept of multi-frequency multi-mode Terahertz and millimeter-wave detection with new automatic detection and classification functionalities. The system developed will demonstrate, at a live control point, the safe automatic detection and classification of objects concealed under clothing, whilst respecting privacy and increasing current throughput rates. This innovative screening system will combine multi-frequency, multi-mode images taken by passive and active subsystems which will scan the subjects and obtain complementary spatial and spectral information, thus allowing for automatic threat recognition. The TeraSCREEN project, which will run from 2013 to 2016, has received funding from the European Union's Seventh Framework Programme under the Security Call. This paper will describe the project objectives and approach.
Millimetre wave and terahertz technology for the detection of concealed threats: a review
NASA Astrophysics Data System (ADS)
Kemp, Michael C.
2006-09-01
There has been intense interest in the use of millimetre wave and terahertz technology for the detection of concealed weapons, explosives and other threats. Electromagnetic waves at these frequencies are safe, penetrate barriers and have short enough wavelengths to allow discrimination between objects. In addition, many solids including explosives have characteristic spectroscopic signatures at terahertz wavelengths which can be used to identify them. This paper reviews the progress which has been made in recent years and identifies the achievements, challenges and prospects for these technologies in checkpoint people screening, stand off detection of improvised explosive devices (IEDs) and suicide bombers as well as more specialized screening tasks.
Remote sensing based on hyperspectral data analysis
NASA Astrophysics Data System (ADS)
Sharifahmadian, Ershad
In remote sensing, accurate identification of far objects, especially concealed objects is difficult. In this study, to improve object detection from a distance, the hyperspecral imaging and wideband technology are employed with the emphasis on wideband radar. As the wideband data includes a broad range of frequencies, it can reveal information about both the surface of the object and its content. Two main contributions are made in this study: 1) Developing concept of return loss for target detection: Unlike typical radar detection methods which uses radar cross section to detect an object, it is possible to enhance the process of detection and identification of concealed targets using the wideband radar based on the electromagnetic characteristics --conductivity, permeability, permittivity, and return loss-- of materials. During the identification process, collected wideband data is evaluated with information from wideband signature library which has already been built. In fact, several classes (e.g. metal, wood, etc.) and subclasses (ex. metals with high conductivity) have been defined based on their electromagnetic characteristics. Materials in a scene are then classified based on these classes. As an example, materials with high electrical conductivity can be conveniently detected. In fact, increasing relative conductivity leads to a reduction in the return loss. Therefore, metals with high conductivity (ex. copper) shows stronger radar reflections compared with metals with low conductivity (ex. stainless steel). Thus, it is possible to appropriately discriminate copper from stainless steel. 2) Target recognition techniques: To detect and identify targets, several techniques have been proposed, in particular the Multi-Spectral Wideband Radar Image (MSWRI) which is able to localize and identify concealed targets. The MSWRI is based on the theory of robust capon beamformer. During identification process, information from wideband signature library is utilized. The WB signature library includes such parameters as conductivity, permeability, permittivity, and return loss at different frequencies for possible materials related to a target. In the MSWRI approach, identification procedure is performed by calculating the RLs at different selected frequencies. Based on similarity of the calculated RLs and RL from WB signature library, targets are detected and identified. Based on the simulation and experimental results, it is concluded that the MSWRI technique is a promising approach for standoff target detection.
Passive millimeter-wave imaging for concealed article detection
NASA Astrophysics Data System (ADS)
Lovberg, John A.; Galliano, Joseph A., Jr.; Clark, Stuart E.
1997-02-01
Passive-millimeter-wave imaging (PMI) provides a powerful sensing tool for law enforcement, allowing an unobtrusive means for detecting concealed weapons, explosives, or contraband on persons or in baggage. Natural thermal emissions at millimeter wavelengths from bodies, guns, explosives, and other articles pass easily through clothing or other concealment materials, where they can be detected and converted into conventional 2-dimensional images. A new implementation of PMI has demonstrated a large-area, near- real-time staring capability for personnel inspection at standoff ranges of greater than 10 meters. In this form, PMI does not require operator cuing based on subjective 'profiles' of suspicious appearance or behaviors, which may otherwise be construed as violations of civil rights. To the contrary, PMI detects and images heat generated by any object with no predisposition as to its nature or function (e.g. race or gender of humans). As a totally passive imaging tool, it generates no radio-frequency or other radiation which might raise public health concerns. Specifics of the new PMI architecture are presented along with a host of imaging data representing the current state- of-the-art.
Mental Layouts of Concealed Objects as a Function of Bizarre Imagery and Retention Interval.
ERIC Educational Resources Information Center
Iaccino, James; And Others
To determine whether concealed imagery was an effective mnemonic aid in the recall of paired objects, two studies were conducted with explicitly worded instructions to conceal targets and with variable image formation periods. In each study, 40 subjects were presented with counterbalanced verbal descriptions of Concealed, Pictorial, and Separate…
PNNL Expert Doug McMakin Discusses Millimeter Wave Technology
McMakin, Doug
2018-02-13
Electrical Engineer Doug McMakin discusses Millimeter Wave Holographic technology, which uses non-harmful, ultrahigh-frequency radio waves to penetrate clothing to detect and identify concealed objects, as well as obtain accurate body measurements.
Target recognition in passive terahertz image of human body
NASA Astrophysics Data System (ADS)
Zhao, Ran; Zhao, Yuan-meng; Deng, Chao; Zhang, Cun-lin; Li, Yue
2014-11-01
THz radiation can penetrate through many nonpolar dielectric materials and can be used for nondestructive/noninvasive sensing and imaging of targets under nonpolar, nonmetallic covers or containers. Thus using THz systems to "see through" concealing barriers (i.e. packaging, corrugated cardboard, clothing) has been proposed as a new security screening method. Objects that can be detected by THz include concealed weapons, explosives, and chemical agents under clothing. Passive THz imaging system can detect THz wave from human body without transmit any electromagnetic wave, and the suspicious objects will become visible because the THz wave is blocked by this items. We can find out whether or not someone is carrying dangerous objects through this image. In this paper, the THz image enhancement, segmentation and contour extraction algorithms were studied to achieve effective target image detection. First, the terahertz images are enhanced and their grayscales are stretched. Then we apply global threshold segmentation to extract the target, and finally the targets are marked on the image. Experimental results showed that the algorithm proposed in this paper can extract and mark targets effectively, so that people can identify suspicious objects under clothing quickly. The algorithm can significantly improve the usefulness of the terahertz security apparatus.
NASA Astrophysics Data System (ADS)
Robertson, Duncan A.; Macfarlane, David G.; Bryllert, Tomas
2016-05-01
We present a 220 GHz 3D imaging `Pathfinder' radar developed within the EU FP7 project CONSORTIS (Concealed Object Stand-Off Real-Time Imaging for Security) which has been built to address two objectives: (i) to de-risk the radar hardware development and (ii) to enable the collection of phenomenology data with ~1 cm3 volumetric resolution. The radar combines a DDS-based chirp generator and self-mixing multiplier technology to achieve a 30 GHz bandwidth chirp with such high linearity that the raw point response is close to ideal and only requires minor nonlinearity compensation. The single transceiver is focused with a 30 cm lens mounted on a gimbal to acquire 3D volumetric images of static test targets and materials.
Imaging terahertz radar for security applications
NASA Astrophysics Data System (ADS)
Semenov, Alexei; Richter, Heiko; Böttger, Ute; Hübers, Heinz-Wilhelm
2008-04-01
Detection of concealed threats is a key issue in public security. In short range applications, passive imagers operating at millimeter wavelengths fulfill this task. However, for larger distances, they will suffer from limited spatial resolution. We will describe the design and performance of 0.8-THz imaging radar that is capable to detect concealed objects at a distance of more than 20 meter. The radar highlights the target with the built-in cw transmitter and analyses the returned signal making use of a heterodyne receiver with a single superconducting hot-electron bolometric mixer. With an integration time of 0.3 sec, the receiver distinguishes a temperature difference of 2 K at the 20 m distance. Both the transmitter and the receiver use the same modified Gregorian telescope consisting from two offset elliptic mirrors. The primary mirror defines limits the lateral resolution of the radar to 2 cm at 20 m distance. At this distance, the field of view of the radar has the diameter 0.5 m. It is sampled with a high-speed conical scanner that allows for a frame time less than 5 sec. The transmitter delivers to the target power with a density less than ten microwatt per squared centimeter, which is harmless for human beings. The radar implements a sensor fusion technique that greatly improves the ability to identify concealed objects.
Review of terahertz technology development at INO
NASA Astrophysics Data System (ADS)
Dufour, Denis; Marchese, Linda; Terroux, Marc; Oulachgar, Hassane; Généreux, Francis; Doucet, Michel; Mercier, Luc; Tremblay, Bruno; Alain, Christine; Beaupré, Patrick; Blanchard, Nathalie; Bolduc, Martin; Chevalier, Claude; D'Amato, Dominic; Desroches, Yan; Duchesne, François; Gagnon, Lucie; Ilias, Samir; Jerominek, Hubert; Lagacé, François; Lambert, Julie; Lamontagne, Frédéric; Le Noc, Loïc; Martel, Anne; Pancrati, Ovidiu; Paultre, Jacques-Edmond; Pope, Tim; Provençal, Francis; Topart, Patrice; Vachon, Carl; Verreault, Sonia; Bergeron, Alain
2015-10-01
Over the past decade, INO has leveraged its expertise in the development of uncooled microbolometer detectors for infrared imaging to produce terahertz (THz) imaging systems. By modifying its microbolometer-based focal plane arrays to enhance absorption in the THz bands and by developing custom THz imaging lenses, INO has developed a leading-edge THz imaging system, the IRXCAM-THz-384 camera, capable of exploring novel applications in the emerging field of terahertz imaging and sensing. Using appropriate THz sources, results show that the IRXCAM-THz-384 camera is able to image a variety of concealed objects of interest for applications such as non-destructive testing and weapons detections. By using a longer wavelength (94 GHz) source, it is also capable of sensing the signatures of various objects hidden behind a drywall panel. This article, written as a review of THz research at INO over the past decade, describes the technical components that form the IRXCAM-THz-384 camera and the experimental setup used for active THz imaging. Image results for concealed weapons detection experiments, an exploration of wavelength choice on image quality, and the detection of hidden objects behind drywall are also presented.
Fusion of radar and ultrasound sensors for concealed weapons detection
NASA Astrophysics Data System (ADS)
Felber, Franklin S.; Davis, Herbert T., III; Mallon, Charles E.; Wild, Norbert C.
1996-06-01
An integrated radar and ultrasound sensor, capable of remotely detecting and imaging concealed weapons, is being developed. A modified frequency-agile, mine-detection radar is intended to specify with high probability of detection at ranges of 1 to 10 m which individuals in a moving crowd may be concealing metallic or nonmetallic weapons. Within about 1 to 5 m, the active ultrasound sensor is intended to enable a user to identify a concealed weapon on a moving person with low false-detection rate, achieved through a real-time centimeter-resolution image of the weapon. The goal for sensor fusion is to have the radar acquire concealed weapons at long ranges and seamlessly hand over tracking data to the ultrasound sensor for high-resolution imaging on a video monitor. We have demonstrated centimeter-resolution ultrasound images of metallic and non-metallic weapons concealed on a human at ranges over 1 m. Processing of the ultrasound images includes filters for noise, frequency, brightness, and contrast. A frequency-agile radar has been developed by JAYCOR under the U.S. Army Advanced Mine Detection Radar Program. The signature of an armed person, detected by this radar, differs appreciably from that of the same person unarmed.
Small threat and contraband detection with TNA-based systems.
Shaw, T J; Brown, D; D'Arcy, J; Liu, F; Shea, P; Sivakumar, M; Gozani, T
2005-01-01
The detection of small threats, such as explosives, drugs, and chemical weapons, concealed or encased in surrounding material, is a major concern in areas from security checkpoints to UneXploded Ordnance (UXO) clearance. Techniques such as X-ray and trace detection are often ineffectual in these applications. Thermal neutron analysis (TNA) provides an effective method for detecting concealed threats. This paper shows the effectiveness of Ancore's SPEDS, based on TNA, in detecting concealed liquid threats and differentiating live from inert mortar shells.
Powell, J.; Reich, M.; Danby, G.
1997-07-22
A magnetic imager includes a generator for practicing a method of applying a background magnetic field over a concealed object, with the object being effective to locally perturb the background field. The imager also includes a sensor for measuring perturbations of the background field to detect the object. In one embodiment, the background field is applied quasi-statically. And, the magnitude or rate of change of the perturbations may be measured for determining location, size, and/or condition of the object. 25 figs.
Concealed identification symbols and nondestructive determination of the identification symbols
Nance, Thomas A.; Gibbs, Kenneth M.
2014-09-16
The concealing of one or more identification symbols into a target object and the subsequent determination or reading of such symbols through non-destructive testing is described. The symbols can be concealed in a manner so that they are not visible to the human eye and/or cannot be readily revealed to the human eye without damage or destruction of the target object. The identification symbols can be determined after concealment by e.g., the compilation of multiple X-ray images. As such, the present invention can also provide e.g., a deterrent to theft and the recovery of lost or stolen objects.
An explosives detection system for airline security using coherent x-ray scattering technology
NASA Astrophysics Data System (ADS)
Madden, Robert W.; Mahdavieh, Jacob; Smith, Richard C.; Subramanian, Ravi
2008-08-01
L-3 Communications Security and Detection Systems (SDS) has developed a new system for automated alarm resolution in airline baggage Explosive Detection Systems (EDS) based on coherent x-ray scattering spectroscopy. The capabilities of the system were demonstrated in tests with concealed explosives at the Transportation Security Laboratory and airline passenger baggage at Orlando International Airport. The system uses x-ray image information to identify suspicious objects and performs targeted diffraction measurements to classify them. This extra layer of detection capability affords a significant reduction in the rate of false alarm objects that must presently be resolved by opening passenger bags for hand inspection.
Powell, James; Reich, Morris; Danby, Gordon
1997-07-22
A magnetic imager 10 includes a generator 18 for practicing a method of applying a background magnetic field over a concealed object, with the object being effective to locally perturb the background field. The imager 10 also includes a sensor 20 for measuring perturbations of the background field to detect the object. In one embodiment, the background field is applied quasi-statically. And, the magnitude or rate of change of the perturbations may be measured for determining location, size, and/or condition of the object.
Concealing with structured light.
Sun, Jingbo; Zeng, Jinwei; Wang, Xi; Cartwright, Alexander N; Litchinitser, Natalia M
2014-02-13
While making objects less visible (or invisible) to a human eye or a radar has captured people's imagination for centuries, current attempts towards realization of this long-awaited functionality range from various stealth technologies to recently proposed cloaking devices. A majority of proposed approaches share a number of common deficiencies such as design complexity, polarization effects, bandwidth, losses and the physical size or shape requirement complicating their implementation especially at optical frequencies. Here we demonstrate an alternative way to conceal macroscopic objects by structuring light itself. In our approach, the incident light is transformed into an optical vortex with a dark core that can be used to conceal macroscopic objects. Once such a beam passed around the object it is transformed back into its initial Gaussian shape with minimum amplitude and phase distortions. Therefore, we propose to use that dark core of the vortex beam to conceal an object that is macroscopic yet small enough to fit the dark (negligibly low intensity) region of the beam. The proposed concealing approach is polarization independent, easy to fabricate, lossless, operates at wavelengths ranging from 560 to 700 nm, and can be used to hide macroscopic objects providing they are smaller than vortex core.
Expanded opportunities of THz passive camera for the detection of concealed objects
NASA Astrophysics Data System (ADS)
Trofimov, Vyacheslav A.; Trofimov, Vladislav V.; Kuchik, Igor E.
2013-10-01
Among the security problems, the detection of object implanted into either the human body or animal body is the urgent problem. At the present time the main tool for the detection of such object is X-raying only. However, X-ray is the ionized radiation and therefore can not be used often. Other way for the problem solving is passive THz imaging using. In our opinion, using of the passive THz camera may help to detect the object implanted into the human body under certain conditions. The physical reason of such possibility arises from temperature trace on the human skin as a result of the difference in temperature between object and parts of human body. Modern passive THz cameras have not enough resolution in temperature to see this difference. That is why, we use computer processing to enhance the passive THz camera resolution for this application. After computer processing of images captured by passive THz camera TS4, developed by ThruVision Systems Ltd., we may see the pronounced temperature trace on the human body skin from the water, which is drunk by person, or other food eaten by person. Nevertheless, there are many difficulties on the way of full soution of this problem. We illustrate also an improvement of quality of the image captured by comercially available passive THz cameras using computer processing. In some cases, one can fully supress a noise on the image without loss of its quality. Using computer processing of the THz image of objects concealed on the human body, one may improve it many times. Consequently, the instrumental resolution of such device may be increased without any additional engineering efforts.
Impact of frequency and polarization diversity on a terahertz radar's imaging performance
NASA Astrophysics Data System (ADS)
Cooper, Ken B.; Dengler, Robert J.; Llombart, Nuria
2011-05-01
The Jet Propulsion Laboratory's 675 GHz, 25 m standoff imaging radar can achieve >1 Hz real time frame rates over 40x40 cm fields of view for rapid detection of person-borne concealed weapons. In its normal mode of operation, the radar generates imagery based solely on the time-of-flight, or range, between the radar and target. With good clothing penetration at 675 GHz, a hidden object will be detectable as an anomaly in the range-to-surface profile of a subject. Here we report on results of two modifications in the radar system that were made to asses its performance using somewhat different detection approaches. First, the radar's operating frequency and bandwidth were cut in half, to 340 GHz and 13 GHz, where there potential system advantages include superior transmit power and clothing penetration, as well as a lower cost of components. In this case, we found that the twofold reduction in range and cross-range resolution sharply limited the quality of through-clothes imagery, although some improvement is observed for detection of large targets concealed by very thick clothing. The second radar modification tested involved operation in a fully polarimetric mode, where enhanced image contrast might occur between surfaces with different material or geometric characteristics. Results from these tests indicated that random speckle dominates polarimetric power imagery, making it an unattractive approach for contrast improvement. Taken together, the experiments described here underscore the primary importance of high resolution imaging in THz radar applications for concealed weapons detection.
Multi-sensor millimeter-wave system for hidden objects detection by non-collaborative screening
NASA Astrophysics Data System (ADS)
Zouaoui, Rhalem; Czarny, Romain; Diaz, Frédéric; Khy, Antoine; Lamarque, Thierry
2011-05-01
In this work, we present the development of a multi-sensor system for the detection of objects concealed under clothes using passive and active millimeter-wave (mmW) technologies. This study concerns both the optimization of a commercial passive mmW imager at 94 GHz using a phase mask and the development of an active mmW detector at 77 GHz based on synthetic aperture radar (SAR). A first wide-field inspection is done by the passive imager while the person is walking. If a suspicious area is detected, the active imager is switched-on and focused on this area in order to obtain more accurate data (shape of the object, nature of the material ...).
Computer vision, camouflage breaking and countershading
Tankus, Ariel; Yeshurun, Yehezkel
2008-01-01
Camouflage is frequently used in the animal kingdom in order to conceal oneself from visual detection or surveillance. Many camouflage techniques are based on masking the familiar contours and texture of the subject by superposition of multiple edges on top of it. This work presents an operator, Darg, for the detection of three-dimensional smooth convex (or, equivalently, concave) objects. It can be used to detect curved objects on a relatively flat background, regardless of image edges, contours and texture. We show that a typical camouflage found in some animal species seems to be a ‘countermeasure’ taken against detection that might be based on our method. Detection by Darg is shown to be very robust, from both theoretical considerations and practical examples of real-life images. PMID:18990669
Detection of concealed cars in complex cargo X-ray imagery using Deep Learning.
Jaccard, Nicolas; Rogers, Thomas W; Morton, Edward J; Griffin, Lewis D
2017-01-01
Non-intrusive inspection systems based on X-ray radiography techniques are routinely used at transport hubs to ensure the conformity of cargo content with the supplied shipping manifest. As trade volumes increase and regulations become more stringent, manual inspection by trained operators is less and less viable due to low throughput. Machine vision techniques can assist operators in their task by automating parts of the inspection workflow. Since cars are routinely involved in trafficking, export fraud, and tax evasion schemes, they represent an attractive target for automated detection and flagging for subsequent inspection by operators. Development and evaluation of a novel method for the automated detection of cars in complex X-ray cargo imagery. X-ray cargo images from a stream-of-commerce dataset were classified using a window-based scheme. The limited number of car images was addressed by using an oversampling scheme. Different Convolutional Neural Network (CNN) architectures were compared with well-established bag of words approaches. In addition, robustness to concealment was evaluated by projection of objects into car images. CNN approaches outperformed all other methods evaluated, achieving 100% car image classification rate for a false positive rate of 1-in-454. Cars that were partially or completely obscured by other goods, a modus operandi frequently adopted by criminals, were correctly detected. We believe that this level of performance suggests that the method is suitable for deployment in the field. It is expected that the generic object detection workflow described can be extended to other object classes given the availability of suitable training data.
Foliage penetration by using 4-D point cloud data
NASA Astrophysics Data System (ADS)
Méndez Rodríguez, Javier; Sánchez-Reyes, Pedro J.; Cruz-Rivera, Sol M.
2012-06-01
Real-time awareness and rapid target detection are critical for the success of military missions. New technologies capable of detecting targets concealed in forest areas are needed in order to track and identify possible threats. Currently, LAser Detection And Ranging (LADAR) systems are capable of detecting obscured targets; however, tracking capabilities are severely limited. Now, a new LADAR-derived technology is under development to generate 4-D datasets (3-D video in a point cloud format). As such, there is a new need for algorithms that are able to process data in real time. We propose an algorithm capable of removing vegetation and other objects that may obfuscate concealed targets in a real 3-D environment. The algorithm is based on wavelets and can be used as a pre-processing step in a target recognition algorithm. Applications of the algorithm in a real-time 3-D system could help make pilots aware of high risk hidden targets such as tanks and weapons, among others. We will be using a 4-D simulated point cloud data to demonstrate the capabilities of our algorithm.
Identifying the location of a concealed object through unintentional eye movements
Neuman, Yair; Assaf, Dan; Israeli, Navot
2015-01-01
In some investigative and interrogative contexts, the investigator is seeking to identify the location of an object (e.g., implanted bomb) which is known to a given subject (e.g., a terrorist). In this paper, we present a non-intrusive methodology for uncovering the loci of a concealed object by analyzing the subject's eye movements. Using a combination of eye tracking, psychological manipulation and a search algorithm, we have performed two experiments. In the first experiment, we have gained 58% hit rate in identifying the location of the concealed object and in the second experiment 56% hit rate. The pros and cons of the methodology for forensic investigation are discussed. PMID:25904879
NASA Astrophysics Data System (ADS)
Nguyen, Lam; Wong, David; Ressler, Marc; Koenig, Francois; Stanton, Brian; Smith, Gregory; Sichina, Jeffrey; Kappra, Karl
2007-04-01
The U.S. Army Research Laboratory (ARL), as part of a mission and customer funded exploratory program, has developed a new low-frequency, ultra-wideband (UWB) synthetic aperture radar (SAR) for forward imaging to support the Army's vision of an autonomous navigation system for robotic ground vehicles. These unmanned vehicles, equipped with an array of imaging sensors, will be tasked to help detect man-made obstacles such as concealed targets, enemy minefields, and booby traps, as well as other natural obstacles such as ditches, and bodies of water. The ability of UWB radar technology to help detect concealed objects has been documented in the past and could provide an important obstacle avoidance capability for autonomous navigation systems, which would improve the speed and maneuverability of these vehicles and consequently increase the survivability of the U. S. forces on the battlefield. One of the primary features of the radar is the ability to collect and process data at combat pace in an affordable, compact, and lightweight package. To achieve this, the radar is based on the synchronous impulse reconstruction (SIRE) technique where several relatively slow and inexpensive analog-to-digital (A/D) converters are used to sample the wide bandwidth of the radar signals. We conducted an experiment this winter at Aberdeen Proving Ground (APG) to support the phenomenological studies of the backscatter from positive and negative obstacles for autonomous robotic vehicle navigation, as well as the detection of concealed targets of interest to the Army. In this paper, we briefly describe the UWB SIRE radar and the test setup in the experiment. We will also describe the signal processing and the forward imaging techniques used in the experiment. Finally, we will present imagery of man-made obstacles such as barriers, concertina wires, and mines.
Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects' Information
Ho, Peng Foong; Kam, Yvonne Hwei-Syn; Wee, Mee Chin
2014-01-01
Traditionally, picture-based password systems employ password objects (pictures/icons/symbols) as input during an authentication session, thus making them vulnerable to “shoulder-surfing” attack because the visual interface by function is easily observed by others. Recent software-based approaches attempt to minimize this threat by requiring users to enter their passwords indirectly by performing certain mental tasks to derive the indirect password, thus concealing the user's actual password. However, weaknesses in the positioning of distracter and password objects introduce usability and security issues. In this paper, a new method, which conceals information about the password objects as much as possible, is proposed. Besides concealing the password objects and the number of password objects, the proposed method allows both password and distracter objects to be used as the challenge set's input. The correctly entered password appears to be random and can only be derived with the knowledge of the full set of password objects. Therefore, it would be difficult for a shoulder-surfing adversary to identify the user's actual password. Simulation results indicate that the correct input object and its location are random for each challenge set, thus preventing frequency of occurrence analysis attack. User study results show that the proposed method is able to prevent shoulder-surfing attack. PMID:24991649
A non-imaging polarized terahertz passive system for detecting and identifying concealed explosives
NASA Astrophysics Data System (ADS)
Karam, Mostafa A.; Meyer, Doug
2011-06-01
Existing terahertz THz systems for detecting concealed explosives are not capable of identifying explosive type which leads to higher false alarm rates. Moreover, some of those systems are imaging systems that invade personal privacy, and require more processing and computational resources. Other systems have no polarization preference which makes them incapable of capturing the geometric features of an explosive. In this study a non-imaging polarized THz passive system for detecting and identifying concealed explosives overcoming the forgoing shortcomings is developed. The system employs a polarized passive THz sensor in acquiring emitted data from a scene that may have concealed explosives. The acquired data are decomposed into their natural resonance frequencies, and the number of those frequencies is used as criteria in detecting the explosive presence. If the presence of an explosive is confirmed, a set of physically based retrieval algorithms is used in extracting the explosive dielectric constant/refractive index value from natural resonance frequencies and amplitudes of associated signals. Comparing the refractive index value against a database of refractive indexes of known explosives identifies the explosive type. As an application, a system having a dual polarized radiometer operating within the frequency band of 0.62- 0.82 THz is presented and used in detecting and identifying person borne C-4 explosive concealed under a cotton garment. The system showed higher efficiencies in detecting and identifying the explosive.
Electromagnetic induction imaging of concealed metallic objects by means of resonating circuits
NASA Astrophysics Data System (ADS)
Guilizzoni, R.; Watson, J. C.; Bartlett, P. A.; Renzoni, F.
2016-05-01
An electromagnetic induction system, suitable for 2D imaging of metallic samples of different electrical conductivities, has been developed. The system is based on a parallel LCR circuit comprising a ferrite-cored coil (7.8 mm x 9.5 mm, L=680 μH at 1 KHz), a variable resistor and capacitor. The working principle of the system is based on eddy current induction inside a metallic sample when this is introduced into the AC magnetic field created by the coil. The inductance of the LCR circuit is modified due to the presence of the sample, to an extent that depends on its conductivity. Such modification is known to increase when the system is operated at its resonant frequency. Characterizing different metals based on their values of conductivity is therefore possible by utilizing a suitable system operated at resonance. Both imaging and material characterization were demonstrated by means of the proposed electromagnetic induction technique. Furthermore, the choice of using a system with an adjustable resonant frequency made it possible to select resonances that allow magnetic-field penetration through conductive screens. Investigations on the possibility of imaging concealed metals by penetrating such shields have been carried out. A penetration depth of δ~3 mm through aluminium (Al) was achieved. This allowed concealed metallic samples- having conductivities ranging from 0.54 to 59.77 MSm-1 and hidden behind 1.5-mm-thick Al shields- to be imaged. Our results demonstrate that the presence of the concealed metallic objects can be revealed. The technique was thus shown to be a promising detection tool for security applications.
Drug concealment in custody deaths--two cases.
Busuttil, A
1994-06-01
Internal concealment of drugs of abuse is a well established method of transporting such substances to avoid detection while they are being smuggled across international frontier lines.(1,2) The same method has been used by dealers and 'pushers' in between purchases on their selling rounds to avoid detection by the police. These methods of hiding drugs may be used by persons taken into short-term custody, in their belief that potential withdrawal effects would thus be avoided by continued availability of their drugs. Two cases are reported in which such concealment was discovered at autopsy after death had occurred while in police custody. In one case the drug concealed was dihydrocodeine and was directly responsible for the death.
Method and apparatus for detecting concealed weapons
Kotter, Dale K.; Fluck, Frederick D.
2006-03-14
Apparatus for classifying a ferromagnetic object within a sensing area may include a magnetic field sensor that produces magnetic field data. A signal processing system operatively associated with the magnetic field sensor includes a neural network. The neural network compares the magnetic field data with magnetic field data produced by known ferromagnetic objects to make a probabilistic determination as to the classification of the ferromagnetic object within the sensing area. A user interface operatively associated with the signal processing system produces a user-discernable output indicative of the probabilistic determination of the classification of the ferromagnetic object within a sensing area.
Improved segmentation of occluded and adjoining vehicles in traffic surveillance videos
NASA Astrophysics Data System (ADS)
Juneja, Medha; Grover, Priyanka
2013-12-01
Occlusion in image processing refers to concealment of any part of the object or the whole object from view of an observer. Real time videos captured by static cameras on roads often encounter overlapping and hence, occlusion of vehicles. Occlusion in traffic surveillance videos usually occurs when an object which is being tracked is hidden by another object. This makes it difficult for the object detection algorithms to distinguish all the vehicles efficiently. Also morphological operations tend to join the close proximity vehicles resulting in formation of a single bounding box around more than one vehicle. Such problems lead to errors in further video processing, like counting of vehicles in a video. The proposed system brings forward efficient moving object detection and tracking approach to reduce such errors. The paper uses successive frame subtraction technique for detection of moving objects. Further, this paper implements the watershed algorithm to segment the overlapped and adjoining vehicles. The segmentation results have been improved by the use of noise and morphological operations.
Detection and identification of concealed weapons using matrix pencil
NASA Astrophysics Data System (ADS)
Adve, Raviraj S.; Thayaparan, Thayananthan
2011-06-01
The detection and identification of concealed weapons is an extremely hard problem due to the weak signature of the target buried within the much stronger signal from the human body. This paper furthers the automatic detection and identification of concealed weapons by proposing the use of an effective approach to obtain the resonant frequencies in a measurement. The technique, based on Matrix Pencil, a scheme for model based parameter estimation also provides amplitude information, hence providing a level of confidence in the results. Of specific interest is the fact that Matrix Pencil is based on a singular value decomposition, making the scheme robust against noise.
Automated Human Screening for Detecting Concealed Knowledge
ERIC Educational Resources Information Center
Twyman, Nathan W.
2012-01-01
Screening individuals for concealed knowledge has traditionally been the purview of professional interrogators investigating a crime. But the ability to detect when a person is hiding important information would be of high value to many other fields and functions. This dissertation proposes design principles for and reports on an implementation…
Submillimetre wave imaging and security: imaging performance and prediction
NASA Astrophysics Data System (ADS)
Appleby, R.; Ferguson, S.
2016-10-01
Within the European Commission Seventh Framework Programme (FP7), CONSORTIS (Concealed Object Stand-Off Real-Time Imaging for Security) has designed and is fabricating a stand-off system operating at sub-millimetre wave frequencies for the detection of objects concealed on people. This system scans people as they walk by the sensor. This paper presents the top level system design which brings together both passive and active sensors to provide good performance. The passive system operates in two bands between 100 and 600GHz and is based on a cryogen free cooled focal plane array sensor whilst the active system is a solid-state 340GHz radar. A modified version of OpenFX was used for modelling the passive system. This model was recently modified to include realistic location-specific skin temperature and to accept animated characters wearing up to three layers of clothing that move dynamically, such as those typically found in cinematography. Targets under clothing have been modelled and the performance simulated. The strengths and weaknesses of this modelling approach are discussed.
Digital image modification detection using color information and its histograms.
Zhou, Haoyu; Shen, Yue; Zhu, Xinghui; Liu, Bo; Fu, Zigang; Fan, Na
2016-09-01
The rapid development of many open source and commercial image editing software makes the authenticity of the digital images questionable. Copy-move forgery is one of the most widely used tampering techniques to create desirable objects or conceal undesirable objects in a scene. Existing techniques reported in the literature to detect such tampering aim to improve the robustness of these methods against the use of JPEG compression, blurring, noise, or other types of post processing operations. These post processing operations are frequently used with the intention to conceal tampering and reduce tampering clues. A robust method based on the color moments and other five image descriptors is proposed in this paper. The method divides the image into fixed size overlapping blocks. Clustering operation divides entire search space into smaller pieces with similar color distribution. Blocks from the tampered regions will reside within the same cluster since both copied and moved regions have similar color distributions. Five image descriptors are used to extract block features, which makes the method more robust to post processing operations. An ensemble of deep compositional pattern-producing neural networks are trained with these extracted features. Similarity among feature vectors in clusters indicates possible forged regions. Experimental results show that the proposed method can detect copy-move forgery even if an image was distorted by gamma correction, addictive white Gaussian noise, JPEG compression, or blurring. Copyright © 2016. Published by Elsevier Ireland Ltd.
Concealed wire tracing apparatus
Kronberg, J.W.
1994-05-31
An apparatus and method that combines a signal generator and a passive signal receiver to detect and record the path of partially or completely concealed electrical wiring without disturbing the concealing surface is disclosed. The signal generator applies a series of electrical pulses to the selected wiring of interest. The applied pulses create a magnetic field about the wiring that can be detected by a coil contained within the signal receiver. An audible output connected to the receiver and driven by the coil reflects the receivers position with respect to the wiring. The receivers audible signal is strongest when the receiver is directly above the wiring and the long axis of the receivers coil is parallel to the wiring. A marking means is mounted on the receiver to mark the location of the wiring as the receiver is directed over the wiring's concealing surface. Numerous marks made on various locations of the concealing surface will trace the path of the wiring of interest. 4 figs.
NASA Astrophysics Data System (ADS)
Reber, E. E.; Foote, F. B.; Schellenbaum, R. L.; Bradley, R. G.
1981-07-01
The potential of radiometric imaging technique to detect shielded nuclear materials and explosives carried covertly by personnel was investigated. This method of detecting contraband depends upon the differences in emissivity and reflectivity of the contraband relative to human tissue. Explosives, unlike metals and metal composites, generally have high emissivities and low reflectivities that closely approximate those of human tissue making explosives difficult to detect. Samples of several common types of explosives (TNT, Detasheet, C4, and several types of water gels) were examined at the 1.4- and 3-mm wavelengths using active and passive radiometeric techniques.
NASA Astrophysics Data System (ADS)
Rojali, Siahaan, Ida Sri Rejeki; Soewito, Benfano
2017-08-01
Steganography is the art and science of hiding the secret messages so the existence of the message cannot be detected by human senses. The data concealment is using the Multi Pixel Value Differencing (MPVD) algorithm, utilizing the difference from each pixel. The development was done by using six interval tables. The objective of this algorithm is to enhance the message capacity and to maintain the data security.
Image fusion based on millimeter-wave for concealed weapon detection
NASA Astrophysics Data System (ADS)
Zhu, Weiwen; Zhao, Yuejin; Deng, Chao; Zhang, Cunlin; Zhang, Yalin; Zhang, Jingshui
2010-11-01
This paper describes a novel multi sensors image fusion technology which is presented for concealed weapon detection (CWD). It is known to all, because of the good transparency of the clothes at millimeter wave band, a millimeter wave radiometer can be used to image and distinguish concealed contraband beneath clothes, for example guns, knives, detonator and so on. As a result, we adopt the passive millimeter wave (PMMW) imaging technology for airport security. However, in consideration of the wavelength of millimeter wave and the single channel mechanical scanning, the millimeter wave image has law optical resolution, which can't meet the need of practical application. Therefore, visible image (VI), which has higher resolution, is proposed for the image fusion with the millimeter wave image to enhance the readability. Before the image fusion, a novel image pre-processing which specifics to the fusion of millimeter wave imaging and visible image is adopted. And in the process of image fusion, multi resolution analysis (MRA) based on Wavelet Transform (WT) is adopted. In this way, the experiment result shows that this method has advantages in concealed weapon detection and has practical significance.
Video error concealment using block matching and frequency selective extrapolation algorithms
NASA Astrophysics Data System (ADS)
P. K., Rajani; Khaparde, Arti
2017-06-01
Error Concealment (EC) is a technique at the decoder side to hide the transmission errors. It is done by analyzing the spatial or temporal information from available video frames. It is very important to recover distorted video because they are used for various applications such as video-telephone, video-conference, TV, DVD, internet video streaming, video games etc .Retransmission-based and resilient-based methods, are also used for error removal. But these methods add delay and redundant data. So error concealment is the best option for error hiding. In this paper, the error concealment methods such as Block Matching error concealment algorithm is compared with Frequency Selective Extrapolation algorithm. Both the works are based on concealment of manually error video frames as input. The parameter used for objective quality measurement was PSNR (Peak Signal to Noise Ratio) and SSIM(Structural Similarity Index). The original video frames along with error video frames are compared with both the Error concealment algorithms. According to simulation results, Frequency Selective Extrapolation is showing better quality measures such as 48% improved PSNR and 94% increased SSIM than Block Matching Algorithm.
Holographic radar imaging privacy techniques utilizing dual-frequency implementation
NASA Astrophysics Data System (ADS)
McMakin, Douglas L.; Hall, Thomas E.; Sheen, David M.
2008-04-01
Over the last 15 years, the Pacific Northwest National Laboratory has performed significant research and development activities to enhance the state of the art of holographic radar imaging systems to be used at security checkpoints for screening people for concealed threats hidden under their garments. These enhancement activities included improvements to privacy techniques to remove human features and providing automatic detection of body-worn concealed threats. The enhanced privacy and detection methods used both physical and software imaging techniques. The physical imaging techniques included polarization-diversity illumination and reception, dual-frequency implementation, and high-frequency imaging at 60 GHz. Software imaging techniques to enhance the privacy of the person under surveillance included extracting concealed threat artifacts from the imagery to automatically detect the threat. This paper will focus on physical privacy techniques using dual-frequency implementation.
Holographic Radar Imaging Privacy Techniques Utilizing Dual-Frequency Implementation
DOE Office of Scientific and Technical Information (OSTI.GOV)
McMakin, Douglas L.; Hall, Thomas E.; Sheen, David M.
2008-04-18
Over the last 15 years, the Pacific Northwest National Laboratory has performed significant research and development activities to enhance the state of the art of holographic radar imaging systems to be used at security checkpoints for screening people for concealed threats hidden under their garments. These enhancement activities included improvements to privacy techniques to remove human features and providing automatic detection of body-worn concealed threats. The enhanced privacy and detection methods used both physical and software imaging techniques. The physical imaging techniques included polarization-diversity illumination and reception, dual-frequency implementation, and high-frequency imaging at 60 GHz. Software imaging techniques to enhancemore » the privacy of the person under surveillance included extracting concealed threat artifacts from the imagery to automatically detect the threat. This paper will focus on physical privacy techniques using dual-frequency implementation.« less
Protection of Public Figures. Symposium Proceedings, May 16-18, 1972
1972-01-01
192 EXPLOSIVE TRACE VAPOR DETECTION, Maryland D. Keyrw, USAMERDC.. 194 ATOMIC AND MOLECULAR DETECTION...subject through a doorway, a hallway, a portal, a fence, and thus subject him to co- vert surveillance for weapons or explosives concealed on his person...who has weapons or conceal- ed explosives on his person. So insofar as 4ERDC is concerned, the two broad scenarios that we will be talking about are
Goldstein, Adam O; Viera, Anthony J; Pierson, John; Barnhouse, Kathy K; Tulsky, James A; Richman, Barak D
2015-06-01
Law enforcement officials have asked health care providers to evaluate patient applications for concealed weapon permits. The current study was designed to examine physician beliefs regarding competency to carry a concealed weapon for patients with specific physical and mental conditions. Among 222 North Carolina physicians who participated in this survey (40% response rate), large variation and uncertainty existed for determining competency. Physicians most frequently chose mild dementia, post-traumatic stress disorder, and recent depression as conditions that would render a patient not competent to carry a concealed weapon. Male physicians and those owning a gun were more likely to deem a patient competent. Almost a third of physicians were unsure about competence for most conditions. Physicians asked to assess competency of patients to carry a concealed weapon have quite disparate views on competency and little confidence in their decisions. If physicians are expected to assess patient competence to carry a concealed weapon, more objective criteria and training are needed. Copyright © 2015 John Wiley & Sons, Ltd.
NASA Astrophysics Data System (ADS)
Trofimov, Vyacheslav A.; Trofimov, Vladislav V.; Kuchik, Igor E.
2014-06-01
As it is well-known, application of the passive THz camera for the security problems is very promising way. It allows seeing concealed object without contact with a person and this camera is non-dangerous for a person. We demonstrate new possibility of the passive THz camera using for a temperature difference observing on the human skin if this difference is caused by different temperatures inside the body. We discuss some physical experiments, in which a person drinks hot, and warm, and cold water and he eats. After computer processing of images captured by passive THz camera TS4 we may see the pronounced temperature trace on skin of the human body. For proof of validity of our statement we make the similar physical experiment using the IR camera. Our investigation allows to increase field of the passive THz camera using for the detection of objects concealed in the human body because the difference in temperature between object and parts of human body will be reflected on the human skin. However, modern passive THz cameras have not enough resolution in a temperature to see this difference. That is why, we use computer processing to enhance the camera resolution for this application. We consider images produced by THz passive cameras manufactured by Microsemi Corp., and ThruVision Corp.
Cloaks and antiobject-independent illusion optics based on illusion media
NASA Astrophysics Data System (ADS)
Li, Zhou; Zang, XiaoFei; Cai, Bin; Shi, Cheng; Zhu, YiMing
2013-11-01
Based on the transformation optics, we propose a new strategy of illusion media consisting of homogeneous and anisotropic materials. By utilizing the illusion media, invisible cloak is theoretically realized, in which objects covered with the illusion media could not be detected. The cloak here allows neither the propagation of light around the concealed region nor compensates the scattering field of object outside the media. What the cloak does is to shift the region into another place where outside the trace of light, so that objects in that region can disappear. Another application of the illusion media is to create the antiobject-independent illusion optics which means that two objects appear to be like some other objects of our choice. Finite element simulations for two-dimensional cases have been performed to prove these ideas.
Possible standoff detection of ionizing radiation using high-power THz electromagnetic waves
NASA Astrophysics Data System (ADS)
Nusinovich, Gregory S.; Sprangle, Phillip; Romero-Talamas, Carlos A.; Rodgers, John; Pu, Ruifeng; Kashyn, Dmytro G.; Antonsen, Thomas M., Jr.; Granatstein, Victor L.
2012-06-01
Recently, a new method of remote detection of concealed radioactive materials was proposed. This method is based on focusing high-power short wavelength electromagnetic radiation in a small volume where the wave electric field exceeds the breakdown threshold. In the presence of free electrons caused by ionizing radiation, in this volume an avalanche discharge can then be initiated. When the wavelength is short enough, the probability of having even one free electron in this small volume in the absence of additional sources of ionization is low. Hence, a high breakdown rate will indicate that in the vicinity of this volume there are some materials causing ionization of air. To prove this concept a 0.67 THz gyrotron delivering 200-300 kW power in 10 microsecond pulses is under development. This method of standoff detection of concealed sources of ionizing radiation requires a wide range of studies, viz., evaluation of possible range, THz power and pulse duration, production of free electrons in air by gamma rays penetrating through container walls, statistical delay time in initiation of the breakdown in the case of low electron density, temporal evolution of plasma structure in the breakdown and scattering of THz radiation from small plasma objects. Most of these issues are discussed in the paper.
Hiding and finding: the relationship between visual concealment and visual search.
Smilek, Daniel; Weinheimer, Laura; Kwan, Donna; Reynolds, Mike; Kingstone, Alan
2009-11-01
As an initial step toward developing a theory of visual concealment, we assessed whether people would use factors known to influence visual search difficulty when the degree of concealment of objects among distractors was varied. In Experiment 1, participants arranged search objects (shapes, emotional faces, and graphemes) to create displays in which the targets were in plain sight but were either easy or hard to find. Analyses of easy and hard displays created during Experiment 1 revealed that the participants reliably used factors known to influence search difficulty (e.g., eccentricity, target-distractor similarity, presence/absence of a feature) to vary the difficulty of search across displays. In Experiment 2, a new participant group searched for the targets in the displays created by the participants in Experiment 1. Results indicated that search was more difficult in the hard than in the easy condition. In Experiments 3 and 4, participants used presence versus absence of a feature to vary search difficulty with several novel stimulus sets. Taken together, the results reveal a close link between the factors that govern concealment and the factors known to influence search difficulty, suggesting that a visual search theory can be extended to form the basis of a theory of visual concealment.
Impulse radar imaging system for concealed object detection
NASA Astrophysics Data System (ADS)
Podd, F. J. W.; David, M.; Iqbal, G.; Hussain, F.; Morris, D.; Osakue, E.; Yeow, Y.; Zahir, S.; Armitage, D. W.; Peyton, A. J.
2013-10-01
Electromagnetic systems for imaging concealed objects at checkpoints typically employ radiation at millimetre and terahertz frequencies. These systems have been shown to be effective and provide a sufficiently high resolution image. However there are difficulties and current electromagnetic systems have limitations particularly in accurately differentiating between threat and innocuous objects based on shape, surface emissivity or reflectivity, which are indicative parameters. In addition, water has a high absorption coefficient at millimetre wavelength and terahertz frequencies, which makes it more difficult for these frequencies to image through thick damp clothing. This paper considers the potential of using ultra wideband (UWB) in the low gigahertz range. The application of this frequency band to security screening appears to be a relatively new field. The business case for implementing the UWB system has been made financially viable by the recent availability of low-cost integrated circuits operating at these frequencies. Although designed for the communication sector, these devices can perform the required UWB radar measurements as well. This paper reports the implementation of a 2 to 5 GHz bandwidth linear array scanner. The paper describes the design and fabrication of transmitter and receiver antenna arrays whose individual elements are a type of antipodal Vivaldi antenna. The antenna's frequency and angular response were simulated in CST Microwave Studio and compared with laboratory measurements. The data pre-processing methods of background subtraction and deconvolution are implemented to improve the image quality. The background subtraction method uses a reference dataset to remove antenna crosstalk and room reflections from the dataset. The deconvolution method uses a Wiener filter to "sharpen" the returned echoes which improves the resolution of the reconstructed image. The filter uses an impulse response reference dataset and a signal-to-noise parameter to determine how the frequencies contained in the echo dataset are normalised. The chosen image reconstruction algorithm is based on the back-projection method. The algorithm was implemented in MATLAB and uses a pre-calculated sensitivity matrix to increase the computation speed. The results include both 2D and 3D image datasets. The 3D datasets were obtained by scanning the dual sixteen element linear antenna array over the test object. The system has been tested on both humans and mannequin test objects. The front surface of an object placed on the human/mannequin torso is clearly visible, but its presence is also seen from a tell-tale imaging characteristic. This characteristic is caused by a reduction in the wave velocity as the electromagnetic radiation passes through the object, and manifests as an indentation in the reconstructed image that is readily identifiable. The prototype system has been shown to easily detect a 12 mm x 30 mm x70 mm plastic object concealed under clothing.
Mapping Fearscapes of a Mammalian Herbivore using Terrestrial LiDAR and UAV Imagery
NASA Astrophysics Data System (ADS)
Olsoy, P.; Nobler, J. D.; Forbey, J.; Rachlow, J. L.; Burgess, M. A.; Glenn, N. F.; Shipley, L. A.
2013-12-01
Concealment allows prey animals to remain hidden from a predator and can influence both real and perceived risks of predation. The heterogeneous nature of vegetative structure can create a variable landscape of concealment - a 'fearscape' - that may influence habitat quality and use by prey. Traditional measurements of concealment rely on a limited number of distances, heights, and vantage points, resulting in small snapshots of concealment available to a prey animal. Our objective was to demonstrate the benefits of emerging remote sensing techniques to map fearscapes for pygmy rabbits (Brachylagus idahoensis) in sagebrush steppe habitat across a continuous range of scales. Specifically, we used vegetation height rasters derived from terrestrial laser scanning (TLS) to create viewsheds from multiple vantage points, representing predator visibility. The sum of all the viewsheds modeled horizontal concealment of prey at both the shrub and patch scales. We also used a small, unmanned aerial vehicle (UAV) to determine vertical concealment at a habitat scale. Terrestrial laser scanning provided similar estimates of horizontal concealment at the shrub scale when compared to photographic methods (R2 = 0.85). Both TLS and UAV provide the potential to quantify concealment of prey from multiple distances, heights, or vantage points, allowing the creation of a manipulable fearscape map that can be correlated with habitat use by prey animals. The predictive power of such a map also could identify shrubs or patches for fine scale nutritional and concealment analysis for future investigation and conservation efforts. Fearscape map at the mound-scale. Viewsheds were calculated from 100 equally spaced observer points located 4 m from the closest on-mound sagebrush of interest. Red areas offer low concealment, while green areas provide high concealment.
Change-based threat detection in urban environments with a forward-looking camera
NASA Astrophysics Data System (ADS)
Morton, Kenneth, Jr.; Ratto, Christopher; Malof, Jordan; Gunter, Michael; Collins, Leslie; Torrione, Peter
2012-06-01
Roadside explosive threats continue to pose a significant risk to soldiers and civilians in conflict areas around the world. These objects are easy to manufacture and procure, but due to their ad hoc nature, they are difficult to reliably detect using standard sensing technologies. Although large roadside explosive hazards may be difficult to conceal in rural environments, urban settings provide a much more complicated background where seemingly innocuous objects (e.g., piles of trash, roadside debris) may be used to obscure threats. Since direct detection of all innocuous objects would flag too many objects to be of use, techniques must be employed to reduce the number of alarms generated and highlight only a limited subset of possibly threatening regions for the user. In this work, change detection techniques are used to reduce false alarm rates and increase detection capabilities for possible threat identification in urban environments. The proposed model leverages data from multiple video streams collected over the same regions by first applying video aligning and then using various distance metrics to detect changes based on image keypoints in the video streams. Data collected at an urban warfare simulation range at an Eastern US test site was used to evaluate the proposed approach, and significant reductions in false alarm rates compared to simpler techniques are illustrated.
Beam Width Robustness of a 670 GHz Imaging Radar
NASA Technical Reports Server (NTRS)
Cooper, K. B.; Llombart, N.; Dengler, R. J.; Siegel, P. H.
2009-01-01
Detection of a replica bomb belt concealed on a mannequin at 4 m standoff range is achieved using a 670 GHz imaging radar. At a somewhat larger standoff range of 4.6 m, the radar's beam width increases substantially, but the through-shirt image quality remains good. This suggests that a relatively modest increase in aperture size over the current design will be sufficient to detect person-borne concealed weapons at ranges exceeding 25 meters.
Standoff concealed weapon detection using a 350-GHz radar imaging system
NASA Astrophysics Data System (ADS)
Sheen, David M.; Hall, Thomas E.; Severtsen, Ronald H.; McMakin, Douglas L.; Hatchell, Brian K.; Valdez, Patrick L. J.
2010-04-01
The sub-millimeter (sub-mm) wave frequency band from 300 - 1000 GHz is currently being developed for standoff concealed weapon detection imaging applications. This frequency band is of interest due to the unique combination of high resolution and clothing penetration. The Pacific Northwest National Laboratory (PNNL) is currently developing a 350 GHz, active, wideband, three-dimensional, radar imaging system to evaluate the feasibility of active sub-mm imaging for standoff detection. Standoff concealed weapon and explosive detection is a pressing national and international need for both civilian and military security, as it may allow screening at safer distances than portal screening techniques. PNNL has developed a prototype active wideband 350 GHz radar imaging system based on a wideband, heterodyne, frequency-multiplier-based transceiver system coupled to a quasi-optical focusing system and high-speed rotating conical scanner. This prototype system operates at ranges up to 10+ meters, and can acquire an image in 10 - 20 seconds, which is fast enough to scan cooperative personnel for concealed weapons. The wideband operation of this system provides accurate ranging information, and the images obtained are fully three-dimensional. During the past year, several improvements to the system have been designed and implemented, including increased imaging speed using improved balancing techniques, wider bandwidth, and improved image processing techniques. In this paper, the imaging system is described in detail and numerous imaging results are presented.
Detecting persons concealed in a vehicle
Tucker, Jr., Raymond W.
2005-03-29
An improved method for detecting the presence of humans or animals concealed within in a vehicle uses a combination of the continuous wavelet transform and a ratio-based energy calculation to determine whether the motion detected using seismic sensors placed on the vehicle is due to the presence of a heartbeat within the vehicle or is the result of motion caused by external factors such as the wind. The method performs well in the presence of light to moderate ambient wind levels, producing far fewer false alarm indications. The new method significantly improves the range of ambient environmental conditions under which human presence detection systems can reliably operate.
Millimeter wave imaging for concealed weapon detection and surveillance at up to 220 GHz
NASA Astrophysics Data System (ADS)
Stanko, S.; Nötel, D.; Huck, J.; Wirtz, S.; Klöppel, F.; Essen, H.
2008-04-01
Sensors used for security purposes have to cover the non-invasive control of men and direct surroundings of buildings and camps to detect weapons, explosives and chemical or biological threat material. Those sensors have to cope with different environmental conditions. Ideally, the control of people has to be done at a longer distance as standoff detection. The work described in this paper concentrates on passive radiometric sensors at 0.1 and 0.2 THz which are able to detect non-metallic objects like ceramic knifes. Also the identification of objects like mobile phones or PDAs will be shown. Additionally, standoff surveillance is possible, which is of high importance with regard to suicide bombers. The presentation will include images at both mentioned frequencies comparing the efficiency in terms of range and resolution. In addition, the concept of the sensor design showing a Dicke-type 220GHz radiometer using new LNAs and the results along with image enhancement methods are shown. 2.1 Main principle
Camouflage, detection and identification of moving targets
Hall, Joanna R.; Cuthill, Innes C.; Baddeley, Roland; Shohet, Adam J.; Scott-Samuel, Nicholas E.
2013-01-01
Nearly all research on camouflage has investigated its effectiveness for concealing stationary objects. However, animals have to move, and patterns that only work when the subject is static will heavily constrain behaviour. We investigated the effects of different camouflages on the three stages of predation—detection, identification and capture—in a computer-based task with humans. An initial experiment tested seven camouflage strategies on static stimuli. In line with previous literature, background-matching and disruptive patterns were found to be most successful. Experiment 2 showed that if stimuli move, an isolated moving object on a stationary background cannot avoid detection or capture regardless of the type of camouflage. Experiment 3 used an identification task and showed that while camouflage is unable to slow detection or capture, camouflaged targets are harder to identify than uncamouflaged targets when similar background objects are present. The specific details of the camouflage patterns have little impact on this effect. If one has to move, camouflage cannot impede detection; but if one is surrounded by similar targets (e.g. other animals in a herd, or moving background distractors), then camouflage can slow identification. Despite previous assumptions, motion does not entirely ‘break’ camouflage. PMID:23486439
Camouflage, detection and identification of moving targets.
Hall, Joanna R; Cuthill, Innes C; Baddeley, Roland; Shohet, Adam J; Scott-Samuel, Nicholas E
2013-05-07
Nearly all research on camouflage has investigated its effectiveness for concealing stationary objects. However, animals have to move, and patterns that only work when the subject is static will heavily constrain behaviour. We investigated the effects of different camouflages on the three stages of predation-detection, identification and capture-in a computer-based task with humans. An initial experiment tested seven camouflage strategies on static stimuli. In line with previous literature, background-matching and disruptive patterns were found to be most successful. Experiment 2 showed that if stimuli move, an isolated moving object on a stationary background cannot avoid detection or capture regardless of the type of camouflage. Experiment 3 used an identification task and showed that while camouflage is unable to slow detection or capture, camouflaged targets are harder to identify than uncamouflaged targets when similar background objects are present. The specific details of the camouflage patterns have little impact on this effect. If one has to move, camouflage cannot impede detection; but if one is surrounded by similar targets (e.g. other animals in a herd, or moving background distractors), then camouflage can slow identification. Despite previous assumptions, motion does not entirely 'break' camouflage.
ERIC Educational Resources Information Center
Price, James H.; Thompson, Amy; Khubchandani, Jagdish; Dake, Joseph; Payton, Erica; Teeple, Karen
2014-01-01
Objective: To assess the perceptions and practices of a national sample of college and university presidents regarding their support for concealed handguns being carried on college campuses. Participants: The sample for this study consisted of a national random sample of 900 college or university presidents. Methods: In the spring of 2013, a…
A simulation study of detection of weapon of mass destruction based on radar
NASA Astrophysics Data System (ADS)
Sharifahmadian, E.; Choi, Y.; Latifi, S.
2013-05-01
Typical systems used for detection of Weapon of Mass Destruction (WMD) are based on sensing objects using gamma rays or neutrons. Nonetheless, depending on environmental conditions, current methods for detecting fissile materials have limited distance of effectiveness. Moreover, radiation related to gamma- rays can be easily shielded. Here, detecting concealed WMD from a distance is simulated and studied based on radar, especially WideBand (WB) technology. The WB-based method capitalizes on the fact that electromagnetic waves penetrate through different materials at different rates. While low-frequency waves can pass through objects more easily, high-frequency waves have a higher rate of absorption by objects, making the object recognition easier. Measuring the penetration depth allows one to identify the sensed material. During simulation, radar waves and propagation area including free space, and objects in the scene are modeled. In fact, each material is modeled as a layer with a certain thickness. At start of simulation, a modeled radar wave is radiated toward the layers. At the receiver side, based on the received signals from every layer, each layer can be identified. When an electromagnetic wave passes through an object, the wave's power will be subject to a certain level of attenuation depending of the object's characteristics. Simulation is performed using radar signals with different frequencies (ranges MHz-GHz) and powers to identify different layers.
Fast, High-Resolution Terahertz Radar Imaging at 25 Meters
NASA Technical Reports Server (NTRS)
Cooper, Ken B.; Dengler, Robert J.; Llombart, Nuria; Talukder, Ashit; Panangadan, Anand V.; Peay, Chris S.; Siegel, Peter H.
2010-01-01
We report improvements in the scanning speed and standoff range of an ultra-wide bandwidth terahertz (THz) imaging radar for person-borne concealed object detection. Fast beam scanning of the single-transceiver radar is accomplished by rapidly deflecting a flat, light-weight subreflector in a confocal Gregorian optical geometry. With RF back-end improvements also implemented, the radar imaging rate has increased by a factor of about 30 compared to that achieved previously in a 4 m standoff prototype instrument. In addition, a new 100 cm diameter ellipsoidal aluminum reflector yields beam spot diameters of approximately 1 cm over a 50x50 cm field of view at a range of 25 m, although some aberrations are observed that probably arise from misaligned optics. Through-clothes images of a concealed threat at 25 m range, acquired in 5 seconds, are presented, and the impact of reduced signal-to-noise from an even faster frame rate is analyzed. These results inform the system requirements for eventually achieving sub-second or video-rate THz radar imaging.
Schrimshaw, Eric W.; Siegel, Karolynn; Downing, Martin J.; Parsons, Jeffrey T.
2013-01-01
Objective Although bisexual men report lower levels of mental health relative to gay men, few studies have examined the factors that contribute to bisexual men’s mental health. Bisexual men are less likely to disclose, and more likely to conceal (i.e., a desire to hide), their sexual orientation than gay men. Theory suggests that this may adversely impact their mental health. This report examined the factors associated with disclosure and with concealment of sexual orientation, the association of disclosure and concealment with mental health, and the potential mediators (i.e., internalized homophobia, social support) of this association with mental health. Method An ethnically-diverse sample of 203 non-gay-identified, behaviorally-bisexual men who do not disclose their same-sex behavior to their female partners were recruited in New York City to complete a single set of self-report measures. Results Concealment was associated with higher income, a heterosexual identification, living with a wife or girlfriend, more frequent sex with women, and less frequent sex with men. Greater concealment, but not disclosure to friends and family, was significantly associated with lower levels of mental health. Multiple mediation analyses revealed that both internalized homophobia and general emotional support significantly mediated the association between concealment and mental health. Conclusions The findings demonstrate that concealment and disclosure are independent constructs among bisexual men. Further, they suggest that interventions addressing concerns about concealment, emotional support, and internalized homophobia may be more beneficial for increasing the mental health of bisexual men than those focused on promoting disclosure. PMID:23276123
Specific NIST projects in support of the NIJ Concealed Weapon Detection and Imaging Program
NASA Astrophysics Data System (ADS)
Paulter, Nicholas G.
1998-12-01
The Electricity Division of the National Institute of Standards and Technology is developing revised performance standards for hand-held (HH) and walk-through (WT) metal weapon detectors, test procedures and systems for these detectors, and a detection/imaging system for finding concealed weapons. The revised standards will replace the existing National Institute of Justice (NIJ) standards for HH and WT devices and will include detection performance specifications as well as system specifications (environmental conditions, mechanical strength and safety, response reproducibility and repeatability, quality assurance, test reporting, etc.). These system requirements were obtained from the Law Enforcement and corrections Technology Advisory Council, an advisory council for the NIJ. Reproducible and repeatable test procedures and appropriate measurement systems will be developed for evaluating HH and WT detection performance. A guide to the technology and application of non- eddy-current-based detection/imaging methods (such as acoustic, passive millimeter-wave and microwave, active millimeter-wave and terahertz-wave, x-ray, etc.) Will be developed. The Electricity Division is also researching the development of a high- frequency/high-speed (300 GH to 1 THz) pulse-illuminated, stand- off, video-rate, concealed weapons/contraband imaging system.
An interfering Go/No-go task does not affect accuracy in a Concealed Information Test.
Ambach, Wolfgang; Stark, Rudolf; Peper, Martin; Vaitl, Dieter
2008-04-01
Following the idea that response inhibition processes play a central role in concealing information, the present study investigated the influence of a Go/No-go task as an interfering mental activity, performed parallel to the Concealed Information Test (CIT), on the detectability of concealed information. 40 undergraduate students participated in a mock-crime experiment and simultaneously performed a CIT and a Go/No-go task. Electrodermal activity (EDA), respiration line length (RLL), heart rate (HR) and finger pulse waveform length (FPWL) were registered. Reaction times were recorded as behavioral measures in the Go/No-go task as well as in the CIT. As a within-subject control condition, the CIT was also applied without an additional task. The parallel task did not influence the mean differences of the physiological measures of the mock-crime-related probe and the irrelevant items. This finding might possibly be due to the fact that the applied parallel task induced a tonic rather than a phasic mental activity, which did not influence differential responding to CIT items. No physiological evidence for an interaction between the parallel task and sub-processes of deception (e.g. inhibition) was found. Subjects' performance in the Go/No-go parallel task did not contribute to the detection of concealed information. Generalizability needs further investigations of different variations of the parallel task.
Ishikawa, Muriel Y.; Wood, Lowell L.; Lougheed, Ronald W.; Moody, Kenton J.; Wang, Tzu-Fang
2004-05-25
A covert, gamma-ray "signature" is used as a "watermark" for property identification. This new watermarking technology is based on a unique steganographic or "hidden writing" digital signature, implemented in tiny quantities of gamma-ray-emitting radioisotopic material combinations, generally covertly emplaced on or within an object. This digital signature may be readily recovered at distant future times, by placing a sensitive, high energy-resolution gamma-ray detecting instrument reasonably precisely over the location of the watermark, which location may be known only to the object's owner; however, the signature is concealed from all ordinary detection means because its exceedingly low level of activity is obscured by the natural radiation background (including the gamma radiation naturally emanating from the object itself, from cosmic radiation and material surroundings, from human bodies, etc.). The "watermark" is used in object-tagging for establishing object identity, history or ownership. It thus may serve as an aid to law enforcement officials in identifying stolen property and prosecuting theft thereof. Highly effective, potentially very low cost identification-on demand of items of most all types is thus made possible.
Fey, David L.; Granitto, Matthew; Giles, Stuart A.; Smith, Steven M.; Eppinger, Robert G.; Kelley, Karen D.
2009-01-01
In the summer of 2007, the U.S. Geological Survey (USGS) began an exploration geochemical research study over the Pebble porphyry copper-gold-molybdenum deposit. This report presents the analytical data collected in 2008. The Pebble deposit is world class in size, and is almost entirely concealed by tundra, glacial deposits, and post-Cretaceous volcanic rocks. The Pebble deposit was chosen for this study because it is concealed by surficial cover rocks, is relatively undisturbed (except for exploration company drill holes), is a large mineral system, and is fairly well-constrained at depth by the drill hole geology and geochemistry. The goals of this study are to 1) determine whether the concealed deposit can be detected with surface samples, 2) better understand the processes of metal migration from the deposit to the surface, and 3) test and develop methods for assessing mineral resources in similar concealed terrains. The analytical data are presented as an integrated Microsoft Access 2003 database and as separate Excel files.
NASA Astrophysics Data System (ADS)
Dogan, Mesut; Yesilyurt, Omer; Turhan-Sayan, Gonul
2018-04-01
Ground penetrating radar (GPR) is an ultra-wideband electromagnetic sensor used not only for subsurface sensing but also for the detection of objects which may be hidden behind a wall or inserted within the wall. Such applications of the GPR technology are used in both military and civilian operations such as mine or IED (improvised explosive device) detection, rescue missions after earthquakes and investigation of archeological sites. Detection of concealed objects with low metal content is known to be a challenging problem in general. Use of A-scan, B-scan and C-scan GPR data in combination provides valuable information for target recognition in such applications. In this paper, we study the problem of target detection for potentially explosive objects embedded inside a wall. GPR data is numerically simulated by using an FDTD-based numerical computation tool when dielectric targets and targets with low metal content are inserted into different types of walls. A small size plastic bottle filled with trinitrotoluene (TNT) is used as the target with and without a metal fuse in it. The targets are buried into two different types of wall; a homogeneous brick wall and an inhomogeneous wall constructed by bricks having periodically located air holes in it. Effects of using an inhomogeneous wall structure with internal boundaries are investigated as a challenging scenario, paying special attention to preprocessing.
Passive millimeter-wave concealed weapon detection
NASA Astrophysics Data System (ADS)
Sinclair, Gordon N.; Anderton, Rupert N.; Appleby, Roger
2001-02-01
A method of detecting weapons concealed under clothing using passive millimeter wave imaging is described. The optical properties of clothing are discussed and examples given of the spectral reflectivity and transmission. The transmission tends to be constant from 60 to 150 GHz above which it decreases for some clothing materials. The transmission of a cotton T-shirt is typically 95% and of a leather jacket up to 85% at lower frequencies. A model is presented for calculating the contrast of a metallic concealed weapon when hidden under clothing and it indicates contrasts as large as 200 K can be realized outdoors. The advantages of real time over static frame imagery are discussed. It is concluded that real time imagery offers considerable advantages as weapons can be very varied in size, position and orientation and movement offers vital clues to the human observer which aid the recognition process.
Determinants of felt stigma in epilepsy.
Aydemir, N; Kaya, B; Yıldız, G; Öztura, I; Baklan, B
2016-05-01
The present study aimed to determine the level of felt stigma, overprotection, concealment, and concerns related to epilepsy in different life domains by using culturally-specific scales for Turkish individuals with epilepsy. Also, it aimed to detect relations among the study variables and to determine the variables which predict felt stigma. For this purpose, felt stigma scale, overprotection scale, concealment of epilepsy scale, and concerns of epilepsy scale were administered to two hundred adult persons with epilepsy (PWE). The results showed that almost half of the participants reported felt stigma, overprotection, concealment of epilepsy, concerns related to future occupation, and concerns related to social life. Almost all the study variables show correlations with each other. Concealment of epilepsy, concerns related to social life, and concerns related to future occupation were found as the predictors of felt stigma. Copyright © 2016 Elsevier Inc. All rights reserved.
Cheng, Qiluan; Wu, Kedi; Shi, Yile; Wang, Hui; Wang, Guo Ping
2015-01-01
Realization of a perfect invisibility cloak still challenges the current fabricating technologies. Most experiments, if not all, are hence focused on carpet cloaks because of their relatively low requirements to material properties. Nevertheless, present invisibility carpets are used to hide beneath objects. Here, we report a carpet-like device to directionally conceal objects and further to create illusions above it. The device is fabricated through recording a reflection hologram of objects and is used to produce a time-reversed signal to compensate for the information of the objects and further to create light field of another object so as to realize both functions of hiding the objects and creating illusions, respectively. The carpet-like device can work for macroscopic objects at visible wavelength as the distance between objects and device is at decimeter scale. Our carpet-like device to realizing invisibility and creating illusions may provide a robust way for crucial applications of magic camouflaging and anti-detection etc. PMID:25716451
NASA Astrophysics Data System (ADS)
Cheng, Qiluan; Wu, Kedi; Shi, Yile; Wang, Hui; Wang, Guo Ping
2015-02-01
Realization of a perfect invisibility cloak still challenges the current fabricating technologies. Most experiments, if not all, are hence focused on carpet cloaks because of their relatively low requirements to material properties. Nevertheless, present invisibility carpets are used to hide beneath objects. Here, we report a carpet-like device to directionally conceal objects and further to create illusions above it. The device is fabricated through recording a reflection hologram of objects and is used to produce a time-reversed signal to compensate for the information of the objects and further to create light field of another object so as to realize both functions of hiding the objects and creating illusions, respectively. The carpet-like device can work for macroscopic objects at visible wavelength as the distance between objects and device is at decimeter scale. Our carpet-like device to realizing invisibility and creating illusions may provide a robust way for crucial applications of magic camouflaging and anti-detection etc.
Temperature resolution enhancing of commercially available IR camera using computer processing
NASA Astrophysics Data System (ADS)
Trofimov, Vyacheslav A.; Trofimov, Vladislav V.
2015-09-01
As it is well-known, application of the passive THz camera for the security problems is very promising way. It allows seeing concealed object without contact with a person and this camera is non-dangerous for a person. Using such THz camera, one can see a temperature difference on the human skin if this difference is caused by different temperatures inside the body. Because the passive THz camera is very expensive, we try to use the IR camera for observing of such phenomenon. We use a computer code that is available for treatment of the images captured by commercially available IR camera, manufactured by Flir Corp. Using this code we demonstrate clearly changing of human body skin temperature induced by water drinking. Nevertheless, in some cases it is necessary to use additional computer processing to show clearly changing of human body temperature. One of these approaches is developed by us. We believe that we increase ten times (or more) the temperature resolution of such camera. Carried out experiments can be used for solving the counter-terrorism problem and for medicine problems solving. Shown phenomenon is very important for the detection of forbidden objects and substances concealed inside the human body using non-destructive control without X-ray application. Early we have demonstrated such possibility using THz radiation.
Non-invasive detection of cocaine dissolved in beverages using displaced Raman spectroscopy.
Eliasson, C; Macleod, N A; Matousek, P
2008-01-21
We demonstrate the potential of Raman spectroscopy to detect cocaine concealed inside transparent glass bottles containing alcoholic beverages. A clear Raman signature of cocaine with good signal-to-noise was obtained from a approximately 300 g solution of adulterated cocaine (purity 75%) in a 0.7 L authentic brown bottle of rum with 1 s acquisition time. The detection limit was estimated to be of the order of 9 g of pure cocaine per 0.7 L (approximately 0.04 moles L(-1)) with 1 s acquisition time. The technique holds great promise for the fast, non-invasive, detection of concealed illicit compounds inside beverages using portable Raman instruments, thus permitting drug trafficking to be combated more effectively.
ERIC Educational Resources Information Center
Schrimshaw, Eric W.; Siegel, Karolynn; Downing, Martin J., Jr.; Parsons, Jeffrey T.
2013-01-01
Objective: Although bisexual men report lower levels of mental health relative to gay men, few studies have examined the factors that contribute to bisexual men's mental health. Bisexual men are less likely to disclose, and more likely to conceal (i.e., a desire to hide), their sexual orientation than gay men. Theory suggests that this may…
Non-Linear Acoustic Concealed Weapons Detector
2006-05-01
signature analysis 8 the interactions of the beams with concealed objects. The Khokhlov- Zabolotskaya-Kuznetsov ( KZK ) equation is the most widely used...Hamilton developed a finite difference method based on the KZK equation to model pulsed acoustic emissions from axial symmetric sources. Using a...College of William & Mary, we have developed a simulation code using the KZK equation to model non-linear acoustic beams and visualize beam patterns
Development and Validation of the Body Concealment Scale for Scleroderma.
Jewett, Lisa R; Malcarne, Vanessa L; Kwakkenbos, Linda; Harcourt, Diana; Rumsey, Nichola; Körner, Annett; Steele, Russell J; Hudson, Marie; Baron, Murray; Haythornthwaite, Jennifer A; Heinberg, Leslie; Wigley, Fredrick M; Thombs, Brett D
2016-08-01
Body concealment is a component of social avoidance among people with visible differences from disfiguring conditions, including systemic sclerosis (SSc). The study objective was to develop a measure of body concealment related to avoidance behaviors in SSc. Initial items for the Body Concealment Scale for Scleroderma (BCSS) were selected using item analysis in a development sample of 93 American SSc patients. The factor structure of the BCSS was evaluated in 742 Canadian patients with single-factor, 2-factor, and bifactor confirmatory factor analysis models. Convergent and divergent validity were assessed by comparing the BCSS total score with the Brief-Satisfaction with Appearance Scale (Brief-SWAP) and measures of depressive symptoms and pain. A 2-factor model (Comparative Fit Index [CFI] 0.99, Tucker-Lewis Index [TLI] 0.98, Root Mean Square Error of Approximation [RMSEA] 0.08) fit substantially better than a 1-factor model (CFI 0.95, TLI 0.94, RMSEA 0.15) for the 9-item BCSS, but the Concealment with Clothing and Concealment of Hands factors were highly correlated (α = 0.79). The bifactor model (CFI 0.99, TLI 0.99, RMSEA 0.08) also fit well. In the bifactor model, the omega coefficient was high for the general factor (ω = 0.80), but low for the Concealment with Clothing (ω = 0.01) and Concealment of Hands (ω = 0.33) factors. The BCSS total score correlated more strongly with the Brief-SWAP Social Discomfort (r = 0.59) and Dissatisfaction with Appearance (r = 0.53) subscales than with measures of depressive symptoms and pain. The BCSS sum score is a valid indicator of body concealment in SSc that extends the concepts of body concealment and avoidance beyond the realms of body shape and weight to concerns of individuals with visible differences from SSc. © 2016, American College of Rheumatology.
Motion compensated shape error concealment.
Schuster, Guido M; Katsaggelos, Aggelos K
2006-02-01
The introduction of Video Objects (VOs) is one of the innovations of MPEG-4. The alpha-plane of a VO defines its shape at a given instance in time and hence determines the boundary of its texture. In packet-based networks, shape, motion, and texture are subject to loss. While there has been considerable attention paid to the concealment of texture and motion errors, little has been done in the field of shape error concealment. In this paper we propose a post-processing shape error concealment technique that uses the motion compensated boundary information of the previously received alpha-plane. The proposed approach is based on matching received boundary segments in the current frame to the boundary in the previous frame. This matching is achieved by finding a maximally smooth motion vector field. After the current boundary segments are matched to the previous boundary, the missing boundary pieces are reconstructed by motion compensation. Experimental results demonstrating the performance of the proposed motion compensated shape error concealment method, and comparing it with the previously proposed weighted side matching method are presented.
Extremely High-Frequency Holographic Radar Imaging of Personnel and Mail
DOE Office of Scientific and Technical Information (OSTI.GOV)
McMakin, Douglas L.; Sheen, David M.; Griffin, Jeffrey W.
2006-08-01
The awareness of terrorists covertly transporting chemical warfare (CW) and biological warfare (BW) agents into government, military, and civilian facilities to harm the occupants has increased dramatically since the attacks of 9/11. Government and civilian security personnel have a need for innovative surveillance technology that can rapidly detect these lethal agents, even when they are hidden away in sealed containers and concealed either under clothing or in hand-carried items such as mailed packages or handbags. Sensor technology that detects BW and CW agents in mail or sealed containers carried under the clothing are under development. One promising sensor technology presentlymore » under development to defeat these threats is active millimeter-wave holographic radar imaging, which can readily image concealed items behind paper, cardboard, and clothing. Feasibility imaging studies at frequencies greater than 40 GHz have been conducted to determine whether simulated biological or chemical agents concealed in mail packages or under clothing could be detected using this extremely high-frequency imaging technique. The results of this imaging study will be presented in this paper.« less
Bultman, Mark W.
2013-01-01
Data on the Earth’s total-intensity magnetic field acquired near ground level and at measurement intervals as small as 1 m include information on the spatial distribution of nearsurface magnetic dipoles that in many cases are unique to a specific lithology. Such spatial information is expressed in the texture (physical appearance or characteristics) of the data at scales of hundreds of meters to kilometers. These magnetic textures are characterized by several descriptive statistics, their power spectrum, and their multifractal spectrum. On the basis of a graphical comparison and textural characterization, ground-based magnetic-field profile data can be used to estimate bedrock lithology concealed by as much as 100 m of basin fill in some cases, information that is especially important in assessing and exploring for concealed mineral deposits. I demonstrate that multifractal spectra of ground-based magnetic-field-profile data can be used to differentiate exposed lithologies and that the shape and position of the multifractal spectrum of the ground-based magnetic-field-profile of concealed lithologies can be matched to the upward-continued multifractal spectrum of an exposed lithology to help distinguish the concealed lithology. In addition, ground-based magnetic-field-profile data also detect minute differences in the magnetic susceptibility of rocks over small horizontal and vertical distances and so can be used for precise modeling of bedrock geometry and structure, even when that bedrock is concealed by 100 m or more of nonmagnetic basin fill. Such data contain valuable geologic information on the bedrock concealed by basin fill that may not be so visible in aeromagnetic data, including areas of hydrothermal alteration, faults, and other bedrock structures. Interpretation of these data in the San Rafael Basin, southeastern Arizona, has yielded results for estimating concealed lithologies, concealed structural geology, and a concealed potential mineral-resource target.
A Concealed Information Test with multimodal measurement.
Ambach, Wolfgang; Bursch, Stephanie; Stark, Rudolf; Vaitl, Dieter
2010-03-01
A Concealed Information Test (CIT) investigates differential physiological responses to deed-related (probe) vs. irrelevant items. The present study focused on the detection of concealed information using simultaneous recordings of autonomic and brain electrical measures. As a secondary issue, verbal and pictorial presentations were compared with respect to their influence on the recorded measures. Thirty-one participants underwent a mock-crime scenario with a combined verbal and pictorial presentation of nine items. The subsequent CIT, designed with respect to event-related potential (ERP) measurement, used a 3-3.5s interstimulus interval. The item presentation modality, i.e. pictures or written words, was varied between subjects; no response was required from the participants. In addition to electroencephalogram (EEG), electrodermal activity (EDA), electrocardiogram (ECG), respiratory activity, and finger plethysmogram were recorded. A significant probe-vs.-irrelevant effect was found for each of the measures. Compared to sole ERP measurement, the combination of ERP and EDA yielded incremental information for detecting concealed information. Although, EDA per se did not reach the predictive value known from studies primarily designed for peripheral physiological measurement. Presentation modality neither influenced the detection accuracy for autonomic measures nor EEG measures; this underpins the equivalence of verbal and pictorial item presentation in a CIT, regardless of the physiological measures recorded. Future studies should further clarify whether the incremental validity observed in the present study reflects a differential sensitivity of ERP and EDA to different sub-processes in a CIT. Copyright 2009 Elsevier B.V. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tuemer, T.O.; Doan, L.; Su, C.W.
2000-07-01
A Compact Integrated Narcotics Detection Instrument (CINDI) has been developed at NOVA R and D, Inc., in cooperation with the US Coast Guard. This detector utilizes neutrons emitted from {sup 252}Cf. Neutrons emitted from the front face of CINDI penetrate dense compartment barrier materials with little change in energy but are backscattered by hydrogen-rich materials such as drugs. The backscattered neutrons are detected, and the rate is displayed by a microprocessor-controller integrated into CINDI. The operator guides the detector along a suspected area and receives immediate feedback from the state-of-the-art electronics. For user safety, the device incorporates a highly sensitivemore » detection scheme to permit the use of a very weak radioactive source, without compromising detectability. CINDI is capable of detecting narcotics effectively behind panels made of steel, wood, fiberglass, or even lead-lined materials. This makes it useful for inspecting marine vessels, ship bulkheads, automobiles, structure walls, or small sealed containers. Figure 2 shows three views of the CINDI instrument. CINDI responds strongly to hydrogen-rich materials such as narcotics. It has been tested at NOVA, the US Coast Guard, and Brewt Power Systems. The results of the tests show excellent response and specificity to narcotics. CINDI has led to a new technology that shows promise for identifying the concealed contraband. The new technique uses a fusion of two independent but complementary signals for detecting and possibly identifying concealed drugs in a variety of carriers such as vehicles, marine vessels, airplanes, containers, cargo, and luggage. The carriers will be scanned using both neutron and gamma-ray sources. The signal from both the neutron and gamma-ray backscattering and/or transmission can be used simultaneously to detect and possibly identify the contrabands it has been trained for. A system that can produce three-dimensional images for both signals may also be developed. The two images may be combined and analyzed by a fast host computer to detect concealed contraband. The two independent signatures when analyzed simultaneously may help determine the type of concealed contraband.« less
An ultrathin invisibility skin cloak for visible light.
Ni, Xingjie; Wong, Zi Jing; Mrejen, Michael; Wang, Yuan; Zhang, Xiang
2015-09-18
Metamaterial-based optical cloaks have thus far used volumetric distribution of the material properties to gradually bend light and thereby obscure the cloaked region. Hence, they are bulky and hard to scale up and, more critically, typical carpet cloaks introduce unnecessary phase shifts in the reflected light, making the cloaks detectable. Here, we demonstrate experimentally an ultrathin invisibility skin cloak wrapped over an object. This skin cloak conceals a three-dimensional arbitrarily shaped object by complete restoration of the phase of the reflected light at 730-nanometer wavelength. The skin cloak comprises a metasurface with distributed phase shifts rerouting light and rendering the object invisible. In contrast to bulky cloaks with volumetric index variation, our device is only 80 nanometer (about one-ninth of the wavelength) thick and potentially scalable for hiding macroscopic objects. Copyright © 2015, American Association for the Advancement of Science.
Neutron Resonance Radiography for Explosives Detection: Technical Challenges
DOE Office of Scientific and Technical Information (OSTI.GOV)
Raas, W L; Blackburn, B; Boyd, E
2005-11-09
Fast Neutron Resonance Radiography (NRR) has recently become a focus of investigation as a supplement to conventional x-ray systems as a non-invasive, non-destructive means of detecting explosive material concealed in checked luggage or cargo containers at airports. Using fast (1-6 MeV) neutrons produced by the D(d,n){sup 3}He reaction, NRR provides both an imaging capability and the ability to determine the chemical composition of materials in baggage or cargo. Elemental discrimination is achieved by exploiting the resonance features of the neutron cross-section for oxygen, nitrogen, carbon, and hydrogen. Simulations have shown the effectiveness of multiple-element NRR through Monte Carlo transport methods;more » this work is focused on the development of a prototype system that will incorporate an accelerator-based neutron source and a neutron detection and imaging system to demonstrate the realistic capabilities of NRR in distinguishing the elemental components of concealed objects. Preliminary experiments have exposed significant technical difficulties unapparent in simulations, including the presence of image contamination from gamma ray production, the detection of low-fluence fast neutrons in a gamma field, and the mechanical difficulties inherent in the use of thin foil windows for gas cell confinement. To mitigate these concerns, a new gas target has been developed to simultaneously reduce gamma ray production and increase structural integrity in high flux gas targets. Development of a neutron imaging system and neutron counting based on characteristic neutron pulse shapes have been investigated as a means of improving signal to noise ratios, reducing irradiation times, and increasing the accuracy of elemental determination.« less
Through-barrier electromagnetic imaging with an atomic magnetometer.
Deans, Cameron; Marmugi, Luca; Renzoni, Ferruccio
2017-07-24
We demonstrate the penetration of thick metallic and ferromagnetic barriers for imaging of conductive targets underneath. Our system is based on an 85 Rb radio-frequency atomic magnetometer operating in electromagnetic induction imaging modality in an unshielded environment. Detrimental effects, including unpredictable magnetic signatures from ferromagnetic screens and variations in the magnetic background, are automatically compensated by active compensation coils controlled by servo loops. We exploit the tunability and low-frequency sensitivity of the atomic magnetometer to directly image multiple conductive targets concealed by a 2.5 mm ferromagnetic steel shield and/or a 2.0 mm aluminium shield, in a single scan. The performance of the atomic magnetometer allows imaging without any prior knowledge of the barriers or the targets, and without the need of background subtraction. A dedicated edge detection algorithm allows automatic estimation of the targets' size within 3.3 mm and of their position within 2.4 mm. Our results prove the feasibility of a compact, sensitive and automated sensing platform for imaging of concealed objects in a range of applications, from security screening to search and rescue.
Dietrich, Ariana B; Hu, Xiaoqing; Rosenfeld, J Peter
2014-03-01
In the first of two experiments, we compared the accuracy of the P300 concealed information test protocol as a function of numbers of trials experienced by subjects and ERP averages analyzed by investigators. Contrary to Farwell et al. (Cogn Neurodyn 6(2):115-154, 2012), we found no evidence that 100 trial based averages are more accurate than 66 or 33 trial based averages (all numbers led to accuracies of 84-94 %). There was actually a trend favoring the lowest trial numbers. The second study compared numbers of irrelevant stimuli recalled and recognized in the 3-stimulus protocol versus the complex trial protocol (Rosenfeld in Memory detection: theory and application of the concealed information test, Cambridge University Press, New York, pp 63-89, 2011). Again, in contrast to expectations from Farwell et al. (Cogn Neurodyn 6(2):115-154, 2012), there were no differences between protocols, although there were more irrelevant stimuli recognized than recalled, and irrelevant 4-digit number group stimuli were neither recalled nor recognized as well as irrelevant city name stimuli. We therefore conclude that stimulus processing in the P300-based complex trial protocol-with no more than 33 sweep averages-is adequate to allow accurate detection of concealed information.
NASA Astrophysics Data System (ADS)
Hu, Taiyang; Xiao, Zelong; Li, Hao; Lv, Rongchuan; Lu, Xuan
2014-11-01
The increasingly emerging terrorism attacks and violence crimes around the world have posed severe threats to public security, so carrying out relevant research on advanced experimental methods of personnel concealed contraband detection is crucial and meaningful. All of the advantages of imaging covertly, avoidance of interference with other systems, intrinsic property of being safe to persons under screening , and the superior ability of imaging through natural or manmade obscurants, have significantly combined to enable millimeter-wave (MMW) radiometric imaging to offer great potential in personnel concealed contraband detection. Based upon the current research status of MMW radiometric imaging and urgent demands of personnel security screening, this paper mainly focuses on the experimental methods of indoor MMW radiometric imaging. The reverse radiation noise resulting from super-heterodyne receivers seriously affects the image experiments carried out at short range, so both the generation mechanism and reducing methods of this noise are investigated. Then, the benefit of sky illumination no longer exists for the indoor radiometric imaging, and this leads to the decrease in radiometric temperature contrast between target and background. In order to enhance the radiometric temperature contrast for improving indoor imaging performance, the noise illumination technique is adopted in the indoor imaging scenario. In addition, the speed and accuracy of concealed contraband detection from acquired MMW radiometric images are usually restricted to the deficiencies in traditional artificial interpretation by security inspectors, thus an automatic recognition and location algorithm by integrating improved Fuzzy C-means clustering with moment invariants is put forward. A series of original results are also presented to demonstrate the significance and validity of these methods.
Development of an ultra wide band microwave radar based footwear scanning system
NASA Astrophysics Data System (ADS)
Rezgui, Nacer Ddine; Bowring, Nicholas J.; Andrews, David A.; Harmer, Stuart W.; Southgate, Matthew J.; O'Reilly, Dean
2013-10-01
At airports, security screening can cause long delays. In order to speed up screening a solution to avoid passengers removing their shoes to have them X-ray scanned is required. To detect threats or contraband items hidden within the shoe, a method of screening using frequency swept signals between 15 to 40 GHz has been developed, where the scan is carried out whilst the shoes are being worn. Most footwear is transparent to microwaves to some extent in this band. The scans, data processing and interpretation of the 2D image of the cross section of the shoe are completed in a few seconds. Using safe low power UWB radar, scattered signals from the shoe can be observed which are caused by changes in material properties such as cavities, dielectric or metal objects concealed within the shoe. By moving the transmission horn along the length of the shoe a 2D image corresponding to a cross section through the footwear is built up, which can be interpreted by the user, or automatically, to reveal the presence of concealed threat within the shoe. A prototype system with a resolution of 6 mm or less has been developed and results obtained for a wide range of commonly worn footwear, some modified by the inclusion of concealed material. Clear differences between the measured images of modified and unmodified shoes are seen. Procedures for enhancing the image through electronic image synthesis techniques and image processing methods are discussed and preliminary performance data presented.
Visu-Petra, George; Varga, Mihai; Miclea, Mircea; Visu-Petra, Laura
2013-01-01
The possibility to enhance the detection efficiency of the Concealed Information Test (CIT) by increasing executive load was investigated, using an interference design. After learning and executing a mock crime scenario, subjects underwent three deception detection tests: an RT-based CIT, an RT-based CIT plus a concurrent memory task (CITMem), and an RT-based CIT plus a concurrent set-shifting task (CITShift). The concealed information effect, consisting in increased RT and lower response accuracy for probe items compared to irrelevant items, was evidenced across all three conditions. The group analyses indicated a larger difference between RTs to probe and irrelevant items in the dual-task conditions, but this difference was not translated in a significantly increased detection efficiency at an individual level. Signal detection parameters based on the comparison with a simulated innocent group showed accurate discrimination for all conditions. Overall response accuracy on the CITMem was highest and the difference between response accuracy to probes and irrelevants was smallest in this condition. Accuracy on the concurrent tasks (Mem and Shift) was high, and responses on these tasks were significantly influenced by CIT stimulus type (probes vs. irrelevants). The findings are interpreted in relation to the cognitive load/dual-task interference literature, generating important insights for research on the involvement of executive functions in deceptive behavior. PMID:23543918
Varga, Mihai; Visu-Petra, George; Miclea, Mircea; Visu-Petra, Laura
2015-01-01
Concealing the possession of relevant information represents a complex cognitive process, shaped by contextual demands and individual differences in cognitive and socio-emotional functioning. The Reaction Time-based Concealed Information Test (RT-CIT) is used to detect concealed knowledge based on the difference in RTs between denying recognition of critical (probes) and newly encountered (irrelevant) information. Several research questions were addressed in this scenario implemented after a mock crime. First, we were interested whether the introduction of a social stimulus (facial identity) simulating a virtual investigator would facilitate the process of deception detection. Next, we explored whether his emotional displays (friendly, hostile or neutral) would have a differential impact on speed of responses to probe versus irrelevant items. We also compared the impact of introducing similar stimuli in a working memory (WM) updating context without requirements to conceal information. Finally, we explored the association between deceptive behavior and individual differences in WM updating proficiency or in internalizing problems (state / trait anxiety and depression). Results indicated that the mere presence of a neutral virtual investigator slowed down participants' responses, but not the appended lie-specific time (difference between probes and irrelevants). Emotional expression was shown to differentially affect speed of responses to critical items, with positive displays from the virtual examiner enhancing lie-specific time, compared to negative facial expressions, which had an opposite impact. This valence-specific effect was not visible in the WM updating context. Higher levels of trait / state anxiety were related to faster responses to probes in the negative condition (hostile facial expression) of the RT-CIT. These preliminary findings further emphasize the need to take into account motivational and emotional factors when considering the transfer of deception detection techniques from the laboratory to real-life settings. PMID:25699516
Three-dimensional radar imaging techniques and systems for near-field applications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sheen, David M.; Hall, Thomas E.; McMakin, Douglas L.
2016-05-12
The Pacific Northwest National Laboratory has developed three-dimensional holographic (synthetic aperture) radar imaging techniques and systems for a wide variety of near-field applications. These applications include radar cross-section (RCS) imaging, personnel screening, standoff concealed weapon detection, concealed threat detection, through-barrier imaging, ground penetrating radar (GPR), and non-destructive evaluation (NDE). Sequentially-switched linear arrays are used for many of these systems to enable high-speed data acquisition and 3-D imaging. In this paper, the techniques and systems will be described along with imaging results that demonstrate the utility of near-field 3-D radar imaging for these compelling applications.
Sato, Yoshiharu; Nagata, Hirofumi; Inoda, Ayako; Miura, Hiroko; Watanabe, Yoko; Suzuki, Kenji
2014-10-01
We report a case of paroxysmal supraventricular tachycardia (PSVT) that occurred during video-assisted thoracoscopic (VATS) lobectomy in a patient with concealed Wolff-Parkinson-White (WPW) syndrome. A 59-year-old man with lung cancer was scheduled for VATS lobectomy under general anesthesia. After inserting a thoracic epidural catheter, general anesthesia was induced with intravenous administration of propofol. Anesthesia was maintained with inhalation of desfurane in an air/oxygen mixture and intravenous infusion of remifentanil. Recurrent PSVT occurred three times, and the last episode of PSVT continued for 50 minutes regardless of administration of antiarrhythmic drugs. Synchronized electric shock via adhesive electrode pads on the patient's chest successfully converted PSVT back to normal sinus rhythm. The remaining course and postoperative period were uneventful. An electrophysiological study performed after hospital discharge detected concealed WPW syndrome, which had contributed to the development of atrioventricular reciprocating tachycardia. Concealed WPW syndrome is a rare, but critical complication that could possibly cause lethal atrial tachyarrhythmias during the perioperative period. In the present case, cardioversion using adhesive electrode pads briefly terminated PSVT in a patient with concealed WPW syndrome.
NASA Astrophysics Data System (ADS)
Trofimov, Vyacheslav A.; Trofimov, Vladislav V.; Shestakov, Ivan L.; Blednov, Roman G.
2017-05-01
One of urgent security problems is a detection of objects placed inside the human body. Obviously, for safety reasons one cannot use X-rays for such object detection widely and often. For this purpose, we propose to use THz camera and IR camera. Below we continue a possibility of IR camera using for a detection of temperature trace on a human body. In contrast to passive THz camera using, the IR camera does not allow to see very pronounced the object under clothing. Of course, this is a big disadvantage for a security problem solution based on the IR camera using. To find possible ways for this disadvantage overcoming we make some experiments with IR camera, produced by FLIR Company and develop novel approach for computer processing of images captured by IR camera. It allows us to increase a temperature resolution of IR camera as well as human year effective susceptibility enhancing. As a consequence of this, a possibility for seeing of a human body temperature changing through clothing appears. We analyze IR images of a person, which drinks water and eats chocolate. We follow a temperature trace on human body skin, caused by changing of temperature inside the human body. Some experiments are made with observing of temperature trace from objects placed behind think overall. Demonstrated results are very important for the detection of forbidden objects, concealed inside the human body, by using non-destructive control without using X-rays.
Scattering suppression from arbitrary objects in spatially dispersive layered metamaterials
NASA Astrophysics Data System (ADS)
Shalin, Alexander S.; Ginzburg, Pavel; Orlov, Alexey A.; Iorsh, Ivan; Belov, Pavel A.; Kivshar, Yuri S.; Zayats, Anatoly V.
2015-03-01
Concealing objects by making them invisible to an external electromagnetic probe is coined by the term "cloaking." Cloaking devices, having numerous potential applications, are still facing challenges in realization, especially in the visible spectral range. In particular, inherent losses and extreme parameters of metamaterials required for the cloak implementation are the limiting factors. Here, we numerically demonstrate nearly perfect suppression of scattering from arbitrary-shaped objects in spatially dispersive metamaterial acting as an alignment-free concealing cover. We consider a realization of a metamaterial as a metal-dielectric multilayer and demonstrate suppression of scattering from an arbitrary object in forward and backward directions with perfectly preserved wave fronts and less than 10% absolute intensity change, despite spatial dispersion effects present in the composite metamaterial. Beyond the usual scattering suppression applications, the proposed configuration may be used for a simple realization of scattering-free detectors and sensors.
Anderson, E.D.; Smith, S.M.; Giles, S.A.; Granitto, Matthew; Eppinger, R.G.; Bedrosian, P.A.; Shah, A.K.; Kelley, K.D.; Fey, D.L.; Minsley, B.J.; Brown, P.J.
2011-01-01
In 2007, the U.S. Geological Survey began a multidisciplinary study in southwest Alaska to investigate the setting and detectability of mineral deposits in concealed volcanic and glacial terranes. The study area hosts the world-class Pebble porphyry Cu-Au-Mo deposit, and through collaboration with the Pebble Limited Partnership, a range of geophysical and geochemical investigations was carried out in proximity to the deposit. The deposit is almost entirely concealed by tundra, glacial deposits, and post-mineralization volcanic rocks. The discovery of mineral resources beneath cover is becoming more important because most of the mineral resources at the surface have already been discovered. Research is needed to identify ways in which to assess for concealed mineral resources. This report presents the uninterpreted geophysical measurements and geochemical and mineralogical analytical data from samples collected during the summer field seasons from 2007 to 2010, and makes the data available in a single Geographic Information System (GIS) database.
Laser vibration sensing at Fraunhofer IOSB: review and applications
NASA Astrophysics Data System (ADS)
Lutzmann, Peter; Göhler, Benjamin; Hill, Chris A.; van Putten, Frank
2017-03-01
Laser vibrometry based on coherent detection allows noncontact measurements of small-amplitude vibration characteristics of objects. This technique, commonly using the Doppler effect, offers high potential for short-range civil applications and for medium- or long-range applications in defense and security. Most commercially available laser Doppler vibrometers are for short ranges (up to a few tens of meters) and use a single beam from a low-power HeNe laser source (λ=633 nm). Medium- or long-range applications need higher laser output power, and thus, appropriate vibrometers typically operate at 1.5, 2, or 10.6 μm to meet the laser safety regulations. Spatially resolved vibrational information can be obtained from an object by using scanning laser vibrometers. To reduce measuring time and to measure transient object movements and vibrational mode structures of objects, several approaches to multibeam laser Doppler vibrometry have been developed, and some of them are already commercially available for short ranges. We focus on applications in the field of defense and security, such as target classification and identification, including camouflaged or partly concealed targets, and the detection of buried land mines. Examples of civil medium-range applications are also given.
1.56 Terahertz 2-frames per second standoff imaging
NASA Astrophysics Data System (ADS)
Goyette, Thomas M.; Dickinson, Jason C.; Linden, Kurt J.; Neal, William R.; Joseph, Cecil S.; Gorveatt, William J.; Waldman, Jerry; Giles, Robert; Nixon, William E.
2008-02-01
A Terahertz imaging system intended to demonstrate identification of objects concealed under clothing was designed, assembled, and tested. The system design was based on a 2.5 m standoff distance, with a capability of visualizing a 0.5 m by 0.5 m scene at an image rate of 2 frames per second. The system optical design consisted of a 1.56 THz laser beam, which was raster swept by a dual torsion mirror scanner. The beam was focused onto the scan subject by a stationary 50 cm-diameter focusing mirror. A heterodyne detection technique was used to down convert the backscattered signal. The system demonstrated a 1.5 cm spot resolution. Human subjects were scanned at a frame rate of 2 frames per second. Hidden metal objects were detected under a jacket worn by the human subject. A movie including data and video images was produced in 1.5 minutes scanning a human through 180° of azimuth angle at 0.7° increment.
Calibration methods for explosives detectors
NASA Astrophysics Data System (ADS)
MacDonald, Stephen J.; Rounbehler, David P.
1992-05-01
Airport security has become an important concern to cultures in every corner of the world. Presently, efforts to improve airport security have brought additional technological solutions, in the form of advanced instrumentation for the detection of explosives, into use at airport terminals in many countries. This new generation of explosives detectors is often used to augment existing security measures and provide a more encompassing screening capability for airline passengers. This paper describes two calibration procedures used for the Thermedics' EGIS explosives detectors. The systems were designed to screen people, electronic components, luggage, automobiles, and other objects for the presence of concealed explosives. The detectors have the ability to detect a wide range of explosives in both the vapor state or as surface adsorbed solids, therefore, calibrations were designed to challenge the system with explosives in each form.
Training Objectives for Tank Platoon Leaders Covering Tasks Performed during Four Armor Operations
1983-01-01
screens to conceal their movement to covered and concealed positions. The M250 grenade launcher consists of two six-barreled dischargers wired for two...generates smoke by the injestion of fuel onto the hot engine exhaust system. The smoke screen generated by VEESS is used to compli- ment the M250 smoke...grenade system by reinforcing and sustaining the screen created by the M250 system. The purpose of the smoke producing systems is to make it more
Could plate tectonics on Venus be concealed by volcanic deposits
NASA Technical Reports Server (NTRS)
Kaula, W. M.; Muradian, L. M.
1982-01-01
The present investigation is supplementary to a study reported by Kaula and Phillips (1981). From an analysis of Pioneer Venus altimetry, Kaula and Phillips had inferred that any heat loss from the planet by plate tectonics must be small compared to that from the earth. However, it has been suggested by others that plate tectonic may exist on Venus, but that the expected 'square root of s' dependence of the topographic drop off is not observed because it is concealed by lava flows. The present investigation has the objective to conduct an examination whether this suggestion of concealment by lava flow is correct. On the basis of the performed analysis, it is concluded that the results obtained by Kaula and Phillips appear to be well justified.
Portable concealed weapon detection using millimeter-wave FMCW radar imaging
NASA Astrophysics Data System (ADS)
Johnson, Michael A.; Chang, Yu-Wen
2001-02-01
Unobtrusive detection of concealed weapons on persons or in abandoned bags would provide law enforcement a powerful tool to focus resources and increase traffic throughput in high- risk situations. We have developed a fast image scanning 94 GHz radar system that is suitable for portable operation and remote viewing of radar data. This system includes a novel fast image-scanning antenna that allows for the acquisition of medium resolution 3D millimeter wave images of stationary targets with frame times on order of one second. The 3D radar data allows for potential isolation of concealed weapons from body and environmental clutter such as nearby furniture or other people. The radar is an active system so image quality is not affected indoors, emitted power is however very low so there are no health concerns for operator or targets. The low power operation is still sufficient to penetrate heavy clothing or material. Small system size allows for easy transport and rapid deployment of the system as well as an easy migration path to future hand held systems.
Habitat drives dispersal and survival of translocated juvenile desert tortoises
Nafus, Melia G.; Esque, Todd C.; Averill-Murray, Roy C.; Nussear, Kenneth E.; Swaisgood, Ronald R.
2017-01-01
5.Synthesis and applications. Resource managers using translocations as a conservation tool should prioritize acquiring data linking habitat to fitness. In particular, for species that depend on avoiding detection, refuges such as burrows and habitat that improved concealment had notable ability to improve survival and dispersal. Our study on juvenile Mojave desert tortoises showed that refuge availability or the distributions of habitat appropriate for concealment are important considerations for identifying translocation sites for species highly dependent on crypsis, camouflage, or other forms of habitat matching.
Goal-Directed Modulation of Neural Memory Patterns: Implications for fMRI-Based Memory Detection.
Uncapher, Melina R; Boyd-Meredith, J Tyler; Chow, Tiffany E; Rissman, Jesse; Wagner, Anthony D
2015-06-03
Remembering a past event elicits distributed neural patterns that can be distinguished from patterns elicited when encountering novel information. These differing patterns can be decoded with relatively high diagnostic accuracy for individual memories using multivoxel pattern analysis (MVPA) of fMRI data. Brain-based memory detection--if valid and reliable--would have clear utility beyond the domain of cognitive neuroscience, in the realm of law, marketing, and beyond. However, a significant boundary condition on memory decoding validity may be the deployment of "countermeasures": strategies used to mask memory signals. Here we tested the vulnerability of fMRI-based memory detection to countermeasures, using a paradigm that bears resemblance to eyewitness identification. Participants were scanned while performing two tasks on previously studied and novel faces: (1) a standard recognition memory task; and (2) a task wherein they attempted to conceal their true memory state. Univariate analyses revealed that participants were able to strategically modulate neural responses, averaged across trials, in regions implicated in memory retrieval, including the hippocampus and angular gyrus. Moreover, regions associated with goal-directed shifts of attention and thought substitution supported memory concealment, and those associated with memory generation supported novelty concealment. Critically, whereas MVPA enabled reliable classification of memory states when participants reported memory truthfully, the ability to decode memory on individual trials was compromised, even reversing, during attempts to conceal memory. Together, these findings demonstrate that strategic goal states can be deployed to mask memory-related neural patterns and foil memory decoding technology, placing a significant boundary condition on their real-world utility. Copyright © 2015 the authors 0270-6474/15/358531-15$15.00/0.
Computer vision techniques for rotorcraft low altitude flight
NASA Technical Reports Server (NTRS)
Sridhar, Banavar
1990-01-01
Rotorcraft operating in high-threat environments fly close to the earth's surface to utilize surrounding terrain, vegetation, or manmade objects to minimize the risk of being detected by an enemy. Increasing levels of concealment are achieved by adopting different tactics during low-altitude flight. Rotorcraft employ three tactics during low-altitude flight: low-level, contour, and nap-of-the-earth (NOE). The key feature distinguishing the NOE mode from the other two modes is that the whole rotorcraft, including the main rotor, is below tree-top whenever possible. This leads to the use of lateral maneuvers for avoiding obstacles, which in fact constitutes the means for concealment. The piloting of the rotorcraft is at best a very demanding task and the pilot will need help from onboard automation tools in order to devote more time to mission-related activities. The development of an automation tool which has the potential to detect obstacles in the rotorcraft flight path, warn the crew, and interact with the guidance system to avoid detected obstacles, presents challenging problems. Research is described which applies techniques from computer vision to automation of rotorcraft navigtion. The effort emphasizes the development of a methodology for detecting the ranges to obstacles in the region of interest based on the maximum utilization of passive sensors. The range map derived from the obstacle-detection approach can be used as obstacle data for the obstacle avoidance in an automatic guidance system and as advisory display to the pilot. The lack of suitable flight imagery data presents a problem in the verification of concepts for obstacle detection. This problem is being addressed by the development of an adequate flight database and by preprocessing of currently available flight imagery. The presentation concludes with some comments on future work and how research in this area relates to the guidance of other autonomous vehicles.
NASA Astrophysics Data System (ADS)
Polom, Ulrich; Mueller, Christof; Krawczyk, CharLotte M.
2016-04-01
The Mw 7.1 Darfield Earthquake in September 2010 ruptured the surface along the Greendale Fault that was not known prior to the earthquake. The subsequent Mw 6.3 Christchurch earthquake in February 2011 demonstrated that concealed active faults have a significant risk potential for urban infrastructure and human life in New Zealand if they are located beneath or close to such areas. Mapping exposures and analysis of active faults incorporated into the National Seismic Hazard Model (NSHM) suggests that several thousands of these active structures are yet to be identified and have the potential to generate moderate to large magnitude earthquakes (i.e. magnitudes >5). Geological mapping suggests that active faults pass beneath, or within many urban areas in New Zealand, including Auckland, Blenheim, Christchurch, Hastings/Napier, Nelson, Rotorua, Taupo, Wellington, and Whakatane. Since no established methodology for routinely locating and assessing the earthquake hazard posed by concealed active faults is available, the principal objective of the presented study was to evaluate the usefulness of high-resolution shear wave seismic reflection profiling using a land streamer to locate buried faults in urban areas of New Zealand. During the survey carried out in the city of Whakatane in February 2015, the method was first tested over a well known surface outcrop of the Edgecumbe Fault 30 km south-west of Whakatane city. This allowed further to investigate the principle shear wave propagation characteristics in the unknown sediments, consisting mainly of effusive rock material of the Taupo volcanic zone mixed with marine transgression units. Subsequently the survey was continued within Whakatane city using night operation time slots to reduce the urban noise. In total, 11 profiles of 5.7 km length in high data quality were acquired, which clearly show concealed rupture structures of obviously different age in the shallow sediments down to 100 m depth. Subject to depth verification by drillings normal fault displacements of up to 15 m are visible in depths of 20-40 m, deeper rupture structures show displacements of up to 20 m. Furthermore, indications of strike-slip fault activities are visible. The concealed rupture structures found are not aligned along former estimated fault lineaments or main surface structures like the Whakatane river bed. Correlations exist with small topographic variations detected by LIDAR imaging and surface signatures on a historic map of 1867.
NASA Astrophysics Data System (ADS)
Luukanen, Arttu; Grönberg, Leif; Helistö, Panu; Penttilä, Jari S.; Seppä, Heikki; Sipola, Hannu; Dietlein, Charles R.; Grossman, Erich N.
2007-04-01
The objective of this program is to demonstrate a system capable of passive indoors detection and identification of concealed threat items hidden underneath the clothing of non-cooperative subjects from a stand-off distance of several meters. To meet this difficult task, we are constructing an imaging system utilising superconducting ultrawideband antenna-coupled microbolometers, coupled to innovative room temperature read-out electronics, and operated within a cryogen-free pulse tube refrigerator. Previously, we have demonstrated that these devices are capable of a Noise Equivalent Temperature Difference (NETD) of 125 mK over a pre-detection bandwidth from 0.2-1 THz using a post-detection integration time of 30 ms. Further improvements on our devices are reducing this number to a few tens of mK. Such an exquisite sensitivity is necessary in order to achieve the undoubtedly stringent requirements for low false positive alarm rate combined with high probability of detection dictated by the application. Our technological approach allows for excellent per frame NETD (objective 0.5 K or below at 30 Hz frame rate), and is also amenable to multispectral (colour) imagery that enhances the discrimination of innocuous objects against real threats. In the paper we present results obtained with an 8-pixel subarray from our linear array of 128 pixels constructed using a modular approach. Two-dimensional imaging will be achieved by the use of conical scanning.
NASA Astrophysics Data System (ADS)
Mitchell-Thomas, R. C.; McManus, T. M.; Quevedo-Teruel, O.; Horsley, S. A. R.; Hao, Y.
2013-11-01
This Letter presents a method for making an uneven surface behave as a flat surface. This allows an object to be concealed (cloaked) under an uneven portion of the surface, without disturbing the wave propagation on the surface. The cloaks proposed in this Letter achieve perfect cloaking that only relies upon isotropic radially dependent refractive index profiles, contrary to those previously published. In addition, these cloaks are very thin, just a fraction of a wavelength in thickness, yet can conceal electrically large objects. While this paper focuses on cloaking electromagnetic surface waves, the theory is also valid for other types of surface waves. The performance of these cloaks is simulated using dielectric filled waveguide geometries, and the curvature of the surface is shown to be rendered invisible, hiding any object positioned underneath. Finally, a transformation of the required dielectric slab permittivity was performed for surface wave propagation, demonstrating the practical applicability of this technique.
Noise analysis for near field 3-D FM-CW radar imaging systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sheen, David M.
2015-06-19
Near field radar imaging systems are used for several applications including concealed weapon detection in airports and other high-security venues. Despite the near-field operation, phase noise and thermal noise can limit the performance in several ways including reduction in system sensitivity and reduction of image dynamic range. In this paper, the effects of thermal noise, phase noise, and processing gain are analyzed in the context of a near field 3-D FM-CW imaging radar as might be used for concealed weapon detection. In addition to traditional frequency domain analysis, a time-domain simulation is employed to graphically demonstrate the effect of thesemore » noise sources on a fast-chirping FM-CW system.« less
Deep Raman spectroscopy for the non-invasive standoff detection of concealed chemical threat agents.
Izake, Emad L; Cletus, Biju; Olds, William; Sundarajoo, Shankaran; Fredericks, Peter M; Jaatinen, Esa
2012-05-30
Deep Raman spectroscopy has been utilized for the standoff detection of concealed chemical threat agents from a distance of 15 m under real life background illumination conditions. By using combined time and space resolved measurements, various explosive precursors hidden in opaque plastic containers were identified non-invasively. Our results confirm that combined time and space resolved Raman spectroscopy leads to higher selectivity towards the sub-layer over the surface layer as well as enhanced rejection of fluorescence from the container surface when compared to standoff spatially offset Raman spectroscopy. Raman spectra that have minimal interference from the packaging material and good signal-to-noise ratio were acquired within 5 s of measurement time. A new combined time and space resolved Raman spectrometer has been designed with nanosecond laser excitation and gated detection, making it of lower cost and complexity than picosecond-based laboratory systems. Copyright © 2012 Elsevier B.V. All rights reserved.
... can conceal sharp objects underwater. People living with diabetes should never go barefoot, even indoors, because their nervous system may not ... Use your current position? {{ps.position.alert.message}} Getting your location, one ...
Concealment of type 1 diabetes at work in Finland: a mixed-method study
Munir, Fehmidah; Moilanen, Leena; Räsänen, Kimmo; Hänninen, Vilma
2018-01-01
Objectives To explore the possible reasons for concealing type 1 diabetes (T1D) at work. Methods The main set of data came from a cross-sectional survey (response rate 49.3%), the participants of which were 688 wage earners with T1D. Concealment of T1D was measured by asking respondents have they ever during their working career hidden their diabetes from their (A) colleagues and (B) line manager. Furthermore, semistructured interviews (n=20) were conducted to obtain deeper understanding. Questionnaire data were analysed using logistic regression analyses and qualitative interviews with inductive thematic analysis. Results About 30% of wage earners with T1D had concealed their condition during their working career from their colleagues and almost 20% from their line manager. Individuals aged 18–44 years age were more likely to conceal their T1D from their colleagues than older workers during their working career. Not disclosing T1D to the extended family (OR 5.24 (95% CI 2.06 to 13.35)), feeling an outsider at work (OR 2.47 (95% CI 1.58 to 3.84)), being embarrassed by receiving special attention at work (OR 1.99 (95% CI 1.33 to 2.96)) and neglecting treatment at work (OR 1.59 (95% CI 1.01 to 2.48)) were all associated with concealment of T1D from colleagues. The youngest age group of 18–24 years were more likely to conceal their T1D from their line managers than the older age groups during their working career. Not disclosing T1D to the extended family (OR 4.41 (95% CI 1.72 to 11.32)), feeling like an outsider at work (OR 2.51 (1.52 to 4.14)) and being embarrassed by receiving special attention at work (OR 1.81 (95% CI 1.13 to 2.91)) were associated with concealment of T1D from line managers. From the interviews, five main themes related to concealment emerged, expressing fears related to the consequences of telling: (1) being perceived as weak, (2) job discrimination, (3) unwanted attention, (4) being seen as a person who uses their T1D for seeking advantages and (5) losing privacy. Conclusions A considerable proportion of wage earners with T1D are concealing their diagnosis often because of feelings associated with stigma. Both overemphasis and underestimation of T1D at work by the colleagues or line manager may lead to concealing T1D and may thus be harmful to self-management of T1D. The obstacles in disclosing T1D might be diminished by giving adequate information at the workplace about the condition and its significance. PMID:29331976
Capability of long distance 100 GHz FMCW using a single GDD lamp sensor.
Levanon, Assaf; Rozban, Daniel; Aharon Akram, Avihai; Kopeika, Natan S; Yitzhaky, Yitzhak; Abramovich, Amir
2014-12-20
Millimeter wave (MMW)-based imaging systems are required for applications in medicine, homeland security, concealed weapon detection, and space technology. The lack of inexpensive room temperature imaging sensors makes it difficult to provide a suitable MMW system for many of the above applications. A 3D MMW imaging system based on chirp radar was studied previously using a scanning imaging system of a single detector. The radar system requires that the millimeter wave detector will be able to operate as a heterodyne detector. Since the source of radiation is a frequency modulated continuous wave (FMCW), the detected signal as a result of heterodyne detection gives the object's depth information according to value of difference frequency, in addition to the reflectance of the 2D image. New experiments show the capability of long distance FMCW detection by using a large scale Cassegrain projection system, described first (to our knowledge) in this paper. The system presents the capability to employ a long distance of at least 20 m with a low-cost plasma-based glow discharge detector (GDD) focal plane array (FPA). Each point on the object corresponds to a point in the image and includes the distance information. This will enable relatively inexpensive 3D MMW imaging.
Stedmon, Alex W; Eachus, Peter; Baillie, Les; Tallis, Huw; Donkor, Richard; Edlin-White, Robert; Bracewell, Robert
2015-03-01
Individuals trying to conceal knowledge from interrogators are likely to experience raised levels of stress that can manifest itself across biological, physiological, psychological and behavioural factors, providing an opportunity for detection. Using established research paradigms an innovative scalable interrogation was designed in which participants were given a 'token' that represented information they had to conceal from interviewers. A control group did not receive a token and therefore did not have to deceive the investigators. The aim of this investigation was to examine differences between deceivers and truth-tellers across the four factors by collecting data for cortisol levels, sweat samples, heart-rate, respiration, skin temperature, subjective stress ratings and video and audio recordings. The results provided an integrated understanding of responses to interrogation by those actively concealing information and those acting innocently. Of particular importance, the results also suggest, for the first time in an interrogation setting, that stressed individuals may secrete a volatile steroid based marker that could be used for stand-off detection. The findings are discussed in relation to developing a scalable interrogation protocol for future research in this area. Copyright © 2014 Elsevier Ltd and The Ergonomics Society. All rights reserved.
Common IED exploitation target set ontology
NASA Astrophysics Data System (ADS)
Russomanno, David J.; Qualls, Joseph; Wowczuk, Zenovy; Franken, Paul; Robinson, William
2010-04-01
The Common IED Exploitation Target Set (CIEDETS) ontology provides a comprehensive semantic data model for capturing knowledge about sensors, platforms, missions, environments, and other aspects of systems under test. The ontology also includes representative IEDs; modeled as explosives, camouflage, concealment objects, and other background objects, which comprise an overall threat scene. The ontology is represented using the Web Ontology Language and the SPARQL Protocol and RDF Query Language, which ensures portability of the acquired knowledge base across applications. The resulting knowledge base is a component of the CIEDETS application, which is intended to support the end user sensor test and evaluation community. CIEDETS associates a system under test to a subset of cataloged threats based on the probability that the system will detect the threat. The associations between systems under test, threats, and the detection probabilities are established based on a hybrid reasoning strategy, which applies a combination of heuristics and simplified modeling techniques. Besides supporting the CIEDETS application, which is focused on efficient and consistent system testing, the ontology can be leveraged in a myriad of other applications, including serving as a knowledge source for mission planning tools.
Research on Integrated Geophysics Detect Potential Ground Fissure in City
NASA Astrophysics Data System (ADS)
Qian, R.
2017-12-01
North China confined aquifer lied 70 to 200 meters below the earth's surface has been exploited for several decades, which resulted in confined water table declining and has generated a mass of ground fissure. Some of them has reached the surface and the other is developing. As it is very difficult to stop the ground fissure coming into being, measures of avoiding are often taken. It brings great potential risk to urban architecture and municipal engineering. It is very important to find out specific distribution and characteristic of potential ground fissure in city with high resolution. The ground fissure is concealed, therefor, geophysical method is an important technology to detecting concealed ground fissure. However, it is very difficult to detect the characteristics of the superficial part of ground fissure directly, as it lies dozens of meters below and has only scores of centimeters fault displacement. This paper studies applied ground penetration radar, surface wave and shallow refleciton seismic to detect ground fissure. It sets up model of surface by taking advantage of high resolution of ground penetrating radar data, constrains Reilay wave inversion and improves its resolution. The high resolution reflection seismic is good at detecting the geology structure. The data processing and interpretation technique is developmented to avoid the pitfall and improve the aliability of the rusult. The experiment has been conducted in Shunyi District, Beijing in 2016. 5 lines were settled to collect data of integrated geophysical method. Development zone of concealed ground fissure was found and its ultra shallow layer location was detected by ground penetrating radar. A trial trench of 6 meters in depth was dug and obvious ground fissure development was found. Its upper end was 1.5 meters beneath the earth's surface with displacement of 0.3 meters. The favorable effect of this detection has provided a new way for detecting ground fissure in cities of China, such as Beijing and Xi'an etc. Keyword: Ground Fissure, GPR, Surface Wave; Shallow Reflection Seismic
Structured thermal surface for radiative camouflage.
Li, Ying; Bai, Xue; Yang, Tianzhi; Luo, Hailu; Qiu, Cheng-Wei
2018-01-18
Thermal camouflage has been successful in the conductive regime, where thermal metamaterials embedded in a conductive system can manipulate heat conduction inside the bulk. Most reported approaches are background-dependent and not applicable to radiative heat emitted from the surface of the system. A coating with engineered emissivity is one option for radiative camouflage, but only when the background has uniform temperature. Here, we propose a strategy for radiative camouflage of external objects on a given background using a structured thermal surface. The device is non-invasive and restores arbitrary background temperature distributions on its top. For many practical candidates of the background material with similar emissivity as the device, the object can thereby be radiatively concealed without a priori knowledge of the host conductivity and temperature. We expect this strategy to meet the demands of anti-detection and thermal radiation manipulation in complex unknown environments and to inspire developments in phononic and photonic thermotronics.
A flexible and wearable terahertz scanner
NASA Astrophysics Data System (ADS)
Suzuki, D.; Oda, S.; Kawano, Y.
2016-12-01
Imaging technologies based on terahertz (THz) waves have great potential for use in powerful non-invasive inspection methods. However, most real objects have various three-dimensional curvatures and existing THz technologies often encounter difficulties in imaging such configurations, which limits the useful range of THz imaging applications. Here, we report the development of a flexible and wearable THz scanner based on carbon nanotubes. We achieved room-temperature THz detection over a broad frequency band ranging from 0.14 to 39 THz and developed a portable THz scanner. Using this scanner, we performed THz imaging of samples concealed behind opaque objects, breakages and metal impurities of a bent film and multi-view scans of a syringe. We demonstrated a passive biometric THz scan of a human hand. Our results are expected to have considerable implications for non-destructive and non-contact inspections, such as medical examinations for the continuous monitoring of health conditions.
An airport cargo inspection system based on X-ray and thermal neutron analysis (TNA).
Ipe, Nisy E; Akery, A; Ryge, P; Brown, D; Liu, F; Thieu, J; James, B
2005-01-01
A cargo inspection system incorporating a high-resolution X-ray imaging system with a material-specific detection system based on Ancore Corporation's patented thermal neutron analysis (TNA) technology can detect bulk quantities of explosives and drugs concealed in trucks or cargo containers. The TNA process utilises a 252Cf neutron source surrounded by a moderator. The neutron interactions with the inspected object result in strong and unique gamma-ray signals from nitrogen, which is a key ingredient in modern high explosives, and from chlorinated drugs. The TNA computer analyses the gamma-ray signals and automatically determines the presence of explosives or drugs. The radiation source terms and shielding design of the facility are described. For the X-ray generator, the primary beam, leakage radiation, and scattered primary and leakage radiation were considered. For the TNA, the primary neutrons and tunnel scattered neutrons as well as the neutron-capture gamma rays were considered.
Color image fusion for concealed weapon detection
NASA Astrophysics Data System (ADS)
Toet, Alexander
2003-09-01
Recent advances in passive and active imaging sensor technology offer the potential to detect weapons that are concealed underneath a person's clothing or carried along in bags. Although the concealed weapons can sometimes easily be detected, it can be difficult to perceive their context, due to the non-literal nature of these images. Especially for dynamic crowd surveillance purposes it may be impossible to rapidly asses with certainty which individual in the crowd is the one carrying the observed weapon. Sensor fusion is an enabling technology that may be used to solve this problem. Through fusion the signal of the sensor that depicts the weapon can be displayed in the context provided by a sensor of a different modality. We propose an image fusion scheme in which non-literal imagery can be fused with standard color images such that the result clearly displays the observed weapons in the context of the original color image. The procedure is such that the relevant contrast details from the non-literal image are transferred to the color image without altering the original color distribution of this image. The result is a natural looking color image that fluently combines all details from both input sources. When an observer who performs a dynamic crowd surveillance task, detects a weapon in the scene, he will also be able to quickly determine which person in the crowd is actually carrying the observed weapon (e.g. "the man with the red T-shirt and blue jeans"). The method is illustrated by the fusion of thermal 8-12 μm imagery with standard RGB color images.
Mobile TNA system to detect explosives and drugs concealed in cars and trucks
NASA Astrophysics Data System (ADS)
Bendahan, Joseph; Gozani, Tsahi
1998-12-01
The drug problem in the U.S. is serious and efforts to fight it are constrained by the lack of adequate means to curb the inflow of smuggled narcotics into the country through cargo containers. Also, events such as the disastrous explosion in Oklahoma City, the IRA bombing in London, and the bombing of the U.S. military residence in Dharan make the development of new tools for the detection of explosives and drugs in vehicles imperative. Thermal neutron analysis (TNA) technology, developed for the detection of explosives in suitcases, and detection of landmines and unexploded ordnance is presently being applied to the nonintrusive detection of significant amounts of explosives and drugs concealed in cars, trucks and large cargo containers. TNA technology is based on the analysis of characteristic gamma rays emitted following thermal neutron capture. A TNA system can be used in a variety of operational scenarios, such as inspection before an unloaded cargo container from a spit is moved to temporary storage, inspection of trucks unloaded from a ferry, or inspection of vehicles parked close to Federal building or military bases. This paper will discuss the detection process and operational scenarios, and will present results from recent simulations and measurements.
Winograd, Michael R; Rosenfeld, J Peter
2014-12-01
In P300-Concealed Information Tests used with mock crime scenarios, the amount of detail revealed to a participant prior to the commission of the mock crime can have a serious impact on a study's validity. We predicted that exposure to crime details through instructions would bias detection rates toward enhanced sensitivity. In a 2 × 2 factorial design, participants were either informed (through mock crime instructions) or naïve as to the identity of a to-be-stolen item, and then either committed (guilty) or did not commit (innocent) the crime. Results showed that prior knowledge of the stolen item was sufficient to cause 69% of innocent-informed participants to be incorrectly classified as guilty. Further, we found a trend toward enhanced detection rate for guilty-informed participants over guilty-naïve participants. Results suggest that revealing details to participants through instructions biases detection rates in the P300-CIT toward enhanced sensitivity. Copyright © 2014 Elsevier B.V. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Burns, Kimberly A.
2009-08-01
The accurate and efficient simulation of coupled neutron-photon problems is necessary for several important radiation detection applications. Examples include the detection of nuclear threats concealed in cargo containers and prompt gamma neutron activation analysis for nondestructive determination of elemental composition of unknown samples.
Using more different and more familiar targets improves the detection of concealed information.
Suchotzki, Kristina; De Houwer, Jan; Kleinberg, Bennett; Verschuere, Bruno
2018-04-01
When embedded among a number of plausible irrelevant options, the presentation of critical (e.g., crime-related or autobiographical) information is associated with a marked increase in response time (RT). This RT effect crucially depends on the inclusion of a target/non-target discrimination task with targets being a dedicated set of items that require a unique response (press YES; for all other items press NO). Targets may be essential because they share a feature - familiarity - with the critical items. Whereas irrelevant items have not been encountered before, critical items are known from the event or the facts of the investigation. Target items are usually learned before the test, and thereby made familiar to the participants. Hence, familiarity-based responding needs to be inhibited on the critical items and may therefore explain the RT increase on the critical items. This leads to the hypothesis that the more participants rely on familiarity, the more pronounced the RT increase on critical items may be. We explored two ways to increase familiarity-based responding: (1) Increasing the number of different target items, and (2) using familiar targets. In two web-based studies (n = 357 and n = 499), both the number of different targets and the use of familiar targets facilitated concealed information detection. The effect of the number of different targets was small yet consistent across both studies, the effect of target familiarity was large in both studies. Our results support the role of familiarity-based responding in the Concealed Information Test and point to ways on how to improve validity of the Concealed Information Test. Copyright © 2018 Elsevier B.V. All rights reserved.
NASA Astrophysics Data System (ADS)
Murrill, Steven R.; Jacobs, Eddie L.; Franck, Charmaine C.; Petkie, Douglas T.; De Lucia, Frank C.
2015-10-01
The U.S. Army Research Laboratory (ARL) has continued to develop and enhance a millimeter-wave (MMW) and submillimeter- wave (SMMW)/terahertz (THz)-band imaging system performance prediction and analysis tool for both the detection and identification of concealed weaponry, and for pilotage obstacle avoidance. The details of the MATLAB-based model which accounts for the effects of all critical sensor and display components, for the effects of atmospheric attenuation, concealment material attenuation, and active illumination, were reported on at the 2005 SPIE Europe Security and Defence Symposium (Brugge). An advanced version of the base model that accounts for both the dramatic impact that target and background orientation can have on target observability as related to specular and Lambertian reflections captured by an active-illumination-based imaging system, and for the impact of target and background thermal emission, was reported on at the 2007 SPIE Defense and Security Symposium (Orlando). Further development of this tool that includes a MODTRAN-based atmospheric attenuation calculator and advanced system architecture configuration inputs that allow for straightforward performance analysis of active or passive systems based on scanning (single- or line-array detector element(s)) or staring (focal-plane-array detector elements) imaging architectures was reported on at the 2011 SPIE Europe Security and Defence Symposium (Prague). This paper provides a comprehensive review of a newly enhanced MMW and SMMW/THz imaging system analysis and design tool that now includes an improved noise sub-model for more accurate and reliable performance predictions, the capability to account for postcapture image contrast enhancement, and the capability to account for concealment material backscatter with active-illumination- based systems. Present plans for additional expansion of the model's predictive capabilities are also outlined.
Asha, Stephen Edward; Higham, Matthew; Child, Peter
2015-05-01
If package counts on abdominal CTs of body-packers were known to be accurate, follow-up CTs could be avoided. The objective was to determine the accuracy of CT for the number of concealed packages in body-packers, and the reliability of package counts reported by body-packers who admit to concealing drugs. Suspected body-packers were identified from the emergency departments (ED) database. The medical record and radiology reports were reviewed for package counts determined by CT, patient-reported and physically retrieved. The last method was used as the reference standard. Sensitivity, specificity, positive predictive values (PPV) and negative predictive values (NPV) were calculated for CT package count accuracy. Reliability of patient-reported package counts was assessed using Pearson's correlation coefficient. There were 50 confirmed body-packers on whom 104 CT scans were performed. Data for the index and reference tests were available for 84 scans. The sensitivity, specificity, PPV and NPV for CT package count were 63% (95% CI 46% to 77%), 82% (95% CI 67% to 92%), 76% (95% CI 58% to 89%) and 71% (95% CI 56% to 83%) respectively. For CTs with a package count<15, the sensitivity, specificity, PPV and NPV for CT package count were 96% (95% CI 80% to 99%), 95% (95% CI 82% to 99%), 93% (95% CI 76% to 99%) and 97% (95% CI 86% to 100%), respectively. Correlation between patient-reported package counts and the number of packages retrieved was high (r=0.90, p<0.001, R2=81%). The accuracy of CT for determining the number of concealed packages is poor, although when applied to patients with few concealed packages accuracy is high and is useful as a rule-out test. Among patients who have admitted to drug concealment, the number of packages reported to be concealed is reliable. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
Time-to-Contact Judgments of an Approaching Object that Is Partially Concealed by an Occluder
ERIC Educational Resources Information Center
DeLucia, Patricia R.
2004-01-01
Prior studies of time-to-contact (TTC) focused on judgments of unoccluded approaching objects. P. R. DeLucia, M. K. Kaiser, J. M. Bush, L. E. Meyer, and B. T. Sweet (2003) showed that partial occlusion decreases an object's optical size and expansion rate and that the value of tau derived from the reduced optical size (relative rate of accretion;…
Krajčovič, Jozef; Janík, Martin; Novomeský, František; Straka, Lubomír; Hejna, Petr
2014-11-01
In forensic assessment, denial and concealment of pregnancy has wide-ranging implications including criminal abortions, extramural deliveries, concealment of birth, newborn infant abandonment or even neonaticide. Clarification of whether a newborn was born alive is the most important factor when evaluating an abandoned neonate or concealment of birth. Other points that need to be addressed are determination of viability and maturity of the newborn infant, and the identity of the mother. A prolonged postmortem interval following illegal disposal of a dead body often leads to advanced decomposition, making postmortem elucidation difficult. We report an exceptionally uncommon autopsy case of a well-preserved female newborn, which was accidentally found after eight years in a home freezer. Despite the prolonged postmortem interval, tissue preservation was sufficient for a meaningful autopsy including a comprehensive histopathological study. The purpose of the present investigations was to expand our understanding of thanatological processes, as well as detectability of particular histological findings on the remains of a newborn after extremely prolonged storage in an artificially frozen environment. In addition, this article discusses forensically important issues regarding concealment of newborn infant under specific conditions. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.
Current Research and Potential Applications of the Concealed Information Test: An Overview
Ben-Shakhar, Gershon
2012-01-01
Research interest in psychophysiological detection of deception has significantly increased since the September 11 terror attack in the USA. In particular, the concealed information test (CIT), designed to detect memory traces that can connect suspects to a certain crime, has been extensively studied. In this paper I will briefly review several psychophysiological detection paradigms that have been studied, with a focus on the CIT. The theoretical background of the CIT, its strength and weaknesses, its potential applications as well as research finings related to its validity (based on a recent meta-analytic study), will be discussed. Several novel research directions, with a focus on factors that may affect CIT detection in realistic settings (e.g., memory for crime details; the effect of emotional stress during crime execution) will be described. Additionally, research focusing on mal-intentions and attempts to detect terror networks using information gathered from groups of suspects using both the standard CIT and the searching CIT will be reviewed. Finally, implications of current research to the actual application of the CIT will be discussed and several recommendations that can enhance the use of the CIT will be made. PMID:23060826
Tracking the truth: the effect of face familiarity on eye fixations during deception.
Millen, Ailsa E; Hope, Lorraine; Hillstrom, Anne P; Vrij, Aldert
2017-05-01
In forensic investigations, suspects sometimes conceal recognition of a familiar person to protect co-conspirators or hide knowledge of a victim. The current experiment sought to determine whether eye fixations could be used to identify memory of known persons when lying about recognition of faces. Participants' eye movements were monitored whilst they lied and told the truth about recognition of faces that varied in familiarity (newly learned, famous celebrities, personally known). Memory detection by eye movements during recognition of personally familiar and famous celebrity faces was negligibly affected by lying, thereby demonstrating that detection of memory during lies is influenced by the prior learning of the face. By contrast, eye movements did not reveal lies robustly for newly learned faces. These findings support the use of eye movements as markers of memory during concealed recognition but also suggest caution when familiarity is only a consequence of one brief exposure.
Asha, Stephen Edward; Cooke, Andrew
2015-09-01
Suspected body packers may be brought to emergency departments (EDs) close to international airports for abdominal computed tomography (CT) scanning. Senior emergency clinicians may be asked to interpret these CT scans. Missing concealed drug packages have important clinical and forensic implications. The accuracy of emergency clinician interpretation of abdominal CT scans for concealed drugs is not known. Limited evidence suggests that accuracy for identification of concealed packages can be increased by viewing CT images on "lung window" settings. To determine the accuracy of senior emergency clinicians in interpreting abdominal CT scans for concealed drugs, and to determine if this accuracy was improved by viewing scans on both abdominal and lung window settings. Emergency clinicians blinded to all patient identifiers and the radiology report interpreted CT scans of suspected body packers using standard abdominal window settings and then with the addition of lung window settings. The reference standard was the radiologist's report. Fifty-five emergency clinicians reported 235 CT scans. The sensitivity, specificity, and accuracy of interpretation using abdominal windows was 89.9% (95% confidence interval [CI] 83.0-94.7), 81.9% (95% CI 73.7-88.4), and 86.0% (95% CI 81.5-90.4), respectively, and with both window settings was 94.1% (95% CI 88.3-97.6), 76.7% (95% CI 68.0-84.1), 85.5% (95% CI 81.0-90.0), respectively. Diagnostic accuracy was similar regardless of the clinician's experience. Interrater reliability was moderate (kappa 0.46). The accuracy of interpretation of abdominal CT scans performed for the purpose of detecting concealed drug packages by emergency clinicians is not high enough to safely discharge these patients from the ED. The use of lung windows improved sensitivity, but at the expense of specificity. Crown Copyright © 2015. Published by Elsevier Inc. All rights reserved.
NASA Astrophysics Data System (ADS)
A. AL-Salhi, Yahya E.; Lu, Songfeng
2016-08-01
Quantum steganography can solve some problems that are considered inefficient in image information concealing. It researches on Quantum image information concealing to have been widely exploited in recent years. Quantum image information concealing can be categorized into quantum image digital blocking, quantum image stereography, anonymity and other branches. Least significant bit (LSB) information concealing plays vital roles in the classical world because many image information concealing algorithms are designed based on it. Firstly, based on the novel enhanced quantum representation (NEQR), image uniform blocks clustering around the concrete the least significant Qu-block (LSQB) information concealing algorithm for quantum image steganography is presented. Secondly, a clustering algorithm is proposed to optimize the concealment of important data. Finally, we used Con-Steg algorithm to conceal the clustered image blocks. Information concealing located on the Fourier domain of an image can achieve the security of image information, thus we further discuss the Fourier domain LSQu-block information concealing algorithm for quantum image based on Quantum Fourier Transforms. In our algorithms, the corresponding unitary Transformations are designed to realize the aim of concealing the secret information to the least significant Qu-block representing color of the quantum cover image. Finally, the procedures of extracting the secret information are illustrated. Quantum image LSQu-block image information concealing algorithm can be applied in many fields according to different needs.
Self-Concealment and Suicidal Behaviors
ERIC Educational Resources Information Center
Friedlander, Adam; Nazem, Sarra; Fiske, Amy; Nadorff, Michael R.; Smith, Merideth D.
2012-01-01
Understanding self-concealment, the tendency to actively conceal distressing personal information from others, may be important in developing effective ways to help individuals with suicidal ideation. No published study has yet assessed the relation between self-concealment and suicidal behaviors. Additionally, most self-concealment research has…
Status of VESAS: a fully-electronic microwave imaging radiometer system
NASA Astrophysics Data System (ADS)
Schreiber, Eric; Peichl, Markus; Suess, Helmut
2010-04-01
Present applications of microwave remote sensing systems cover a large variety. One utilisation of the frequency range from 1 - 300 GHz is the domain of security and reconnaissance. Examples are the observation of critical infrastructures or the performance of security checks on people in order to detect concealed weapons or explosives, both being frequent threats in our world of growing international terrorism. The imaging capability of concealed objects is one of the main advantages of microwave remote sensing, because of the penetration performance of electromagnetic waves through dielectric materials in this frequency domain. The main physical effects used in passive microwave sensing rely on the naturally generated thermal radiation and the physical properties of matter, the latter being surface characteristics, chemical and physical composition, and the temperature of the material. As a consequence it is possible to discriminate objects having different material characteristics like ceramic weapons or plastic explosives with respect to the human body. Considering the use of microwave imaging with respect to people scanning systems in airports, railway stations, or stadiums, it is advantageous that passively operating devices generate no exposure on the scanned objects like actively operating devices do. For frequently used security gateways it is additionally important to have a high through-put rate in order to minimize the queue time. Consequently fast imaging systems are necessary. In this regard the conceptual idea of a fully-electronic microwave imaging radiometer system is introduced. The two-dimensional scanning mechanism is divided into a frequency scan in one direction and the method of aperture synthesis in the other. The overall goal here is to design a low-cost, fully-electronic imaging system with a frame rate of around one second at Ka band. This frequency domain around a center frequency of 37 GHz offers a well-balanced compromise between the achievable spatial resolution for a given size, and the penetration depth of the electromagnetic wave, which are conflictive requirements.
Detection of concealed explosives at stand-off distances using wide band swept millimetre waves
NASA Astrophysics Data System (ADS)
Andrews, David A.; Rezgui, Nacer D.; Smith, Sarah E.; Bowring, Nicholas; Southgate, Matthew; Baker, John G.
2008-10-01
Millimetre waves in the range 20 to 110 GHz have been used to detect the presence and thickness of dielectric materials, such as explosives, by measuring the frequency response of the return signal. Interference between the reflected signals from the front and back surfaces of the dielectric provides a characteristic frequency variation in the return signal, which may be processed to yield its optical depth [Bowring et al, Meas. Sci. Technol. 19, 024004 (2008)]. The depth resolution depends on the sweep bandwidth, which is typically 10 to 30 GHz. By using super-heterodyne detection the range of the object can also be determined, which enables a signal from a target, such as a suicide bomber to be extracted from background clutter. Using millimetre wave optics only a small area of the target is illuminated at a time, thus reducing interference from different parts of a human target. Results are presented for simulated explosive materials with water or human backing at stand-off distances. A method of data analysis that involves pattern recognition enables effective differentiation of target types.
Infrared fine-structure line diagnostics of shrouded active galactic nuclei
NASA Technical Reports Server (NTRS)
Voit, G. M.
1993-01-01
Far-infrared spectroscopy of celestial objects will improve dramatically in the coming decade, allowing astronomers to use fine-structure line emission to probe photoionized regions obscured in the optical band by thick clouds of dust. The ultraluminous far-IR galaxies revealed by IRAS, quasar-like in luminosity but smothered in molecular gas, probably conceal either immense starbursts or luminous active nuclei. In both scenarios, these objects ought to produce copious infrared fine-structure emission with several lines comparable to H(beta) in luminosity. This paper shows how these lines, if detected, can be used to determine the electron densities and far-IR obscurations of shrouded photoionized regions and to constrain the shape and ionization parameter of the ionizing spectra. The presence of (Ne V) emission in particular will distinguish shrouded AGN's from shrouded starbursts. Since all active galaxies photoionize at least some surrounding material, these diagnostics can also be applied to active galaxies in general and will aid in studying how an active nucleus interacts with the interstellar medium of its host galaxy.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Burrows, T.A.; Thoma, P.J.
Two types of ion-mobility detectors were evaluated in both laboratory and field tests. Laboratory test results show that these detectors are highly sensitive to dynamite and pistol powder and have good false-alarm agent rejection. Field tests of these two detectors revealed that they would detect dynamite and Ball-C-Propellent in free air. However, neither of the ion-mobility detectors would detect these explosives if the explosives were concealed.
NASA Astrophysics Data System (ADS)
Sinha, V.; Srivastava, A.; Lee, H. K.; Liu, X.
2013-05-01
The successful creation and operation of a neutron and X-ray combined computed tomography (NXCT) system has been demonstrated by researchers at the Missouri University of Science and Technology. The NXCT system has numerous applications in the field of material characterization and object identification in materials with a mixture of atomic numbers represented. Presently, the feasibility studies have been performed for explosive detection and homeland security applications, particularly in concealed material detection and determination of the light atomic number materials. These materials cannot be detected using traditional X-ray imaging. The new system has the capability to provide complete structural and compositional information due to the complementary nature of X-ray and neutron interactions with materials. The design of the NXCT system facilitates simultaneous and instantaneous imaging operation, promising enhanced detection capabilities of explosive materials, low atomic number materials and illicit materials for homeland security applications. In addition, a sample positioning system allowing the user to remotely and automatically manipulate the sample makes the system viable for commercial applications. Several explosives and weapon simulants have been imaged and the results are provided. The fusion algorithms which combine the data from the neutron and X-ray imaging produce superior images. This paper is a compete overview of the NXCT system for feasibility studies of explosive detection and homeland security applications. The design of the system, operation, algorithm development, and detection schemes are provided. This is the first combined neutron and X-ray computed tomography system in operation. Furthermore, the method of fusing neutron and X-ray images together is a new approach which provides high contrast images of the desired object. The system could serve as a standardized tool in nondestructive testing of many applications, especially in explosives detection and homeland security research.
Elbasuney, Sherif; El-Sherif, Ashraf F
2017-01-01
The instant detection of explosives and explosive-related compounds has become an urgent priority in recent years for homeland security and counter-terrorism applications. Modern techniques should offer enhancement in selectivity, sensitivity, and standoff distances. Miniaturisation, portability, and field-ruggedisation are crucial requirements. This study reports on instant and standoff identification of concealed explosive-related compounds using customized Raman technique. Stokes Raman spectra of common explosive-related compounds were generated and spectrally resolved to create characteristic finger print spectra. The scattered Raman emissions over the band 400:2000cm -1 were compared to infrared absorption using FTIR. It has been demonstrated that the two vibrational spectroscopic techniques were opposite and completing each other. Molecular vibrations with strong absorption in infrared (those involve strong change in dipole moments) induced weak signals in Raman and vice versa. The tailored Raman offered instant detection, high sensitivity, and standoff detection capabilities. Raman demonstrated characteristic fingerprint spectra with stable baseline and sharp intense peaks. Complete correlations of absorption/scattered signals to certain molecular vibrations were conducted to generate an entire spectroscopic profile of explosive-related compounds. This manuscript shades the light on Raman as one of the prevailing technologies for instantaneous detection of explosive-related compounds. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Director of Innovation. Volume 3, November 2009
2009-11-01
evaluated at Crimson Vi- per 2009 included the Portable Acoustic Contraband Detector (PACD) and the Fluxgate Magnetometer , two projects from SPAWAR...concealed within the containers. The Fluxgate Magnetometer is a hockey puck-sized sensor head that can detect vehicles and weapons by measuring
Visualizing the mesothoracic spiracles in a bark beetle: The coffee berry borer, Hypothenemus hampei
USDA-ARS?s Scientific Manuscript database
In a low-temperature scanning electron microscopy study aimed at determining whether the coffee berry borer (Hypothenemus hampei (Ferrari); Coleoptera: Curculionidae: Scolytinae) possesses mycangia, we fortuitously detected the mesothoracic spiracles, which are usually concealed. The mesothoracic s...
Explosive vapor detection payload for small robots
NASA Astrophysics Data System (ADS)
Stimac, Phil J.; Pettit, Michael; Wetzel, John P.; Haas, John W.
2013-05-01
Detection of explosive hazards is a critical component of enabling and improving operational mobility and protection of US Forces. The Autonomous Mine Detection System (AMDS) developed by the US Army RDECOM CERDEC Night Vision and Electronic Sensors Directorate (NVESD) is addressing this challenge for dismounted soldiers. Under the AMDS program, ARA has developed a vapor sampling system that enhances the detection of explosive residues using commercial-off-the-shelf (COTS) sensors. The Explosives Hazard Trace Detection (EHTD) payload is designed for plug-and-play installation and operation on small robotic platforms, addressing critical Army needs for more safely detecting concealed or exposed explosives in areas such as culverts, walls and vehicles. In this paper, we describe the development, robotic integration and performance of the explosive vapor sampling system, which consists of a sampling "head," a vapor transport tube and an extendable "boom." The sampling head and transport tube are integrated with the boom, allowing samples to be collected from targeted surfaces up to 7-ft away from the robotic platform. During sample collection, an IR lamp in the sampling head is used to heat a suspected object/surface and the vapors are drawn through the heated vapor transport tube to an ion mobility spectrometer (IMS) for detection. The EHTD payload is capable of quickly (less than 30 seconds) detecting explosives such as TNT, PETN, and RDX at nanogram levels on common surfaces (brick, concrete, wood, glass, etc.).
Detection and classification of concealed weapons using a magnetometer-based portal
NASA Astrophysics Data System (ADS)
Kotter, Dale K.; Roybal, Lyle G.; Polk, Robert E.
2002-08-01
A concealed weapons detection technology was developed through the support of the National Institute of Justice (NIJ) to provide a non intrusive means for rapid detection, location, and archiving of data (including visual) of potential suspects and weapon threats. This technology, developed by the Idaho National Engineering and Environmental Laboratory (INEEL), has been applied in a portal style weapons detection system using passive magnetic sensors as its basis. This paper will report on enhancements to the weapon detection system to enable weapon classification and to discriminate threats from non-threats. Advanced signal processing algorithms were used to analyze the magnetic spectrum generated when a person passes through a portal. These algorithms analyzed multiple variables including variance in the magnetic signature from random weapon placement and/or orientation. They perform pattern recognition and calculate the probability that the collected magnetic signature correlates to a known database of weapon versus non-weapon responses. Neural networks were used to further discriminate weapon type and identify controlled electronic items such as cell phones and pagers. False alarms were further reduced by analyzing the magnetic detector response by using a Joint Time Frequency Analysis digital signal processing technique. The frequency components and power spectrum for a given sensor response were derived. This unique fingerprint provided additional information to aid in signal analysis. This technology has the potential to produce major improvements in weapon detection and classification.
Courtesy stigma: A concealed consternation among caregivers of people affected by leprosy.
Dako-Gyeke, Mavis
2018-01-01
This study explored experiences of courtesy stigma among caregivers of people affected by leprosy. Using a qualitative research approach, twenty participants were purposively selected and in-depth interviews conducted. The interviews were audio-recorded, transcribed, and analyzed to identify emerging themes that addressed objectives of the study. The findings indicated that caregivers of people affected by leprosy experienced courtesy stigma. Evidence showed that fear of contagion underpinned caregivers' experiences, especially in employment and romantic relationships. In addition, participants adopted different strategies (disregarding, concealment, education, faith-based trust) to handle courtesy stigma. The findings demonstrate that psychosocial support and financial assistance to caregivers are necessary considerations for attainment of effective care for people affected by leprosy. Copyright © 2017 Elsevier Ltd. All rights reserved.
The nest-concealment hypothesis: New insights from a comparative analysis
Borgmann, Kathi L.; Conway, Courtney J.
2015-01-01
Selection of a breeding site is critical for many animals, especially for birds whose offspring are stationary during development. Thus, birds are often assumed to prefer concealed nest sites. However, 74% of studies (n = 106) that have evaluated this relationship for open-cup nesting songbirds in North America failed to support the nest-concealment hypothesis. We conducted a comparative analysis to identify factors that contribute to variation in the ability of researchers to find support for the nest-concealment hypothesis. We found that some of the discrepancy among studies can be explained by interspecific differences in morphological and extrinsic factors that affect nest predation. Moreover, methods that investigators used to estimate concealment affected whether studies found support for the nest-concealment hypothesis; 33% of the studies that used quantitative estimates found support for the nest-concealment hypothesis whereas only 10% of the studies that used qualitative estimates found support. The timing of measurements also explained some of the ambiguity; studies that provided little information regarding the timing of their foliage density estimates were less likely to support the nest-concealment hypothesis. Species with more conspicuous male plumage were less likely to support the nest-concealment hypothesis when we analyzed studies that used visual estimates. Whereas species with more conspicuous female plumage were more likely to support the nest-concealment hypothesis when we analyzed studies that used quantitative measures. Our results demonstrate that support for the nest-concealment hypothesis has been equivocal, but that some of the ambiguity can be explained by morphological traits and methods used to measure concealment.
A review of visual perception mechanisms that regulate rapid adaptive camouflage in cuttlefish.
Chiao, Chuan-Chin; Chubb, Charles; Hanlon, Roger T
2015-09-01
We review recent research on the visual mechanisms of rapid adaptive camouflage in cuttlefish. These neurophysiologically complex marine invertebrates can camouflage themselves against almost any background, yet their ability to quickly (0.5-2 s) alter their body patterns on different visual backgrounds poses a vexing challenge: how to pick the correct body pattern amongst their repertoire. The ability of cuttlefish to change appropriately requires a visual system that can rapidly assess complex visual scenes and produce the motor responses-the neurally controlled body patterns-that achieve camouflage. Using specifically designed visual backgrounds and assessing the corresponding body patterns quantitatively, we and others have uncovered several aspects of scene variation that are important in regulating cuttlefish patterning responses. These include spatial scale of background pattern, background intensity, background contrast, object edge properties, object contrast polarity, object depth, and the presence of 3D objects. Moreover, arm postures and skin papillae are also regulated visually for additional aspects of concealment. By integrating these visual cues, cuttlefish are able to rapidly select appropriate body patterns for concealment throughout diverse natural environments. This sensorimotor approach of studying cuttlefish camouflage thus provides unique insights into the mechanisms of visual perception in an invertebrate image-forming eye.
Transformation & Metamorphosis
ERIC Educational Resources Information Center
Lott, Debra
2009-01-01
The sculptures of Canadian artist Brian Jungen are a great inspiration for a lesson on creating new forms. Jungen transforms found objects into unique creations without fully concealing their original form or purpose. Frank Stella's sculpture series, including "K.132,2007" made of stainless steel and spray paint, is another great example of…
Intentional retrieval suppression can conceal guilty knowledge in ERP memory detection tests☆
Bergström, Zara M.; Anderson, Michael C.; Buda, Marie; Simons, Jon S.; Richardson-Klavehn, Alan
2013-01-01
Brain-activity markers of guilty knowledge have been promoted as accurate and reliable measures for establishing criminal culpability. Tests based on these markers interpret the presence or absence of memory-related neural activity as diagnostic of whether or not incriminating information is stored in a suspect's brain. This conclusion critically relies on the untested assumption that reminders of a crime uncontrollably elicit memory-related brain activity. However, recent research indicates that, in some circumstances, humans can control whether they remember a previous experience by intentionally suppressing retrieval. We examined whether people could use retrieval suppression to conceal neural evidence of incriminating memories as indexed by Event-Related Potentials (ERPs). When people were motivated to suppress crime retrieval, their memory-related ERP effects were significantly decreased, allowing guilty individuals to evade detection. Our findings indicate that brain measures of guilty knowledge may be under criminals’ intentional control and place limits on their use in legal settings. PMID:23664804
Detection of contraband concealed on the body using x-ray imaging
NASA Astrophysics Data System (ADS)
Smith, Gerald J.
1997-01-01
In an effort to avoid detection, smugglers and terrorists are increasingly using the body as a vehicle for transporting illicit drugs, weapons, and explosives. This trend illustrates the natural tendency of traffickers to seek the path of least resistance, as improved interdiction technology and operational effectiveness have been brought to bear on other trafficking avenues such as luggage, cargo, and parcels. In response, improved technology for human inspection is being developed using a variety of techniques. ASE's BodySearch X-ray Inspection Systems uses backscatter x-ray imaging of the human body to quickly, safely, and effectively screen for drugs, weapons, and explosives concealed on the body. This paper reviews the law enforcement and social issues involved in human inspections, and briefly describes the ASE BodySearch systems. Operator training, x-ray image interpretation, and maximizing systems effectiveness are also discussed. Finally, data collected from operation of the BodySearch system in the field is presented, and new law enforcement initiatives which have come about due to recent events are reviewed.
Jung, Kyungyong; Kim, Dae Hwan; Ryu, Ji Young
2018-05-11
In this study, we explored the relationship between concealing emotions at work and musculoskeletal symptoms in Korean workers using data from a national, population-based survey. Data were obtained from the third Korean Working Conditions Survey in 2011. We investigated the prevalence of three musculoskeletal symptoms ("back pain", "pain in the upper extremities", and "pain in the lower extremities"). Multiple logistic regression analysis was also performed to determine odds ratios (ORs) for musculoskeletal symptoms according to concealing emotions at work, adjusting for socioeconomic factors. In both sexes, the emotion-concealing group showed a significantly higher prevalence of "pain in the upper extremities" and "pain in the lower extremities" than the non-emotion-concealing group. For back pain, male - but not female - workers who concealed their emotions showed a higher prevalence than their non-emotion-concealing counterparts; the difference was statistically significant. Adjusted ORs for musculoskeletal symptoms (excluding "back pain" for female workers) in the emotion-concealing group were significantly higher. Our study suggests that concealment of emotions is closely associated with musculoskeletal symptoms, and the work environment should operate in consideration not only of the physical health work condition of workers but also of their emotional efforts including concealing emotion at work.
Gulson, B.L.; Church, S.E.; Mizon, K.J.; Meier, A.L.
1992-01-01
Lead isotopes from Fe and Mn oxides that coat stream pebbles from around the Mount Emmons porphyry molybdenum deposit in Colorado were studied to assess the feasibility of using Pb isotopes to detect concealed mineral deposits. The Fe/Mn oxide coatings were analyzed to determine their elemental concentrations using ICP-AES. The Pb isotope compositions of solutions from a selected suite of samples were measured, using both thermal ionization and ICP mass spectrometry, to compare results determined by the two analytical methods. Heavy mineral concentrates from the same sites were also analyzed to compare the Pb isotope compositions of the Fe/Mn coatings with those found in panned concentrates. The Fe/Mn and 206Pb/204Pb ratios of the oxide coatings are related to the lithology of the host rocks; Fe/Mn oxide coatings on pebbles of black shale have higher Fe/Mn values than do the coatings on either sandstone or igneous rocks. The shale host rocks have a more radiogenic signature (e.g. higher 206Pb/ 204Pb) than the sandstone or igneous host rocks. The Pb isotope data from sandstone and igneous hosts can detect concealed mineralized rock on both a regional and local scale, even though there are contributions from: (1) metals from the main-stage molybdenite ore deposit; (2) metals from the phyllic alteration zone which has a more radiogenic Pb isotope signature reflecting hydrothermal leaching of Pb from the Mancos Shale; (3) Pb-rich base metal veins with a highly variable Pb isotope signature; and (4) sedimentary country rocks which have a more radiogenic Pb isotope signature. An investigation of within-stream variation shows that the Pb isotope signature of the molybdenite ore zone is retained in the Fe/Mn oxide coatings and is not camouflaged by contributions from Pb-rich base-metal veins that crop out upstream. In another traverse, the Pb isotope data from Fe/Mn oxide coatings reflect a complex mixing of Pb from the molybdenite ore zone and its hornfels margin, Pb-rich base-metal veins, and sedimentary country rocks. Stream-sediment anomalies detected using oxalic acid leaches can be evaluated using Pb isotope analysesof selected geochemical anomalies. Such an evaluation procedure, given regional target Pb isotope signatures for concealed mineralization, can greatly reduce the cost of exploration for undiscovered ore deposits concealed beneath barren overburden. Lead isotope measurements on aliquots of the same solutions showed that ICP-MS determinations are of low precision and vary non-systematically when compared with the Pb isotope values of the higher precision thermal ionization method. These variations and lower precision of the ICP-MS measurements are attributed to matrix effects. ?? 1992.
Combined illumination cylindrical millimeter-wave imaging technique for concealed weapon detection
NASA Astrophysics Data System (ADS)
Sheen, David M.; McMakin, Douglas L.; Hall, Thomas E.
2000-07-01
A novel millimeter-wave imaging technique has been developed for personnel surveillance applications, including the detection of concealed weapons, explosives, drugs, and other contraband material. Millimeter-waves are high-frequency radio waves in the frequency band of 30 - 300 GHz, and pose no health threat to humans at moderate power levels. These waves readily penetrate common clothing materials, and are reflected by the human body and by concealed items. The combined illumination cylindrical imaging concept consists of a vertical, high-resolution, millimeter-wave array of antennas which is scanned in a cylindrical manner about the person under surveillance. Using a computer, the data from this scan is mathematically reconstructed into a series of focused 3D images of the person. After reconstruction, the images are combined into a single high-resolution 3D image of the person under surveillance. This combined image is then rendered using 3D computer graphics techniques. The combined cylindrical illumination is critical as it allows the display of information from all angles. This is necessary because millimeter-waves do not penetrate the body. Ultimately, the images displayed to the operate will be icon-based to protect the privacy of the person being screened. Novel aspects of this technique include the cylindrical scanning concept and the image reconstruction algorithm, which was developed specifically for this imaging system. An engineering prototype based on this cylindrical imaging technique has been fabricated and tested. This work has been sponsored by the Federal Aviation Administration.
An Exploratory Investigation of Social Stigma and Concealment in Patients with Multiple Sclerosis.
Cook, Jonathan E; Germano, Adriana L; Stadler, Gertraud
2016-01-01
We conducted a preliminary investigation into dimensions of stigma and their relation to disease concealment in a sample of American adults living with multiple sclerosis (MS). Fifty-three adults with MS in the United States completed an online survey assessing anticipated, internalized, and isolation stigma, as well as concealment. Responses to all the scales were relatively low, on average, but above scale minimums (P < .001). Ratings of isolation stigma and concealment were highest. Anticipated stigma strongly predicted concealment. Many adults living with MS may be concerned that they will be the target of social stigma because of their illness. These concerns are associated with disease concealment. More research is needed to investigate how MS stigma and concealment may be independent contributors to health in patients with MS.
Concealment of sexual orientation.
Sylva, David; Rieger, Gerulf; Linsenmeier, Joan A W; Bailey, J Michael
2010-02-01
Sex-atypical behaviors may be used to identify a person as homosexual. To shield themselves from prejudice, homosexual people may attempt to conceal these behaviors. It is not clear how effectively they can do so. In Study 1, we asked homosexual participants to conceal their sex-atypical behaviors while talking about the weather. Raters watched videos of the participants and judged the likelihood that each participant was homosexual. Homosexual participants were able to partially conceal signs of their orientation, but they remained distinguishable from heterosexual participants. In Study 2, we tested the ability to conceal signs of one's sexual orientation in a more demanding situation: a mock job interview. In this scenario, homosexual men were even less effective at concealing their orientation. Higher cognitive demands in this new situation may have interfered with their ability to conceal.
Infrared fine-structure line diagnostics of shrouded active galactic nuclei
NASA Technical Reports Server (NTRS)
Voit, G. M.
1992-01-01
The ultraluminous far-IR galaxies revealed by IRAS, quasar-like in luminosity but smothered in molecular gas, probably conceal either immense starbursts or luminous active nuclei. In both scenarios, these objects ought to produce copious infrared fine-structure emission with several lines comparable to H-beta in luminosity. We show how these lines, if detected, can be used to determine the electron densities and far-IR obscurations of shrouded photoionized regions and to constrain the shape and ionization parameter of the ionizing spectra. The presence of Ne v emission in particular will distinguish shrouded AGNs from shrouded starbursts. Since all active galaxies photoionize at least some surrounding material, these diagnostics can also be applied to active galaxies in general and will aid in studying how an active nucleus interacts with the interstellar medium of its host galaxy.
Student attitudes toward concealed handguns on campus at 2 universities.
Cavanaugh, Michael R; Bouffard, Jeffrey A; Wells, William; Nobles, Matt R
2012-12-01
We examined student support for a policy that would allow carrying of concealed handguns on university campuses. Large percentages of students at 2 universities expressed very low levels of comfort with the idea of permitting concealed handgun carrying on campus, suggesting that students may not welcome less restrictive policies. Students held slightly different opinions about concealed handguns on and off campus, suggesting that they view the campus environment as unique with respect to concealed handgun carrying.
NASA Astrophysics Data System (ADS)
Trofimov, Vyacheslav A.; Trofimov, Vladislav V.
2015-05-01
As it is well-known, application of the passive THz camera for the security problems is very promising way. It allows seeing concealed object without contact with a person and this camera is non-dangerous for a person. In previous papers, we demonstrate new possibility of the passive THz camera using for a temperature difference observing on the human skin if this difference is caused by different temperatures inside the body. For proof of validity of our statement we make the similar physical experiment using the IR camera. We show a possibility of temperature trace on human body skin, caused by changing of temperature inside the human body due to water drinking. We use as a computer code that is available for treatment of images captured by commercially available IR camera, manufactured by Flir Corp., as well as our developed computer code for computer processing of these images. Using both codes we demonstrate clearly changing of human body skin temperature induced by water drinking. Shown phenomena are very important for the detection of forbidden samples and substances concealed inside the human body using non-destructive control without X-rays using. Early we have demonstrated such possibility using THz radiation. Carried out experiments can be used for counter-terrorism problem solving. We developed original filters for computer processing of images captured by IR cameras. Their applications for computer processing of images results in a temperature resolution enhancing of cameras.
Student Attitudes Toward Concealed Handguns on Campus at 2 Universities
Bouffard, Jeffrey A.; Wells, William; Nobles, Matt R.
2012-01-01
We examined student support for a policy that would allow carrying of concealed handguns on university campuses. Large percentages of students at 2 universities expressed very low levels of comfort with the idea of permitting concealed handgun carrying on campus, suggesting that students may not welcome less restrictive policies. Students held slightly different opinions about concealed handguns on and off campus, suggesting that they view the campus environment as unique with respect to concealed handgun carrying. PMID:22720763
Fiber Optic Coupled Raman Based Detection of Hazardous Liquids Concealed in Commercial Products
2012-01-01
Industrial Compounds in Personal Care Products . Consumer products such as personal care and cosmetics present a challenge. Commonly these products... personal care products are also colored and present fluorescence, obscuring the persistent Raman signatures. The spectra of a perfume is shown in Figure
Computer Viruses: Prevention, Detection, and Treatment
1990-03-12
executed, also carries out its covert function, potentially undetected. This class of attack earned the term "Trojan horse" from the original of Greek ... mythology , signifying a gift which conceals a malicious purpose. 1 cause harm. The offending code may be present in a code segment the user "touches," which
Hoy-Ellis, Charles P.
2016-01-01
Recent population-based studies indicate that sexual minorities aged 50 and older experience significantly higher rates of psychological distress than their heterosexual age-peers. The minority stress model has been useful in explaining disparately high rates of psychological distress among younger sexual minorities. The purpose of this study is to test a hypothesized structural relationship between two minority stressors—internalized heterosexism and concealment of sexual orientation—and consequent psychological distress among a sample of 2,349 lesbian, gay, and bisexual adults aged 50 to 95 years old. Structural equation modeling indicates that concealment has a nonsignificant direct effect on psychological distress but a significant indirect effect that is mediated through internalized heterosexism; the effect of concealment is itself concealed. This may explain divergent results regarding the role of concealment in psychological distress in other studies, and the implications will be discussed. PMID:26322654
Classification-Based Spatial Error Concealment for Visual Communications
NASA Astrophysics Data System (ADS)
Chen, Meng; Zheng, Yefeng; Wu, Min
2006-12-01
In an error-prone transmission environment, error concealment is an effective technique to reconstruct the damaged visual content. Due to large variations of image characteristics, different concealment approaches are necessary to accommodate the different nature of the lost image content. In this paper, we address this issue and propose using classification to integrate the state-of-the-art error concealment techniques. The proposed approach takes advantage of multiple concealment algorithms and adaptively selects the suitable algorithm for each damaged image area. With growing awareness that the design of sender and receiver systems should be jointly considered for efficient and reliable multimedia communications, we proposed a set of classification-based block concealment schemes, including receiver-side classification, sender-side attachment, and sender-side embedding. Our experimental results provide extensive performance comparisons and demonstrate that the proposed classification-based error concealment approaches outperform the conventional approaches.
25 CFR 11.444 - Carrying concealed weapons.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 25 Indians 1 2014-04-01 2014-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor unless...
25 CFR 11.444 - Carrying concealed weapons.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 25 Indians 1 2013-04-01 2013-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor unless...
25 CFR 11.444 - Carrying concealed weapons.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 25 Indians 1 2011-04-01 2011-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor unless...
25 CFR 11.444 - Carrying concealed weapons.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 25 Indians 1 2010-04-01 2010-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor unless...
25 CFR 11.444 - Carrying concealed weapons.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 25 Indians 1 2012-04-01 2011-04-01 true Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor unless...
Camouflaging moving objects: crypsis and masquerade.
Hall, Joanna R; Baddeley, Roland; Scott-Samuel, Nicholas E; Shohet, Adam J; Cuthill, Innes C
2017-01-01
Motion is generally assumed to "break" camouflage. However, although camouflage cannot conceal a group of moving animals, it may impair a predator's ability to single one out for attack, even if that discrimination is not based on a color difference. Here, we use a computer-based task in which humans had to detect the odd one out among moving objects, with "oddity" based on shape. All objects were either patterned or plain, and either matched the background or not. We show that there are advantages of matching both group-mates and the background. However, when patterned objects are on a plain background (i.e., no background matching), the advantage of being among similarly patterned distractors is only realized when the group size is larger (10 compared to 5). In a second experiment, we present a paradigm for testing how coloration interferes with target-distractor discrimination, based on an adaptive staircase procedure for establishing the threshold. We show that when the predator only has a short time for decision-making, displaying a similar pattern to the distractors and the background affords protection even when the difference in shape between target and distractors is large. We conclude that, even though motion breaks camouflage, being camouflaged could help group-living animals reduce the risk of being singled out for attack by predators.
Camouflaging moving objects: crypsis and masquerade
Hall, Joanna R; Baddeley, Roland; Scott-Samuel, Nicholas E; Shohet, Adam J; Cuthill, Innes C
2017-01-01
Abstract Motion is generally assumed to “break” camouflage. However, although camouflage cannot conceal a group of moving animals, it may impair a predator’s ability to single one out for attack, even if that discrimination is not based on a color difference. Here, we use a computer-based task in which humans had to detect the odd one out among moving objects, with “oddity” based on shape. All objects were either patterned or plain, and either matched the background or not. We show that there are advantages of matching both group-mates and the background. However, when patterned objects are on a plain background (i.e., no background matching), the advantage of being among similarly patterned distractors is only realized when the group size is larger (10 compared to 5). In a second experiment, we present a paradigm for testing how coloration interferes with target-distractor discrimination, based on an adaptive staircase procedure for establishing the threshold. We show that when the predator only has a short time for decision-making, displaying a similar pattern to the distractors and the background affords protection even when the difference in shape between target and distractors is large. We conclude that, even though motion breaks camouflage, being camouflaged could help group-living animals reduce the risk of being singled out for attack by predators. PMID:29622927
Using Wireless Sensor Networks in Improvised Explosive Device Detection
2007-12-01
data collection (permitting self - healing when a node failure occurs); Sensor nodes Gateway nodes 24 • Energy efficiency (necessary to maintain...Runner” robotic platform (see Figure 1). It is reported that this system can detect a wide range of IEDs, even those concealed in vehicles. However...be as simple as running over a rubber hose to produce enough air pressure to activate a switch. Some IEDs have been remotely detonated with radio
Study and application of new Raman spectroscopy
NASA Astrophysics Data System (ADS)
Liu, Qiushi; Zhang, Xiaohua
2016-03-01
Spatially Offset Raman Spectroscopy (SORS) is a new type of Raman Spectroscopy technology, which can detect the medium concealed in the opaque or sub-transparent material fast and nondestructively. The article summarized Spatially Offset Raman Spectroscopy`s international and domestic study and application progress on contraband detecting, medical science (bone ingredient, cancer diagnose etc.), agricultural products, historical relic identification etc. and stated the technology would become an effective measurement which had wide application prospect.
Multi-Source Fusion for Explosive Hazard Detection in Forward Looking Sensors
2016-12-01
include; (1) Investigating (a) thermal, (b) synthetic aperture acoustics ( SAA ) and (c) voxel space Radar for buried and side threat attacks. (2...detection. (3) With respect to SAA , we developed new approaches in the time and frequency domains for analyzing signature of concealed targets (called...Fraz). We also developed a method to extract a multi-spectral signature from SAA and deep learning was used on limited training and class imbalance
Disposition and Health Outcomes among Infants Born to Mothers with No Prenatal Care
ERIC Educational Resources Information Center
Friedman, Susan Hatters; Heneghan, Amy; Rosenthal, Miriam
2009-01-01
Objective: This study assessed infant disposition and health outcomes among offspring born to mothers without prenatal care, based on maternal characteristics and the reason for lack of prenatal care (i.e., denial of pregnancy, concealment of pregnancy, primary substance use, financial barriers and multiparity). Methods: A retrospective record…
Social Camouflage: Interpreting Male Student Veterans' Behavior for Residence Life Professionals
ERIC Educational Resources Information Center
Livingston, Wade G.; Scott, David A.; Havice, Pamela A.; Cawthon, Tony W.
2012-01-01
The term "camouflage" implies obscurity and concealment. Male student veterans who return from the military often employ a social camouflage; though some may reveal and discuss their military experience, their overriding objective is to blend in, have a "normal" college experience, and graduate. This creates challenges for housing professionals…
The Influence of Sexual Orientation and Masculinity on Young Men's Tobacco Smoking
ERIC Educational Resources Information Center
Pachankis, John E.; Westmaas, J. Lee; Dougherty, Lea R.
2011-01-01
Objective: The prevalence of smoking among gay men is considerably higher than in the general population. To investigate possible causes of this health risk disparity, this study used multilevel modeling of daily diary data to examine the temporal relationship between smoking and both sexual orientation concealment and masculine gender role…
Zeichner, A
2001-11-01
Experiments were carried out to assess the danger of concealing GSR particles by skin debris using the tape-lift method for sampling GSR from hands. Thirty discrete spherical particles (from GSR and from the debris of oxygen cutting of steel) sized from 8 to 30 microns were mounted on a double-side adhesive coated stubs in known locations using a stereomicroscope. These stubs were then used for dabbing hands 50 times. Some of the particles or parts thereof were covered by skin flakes, however, all particles could be detected using the backscattered electron image (BEI) in the scanning electron microscope (SEM). Also, all could be identified by the energy dispersive X-ray spectroscopy (EDX).
Methodologies for Removing/Desorbing and Transporting Particles from Surfaces to Instrumentation
NASA Astrophysics Data System (ADS)
Miller, Carla J.; Cespedes, Ernesto R.
2012-12-01
Explosive trace detection (ETD) continues to be a key technology supporting the fight against terrorist bombing threats. Very selective and sensitive ETD instruments have been developed to detect explosive threats concealed on personnel, in vehicles, in luggage, and in cargo containers, as well as for forensic analysis (e.g. post blast inspection, bomb-maker identification, etc.) in a broad range of homeland security, law enforcement, and military applications. A number of recent studies have highlighted the fact that significant improvements in ETD systems' capabilities will be achieved, not by increasing the selectivity/sensitivity of the sensors, but by improved techniques for particle/vapor sampling, pre-concentration, and transport to the sensors. This review article represents a compilation of studies focused on characterizing the adhesive properties of explosive particles, the methodologies for removing/desorbing these particles from a range of surfaces, and approaches for transporting them to the instrument. The objectives of this review are to summarize fundamental work in explosive particle characterization, to describe experimental work performed in harvesting and transport of these particles, and to highlight those approaches that indicate high potential for improving ETD capabilities.
Campaign for Right to Carry Concealed Guns on Campuses Gains Traction
ERIC Educational Resources Information Center
Wiseman, Rachel
2012-01-01
Five years after the Virginia Tech massacre prompted a student in Texas to start a Facebook page in favor of the right to carry concealed weapons on college campuses, the resulting group, Students for Concealed Carry, has advanced its cause. In more than a dozen states, legislation has been introduced to allow the carrying of concealed firearms on…
Regulatory focus moderates the social performance of individuals who conceal a stigmatized identity.
Newheiser, Anna-Kaisa; Barreto, Manuela; Ellemers, Naomi; Derks, Belle; Scheepers, Daan
2015-12-01
People often choose to hide a stigmatized identity to avoid bias. However, hiding stigma can disrupt social interactions. We considered whether regulatory focus qualifies the social effects of hiding stigma by examining interactions in which stigmatized participants concealed a devalued identity from non-stigmatized partners. In the Prevention Focus condition, stigmatized participants were instructed to prevent a negative impression by concealing the identity; in the Promotion Focus condition, they were instructed to promote a positive impression by concealing the identity; in the Control condition, they were simply asked to conceal the identity. Both non-stigmatized partners and independent raters rated the interactions more positively in the Promotion Focus condition. Thus, promotion focus is interpersonally beneficial for individuals who conceal a devalued identity. © 2015 The British Psychological Society.
Gaming of performance measurement in health care: parallels with tax compliance.
Mears, Alex; Webley, Paul
2010-10-01
Gaming of performance measurement in health care distorts performance, making it appear better than it is. This can conceal potentially hazardous practice and endanger patients and staff. Research has investigated and categorized this behaviour but as yet has offered little in the way of potential solutions as the drivers are still not well understood. Studies of the psychology of tax behaviour, specifically tax avoidance and evasion, reveal some insights into what the underlying causes are. Looking at health care and tax compliance, seven similarities in response can be detected: negative view of those subject to it; not salient except for specific classes of people; general understanding of the need versus resentment of actuality; cognitive dissonance; moral versus legal grey areas; two levels of objective non-compliance; and four categories of subjective behaviour and attitude. We suggest a model of reaction and compliance for gaming and offer some suggestions as to how this phenomenon might be minimized.
Importance of structural stability to success of mourning dove nests
Coon, R.A.; Nichols, J.D.; Percival, H.F.
1981-01-01
Studies of nest-site selection and nesting habitats often involve a "characterization" of nests and of habitats in which nests are found. Our objective in the present work is to identify nest-site characteristics that are associated with variation in components of Mourning Dove (Zenaida macroura) fitness (e.g. the probability of a nest succeeding), as opposed to simply "characterizing" dove nest sites. If certain nest- site characteristics affect the probability that a nest will succeed, then we suspect that these characteristics will be associated with either concealment (the probability of detection by certain predators) or structural stability (the probability of eggs or entire nests falling to the ground as a result of wind, rain storms, parental activity, etc.). Although other workers agree that structural stability is an important determinant of Mourning Dove nesting success (e.g. McClure 1944: 384; Woolfenden and Rohwer 1969: 59), we are aware of no actual tests of this hypothesis.
324GHz CMOS VCO Using Linear Superimposition Technique
NASA Technical Reports Server (NTRS)
Daquan, Huang; LaRocca, Tim R.; Samoska, Lorene A; Fung, Andy; Chang, Frank
2007-01-01
Terahertz (frequencies ranged from 300GHz to 3THz) imaging and spectroscopic systems have drawn increasing attention recently due to their unique capabilities in detecting and possibly analyzing concealed objects. The generation of terahertz signals is nonetheless nontrivial and traditionally accomplished by using either free-electron radiation, optical lasers, Gunn diodes or fundamental oscillation by using III-V based HBT/HEMT technology[1-3]... We have substantially extended the operation range of deep-scaled CMOS by using a linear superimposition method, in which we have realized a 324GHz VCO in 90nm digital CMOS with 4GHz tuning range under 1V supply voltage. This may also pave the way for ultra-high data rate wireless communications beyond that of IEEE 802.15.3c and reach data rates comparable to that of fiber optical communications, such as OC768 (40Gbps) and beyond.
Attachment style, self-concealment, and interpersonal distance among Japanese undergraduates.
Yukawa, Shintaro; Tokuda, Hideji; Sato, Jun
2007-06-01
The relationships among attachment style, self-concealment, and interpersonal distance were studied with 71 Japanese undergraduates (33 men and 38 women, ages 18 to 20 years, M = 18.7, SD= .6). Participants completed a questionnaire about Self-concealment and Attachment Styles (Secure, Anxious, and Avoidant). One week later, Interpersonal Distance, which individuals maintain between themselves and others, was measured by the stop-distance paradigm. Analysis showed that scores for more Anxious and Avoidant Attachment Styles were positively correlated with those for greater Self-concealment. Scores for greater Self-concealment and more Anxious Attachment Style were also correlated with longer Interpersonal Distance.
Using natural beta emission for detecting concealed tobacco in parcels
NASA Astrophysics Data System (ADS)
Myers, Jeremy; Hussein, Esam M. A.
2007-10-01
It is suspected that postal systems are used for the illegal shipment of tobacco products to circumvent taxation and excise payments. This paper demonstrates that beta-particle emission from the potassium-40 contained in tobacco can be used to passively detect its presence in paperboard postal parcels. The same concept can be utilized for the detection of marijuana, whose leaves are also rich in 40K. The combination of high beta activity and a low weight is a good indicator of the presence of these two contraband materials.
Rogel-Castillo, Cristian; Boulton, Roger; Opastpongkarn, Arunwong; Huang, Guangwei; Mitchell, Alyson E
2016-07-27
Concealed damage (CD) is defined as a brown discoloration of the kernel interior (nutmeat) that appears only after moderate to high heat treatment (e.g., blanching, drying, roasting, etc.). Raw almonds with CD have no visible defects before heat treatment. Currently, there are no screening methods available for detecting CD in raw almonds. Herein, the feasibility of using near-infrared (NIR) spectroscopy between 1125 and 2153 nm for the detection of CD in almonds is demonstrated. Almond kernels with CD have less NIR absorbance in the region related with oil, protein, and carbohydrates. With the use of partial least squares discriminant analysis (PLS-DA) and selection of specific wavelengths, three classification models were developed. The calibration models have false-positive and false-negative error rates ranging between 12.4 and 16.1% and between 10.6 and 17.2%, respectively. The percent error rates ranged between 8.2 and 9.2%. Second-derivative preprocessing of the selected wavelength resulted in the most robust predictive model.
Hu, Xiaoqing; Pornpattananangkul, Narun; Rosenfeld, J Peter
2013-05-01
In an event-related potential (ERP)-based concealed information test (CIT), we investigated the effect of manipulated awareness of concealed information on the ERPs. Participants either committed a mock crime or not (guilty vs. innocent) before the CIT, and received feedback regarding either specific (high awareness) or general (low awareness) task performance during the CIT. We found that awareness and recognition of the crime-relevant information differentially influenced the frontal-central N200 and parietal P300: Probe elicited a larger N200 than irrelevant only when guilty participants were in the high awareness condition, whereas the P300 was mainly responsive to information recognition. No N200-P300 correlation was found, allowing for a combined measure of both yielding the highest detection efficiency in the high awareness group (AUC = .91). Finally, a color-naming Stroop task following the CIT revealed that guilty participants showed larger interference effects than innocent participants, suggesting that the former expended more attentional resources during the CIT. Copyright © 2013 Society for Psychophysiological Research.
Radiological and practical aspects of body packing
Reginelli, A; Pinto, F; Sica, G; Scaglione, M; Berger, F H; Romano, L; Brunese, L
2014-01-01
Body packing represents the concealment of illegal substances in a person's body with the aim of smuggling. “Body packers” either swallow drug-filled packets or introduce drug-filled packets into their bodies rectally or vaginally with the purpose of concealing them. The three main smuggled drugs are cocaine, heroin and cannabis products. Body packing represents a serious risk of acute narcotic toxicity from drug exposure, intestinal obstruction owing to pellet impaction and bowel perforation with consequent abdominal sepsis. A suspected body packer is generally admitted to hospital to perform imaging investigations and confirm the presence of drugs in his/her body. Radiological imaging methods are essential to diagnose body packing and to detect potential complications. Increasing sophistication of traffickers and improvements in packaging add to the detection difficulty. Radiologists should be aware of the appearance of drug packets in a range of imaging modalities. This article informs physicians about the challenging aspects of body packing, its background and medicolegal issues, what imaging methods can be used and what criteria are necessary to perform a correct diagnosis. PMID:24472727
Being seen or being watched? A psychoanalytic perspective on body dysmorphia.
Lemma, Alessandra
2009-08-01
The focus of this paper is on individuals who present as excessively preoccupied with their body, perceiving some aspect(s) to be 'ugly' such that they feel compelled to alter and/or conceal this 'ugly' body part. These difficulties are understood as symptoms of an underlying narcissistic disturbance. The author suggests that the relative pervasiveness of an identification with a 'super'-ego accounts for the degree of severity of the disturbance (increasing the compulsion to alter and/or conceal the hated body part) and that it has implications for the patient's accessibility in analytic treatment. Understanding the vicissitudes of the development of the body-self in the context of the earliest relationship with the 'object of desire' is core to helping these patients because of the quality of the identifications that ensue and that are then enacted the transference.
Figueras, Francesc; Gratacos, Eduard; Rial, Marta; Gull, Ilan; Krofta, Ladislav; Lubusky, Marek; Rogelio, Cruz-Martinez; Mónica, Cruz-Lemini; Miguel, Martinez-Rodriguez; Socias, Pamela; Aleuanlli, Cristina; Cordero, Mauro C Parra
2017-01-01
Introduction Fetal growth restriction (FGR) affects 5%–10% of all pregnancies, contributing to 30%–50% of stillbirths. Unfortunately, growth restriction often is not detected antenatally. The last weeks of pregnancy are critical for preventing stillbirth among babies with FGR because there is a pronounced increase in stillbirths among growth-restricted fetuses after 37 weeks of pregnancy. Here we present a protocol (V.1, 23 May 2016) for the RATIO37 trial, which evaluates an integrated strategy for accurately selecting at-risk fetuses for delivery at term. The protocol is based on the combination of fetal biometry and cerebroplacental ratio (CPR). The primary objective is to reduce stillbirth rates. The secondary aims are to detect low birth weights and adverse perinatal outcomes. Methods and analysis The study is designed as multicentre (Spain, Chile, Mexico,Czech Republic and Israel), open-label, randomised trial with parallel groups. Singleton pregnancies will be invited to participate after routine second-trimester ultrasound scan (19+0–22+6 weeks of gestation), and participants will be randomly allocated to receive revealed or concealed CPR evaluation. Then, a routine ultrasound and Doppler scan will be performed at 36+0–37+6 weeks. Sociodemographic and clinical data will be collected at enrolment. Ultrasound and Doppler variables will be recorded at 36+0–37+6 weeks of pregnancy. Perinatal outcomes will be recorded after delivery. Univariate (with estimated effect size and its 95% CI) and multivariate (mixed-effects logistic regression) comparisons between groups will be performed. Ethics and dissemination The study will be conducted in accordance with the principles of Good Clinical Practice. This study was accepted by the Clinical Research Ethics Committee of Hospital Clinic Barcelona on 23May 2016. Subsequent approval by individual ethical committees and competent authorities was granted. The study results will be published in peer-reviewed journals and disseminated at international conferences. Trial registration number NCT02907242; pre-results. PMID:28619771
Concealing Emotions at Work Is Associated with Allergic Rhinitis in Korea.
Seok, Hongdeok; Yoon, Jin-Ha; Won, Jong-Uk; Lee, Wanhyung; Lee, June-Hee; Jung, Pil Kyun; Roh, Jaehoon
2016-01-01
Concealing emotions at work can cause considerable psychological stress. While there is extensive research on the adverse health effects of concealing emotions and the association between allergic diseases and stress, research has not yet investigated whether concealing emotions at work is associated with allergic rhinitis. Allergic rhinitis is a common disease in many industrialized countries, and its prevalence is increasing. Thus, our aim was to determine the strength of this association using data from three years (2007-2009) of the 4th Korean National Health and Nutrition Examination Survey. Participants (aged 20-64) were 8,345 individuals who were economically active and who had completed the questionnaire items on concealing emotions at work. Odds ratio (OR) and 95% confidence intervals (95% CIs) were calculated for allergic rhinitis using logistic regression models. Among all participants, 3,140 subjects (37.6%) reported concealing their emotions at work: 1,661 men and 1,479 women. The OR (95% CIs) for allergic rhinitis among those who concealed emotions at work versus those who did not was 1.318 (1.148-1.512). Stratified by sex, the OR (95% CIs) was 1.307 (1.078-1.585) among men and 1.346 (1.105-1.639) among women. Thus, individuals who concealed their emotions at work were significantly more likely to have a diagnosis of AR in comparison to those who did not. Because concealing emotions at work has adverse health effects, labor policies that aim to reduce this practice are needed.
Hartman, Jessica D; Patock-Peckham, Julie A; Corbin, William R; Gates, Jonathan R; Leeman, Robert F; Luk, Jeremy W; King, Kevin M
2015-01-01
Self-concealment reflects uncomfortable feelings, thoughts, and information people have about themselves that they avoid telling others (Larson & Chastain, 1990). According to Larson and Chastain (1990) these secrets range from the slightly embarrassing to the very distressing with an individual's most traumatic experiences often concealed. Parental attitudes including those involving self-disclosure are thought to be expressed in their choice of parenting style (Brand, Hatzinger, Beck, & Holsboer-Trachsler, 2009). The specific aim of this investigation was to examine the direct and indirect influences of parenting styles on self-concealment, impaired control over drinking (i.e. the inability to stop drinking when intended), alcohol use (quantity/frequency), and alcohol-related problems. A structural equation model with 419 (223 men, 196 women) university students was examined. Two and three path mediated effects were examined with the bias corrected bootstrap technique in Mplus. Having an authoritarian mother was directly linked to more self-concealment, while having an authoritative father was directly linked to less self-concealment. Higher levels of mother authoritarianism were indirectly linked to both increased alcohol use and alcohol-related problems through more self-concealment and more impaired control over drinking. Moreover, higher levels of father authoritativeness were indirectly linked to less alcohol use and alcohol-related problems through less self-concealment and less impaired control over drinking. These findings suggest that parenting styles influence vulnerabilities such as self-concealment in the impaired control over the drinking pathway to alcohol use and alcohol-related problems. Copyright © 2014 Elsevier Ltd. All rights reserved.
Schrimshaw, Eric W; Siegel, Karolynn; Downing, Martin J; Parsons, Jeffrey T
2013-02-01
Although bisexual men report lower levels of mental health relative to gay men, few studies have examined the factors that contribute to bisexual men's mental health. Bisexual men are less likely to disclose, and more likely to conceal (i.e., a desire to hide), their sexual orientation than gay men. Theory suggests that this may adversely impact their mental health. This report examined the factors associated with disclosure and with concealment of sexual orientation, the association of disclosure and concealment with mental health, and the potential mediators (i.e., internalized homophobia, social support) of this association with mental health. An ethnically diverse sample of 203 non-gay-identified, behaviorally bisexual men who do not disclose their same-sex behavior to their female partners were recruited in New York City to complete a single set of self-report measures. Concealment was associated with higher income, a heterosexual identification, living with a wife or girlfriend, more frequent sex with women, and less frequent sex with men. Greater concealment, but not disclosure to friends and family, was significantly associated with lower levels of mental health. Multiple mediation analyses revealed that both internalized homophobia and general emotional support significantly mediated the association between concealment and mental health. The findings demonstrate that concealment and disclosure are independent constructs among bisexual men. Further, they suggest that interventions addressing concerns about concealment, emotional support, and internalized homophobia may be more beneficial for increasing the mental health of bisexual men than those focused on promoting disclosure.
Criminal Intent with Property: A Study of Real Estate Fraud Prediction and Detection
ERIC Educational Resources Information Center
Blackman, David H.
2013-01-01
The large number of real estate transactions across the United States, combined with closing process complexity, creates extremely large data sets that conceal anomalies indicative of fraud. The quantitative amount of damage due to fraud is immeasurable to the lives of individuals who are victims, not to mention the financial impact to…
Need for Nondestructive Evaluation (NDE) in the Detection of Decay in Structures
W. Wayne Wilcox
1991-01-01
Examples of the need for nondestructive and remote sensing technologies for evaluating early stages of decay are presented. The need is critical to develop methods of analyzing internal decay, at the center of large wood members, and decay behind concealing coverings. Current technologies are reviewed and their inadequacies discussed. Acoustic emission and...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lowdermilk, W. H.; Brothers, L. J.
This was a collaborative effort by Lawrence Livermore National Security (formerly the University of California)/Lawrence Livermore National Laboratory (LLNL), Valley Forge Composite Technologies, Inc., and the following Russian Institutes: P. N. Lebedev Physical Institute (LPI), Innovative Technologies Center.(AUO CIT), Central Design Bureau-Almas (CDB Almaz), Moscow Instrument Automation Research Institute, and Institute for High Energy Physics (IBEP) to develop equipment and procedures for detecting explosive materials concealed in airline checked baggage and cargo.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Voytchev, M; Radev, R; Chiaro, P
The International Electrotechnical Commission (IEC) is the leading and oldest global organization with over 100 years history of developing and publishing international standards for all electrical, electronic and related technologies, including radiation detection instrumentation. Subcommittee 45B 'Radiation Protection Instrumentation' of the IEC has recently started the development of two standards on radiation-generating devices. IEC 62463 'Radiation protection instrumentation--X-ray Systems for the Screening of Persons for Security and the Carrying of Illicit Items' is applicable to X-ray systems designed for screening people to detect if they are carrying objects such as weapons, explosives, chemical and biological agents and other concealed itemsmore » that could be used for criminal purposes, e.g. terrorist use, drug smuggling, etc. IEC 62523 'Radiation protection instrumentation--Cargo/Vehicle radiographic inspection systems' applies to cargo/vehicle imaging inspection systems using accelerator produced X-ray or gamma radiation to obtain images of the screened objects (e.g. cargo containers, transport and passenger vehicles and railroad cars). The objective of both standards is to specify standard requirements and general characteristics and test procedures, as well as, radiation, electrical, environmental, mechanical, and safety requirements and to provide examples of acceptable methods to test these requirements. In particular the standards address the design requirements as they relate to the radiation protection of the people being screened, people who are in the vicinity of the equipment and the operators. The standard IEC 62463 does not deal with the performance requirements for the quality of the object detection. Compliance with the standards requirements will provide the manufacturers with internationally acceptable specifications and the device users with assurance of the rigorous quality and accuracy of the measurements in relation to the radiological safety of the equipment. The main characteristics of IEC 62463 and IEC 62523 standards are presented and as well as the IEC methodology of standard development and approval.« less
Geometry, structure, and concealed lithology of the San Rafael Basin, southeastern Arizona
Bultman, Mark W.
1999-01-01
The contiguous United States has been well explored for exposed conventional mineral deposits. Therefore, it is likely that many economically viable and strategically significant conventional undiscovered mineral deposits will be found in bedrock concealed beneath basin sediments. Mineral resource assessments must incorporate an understanding of the geometry, structure, and concealed lithology of basins in order to be accurate. This report presents an analysis of the basin geometry and structure of the San Rafael basin in southeastern Arizona. In addition, a new methodology for inferring concealed lithology is presented and applied in the San Rafael basin. Gravity data is used to model the geometry of the basin using recent models of sediment density vs. depth developed in the region. This modeling indicates that the basin has a maximum depth of approximately 1.05 km plus or minus 0.10 km. In the southern portion, the basin can be modeled as an asymmetric graben faulted on the western margin. The northern portion of the basin is structurally more complex and may have high angle faults on the western, northern, and eastern margin. Near-ground closely spaced Earth’s total intensity magnetic field data is used to locate concealed faults within the basin. This data is also used to infer lithology concealed by shallow basin sediments. Airborne Earth’s total intensity magnetic field data is used to help infer concealed lithology in deep portions of the basin. The product of integrating all data and interpretations is a map which presents the geometry of the basin, faults and contacts concealed by basin sediments, and an estimate of the bedrock lithology concealed by basin sediment. Based on basin geometry and concealed lithology, the San Rafael basin has a high potential for concealed mineral deposits on its western and northern margin. In particular, a newly discovered magnetic anomaly in the northern portion of the basin can be modeled as a granitic intrusion with highly altered margins and may represent a potential mineral resource target. Based on the permeability and porosity of upper basin fill found in nearby basins, the San Rafael basin may contain an aquifer up to 300 meters thick over a substantial area of the basin.
Noninvasive, near-field terahertz imaging of hidden objects using a single-pixel detector.
Stantchev, Rayko Ivanov; Sun, Baoqing; Hornett, Sam M; Hobson, Peter A; Gibson, Graham M; Padgett, Miles J; Hendry, Euan
2016-06-01
Terahertz (THz) imaging can see through otherwise opaque materials. However, because of the long wavelengths of THz radiation (λ = 400 μm at 0.75 THz), far-field THz imaging techniques suffer from low resolution compared to visible wavelengths. We demonstrate noninvasive, near-field THz imaging with subwavelength resolution. We project a time-varying, intense (>100 μJ/cm(2)) optical pattern onto a silicon wafer, which spatially modulates the transmission of synchronous pulse of THz radiation. An unknown object is placed on the hidden side of the silicon, and the far-field THz transmission corresponding to each mask is recorded by a single-element detector. Knowledge of the patterns and of the corresponding detector signal are combined to give an image of the object. Using this technique, we image a printed circuit board on the underside of a 115-μm-thick silicon wafer with ~100-μm (λ/4) resolution. With subwavelength resolution and the inherent sensitivity to local conductivity, it is possible to detect fissures in the circuitry wiring of a few micrometers in size. THz imaging systems of this type will have other uses too, where noninvasive measurement or imaging of concealed structures is necessary, such as in semiconductor manufacturing or in ex vivo bioimaging.
Fu, Xiao-Ning; Wang, Jie; Yang, Lin
2013-01-01
It is a typical passive ranging technology that estimation of distance of an object is based on transmission characteristic of infrared radiation, it is also a hotspot in electro-optic countermeasures. Because of avoiding transmitting energy in the detection, this ranging technology will significantly enhance the penetration capability and infrared conceal capability of the missiles or unmanned aerial vehicles. With the current situation in existing passive ranging system, for overcoming the shortage in ranging an oncoming target object with small temperature difference from background, an improved distance estimation scheme was proposed. This article begins with introducing the concept of signal transfer function, makes clear the working curve of current algorithm, and points out that the estimated distance is not unique due to inherent nonlinearity of the working curve. A new distance calculation algorithm was obtained through nonlinear correction technique. It is a ranging formula by using sensing information at 3-5 and 8-12 microm combined with background temperature and field meteorological conditions. The authors' study has shown that the ranging error could be mainly kept around the level of 10% under the condition of the target and background apparent temperature difference equal to +/- 5 K, and the error in estimating background temperature is no more than +/- 15 K.
Factors that influence disclosure of hearing loss in the workplace.
Southall, Kenneth; Jennings, Mary Beth; Gagné, Jean-Pierre
2011-10-01
The objective of the study was to identify factors that lead individuals to conceal or disclose their hearing loss in the workplace. A qualitative research paradigm called qualitative description was selected to address this issue. Twelve people who had an adult onset hearing loss, and were gainfully employed, participated in audio-recorded semi-structured interviews designed to probe issues related to disclosure of hearing loss. A photo elicitation interview technique was employed during the interviews. Content analyses were used to extract pertinent information from verbatim transcripts. Five recurring themes emerged as important considerations in relation to this topic: (1) perceived importance of the situation; (2) perceived sense of control; (3) community affiliation; (4) burden of communication; and (5) coexisting issues related to hearing loss. The findings are discussed in relation to other concealable stigmatizing traits, stigma-theory, and social-cognitive theory. The clinical implications of these findings are discussed, with particular emphasis placed on worker self-efficacy.
1997-05-01
with respect to weather modification. Publicizing these efforts is necessary in order to eliminate all traces of " cloak and dagger " efforts tainting...theater, the Japanese used the weather to conceal their approach to the Hawaiian Islands, enhancing their surprise attack on Pearl Harbor. There... attack is different than previous researcher goals. Therefore, future experiments would have to be tailored for the new objective of hiding military
Potential for detection of explosive and biological hazards with electronic terahertz systems.
Choi, Min Ki; Bettermann, Alan; van der Weide, D W
2004-02-15
The terahertz (THz) regime (0.1-10 THz) is rich with emerging possibilities in sensing, imaging and communications, with unique applications to screening for weapons, explosives and biohazards, imaging of concealed objects, water content and skin. Here we present initial surveys to evaluate the possibility of sensing plastic explosives and bacterial spores using field-deployable electronic THz techniques based on short-pulse generation and coherent detection using nonlinear transmission lines and diode sampling bridges. We also review the barriers and approaches to achieving greater sensing-at-a-distance (stand-off) capabilities for THz sensing systems. We have made several reflection measurements of metallic and non-metallic targets in our laboratory, and have observed high contrast relative to reflection from skin. In particular, we have taken small quantities of energetic materials such as plastic explosives and a variety of Bacillus spores, and measured them in transmission and in reflection using a broadband pulsed electronic THz reflectometer. The pattern of reflection versus frequency gives rise to signatures that are remarkably specific to the composition of the target, even though the target's morphology and position is varied. Although more work needs to be done to reduce the effects of standing waves through time-gating or attenuators, the possibility of mapping out this contrast for imaging and detection is very attractive.
Shin, Dong Wook; Park, Jong Hyock; Kim, So Young; Park, Eal Whan; Yang, Hyung Kook; Ahn, Eunmi; Park, Seon Mee; Lee, Young Joon; Lim, Myong Cheol; Seo, Hong Gwan
2014-05-01
We aimed to identify the prevalence of feelings of guilt, censure, and concealment of smoking status among cancer patients and their family members who continued to smoke after the patient's diagnosis. Among 990 patient-family member dyads, 45 patients and 173 family members who continued to smoke for at least 1 month after the patients' diagnoses were administered questions examining feelings of guilt, censure, and smoking concealment. Most patients who continued to smoke reported experiencing feelings of guilt toward their families (75.6%) and censure from their family members (77.8%), and many concealed their smoking from their family members (44.4%) or healthcare professionals (46.7%). Family members who continued to smoke also reported feelings of guilt with respect to the patient (63.6%) and that the patient was critical of them (68.9%), and many concealed their smoking from the patient (28.5%) or healthcare professionals (9.3%). Patients' feeling of guilt was associated with concealment of smoking from family members (55.9% vs. 10.0%) or health care professionals (55.9% vs. 20.0%). Family members who reported feeling guilty (36.5% vs. 16.3%) or censured (34.5% vs. 16.7%) were more likely to conceal smoking from patients. Many patients and family members continue to smoke following cancer diagnosis, and the majority of them experience feelings of guilt and censure, which can lead to the concealment of smoking status from families or health care professionals. Feelings of guilt, censure, and concealment of smoking should be considered in the development and implementation of smoking cessation programs for cancer patients and family members. Copyright © 2013 John Wiley & Sons, Ltd.
Bry, Laura Jane; Mustanski, Brian; Garofalo, Robert; Burns, Michelle Nicole
2017-01-01
Disclosure of a sexual or gender minority status has been associated with both positive and negative effects on wellbeing. Few studies have explored the disclosure and concealment process in young people. Interviews were conducted with 10 sexual and/or gender minority individuals, aged 18–22 years, of male birth sex. Data were analyzed qualitatively, yielding determinants and effects of disclosure and concealment. Determinants of disclosure included holding positive attitudes about one’s identity and an implicit devaluation of acceptance by society. Coming out was shown to have both positive and negative effects on communication and social support, and was associated with both increases and decreases in experiences of stigma. Determinants of concealment included lack of comfort with one’s identity and various motivations to avoid discrimination. Concealment was also related to hypervigilance and unique strategies of accessing social support. Results are discussed in light of their clinical implications. PMID:27633070
Bril-Barniv, Shani; Moran, Galia S; Naaman, Adi; Roe, David; Karnieli-Miller, Orit
2017-03-01
People with mental illnesses face the dilemma of whether to disclose or conceal their diagnosis, but this dilemma was scarcely researched. To gain in-depth understanding of this dilemma, we interviewed 29 individuals with mental illnesses: 16 with major depression/bipolar disorders and 13 with schizophrenia. Using a phenomenological design, we analyzed individuals' experiences, decision-making processes, and views of gains and costs regarding concealment and disclosure of mental illness. We found that participants employed both positive and negative disclosure/concealment practices. Positive practices included enhancing personal recovery, community integration, and/or supporting others. Negative practices occurred in forced, uncontrolled situations. We also identified various influencing factors, including familial norms of sharing, accumulated experiences with disclosure, and ascribed meaning to diagnosis. Based on these findings, we deepen the understanding about decision-making processes and the consequences of disclosing or concealing mental illness. We discuss how these finding can help consumers explore potential benefits and disadvantages of mental illness disclosure/concealment occurrences.
Bry, Laura Jane; Mustanski, Brian; Garofalo, Robert; Burns, Michelle Nicole
2017-01-01
Disclosure of a sexual or gender minority status has been associated with both positive and negative effects on wellbeing. Few studies have explored the disclosure and concealment process in young people. Interviews were conducted with 10 sexual and/or gender minority individuals, aged 18-22 years, of male birth sex. Data were analyzed qualitatively, yielding determinants and effects of disclosure and concealment. Determinants of disclosure included holding positive attitudes about one's identity and an implicit devaluation of acceptance by society. Coming out was shown to have both positive and negative effects on communication and social support and was associated with both increases and decreases in experiences of stigma. Determinants of concealment included lack of comfort with one's identity and various motivations to avoid discrimination. Concealment was also related to hypervigilance and unique strategies of accessing social support. Results are discussed in light of their clinical implications.
The Act of Answering Questions Elicited Differentiated Responses in a Concealed Information Test.
Otsuka, Takuro; Mizutani, Mitsuyoshi; Yagi, Akihiro; Katayama, Jun'ichi
2018-04-17
The concealed information test (CIT), a psychophysiological detection of deception test, compares physiological responses between crime-related and crime-unrelated items. In previous studies, whether the act of answering questions affected physiological responses was unclear. This study examined effects of both question-related and answer-related processes on physiological responses. Twenty participants received a modified CIT, in which the interval between presentation of questions and answering them was 27 s. Differentiated respiratory movements and cardiovascular responses between items were observed for both questions (items) and answers, while differentiated skin conductance response was observed only for questions. These results suggest that physiological responses to questions reflected orientation to a crime-related item, while physiological responses during answering reflected inhibition of psychological arousal caused by orienting. Regarding the CIT's accuracy, participants' perception of the questions themselves more strongly influenced physiological responses than answering them. © 2018 American Academy of Forensic Sciences.
Lim, Meng-Hui; Teoh, Andrew Beng Jin; Toh, Kar-Ann
2013-06-01
Biometric discretization is a key component in biometric cryptographic key generation. It converts an extracted biometric feature vector into a binary string via typical steps such as segmentation of each feature element into a number of labeled intervals, mapping of each interval-captured feature element onto a binary space, and concatenation of the resulted binary output of all feature elements into a binary string. Currently, the detection rate optimized bit allocation (DROBA) scheme is one of the most effective biometric discretization schemes in terms of its capability to assign binary bits dynamically to user-specific features with respect to their discriminability. However, we learn that DROBA suffers from potential discriminative feature misdetection and underdiscretization in its bit allocation process. This paper highlights such drawbacks and improves upon DROBA based on a novel two-stage algorithm: 1) a dynamic search method to efficiently recapture such misdetected features and to optimize the bit allocation of underdiscretized features and 2) a genuine interval concealment technique to alleviate crucial information leakage resulted from the dynamic search. Improvements in classification accuracy on two popular face data sets vindicate the feasibility of our approach compared with DROBA.
Abdollahi, Abbas; Hosseinian, Simin; Beh-Pajooh, Ahmad; Carlbring, Per
2017-01-01
One of the biggest barriers in treating adolescents with mental health problems is their refusing to seek psychological help. This study was designed to examine the relationships between two forms of perfectionism, self-concealment and attitudes toward seeking psychological help and to test the mediating role of self-concealment in the relationship between perfectionism and attitudes toward seeking psychological help among Malaysian high school students. The participants were 475 Malaysian high school students from four high schools in Kuala Lumpur, Malaysia. Structural equation modelling results indicated that high school students with high levels of socially prescribed perfectionism, high levels of self-concealment, and low levels of self-oriented perfectionism reported negative attitudes toward seeking psychological help. Bootstrapping analysis showed that self-concealment emerged as a significant, full mediator in the link between socially prescribed perfectionism and attitudes toward seeking psychological help. Moderated mediation analysis also examined whether the results generalized across men and women. The results revealed that male students with socially prescribed perfectionism are more likely to engage in self-concealment, which in turn, leads to negative attitudes toward seeking psychological help more than their female counterparts. The results suggested that students high in socially prescribed perfectionism were more likely to engage in self-concealment and be less inclined to seek psychological help.
NASA Astrophysics Data System (ADS)
Brockner, Blake; Veal, Charlie; Dowdy, Joshua; Anderson, Derek T.; Williams, Kathryn; Luke, Robert; Sheen, David
2018-04-01
The identification followed by avoidance or removal of explosive hazards in past and/or present conflict zones is a serious threat for both civilian and military personnel. This is a challenging task as variability exists with respect to the objects, their environment and emplacement context, to name a few factors. A goal is the development of automatic or human-in-the-loop sensor technologies that leverage signal processing, data fusion and machine learning. Herein, we explore the detection of side attack explosive hazards (SAEHs) in three dimensional voxel space radar via different shallow and deep convolutional neural network (CNN) architectures. Dimensionality reduction is performed by using multiple projected images versus the raw three dimensional voxel data, which leads to noteworthy savings in input size and associated network hyperparameters. Last, we explore the accuracy and interpretation of solutions learned via random versus intelligent network weight initialization. Experiments are provided on a U.S. Army data set collected over different times, weather conditions, target types and concealments. Preliminary results indicate that deep learning can perform as good as, if not better, than a skilled domain expert, even in light of limited training data with a class imbalance.
Farwell, Lawrence A; Richardson, Drew C; Richardson, Graham M
2013-08-01
Brain fingerprinting detects concealed information stored in the brain by measuring brainwave responses. We compared P300 and P300-MERMER event-related brain potentials for error rate/accuracy and statistical confidence in four field/real-life studies. 76 tests detected presence or absence of information regarding (1) real-life events including felony crimes; (2) real crimes with substantial consequences (either a judicial outcome, i.e., evidence admitted in court, or a $100,000 reward for beating the test); (3) knowledge unique to FBI agents; and (4) knowledge unique to explosives (EOD/IED) experts. With both P300 and P300-MERMER, error rate was 0 %: determinations were 100 % accurate, no false negatives or false positives; also no indeterminates. Countermeasures had no effect. Median statistical confidence for determinations was 99.9 % with P300-MERMER and 99.6 % with P300. Brain fingerprinting methods and scientific standards for laboratory and field applications are discussed. Major differences in methods that produce different results are identified. Markedly different methods in other studies have produced over 10 times higher error rates and markedly lower statistical confidences than those of these, our previous studies, and independent replications. Data support the hypothesis that accuracy, reliability, and validity depend on following the brain fingerprinting scientific standards outlined herein.
Chemical and Biological Defense Program Annual Report to Congress
2006-03-01
activities , which are closely guarded secrets. The prevalence of dual-use technologies and legitimate civilian applications means nuclear, chemical and...and non-state actors can conceal WMD programs and related activities , the United States, its allies and partners must expect further intelligence gaps... activities into three objective areas: Homeland Defense, War on Terror/Irregular (Asymmetric) Warfare, and Conventional Campaigns. In each area, it
Representing revolution: icons of industrialization.
Fara, Patricia
2006-03-01
Appreciating pictures entails a consideration not only of the people, objects and landscape that their artists have chosen to portray, but also an imagining of what has been excluded. The term 'Industrial Revolution' has been given multiple meanings, and this article (part of the Science in the Industrial Revolution series) explores some of these by exposing the messages concealed inside some of the most enduring images of the Revolution.
ERIC Educational Resources Information Center
Okamoto-Barth, Sanae; Tomonaga, Masaki; Tanaka, Masayuki; Matsuzawa, Tetsuro
2008-01-01
The use of gaze shifts as social cues has various evolutionary advantages. To investigate the developmental processes of this ability, we conducted an object-choice task by using longitudinal methods with infant chimpanzees tested from 8 months old until 3 years old. The experimenter used one of six gestures towards a cup concealing food; tapping,…
Cost Effective Regional Ballistic Missile Defense
2016-02-16
deploying advanced air defense systems18, such as the Russian S-300 and S-500, and concealing them in hardened, camouflaged sites, such as extensive... Russian objections to the European Phased Adaptive Approach (EPAA) and fund homeland defense priorities.39 Furthermore, the PTSS system was also... Theatre Ballistic Missile Defence Capability Becomes Operational,” Jane’s Missiles & Rockets, 1 February 2011. 55 Joseph W. Kirschbaum, REGIONAL MISSILE
Component pattern analysis of chemicals using multispectral THz imaging system
NASA Astrophysics Data System (ADS)
Kawase, Kodo; Ogawa, Yuichi; Watanabe, Yuki
2004-04-01
We have developed a novel basic technology for terahertz (THz) imaging, which allows detection and identification of chemicals by introducing the component spatial pattern analysis. The spatial distributions of the chemicals were obtained from terahertz multispectral transillumination images, using absorption spectra previously measured with a widely tunable THz-wave parametric oscillator. Further we have applied this technique to the detection and identification of illicit drugs concealed in envelopes. The samples we used were methamphetamine and MDMA, two of the most widely consumed illegal drugs in Japan, and aspirin as a reference.
Three applications of backscatter x-ray imaging technology to homeland defense
NASA Astrophysics Data System (ADS)
Chalmers, Alex
2005-05-01
A brief review of backscatter x-ray imaging and a description of three systems currently applying it to homeland defense missions (BodySearch, ZBV and ZBP). These missions include detection of concealed weapons, explosives and contraband on personnel, in vehicles and large cargo containers. An overview of the x-ray imaging subsystems is provided as well as sample images from each system. Key features such as x-ray safety, throughput and detection are discussed. Recent trends in operational modes are described that facilitate 100% inspection at high throughput chokepoints.
Zhang, Xin-Sheng; Liu, Shi-Xiong; Xiang, Xue-Yan; Zhang, Wen-Gang; Tang, Da-Xing
2014-04-01
To search for a simple and effective surgical approach to the management of moderate to severe pediatric concealed penis in children. We used Devine's technique via incision between the penis and scrotum in the treatment of 68 cases of moderate to severe pediatric concealed penis. The patients were aged 3 -13 (mean 6.5) years, 30 with moderate and 38 with severe pediatric concealed penis. This strategy achieved good near- and long-term effects and satisfactory appearance of the penis, which was similar to that of circumcision. At 3 months after surgery, the penile length was 3 - 5.2 cm, averaging (2.35 +/- 0.35) cm. Devine's technique via incision between the penis and scrotum is a simple and effective surgical option for moderate to severe pediatric concealed penis in children.
Concealable Stigmatized Identities and Psychological Well-Being
Quinn, Diane M.; Earnshaw, Valerie A.
2013-01-01
Many people have concealable stigmatized identities: Identities that can be hidden from others and that are socially devalued and negatively stereotyped. Understanding how these concealable stigmatized identities affect psychological well-being is critical. We present our model of the components of concealable stigmatized identities including valenced content – internalized stigma, experienced discrimination, anticipated stigma, disclosure reactions, and counter-stereotypic/positive information – and magnitude – centrality and salience. Research has shown that negatively valenced content is related to increased psychological distress. However, smaller identity magnitude may buffer this distress. We review the research available and discuss important areas for future work. PMID:23730326
Noninvasive deep Raman detection with 2D correlation analysis
NASA Astrophysics Data System (ADS)
Kim, Hyung Min; Park, Hyo Sun; Cho, Youngho; Jin, Seung Min; Lee, Kang Taek; Jung, Young Mee; Suh, Yung Doug
2014-07-01
The detection of poisonous chemicals enclosed in daily necessaries is prerequisite essential for homeland security with the increasing threat of terrorism. For the detection of toxic chemicals, we combined a sensitive deep Raman spectroscopic method with 2D correlation analysis. We obtained the Raman spectra from concealed chemicals employing spatially offset Raman spectroscopy in which incident line-shaped light experiences multiple scatterings before being delivered to inner component and yielding deep Raman signal. Furthermore, we restored the pure Raman spectrum of each component using 2D correlation spectroscopic analysis with chemical inspection. Using this method, we could elucidate subsurface component under thick powder and packed contents in a bottle.
Spiegel, Tali; De Bel, Vera; Steverink, Nardi
2016-01-01
This study aims to describe the interplay between the work trajectories and the passing patterns of individuals with degenerative eye conditions in different phases of their career, as well as the disease progression and the career and well-being outcomes associated with different works and passing trajectories. Qualitative interviews on the topic of work trajectories were conducted with 36 working or retired individuals with degenerative eye conditions. The "bigger picture" method was used to explore passing and concealment behavioral patterns, and their associations with various work trajectories. Five patterns of passing and concealment behavior in the workplace were identified and were linked with various work trajectories among visually impaired study participants: (1) no career adjustments, concealed condition throughout career; (2) revealed condition after adjusting career plans; (3) increasingly open about their condition over the course of their career; (4) engaged in career planning, always open about their condition; and (5) engaged in limited career planning, always open about their condition. Patterns characterized by less planning and more identity concealment were associated with more stress and lower levels of self-acceptance, while patterns characterized by more planning for vision deterioration and less passing behavior were associated with higher levels self-acceptance and fewer obstacles over the course of an individual's career. The study's findings can serve as a guide for health professionals. Many individuals with degenerative eye conditions try to conceal their identity as visually impaired in the professional setting. Different aspects of career outcomes (e.g. age of retirement) and wellbeing outcomes (e.g. self-acceptance and stress) associate with identity concealment patterns of individuals throughout their careers. Identifying concealment patterns will allow health professionals to tackle particular adverse outcomes and challenges associated with these patterns.
Malterud, Kirsti; Bjorkman, Mari
2016-10-01
The last decades have offered substantial improvement regarding human rights for lesbian and gay (LG) persons. Yet LG persons are often in the closet, concealing their sexual orientation. We present a qualitative study based on 182 histories submitted from 161 LG individuals to a Web site. The aim was to explore experiences of closeting among LG persons in Norway. A broad range of strategies was used for closeting, even among individuals who generally considered themselves to be out of the closet. Concealment was enacted by blunt denial, clever avoidance, or subtle vagueness. Other strategies included changing or eliminating the pronoun or name of the partner in ongoing conversations. Context-dependent concealment, differentiating between persons, situations, or arenas, was repeatedly applied for security or convenience. We propose a shift from "being in the closet" to "situated concealment of sexual orientation."
Conventional and Non-Conventional Nuclear Material Signatures
NASA Astrophysics Data System (ADS)
Gozani, Tsahi
2009-03-01
The detection and interdiction of concealed special nuclear material (SNM) in all modes of transport is one of the most critical security issues facing the United States and the rest of the world. In principle, detection of nuclear materials is relatively easy because of their unique properties: all of them are radioactive and all emit some characteristic gamma rays. A few emit neutrons as well. These signatures are the basis for passive non-intrusive detection of nuclear materials. The low energy of the radiations necessitates additional means of detection and validation. These are provided by high-energy x-ray radiography and by active inspection based on inducing nuclear reactions in the nuclear materials. Positive confirmation that a nuclear material is present or absent can be provided by interrogation of the inspected object with penetrating probing radiation, such as neutrons and photons. The radiation induces specific reactions in the nuclear material yielding, in turn, penetrating signatures which can be detected outside the inspected object. The "conventional" signatures are first and foremost fission signatures: prompt and delayed neutrons and gamma rays. Their intensity (number per fission) and the fact that they have broad energy (non-discrete, though unique) distributions and certain temporal behaviors are key to their use. The "non- conventional" signatures are not related to the fission process but to the unique nuclear structure of each element or isotope in nature. This can be accessed through the excitation of isotopic nuclear levels (discrete and continuum) by neutron inelastic scattering or gamma resonance fluorescence. Finally there is an atomic signature, namely the high atomic number (Z>74), which obviously includes all the nuclear materials and their possible shielding. The presence of such high-Z elements can be inferred by techniques using high-energy x rays. The conventional signatures have been addressed in another article. Non-conventional signatures and some of their current or potential uses will be discussed here.
Dechartres, Agnes; Trinquart, Ludovic; Atal, Ignacio; Moher, David; Dickersin, Kay; Boutron, Isabelle; Perrodeau, Elodie; Altman, Douglas G; Ravaud, Philippe
2017-06-08
Objective To examine how poor reporting and inadequate methods for key methodological features in randomised controlled trials (RCTs) have changed over the past three decades. Design Mapping of trials included in Cochrane reviews. Data sources Data from RCTs included in all Cochrane reviews published between March 2011 and September 2014 reporting an evaluation of the Cochrane risk of bias items: sequence generation, allocation concealment, blinding, and incomplete outcome data. Data extraction For each RCT, we extracted consensus on risk of bias made by the review authors and identified the primary reference to extract publication year and journal. We matched journal names with Journal Citation Reports to get 2014 impact factors. Main outcomes measures We considered the proportions of trials rated by review authors at unclear and high risk of bias as surrogates for poor reporting and inadequate methods, respectively. Results We analysed 20 920 RCTs (from 2001 reviews) published in 3136 journals. The proportion of trials with unclear risk of bias was 48.7% for sequence generation and 57.5% for allocation concealment; the proportion of those with high risk of bias was 4.0% and 7.2%, respectively. For blinding and incomplete outcome data, 30.6% and 24.7% of trials were at unclear risk and 33.1% and 17.1% were at high risk, respectively. Higher journal impact factor was associated with a lower proportion of trials at unclear or high risk of bias. The proportion of trials at unclear risk of bias decreased over time, especially for sequence generation, which fell from 69.1% in 1986-1990 to 31.2% in 2011-14 and for allocation concealment (70.1% to 44.6%). After excluding trials at unclear risk of bias, use of inadequate methods also decreased over time: from 14.8% to 4.6% for sequence generation and from 32.7% to 11.6% for allocation concealment. Conclusions Poor reporting and inadequate methods have decreased over time, especially for sequence generation and allocation concealment. But more could be done, especially in lower impact factor journals. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
Gaussian private quantum channel with squeezed coherent states
Jeong, Kabgyun; Kim, Jaewan; Lee, Su-Yong
2015-01-01
While the objective of conventional quantum key distribution (QKD) is to secretly generate and share the classical bits concealed in the form of maximally mixed quantum states, that of private quantum channel (PQC) is to secretly transmit individual quantum states concealed in the form of maximally mixed states using shared one-time pad and it is called Gaussian private quantum channel (GPQC) when the scheme is in the regime of continuous variables. We propose a GPQC enhanced with squeezed coherent states (GPQCwSC), which is a generalization of GPQC with coherent states only (GPQCo) [Phys. Rev. A 72, 042313 (2005)]. We show that GPQCwSC beats the GPQCo for the upper bound on accessible information. As a subsidiary example, it is shown that the squeezed states take an advantage over the coherent states against a beam splitting attack in a continuous variable QKD. It is also shown that a squeezing operation can be approximated as a superposition of two different displacement operations in the small squeezing regime. PMID:26364893
Gaussian private quantum channel with squeezed coherent states.
Jeong, Kabgyun; Kim, Jaewan; Lee, Su-Yong
2015-09-14
While the objective of conventional quantum key distribution (QKD) is to secretly generate and share the classical bits concealed in the form of maximally mixed quantum states, that of private quantum channel (PQC) is to secretly transmit individual quantum states concealed in the form of maximally mixed states using shared one-time pad and it is called Gaussian private quantum channel (GPQC) when the scheme is in the regime of continuous variables. We propose a GPQC enhanced with squeezed coherent states (GPQCwSC), which is a generalization of GPQC with coherent states only (GPQCo) [Phys. Rev. A 72, 042313 (2005)]. We show that GPQCwSC beats the GPQCo for the upper bound on accessible information. As a subsidiary example, it is shown that the squeezed states take an advantage over the coherent states against a beam splitting attack in a continuous variable QKD. It is also shown that a squeezing operation can be approximated as a superposition of two different displacement operations in the small squeezing regime.
Visual analysis of the effects of load carriage on gait
NASA Astrophysics Data System (ADS)
Wittman, Michael G.; Ward, James M.; Flynn, Patrick J.
2005-03-01
As early as the 1970's it was determined that gait, or the "manner of walking" is an identifying feature of a human being. Since then, extensive research has been done in the field of computer vision to determine how accurately a subject can be identified by gait characteristics. This has necessarily led to the study of how various data collection conditions, such as terrain type, varying camera angles, or a carried briefcase, may affect the identifying features of gait. However, little or no research has been done to question whether such conditions may be inferred from gait analysis. For example, is it possible to determine characteristics of the walking surface simply by looking at statistics derived from the subject's gait? The question to be addressed is whether significant concealed weight distributed on the subject's torso can be discovered through analysis of his gait. Individual trends in subjects in response to increasing concealed weight will be explored, with the objective of finding universal trends that would have obvious security purposes.
Figueras, Francesc; Gratacos, Eduard; Rial, Marta; Gull, Ilan; Krofta, Ladislav; Lubusky, Marek; Cruz-Martinez, Rogelio; Cruz-Lemini, Mónica; Martinez-Rodriguez, Miguel; Socias, Pamela; Aleuanlli, Cristina; Cordero, Mauro C Parra
2017-06-15
Fetal growth restriction (FGR) affects 5%-10% of all pregnancies, contributing to 30%-50% of stillbirths. Unfortunately, growth restriction often is not detected antenatally. The last weeks of pregnancy are critical for preventing stillbirth among babies with FGR because there is a pronounced increase in stillbirths among growth-restricted fetuses after 37 weeks of pregnancy. Here we present a protocol (V.1, 23 May 2016) for the RATIO37 trial, which evaluates an integrated strategy for accurately selecting at-risk fetuses for delivery at term. The protocol is based on the combination of fetal biometry and cerebroplacental ratio (CPR). The primary objective is to reduce stillbirth rates. The secondary aims are to detect low birth weights and adverse perinatal outcomes. The study is designed as multicentre (Spain, Chile, Mexico,Czech Republic and Israel), open-label, randomised trial with parallel groups. Singleton pregnancies will be invited to participate after routine second-trimester ultrasound scan (19 +0 -22 +6 weeks of gestation), and participants will be randomly allocated to receive revealed or concealed CPR evaluation. Then, a routine ultrasound and Doppler scan will be performed at 36 +0 -37 +6 weeks. Sociodemographic and clinical data will be collected at enrolment. Ultrasound and Doppler variables will be recorded at 36 +0 -37 +6 weeks of pregnancy. Perinatal outcomes will be recorded after delivery. Univariate (with estimated effect size and its 95% CI) and multivariate (mixed-effects logistic regression) comparisons between groups will be performed. The study will be conducted in accordance with the principles of Good Clinical Practice. This study was accepted by the Clinical Research Ethics Committee of Hospital Clinic Barcelona on 23May 2016. Subsequent approval by individual ethical committees and competent authorities was granted. The study results will be published in peer-reviewed journals and disseminated at international conferences. NCT02907242; pre-results. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.
Ultra-wide-band 3D microwave imaging scanner for the detection of concealed weapons
NASA Astrophysics Data System (ADS)
Rezgui, Nacer-Ddine; Andrews, David A.; Bowring, Nicholas J.
2015-10-01
The threat of concealed weapons, explosives and contraband in footwear, bags and suitcases has led to the development of new devices, which can be deployed for security screening. To address known deficiencies of metal detectors and x-rays, an UWB 3D microwave imaging scanning apparatus using FMCW stepped frequency working in the K and Q bands and with a planar scanning geometry based on an x y stage, has been developed to screen suspicious luggage and footwear. To obtain microwave images of the concealed weapons, the targets are placed above the platform and the single transceiver horn antenna attached to the x y stage is moved mechanically to perform a raster scan to create a 2D synthetic aperture array. The S11 reflection signal of the transmitted sweep frequency from the target is acquired by a VNA in synchronism with each position step. To enhance and filter from clutter and noise the raw data and to obtain the 2D and 3D microwave images of the concealed weapons or explosives, data processing techniques are applied to the acquired signals. These techniques include background subtraction, Inverse Fast Fourier Transform (IFFT), thresholding, filtering by gating and windowing and deconvolving with the transfer function of the system using a reference target. To focus the 3D reconstructed microwave image of the target in range and across the x y aperture without using focusing elements, 3D Synthetic Aperture Radar (SAR) techniques are applied to the post-processed data. The K and Q bands, between 15 to 40 GHz, show good transmission through clothing and dielectric materials found in luggage and footwear. A description of the system, algorithms and some results with replica guns and a comparison of microwave images obtained by IFFT, 2D and 3D SAR techniques are presented.
NASA Astrophysics Data System (ADS)
Arya, Ankit S.; Anderson, Derek T.; Bethel, Cindy L.; Carruth, Daniel
2013-05-01
A vision system was designed for people detection to provide support to SWAT team members operating in challenging environments such as low-to-no light, smoke, etc. When the vision system is mounted on a mobile robot platform: it will enable the robot to function as an effective member of the SWAT team; to provide surveillance information; to make first contact with suspects; and provide safe entry for team members. The vision task is challenging because SWAT team members are typically concealed, carry various equipment such as shields, and perform tactical and stealthy maneuvers. Occlusion is a particular challenge because team members operate in close proximity to one another. An uncooled electro-opticaljlong wav e infrared (EO/ LWIR) camera, 7.5 to 13.5 m, was used. A unique thermal dataset was collected of SWAT team members from multiple teams performing tactical maneuvers during monthly training exercises. Our approach consisted of two stages: an object detector trained on people to find candidate windows, and a secondary feature extraction, multi-kernel (MK) aggregation and classification step to distinguish between SWAT team members and civilians. Two types of thermal features, local and global, are presented based on ma ximally stable extremal region (MSER) blob detection. Support vector machine (SVM) classification results of approximately [70, 93]% for SWAT team member detection are reported based on the exploration of different combinations of visual information in terms of training data.
The association between concealing emotions at work and medical utilization in Korea.
Seok, Hongdeok; Yoon, Jin-Ha; Lee, Wanhyung; Lee, June-Hee; Jung, Pil Kyun; Kim, Inah; Won, Jong-Uk; Roh, Jaehoon
2014-01-01
We aimed to investigate the association between concealing emotions at work and medical utilization. Data from the 2007-2009 4th Korea National Health and Nutrition Examination Survey (KNHANES IV) was used, 7,094 participants (3,837 males, 3,257 females) aged between 20 and 54 who were economically active and completed all necessary questionnaire items were included. Odds ratios (ORs) and 95% confidence intervals (95% CI) for differences in hospitalization, outpatient visits, and pharmaceutical drug use between those who concealed their emotions and those who did not were investigated using logistic regression models with and without gender stratification. Among those who concealed their emotions (n = 2,763), 47.4% were females, and 50.1% had chronic disease. In addition, 9.7% of the concealing emotions group had been hospitalized within the last year, 24.8% had been outpatients in the last two weeks, and 28.3% had used pharmaceutical drugs in the last two weeks. All ORs represent the odds of belonging to the concealing emotions group over the non-concealing emotions group. After adjustment for individual, occupational, socioeconomic and disease factors, the adjusted ORs (95% CI) in hospitalization are 1.29 (1.08 ~ 1.53) in the total population, 1.25 (0.98 ~ 1.60) in males and 1.30 (1.02 ~ 1.66) in females, in outpatient visits are 1.15 (1.02 ~ 1.29) in the total population, 1.05 (0.88 ~ 1.24) in males and 1.25 (1.06 ~ 1.47) in females and in pharmaceutical drug use are 1.12 (1.01 ~ 1.25) in the total population, 1.08 (0.92 ~ 1.27) in males and 1.14 (0.98 ~ 1.33) in females. Those who concealed their emotions at work were more likely to use medical services. Moreover, the health effects of concealing emotions at work might be more detrimental in women than in men.
Terahertz Imaging of Subjects With Concealed Weapons
2006-05-01
pulsed imaging", Advanced Characterization, Therapeutics, and Systems XIV, Proceedings of SPIE, Vol. 5318: 23-33 6. Anthony E. Siegman , Lasers , p667...imagery. Both methods made use of in-house transceivers, consisting of two ultra-stable far-infrared lasers , terahertz heterodyne detection systems...SYSTEM The 1.56THz transceiver system at STL uses two carbon dioxide lasers paired individually with two far-infrared lasers . All four units are
Rosenfeld, J Peter; Labkovsky, Elena; Davydova, Elena; Ward, Anne; Rosenfeld, Lauren
2017-05-01
Previous research indicated that the skin conductance response of the autonomic nervous system in the Concealed Information Test (CIT) is typically increased in subjects who are financially and otherwise incentivized to defeat the CIT (the paradoxical "motivational impairment" effect). This is not the case for RT-based CITs, nor P300 tests based on the three-stimulus protocol for detection of cognitive malingering (although these are not the same as CITs). The present report is the first attempt to study the effect of financial motivation on the P300-based Complex Trial Protocol using both episodic and semantic memory probe and irrelevant stimuli. The Test of Memory Malingering (TOMM) was used to validate behavioral differences between the two groups we created by offering one (paid) group but not another (unpaid) group a financial reward for beating our tests. Group behavioral differences on the TOMM did confirm group manipulations. Probe-minus-irrelevant P300 differences did not differ between groups, although as previously, semantic memory-evoked P300s were larger than episodic memory-evoked P300s. © 2017 Society for Psychophysiological Research.
Farwell, Lawrence A.; Richardson, Drew C.; Richardson, Graham M.; Furedy, John J.
2014-01-01
A classification concealed information test (CIT) used the “brain fingerprinting” method of applying P300 event-related potential (ERP) in detecting information that is (1) acquired in real life and (2) unique to US Navy experts in military medicine. Military medicine experts and non-experts were asked to push buttons in response to three types of text stimuli. Targets contain known information relevant to military medicine, are identified to subjects as relevant, and require pushing one button. Subjects are told to push another button to all other stimuli. Probes contain concealed information relevant to military medicine, and are not identified to subjects. Irrelevants contain equally plausible, but incorrect/irrelevant information. Error rate was 0%. Median and mean statistical confidences for individual determinations were 99.9% with no indeterminates (results lacking sufficiently high statistical confidence to be classified). We compared error rate and statistical confidence for determinations of both information present and information absent produced by classification CIT (Is a probe ERP more similar to a target or to an irrelevant ERP?) vs. comparison CIT (Does a probe produce a larger ERP than an irrelevant?) using P300 plus the late negative component (LNP; together, P300-MERMER). Comparison CIT produced a significantly higher error rate (20%) and lower statistical confidences: mean 67%; information-absent mean was 28.9%, less than chance (50%). We compared analysis using P300 alone with the P300 + LNP. P300 alone produced the same 0% error rate but significantly lower statistical confidences. These findings add to the evidence that the brain fingerprinting methods as described here provide sufficient conditions to produce less than 1% error rate and greater than 95% median statistical confidence in a CIT on information obtained in the course of real life that is characteristic of individuals with specific training, expertise, or organizational affiliation. PMID:25565941
NASA Astrophysics Data System (ADS)
Bouma, Henri; Burghouts, Gertjan; den Hollander, Richard; van der Zee, Sophie; Baan, Jan; ten Hove, Johan-Martijn; van Diepen, Sjaak; van den Haak, Paul; van Rest, Jeroen
2016-10-01
Deception detection is valuable in the security domain to distinguish truth from lies. It is desirable in many security applications, such as suspect and witness interviews and airport passenger screening. Interviewers are constantly trying to assess the credibility of a statement, usually based on intuition without objective technical support. However, psychological research has shown that humans can hardly perform better than random guessing. Deception detection is a multi-disciplinary research area with an interest from different fields, such as psychology and computer science. In the last decade, several developments have helped to improve the accuracy of lie detection (e.g., with a concealed information test, increasing the cognitive load, or measurements with motion capture suits) and relevant cues have been discovered (e.g., eye blinking or fiddling with the fingers). With an increasing presence of mobile phones and bodycams in society, a mobile, stand-off, automatic deception detection methodology based on various cues from the whole body would create new application opportunities. In this paper, we study the feasibility of measuring these visual cues automatically on different parts of the body, laying the groundwork for stand-off deception detection in more flexible and mobile deployable sensors, such as body-worn cameras. We give an extensive overview of recent developments in two communities: in the behavioral-science community the developments that improve deception detection with a special attention to the observed relevant non-verbal cues, and in the computer-vision community the recent methods that are able to measure these cues. The cues are extracted from several body parts: the eyes, the mouth, the head and the fullbody pose. We performed an experiment using several state-of-the-art video-content-analysis (VCA) techniques to assess the quality of robustly measuring these visual cues.
Hiding true emotions: micro-expressions in eyes retrospectively concealed by mouth movements
Iwasaki, Miho; Noguchi, Yasuki
2016-01-01
When we encounter someone we dislike, we may momentarily display a reflexive disgust expression, only to follow-up with a forced smile and greeting. Our daily lives are replete with a mixture of true and fake expressions. Nevertheless, are these fake expressions really effective at hiding our true emotions? Here we show that brief emotional changes in the eyes (micro-expressions, thought to reflect true emotions) can be successfully concealed by follow-up mouth movements (e.g. a smile). In the same manner as backward masking, mouth movements of a face inhibited conscious detection of all types of micro-expressions in that face, even when viewers paid full attention to the eye region. This masking works only in a backward direction, however, because no disrupting effect was observed when the mouth change preceded the eye change. These results provide scientific evidence for everyday behaviours like smiling to dissemble, and further clarify a major reason for the difficulty we face in discriminating genuine from fake emotional expressions. PMID:26915796
Eppinger, Robert G.; Kelley, Karen D.; Fey, David L.; Giles, Stuart A.; Minsley, Burke J.; Smith, Steven M.
2010-01-01
From 2007 through 2010, scientists in the U.S. Geological Survey (USGS) have been conducting exploration-oriented geochemical and geophysical studies in the region surrounding the giant Pebble porphyry Cu-Au-Mo deposit in southwestern Alaska. The Cretaceous Pebble deposit is concealed under tundra, glacial till, and Tertiary cover rocks, and is undisturbed except for numerous exploration drill holes. These USGS studies are part of a nation-wide research project on evaluating and detecting concealed mineral resources. This report focuses on exploration geochemistry and comprises illustrations and associated notes that were presented as a case study in a workshop on this topic. The workshop, organized by L.G. Closs and R. Glanzman, is called 'Geochemistry in Mineral Exploration and Development,' presented by the Society of Economic Geologists at a technical conference entitled 'The Challenge of Finding New Mineral Resources: Global Metallogeny, Integrative Exploration and New Discoveries,' held at Keystone, Colorado, October 2-5, 2010.
Hiding true emotions: micro-expressions in eyes retrospectively concealed by mouth movements.
Iwasaki, Miho; Noguchi, Yasuki
2016-02-26
When we encounter someone we dislike, we may momentarily display a reflexive disgust expression, only to follow-up with a forced smile and greeting. Our daily lives are replete with a mixture of true and fake expressions. Nevertheless, are these fake expressions really effective at hiding our true emotions? Here we show that brief emotional changes in the eyes (micro-expressions, thought to reflect true emotions) can be successfully concealed by follow-up mouth movements (e.g. a smile). In the same manner as backward masking, mouth movements of a face inhibited conscious detection of all types of micro-expressions in that face, even when viewers paid full attention to the eye region. This masking works only in a backward direction, however, because no disrupting effect was observed when the mouth change preceded the eye change. These results provide scientific evidence for everyday behaviours like smiling to dissemble, and further clarify a major reason for the difficulty we face in discriminating genuine from fake emotional expressions.
A Concealed Barcode Identification System Using Terahertz Time-domain Spectroscopy
NASA Astrophysics Data System (ADS)
Guan, Yu; Yamamoto, Manabu; Kitazawa, Toshiyuki; Tripathi, Saroj R.; Takeya, Kei; Kawase, Kodo
2015-03-01
We present a concealed terahertz barcode/chipless tag to achieve remote identification through an obstructing material using terahertz radiation. We show scanned terahertz reflection spectral images of barcodes concealed by a thick obstacle. A concealed and double- side printed terahertz barcode structure is proposed, and we demonstrate that our design has better performance in definition than a single-side printed barcode using terahertz time-domain spectroscopy. This technique combines the benefits of a chipless tag to read encoded information covered by an optically opaque material with low cost and a simple fabrication process. Simulations are also described, along with an explanation of the principle of the terahertz barcode identification system.
Weisz, Bradley M; Quinn, Diane M; Williams, Michelle K
2016-12-01
This research examined whether the relationship between perceived social support and health would be moderated by level of outness for people living with different concealable stigmatized identities (mental illness, substance abuse, domestic violence, rape, or childhood abuse). A total of 394 people living with a concealable stigmatized identity completed a survey. Consistent with hypotheses, at high levels of outness, social support predicted better health; at low levels of outness, social support was less predictive of health. People concealing a stigmatized identity may only be able to reap the health benefits of social support if they are "out" about the stigmatized identity. © The Author(s) 2015.
A Practical Millimeter-Wave Holographic Imaging System with Tunable IF Attenuator
NASA Astrophysics Data System (ADS)
Zhu, Yu-Kun; Yang, Ming-Hui; Wu, Liang; Sun, Yun; Sun, Xiao-Wei
2017-10-01
A practical millimeter-wave (mmw) holographic imaging system with tunable intermediate frequency (IF) attenuator has been developed. It can be used for the detection of concealed weapons at security checkpoints, especially the airport. The system is utilized to scan the passenger and detect the weapons hidden in the clothes. To reconstruct the three dimensions (3-D) image, a holographic mmw imaging algorithm based on aperture synthesis and back scattering is presented. The system is active and works at 28-33 GHz. Tunable IF attenuator is applied to compensate the intensity and phase differences between multi-channels and multi-frequencies.
Associations Between Secret-Keeping and Quality of Life in Older Adults.
Maas, Joyce; Wismeijer, Andreas A J; Van Assen, Marcel A L M
2018-01-01
This study examined the effects of secrecy on quality of life in a sample consisting of older adults (>50 years; N = 301). Three key components of secrecy were examined with the Tilburg Secrecy Scale-25 (TSS25; possession of a secret, self-concealment, and cognitive preoccupation). The TSS25 distinguishes between the tendency to conceal personal information (self-concealment) and the tendency to worry or ruminate about the secret (cognitive preoccupation), thereby enabling investigation of the effects of secrecy on quality of life in detail. Confirming previous findings in younger samples, we found a positive effect of possession of a secret on quality of life, after controlling for both TSS25's self-concealment and cognitive preoccupation. This suggests that keeping secrets may have a positive association with quality of life in older adults as well, as long as they do not have the tendency to self-conceal and are not cognitively preoccupied with their secret.
Memory Detection 2.0: The First Web-Based Memory Detection Test
Kleinberg, Bennett; Verschuere, Bruno
2015-01-01
There is accumulating evidence that reaction times (RTs) can be used to detect recognition of critical (e.g., crime) information. A limitation of this research base is its reliance upon small samples (average n = 24), and indications of publication bias. To advance RT-based memory detection, we report upon the development of the first web-based memory detection test. Participants in this research (Study1: n = 255; Study2: n = 262) tried to hide 2 high salient (birthday, country of origin) and 2 low salient (favourite colour, favourite animal) autobiographical details. RTs allowed to detect concealed autobiographical information, and this, as predicted, more successfully so than error rates, and for high salient than for low salient items. While much remains to be learned, memory detection 2.0 seems to offer an interesting new platform to efficiently and validly conduct RT-based memory detection research. PMID:25874966
Pendulum detector testing device
Gonsalves, J.M.
1997-09-30
A detector testing device is described which provides consistent, cost-effective, repeatable results. The testing device is primarily constructed of PVC plastic and other non-metallic materials. Sensitivity of a walk-through detector system can be checked by: (1) providing a standard test object simulating the mass, size and material content of a weapon or other contraband, (2) suspending the test object in successive positions, such as head, waist and ankle levels, simulating where the contraband might be concealed on a person walking through the detector system; and (3) swinging the suspended object through each of the positions, while operating the detector system and observing its response. The test object is retained in a holder in which the orientation of the test device or target can be readily changed, to properly complete the testing requirements. 5 figs.
Pendulum detector testing device
Gonsalves, John M.
1997-01-01
A detector testing device which provides consistent, cost-effective, repeatable results. The testing device is primarily constructed of PVC plastic and other non-metallic materials. Sensitivity of a walk-through detector system can be checked by: 1) providing a standard test object simulating the mass, size and material content of a weapon or other contraband, 2) suspending the test object in successive positions, such as head, waist and ankle levels, simulating where the contraband might be concealed on a person walking through the detector system; and 3) swinging the suspended object through each of the positions, while operating the detector system and observing its response. The test object is retained in a holder in which the orientation of the test device or target can be readily changed, to properly complete the testing requirements.
NASA Astrophysics Data System (ADS)
Kim, Do-Hwi; Han, Kuk-Il; Choi, Jun-Hyuk; Kim, Tae-Kuk
2017-05-01
Infrared (IR) signal emitted from objects over 0 degree Kelvin has been used to detect and recognize the characteristics of those objects. Recently more delicate IR sensors have been applied for various guided missiles and they affect a crucial influence on object's survivability. Especially, in marine environment it is more vulnerable to be attacked by IR guided missiles since there are nearly no objects for concealment. To increase the survivability of object, the IR signal of the object needs to be analyzed properly by considering various marine environments. IR signature of a naval ship consists of the emitted energy from ship surface and the reflected energy by external sources. Surface property such as the emissivity and the absorptivity on the naval ship varies with different paints applied on the surface and the reflected IR signal is also affected by the surface radiative property, the sensor's geometric position and various climatic conditions in marine environment. Since the direct measurement of IR signal using IR camera is costly and time consuming job, computer simulation methods are developing rapidly to replace those experimental tasks. In this study, we are demonstrate a way of analyzing the IR signal characteristics by using the measured background IR signals using an IR camera and the estimated target IR signals from the computer simulation to find the seasonal trends of IR threats of a naval ship. Through this process, measured weather data are used to analyze more accurate IR signal conditions for the naval ship. The seasonal change of IR signal contrast between the naval ship and the marine background shows that the highest contrast radiant intensity (CRI) value is appeared in early summer.
Improved characterization of scenes with a combination of MMW radar and radiometer information
NASA Astrophysics Data System (ADS)
Dill, Stephan; Peichl, Markus; Schreiber, Eric; Anglberger, Harald
2017-05-01
For security related applications MMW radar and radiometer systems in remote sensing or stand-off configurations are well established techniques. The range of development stages extends from experimental to commercial systems on the civil and military market. Typical examples are systems for personnel screening at airports for concealed object detection under clothing, enhanced vision or landing aid for helicopter and vehicle based systems for suspicious object or IED detection along roads. Due to the physical principle of active (radar) and passive (radiometer) MMW measurement techniques the appearance of single objects and thus the complete scenario is rather different for radar and radiometer images. A reasonable combination of both measurement techniques could lead to enhanced object information. However, some technical requirements should be taken into account. The imaging geometry for both sensors should be nearly identical, the geometrical resolution and the wavelength should be similar and at best the imaging process should be carried out simultaneously. Therefore theoretical and experimental investigations on a suitable combination of MMW radar and radiometer information have been conducted. First experiments in 2016 have been done with an imaging linescanner based on a cylindrical imaging geometry [1]. It combines a horizontal line scan in azimuth with a linear motion in vertical direction for the second image dimension. The main drawback of the system is the limited number of pixel in vertical dimension at a certain distance. Nevertheless the near range imaging results where promising. Therefore the combination of radar and radiometer sensor was assembled on the DLR wide-field-of-view linescanner ABOSCA which is based on a spherical imaging geometry [2]. A comparison of both imaging systems is discussed. The investigations concentrate on rather basic scenarios with canonical targets like flat plates, spheres, corner reflectors and cylinders. First experimental measurement results with the ABOSCA linescanner are shown.
Relationship authenticity partially mediates the effects of attachment on relationship satisfaction.
Rasco, Danney; Warner, Rebecca M
2017-01-01
Individuals with anxious and avoidant attachment tend to experience less satisfaction in their relationships. Past research suggests the negative effects of attachment on relationship satisfaction may be partially mediated by self-disclosure and self-concealment; the present study evaluated relationship authenticity as a potential additional mediator. Confirmatory factor analysis indicated that relationship authenticity is distinct from self-disclosure and self-concealment. Relationship authenticity predicted additional variance in relationship satisfaction controlling for attachment, self-disclosure, and self-concealment. The results were consistent with relationship authenticity, along with self-disclosure and self-concealment, partially mediating the effects of attachment on relationship satisfaction. These findings suggest that relationship authenticity may play a unique role in understanding how attachment influences relationship satisfaction. Theoretical and clinical implications are discussed.
Development of a High-Throughput Microwave Imaging System for Concealed Weapons Detection
2016-07-15
hardware. Index Terms—Microwave imaging, multistatic radar, Fast Fourier Transform (FFT). I. INTRODUCTION Near-field microwave imaging is a non-ionizing...configuration, but its computational demands are extreme. Fast Fourier Transform (FFT) imaging has long been used to efficiently construct images sampled with...Simulated image of 25 point scatterers imaged at range 1.5m, with array layout depicted in Fig. 3. Left: image formed with Equation (5) ( Fourier
C-130 Corrosion Prevention and Control Program
2011-08-01
hexavalent chrome … Warner Robins Air Logistics Center People First…Mission Always SIBR Projects Back Scatter X-Ray NDI Detect concealed...Projects Listing Future Projects Chrome -Free Coating Systems Flight Tests • AkzoNobel (Sep-Oct 2011) – PreKote – Aerodur 2100 magnesium rich...primer (MgRP) – Aerodur 5000 topcoat color #36173 • Deft (June 2012) – Rare earth conversion coating (RECC) 1015/3021 – 02-GN-093 chrome -free
Role of radiology in a national initiative to interdict drug smuggling: the Dutch experience.
Algra, Paul R; Brogdon, Byron G; Marugg, Roque C
2007-08-01
The purpose of this pictorial essay is to describe the role of radiology in a national initiative to intercept illegal narcotics concealed within the bodies of human transporters. Radiologic examination is increasingly important in identifying intracorporeal drug smuggling as improved wrapping techniques undermine the usefulness of blood and urine testing and clinical observation. Detection rates of high accuracy, sensitivity, and specificity are achieved by experienced radiologists.
New approach for detecting and classifying concealed weapons
NASA Astrophysics Data System (ADS)
Roybal, Lyle G.; Rice, Philip M.; Manhardt, Joseph M.
1997-02-01
The possession of a weapon in the courtroom of our American justice system is a Federal offense. A weapon in the courtroom is a particularly serious problem for judges, plaintiffs, defendants, and bystanders because of the emotional nature and environment of the courtroom. Potential violators include organized criminals and gangsters, individuals with personal vendettas, and otherwise sane and reasonable people who, because of the emotion of the moment, lose sight of right and wrong in our justice system. Most Federal courthouses incorporate some sort of metal detection apparatus used to screen and prevent individuals from carrying personal weapons into courtrooms. These devices are considered conventional in the sense that they employ an active electromagnetic induction technique that is sensitive to the presence of metal. This technique provides no information concerning the massiveness and location of the offending metal object and is prone to false alarms. This work introduces an alternative method for weapons discrimination that is based on passive magnetics technology in concert with simple comparative algorithms such that massiveness and location of suspected weapons may be determined. Since this system provides information not available from conventional metal detectors, false alarms will be greatly reduced, allowing remote monitoring of all entrances into a courtroom from a single vantage point, thereby saving considerable resources used on personnel costs.
Gómez-Serrano, Miguel Ángel; López-López, Pascual
2014-01-01
Predation is one of the main causes of adult mortality and breeding failure for ground-nesting birds. Micro-habitat structure around nests plays a critical role in minimizing predation risk. Plovers nest in sites with little vegetation cover to maximize the incubating adult visibility, but many studies suggest a trade-off between nest-crypsis and predator detection strategies. However, this trade-off has not been explored in detail because methods used so far do not allow estimating the visibility with regards to critical factors such as slope or plant permeability to vision. Here, we tested the hypothesis that Kentish plovers select exposed sites according to a predator detection strategy, and the hypothesis that more concealed nests survive longer according to a crypsis strategy. To this end, we obtained an accurate estimation of the incubating adult's field of vision through a custom built inverted periscope. Our results showed that plovers selected nest sites with higher visibility than control points randomly selected with regards to humans and dogs, although nests located in sites with higher vegetation cover survived longer. In addition, the flushing distance (i.e., the distance at which incubating adults leave the nest when they detect a potential predator) decreased with vegetation cover. Consequently, the advantages of concealing the nest were limited by the ability to detect predators, thus indirectly supporting the existence of the trade-off between crypsis and predator detection. Finally, human disturbance also constrained nest choice, forcing plovers to move to inland sites that were less suitable because of higher vegetation cover, and modulated flushing behavior, since plovers that were habituated to humans left their nests closer to potential predators. This constraint on the width of suitable breeding habitat is particularly relevant for the conservation of Kentish Plover in sand beaches, especially under the current context of coastal regression and increase of recreational activities.
Gómez-Serrano, Miguel Ángel; López-López, Pascual
2014-01-01
Predation is one of the main causes of adult mortality and breeding failure for ground-nesting birds. Micro-habitat structure around nests plays a critical role in minimizing predation risk. Plovers nest in sites with little vegetation cover to maximize the incubating adult visibility, but many studies suggest a trade-off between nest-crypsis and predator detection strategies. However, this trade-off has not been explored in detail because methods used so far do not allow estimating the visibility with regards to critical factors such as slope or plant permeability to vision. Here, we tested the hypothesis that Kentish plovers select exposed sites according to a predator detection strategy, and the hypothesis that more concealed nests survive longer according to a crypsis strategy. To this end, we obtained an accurate estimation of the incubating adult's field of vision through a custom built inverted periscope. Our results showed that plovers selected nest sites with higher visibility than control points randomly selected with regards to humans and dogs, although nests located in sites with higher vegetation cover survived longer. In addition, the flushing distance (i.e., the distance at which incubating adults leave the nest when they detect a potential predator) decreased with vegetation cover. Consequently, the advantages of concealing the nest were limited by the ability to detect predators, thus indirectly supporting the existence of the trade-off between crypsis and predator detection. Finally, human disturbance also constrained nest choice, forcing plovers to move to inland sites that were less suitable because of higher vegetation cover, and modulated flushing behavior, since plovers that were habituated to humans left their nests closer to potential predators. This constraint on the width of suitable breeding habitat is particularly relevant for the conservation of Kentish Plover in sand beaches, especially under the current context of coastal regression and increase of recreational activities. PMID:25208045
A new surgical technique for concealed penis using an advanced musculocutaneous scrotal flap.
Han, Dong-Seok; Jang, Hoon; Youn, Chang-Shik; Yuk, Seung-Mo
2015-06-19
Until recently, no single, universally accepted surgical method has existed for all types of concealed penis repairs. We describe a new surgical technique for repairing concealed penis by using an advanced musculocutaneous scrotal flap. From January 2010 to June 2014, we evaluated 12 patients (12-40 years old) with concealed penises who were surgically treated with an advanced musculocutaneous scrotal flap technique after degloving through a ventral approach. All the patients were scheduled for regular follow-up at 6, 12, and 24 weeks postoperatively. The satisfaction grade for penile size, morphology, and voiding status were evaluated using a questionnaire preoperatively and at all of the follow-ups. Information regarding complications was obtained during the postoperative hospital stay and at all follow-ups. The patients' satisfaction grades, which included the penile size, morphology, and voiding status, improved postoperatively compared to those preoperatively. All patients had penile lymphedema postoperatively; however, this disappeared within 6 weeks. There were no complications such as skin necrosis and contracture, voiding difficulty, or erectile dysfunction. Our advanced musculocutaneous scrotal flap technique for concealed penis repair is technically easy and safe. In addition, it provides a good cosmetic appearance, functional outcomes and excellent postoperative satisfaction grades. Lastly, it seems applicable in any type of concealed penis, including cases in which the ventral skin defect is difficult to cover.
Cancer survivors' concealment or disclosure of diagnosis: Implications for return to work.
Morrison, T L; Thomas, R L
2015-01-01
The ability to return to work (RTW) is a significant quality of life indicator for many working aged cancer survivors. In the void of available support, many are left to independently navigate the RTW process which includes such important considerations as disclosure or concealment of diagnosis with concomitant sequellae. This article reviews participants' variable approaches to concealment, disclosure, or even an open educative stance as well as the associated benefits and limitations. Photovoice methods combined with interviewing. While most participants disclosed their diagnosis and many extolled the benefits of an open, educative stance, there were drawbacks experienced. Similarly, those who concealed their diagnosis also experienced benefits and challenges. In the current void of appropriate cancer rehabilitation supports, cancer survivors must independently negotiate their RTW process. Although most participants openly disclosed their diagnosis and associated limitations, a few concealed or camouflaged. There are benefits and limitations to both approaches of which survivors should be made aware at the outset as such will shape their RTW experience. Multidisciplinary rehabilitation support services would best guide survivors' management of the myriad of factors that will impact their work reintegration.
Heimann, Marco; Girotto, Vittorio; Legrenzi, Paolo; Bonnefon, Jean-François
2013-01-01
We introduce the Conceal or Reveal Dilemma, in which individuals receive unfair benefits, and must decide whether to conceal or to reveal this unfair advantage. This dilemma has two important characteristics: it does not lend itself easily to cost-benefit analysis, neither to the application of any strong universal norm. As a consequence, it is ideally suited to the study of interindividual and intercultural variations in moral-economic norms. In this paper we focus on interindividual variations, and we report four studies showing that individuals cannot be swayed by financial incentives to conceal or to reveal, and follow instead fixed, idiosyncratic strategies. We discuss how this result can be extended to individual and cultural variations in the tendency to display or to hide unfair rewards. PMID:24066040
Heimann, Marco; Girotto, Vittorio; Legrenzi, Paolo; Bonnefon, Jean-François
2013-01-01
We introduce the Conceal or Reveal Dilemma, in which individuals receive unfair benefits, and must decide whether to conceal or to reveal this unfair advantage. This dilemma has two important characteristics: it does not lend itself easily to cost-benefit analysis, neither to the application of any strong universal norm. As a consequence, it is ideally suited to the study of interindividual and intercultural variations in moral-economic norms. In this paper we focus on interindividual variations, and we report four studies showing that individuals cannot be swayed by financial incentives to conceal or to reveal, and follow instead fixed, idiosyncratic strategies. We discuss how this result can be extended to individual and cultural variations in the tendency to display or to hide unfair rewards.
Classifying threats with a 14-MeV neutron interrogation system.
Strellis, Dan; Gozani, Tsahi
2005-01-01
SeaPODDS (Sea Portable Drug Detection System) is a non-intrusive tool for detecting concealed threats in hidden compartments of maritime vessels. This system consists of an electronic neutron generator, a gamma-ray detector, a data acquisition computer, and a laptop computer user-interface. Although initially developed to detect narcotics, recent algorithm developments have shown that the system is capable of correctly classifying a threat into one of four distinct categories: narcotic, explosive, chemical weapon, or radiological dispersion device (RDD). Detection of narcotics, explosives, and chemical weapons is based on gamma-ray signatures unique to the chemical elements. Elements are identified by their characteristic prompt gamma-rays induced by fast and thermal neutrons. Detection of RDD is accomplished by detecting gamma-rays emitted by common radioisotopes and nuclear reactor fission products. The algorithm phenomenology for classifying threats into the proper categories is presented here.
Pachankis, John E.; Hatzenbuehler, Mark L.; Hickson, Ford; Weatherburn, Peter; Berg, Rigmor C.; Marcus, Ulrich; Schmidt, Axel J.
2016-01-01
Objective Substantial country-level variation exists in prejudiced attitudes towards male homosexuality and in the extent to which countries promote the unequal treatment of MSM through discriminatory laws. The impact and underlying mechanisms of country-level stigma on odds of diagnosed HIV, sexual opportunities, and experience of HIV-prevention services, needs and behaviours have rarely been examined, however. Design Data come from the European MSM Internet Survey (EMIS), which was administered between June and August 2010 across 38 European countries (N =174 209). Methods Country-level stigma was assessed using a combination of national laws and policies affecting sexual minorities and a measure of attitudes held by the citizens of each country. We also assessed concealment, HIV status, number of past 12-month male sex partners, and eight HIV-preventive services, knowledge, and behavioural outcomes. Results MSM living in countries with higher levels of stigma had reduced odds of diagnosed HIV and fewer partners but higher odds of sexual risk behaviour, unmet prevention needs, not using testing services, and not discussing their sexuality in testing services. Sexual orientation concealment mediated associations between country-level stigma and these outcomes. Conclusion Country-level stigma may have historically limited HIV transmission opportunities among MSM, but by restricting MSM’s public visibility, it also reduces MSM’s ability to access HIV-preventive services, knowledge and precautionary behaviours. These findings suggest that MSM in European countries with high levels of stigma are vulnerable to HIV infection. Although they have less opportunity to identify and contact other MSM, this might change with emerging technologies. PMID:26035323
NASA Astrophysics Data System (ADS)
Slaughter, D. R.; Accatino, M. R.; Bernstein, A.; Church, J. A.; Descalle, M. A.; Gosnell, T. B.; Hall, J. M.; Loshak, A.; Manatt, D. R.; Mauger, G. J.; Moore, T. L.; Norman, E. B.; Pohl, B. A.; Pruet, J. A.; Petersen, D. C.; Walling, R. S.; Weirup, D. L.; Prussin, S. G.; McDowell, M.
2005-12-01
A concept for detecting the presence of special nuclear material (235U or 239Pu) concealed in intermodal cargo containers is described. It is based on interrogation with a pulsed beam of 7 MeV neutrons that produce fission events and their β-delayed neutron emission or β-delayed high-energy γ radiation between beam pulses provide the detection signature. Fission product β-delayed γ-rays above 3 MeV are nearly 10 times more abundant than β-delayed neutrons and are distinct from natural radioactivity and from nearly all of the induced activity in a normal cargo. Detector backgrounds and potential interferences with the fission signature radiation have been identified and quantified.
DOE Office of Scientific and Technical Information (OSTI.GOV)
T. O. Tuemer; L. Doan; C. W. Su
2000-06-04
This paper describes the design and operation of a Compact Integrated Narcotics Detection Instrument (CINDI), which utilizes neutrons emitted from {sup 252}Cf. Neutrons emitted from the front face of CINDI penetrate dense compartment barrier materials with little change in energy but are backscattered by hydrogen-rich materials such as drugs. CINDI has led to a new technology that shows promise for identifying the concealed contraband. Carriers such as vehicles, marine vessels, airplanes, containers, cargo, and luggage will be scanned using both neutron and gamma-ray sources. The signal from both the neutron and gamma-ray backscattering and/or transmission can be used simultaneously tomore » detect and possibly identify the contrabands it has been trained for.« less
Science & Technology Review January/February 2010
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bearinger, J P
2009-11-30
This month's issue has the following articles: (1) Innovative Materials Rise to the Radiation Challenge - Commentary by Bruce Warner; (2) The Hunt for Better Radiation Detection - New materials will help radiation detectors pick up weak signals and accurately identify illicit radioactive sources; (3) Time-Critical Technology Identifies Deadly Bloodborne Pathogens - A portable device can simultaneously distinguish up to five bloodborne pathogens in just minutes; (4) Defending Computer Networks against Attack - A Laboratory effort takes a new approach to detecting increasingly sophisticated cyber attacks; and (5) Imaging Cargo's Inner Secrets - Livermore-University of California collaborators are modeling amore » new radiographic technique for identifying nuclear materials concealed inside cargo containers.« less
Subject-based discriminative sparse representation model for detection of concealed information.
Akhavan, Amir; Moradi, Mohammad Hassan; Vand, Safa Rafiei
2017-05-01
The use of machine learning approaches in concealed information test (CIT) plays a key role in the progress of this neurophysiological field. In this paper, we presented a new machine learning method for CIT in which each subject is considered independent of the others. The main goal of this study is to adapt the discriminative sparse models to be applicable for subject-based concealed information test. In order to provide sufficient discriminability between guilty and innocent subjects, we introduced a novel discriminative sparse representation model and its appropriate learning methods. For evaluation of the method forty-four subjects participated in a mock crime scenario and their EEG data were recorded. As the model input, in this study the recurrence plot features were extracted from single trial data of different stimuli. Then the extracted feature vectors were reduced using statistical dependency method. The reduced feature vector went through the proposed subject-based sparse model in which the discrimination power of sparse code and reconstruction error were applied simultaneously. Experimental results showed that the proposed approach achieved better performance than other competing discriminative sparse models. The classification accuracy, sensitivity and specificity of the presented sparsity-based method were about 93%, 91% and 95% respectively. Using the EEG data of a single subject in response to different stimuli types and with the aid of the proposed discriminative sparse representation model, one can distinguish guilty subjects from innocent ones. Indeed, this property eliminates the necessity of several subject EEG data in model learning and decision making for a specific subject. Copyright © 2017 Elsevier B.V. All rights reserved.
Frequency tunable electronic sources working at room temperature in the 1 to 3 THz band
NASA Astrophysics Data System (ADS)
Maestrini, Alain; Mehdi, Imran; Siles, José V.; Lin, Robert; Lee, Choonsup; Chattopadhyay, Goutam; Pearson, John; Siegel, Peter
2012-10-01
Compact, room temperature terahertz sources are much needed in the 1 to 3 THz band for developing multi-pixel heterodyne receivers for astrophysics and planetary science or for building short-range high spatial resolution THz imaging systems able to see through low water content and non metallic materials, smoke or dust for a variety of applications ranging from the inspection of art artifacts to the detection of masked or concealed objects. All solid-sate electronic sources based on a W-band synthesizer followed by a high-power W-band amplifier and a cascade of Schottky diode based THz frequency multipliers are now capable of producing more than 1 mW at 0.9THz, 50 μW at 2 THz and 18 μW at 2.6 THz without the need of any cryogenic system. These sources are frequency agile and have a relative bandwidth of 10 to 15%, limited by the high power W-band amplifiers. The paper will present the latest developments of this technology and its perspective in terms of frequency range, bandwidth and power.
Knowledge of display rules in prelingually deaf and hearing children.
Hosie, J A; Russell, P A; Gray, C D; Scott, C; Hunter, N; Banks, J S; Macaulay, M C
2000-03-01
Deaf children of elementary and secondary school age participated in a study designed to examine their understanding of display rules, the principles governing the expression and concealment of emotion in social situations. The results showed that deaf children's knowledge of display rules, as measured by their reported concealment of emotion, was comparable to that of hearing children of the same age. However, deaf children were less likely to report that they would conceal happiness and anger. They were also less likely to produce reasons for concealing emotion and a smaller proportion of their reasons were prosocial, that is, relating to the feelings of others. The results suggest that the understanding of display rules (which function to protect the feelings of other people) may develop more gradually in deaf children raised in a spoken language environment than it does in hearing children.
Hrcek, Jan; Miller, Scott E; Whitfield, James B; Shima, Hiroshi; Novotny, Vojtech
2013-10-01
The processes maintaining the enormous diversity of herbivore-parasitoid food webs depend on parasitism rate and parasitoid host specificity. The two parameters have to be evaluated in concert to make conclusions about the importance of parasitoids as natural enemies and guide biological control. We document parasitism rate and host specificity in a highly diverse caterpillar-parasitoid food web encompassing 266 species of lepidopteran hosts and 172 species of hymenopteran or dipteran parasitoids from a lowland tropical forest in Papua New Guinea. We found that semi-concealed hosts (leaf rollers and leaf tiers) represented 84% of all caterpillars, suffered a higher parasitism rate than exposed caterpillars (12 vs. 5%) and their parasitoids were also more host specific. Semi-concealed hosts may therefore be generally more amenable to biological control by parasitoids than exposed ones. Parasitoid host specificity was highest in Braconidae, lower in Diptera: Tachinidae, and, unexpectedly, the lowest in Ichneumonidae. This result challenges the long-standing view of low host specificity in caterpillar-attacking Tachinidae and suggests higher suitability of Braconidae and lower suitability of Ichneumonidae for biological control of caterpillars. Semi-concealed hosts and their parasitoids are the largest, yet understudied component of caterpillar-parasitoid food webs. However, they still remain much closer in parasitism patterns to exposed hosts than to what literature reports on fully concealed leaf miners. Specifically, semi-concealed hosts keep an equally low share of idiobionts (2%) as exposed caterpillars.
MicroSensors Systems: detection of a dismounted threat
NASA Astrophysics Data System (ADS)
Davis, Bill; Berglund, Victor; Falkofske, Dwight; Krantz, Brian
2005-05-01
The Micro Sensor System (MSS) is a layered sensor network with the goal of detecting dismounted threats approaching high value assets. A low power unattended ground sensor network is dependant on a network protocol for efficiency in order to minimize data transmissions after network establishment. The reduction of network 'chattiness' is a primary driver for minimizing power consumption and is a factor in establishing a low probability of detection and interception. The MSS has developed a unique protocol to meet these challenges. Unattended ground sensor systems are most likely dependant on batteries for power which due to size determines the ability of the sensor to be concealed after placement. To minimize power requirements, overcome size limitations, and maintain a low system cost the MSS utilizes advanced manufacturing processes know as Fluidic Self-Assembly and Chip Scale Packaging. The type of sensing element and the ability to sense various phenomenologies (particularly magnetic) at ranges greater than a few meters limits the effectiveness of a system. The MicroSensor System will overcome these limitations by deploying large numbers of low cost sensors, which is made possible by the advanced manufacturing process used in production of the sensors. The MSS program will provide unprecedented levels of real-time battlefield information which greatly enhances combat situational awareness when integrated with the existing Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) infrastructure. This system will provide an important boost to realizing the information dominant, network-centric objective of Joint Vision 2020.
Creation of an anti-imaging system using binary optics.
Wang, Haifeng; Lin, Jian; Zhang, Dawei; Wang, Yang; Gu, Min; Urbach, H P; Gan, Fuxi; Zhuang, Songlin
2016-09-13
We present a concealing method in which an anti-point spread function (APSF) is generated using binary optics, which produces a large-scale dark area in the focal region that can hide any object located within it. This result is achieved by generating two identical PSFs of opposite signs, one consisting of positive electromagnetic waves from the zero-phase region of the binary optical element and the other consisting of negative electromagnetic waves from the pi-phase region of the binary optical element.
Creation of an anti-imaging system using binary optics
Wang, Haifeng; Lin, Jian; Zhang, Dawei; Wang, Yang; Gu, Min; Urbach, H. P.; Gan, Fuxi; Zhuang, Songlin
2016-01-01
We present a concealing method in which an anti-point spread function (APSF) is generated using binary optics, which produces a large-scale dark area in the focal region that can hide any object located within it. This result is achieved by generating two identical PSFs of opposite signs, one consisting of positive electromagnetic waves from the zero-phase region of the binary optical element and the other consisting of negative electromagnetic waves from the pi-phase region of the binary optical element. PMID:27620068
Emotional Sequelae of Elective Abortion: The Role of Guilt and Shame.
Whitney, Donna Krupkin
2017-06-01
Although estimates vary, many women experience long-term emotional, spiritual, psychological and interpersonal difficulties following abortion, including complicated grief, depression, post-traumatic stress disorder (PTSD) and relationship disturbances. Developmental, drive, object-relations and narcissism models for perinatal loss also illuminate the dynamics of post-abortion syndromes. Guilt and shame play important roles in generating and concealing post-abortion sequelae. Pastoral care and healthcare providers can increase their awareness of post-abortion sequelae and provide effective care for women experiencing these syndromes.
A novel approach to automatic threat detection in MMW imagery of people scanned in portals
NASA Astrophysics Data System (ADS)
Vaidya, Nitin M.; Williams, Thomas
2008-04-01
We have developed a novel approach to performing automatic detection of concealed threat objects in passive MMW imagery of people scanned in a portal setting. It is applicable to the significant class of imaging scanners that use the protocol of having the subject rotate in front of the camera in order to image them from several closely spaced directions. Customary methods of dealing with MMW sequences rely on the analysis of the spatial images in a frame-by-frame manner, with information extracted from separate frames combined by some subsequent technique of data association and tracking over time. We contend that the pooling of information over time in traditional methods is not as direct as can be and potentially less efficient in distinguishing threats from clutter. We have formulated a more direct approach to extracting information about the scene as it evolves over time. We propose an atypical spatio-temporal arrangement of the MMW image data - to which we give the descriptive name Row Evolution Image (REI) sequence. This representation exploits the singular aspect of having the subject rotate in front of the camera. We point out which features in REIs are most relevant to detecting threats, and describe the algorithms we have developed to extract them. We demonstrate results of successful automatic detection of threats, including ones whose faint image contrast renders their disambiguation from clutter very challenging. We highlight the ease afforded by the REI approach in permitting specialization of the detection algorithms to different parts of the subject body. Finally, we describe the execution efficiency advantages of our approach, given its natural fit to parallel processing. mage
Cycles of abuse nurtured by concealment: a clinical report.
Wijma, Barbro; Thapar-Björkert, Suruchi; Hammarström, Nevija Cah; Swahnberg, Katarina
2007-09-01
At present, health care staff do not seem to have sufficient knowledge about their patients' abusive experiences. The aim of the present study is to analyze and discuss what the implications might be for the encounter between patients and health care professionals, when experiences of abuse are concealed. The methodology of this article is varied: a personal narrative, medical records, sociological theoretical literature and empirical evidence. From the narrative we learn that concealment of abuse was devastating for the patient. She was "treated" in vain as a correct diagnosis was not made, while abuse by her father continued. Health care staff also violated her, which she told her therapist, but her protests were not acknowledged. Ten years of treatment thus made her even more sick. This case story focuses on the mechanisms which nurture concealment of a patient's history of abuse, such as structural and symbolic violence. We also suggest ways to break "cycles of abuse". Help the patient to stop concealing also means that she/he leaves a victim role, gets in charge of the situation and takes a first step towards empowerment. In this way, health care settings can become enabling and empowering environments.
Calibration, reconstruction, and rendering of cylindrical millimeter-wave image data
NASA Astrophysics Data System (ADS)
Sheen, David M.; Hall, Thomas E.
2011-05-01
Cylindrical millimeter-wave imaging systems and technology have been under development at the Pacific Northwest National Laboratory (PNNL) for several years. This technology has been commercialized, and systems are currently being deployed widely across the United States and internationally. These systems are effective at screening for concealed items of all types; however, new sensor designs, image reconstruction techniques, and image rendering algorithms could potentially improve performance. At PNNL, a number of specific techniques have been developed recently to improve cylindrical imaging methods including wideband techniques, combining data from full 360-degree scans, polarimetric imaging techniques, calibration methods, and 3-D data visualization techniques. Many of these techniques exploit the three-dimensionality of the cylindrical imaging technique by optimizing the depth resolution of the system and using this information to enhance detection. Other techniques, such as polarimetric methods, exploit scattering physics of the millimeter-wave interaction with concealed targets on the body. In this paper, calibration, reconstruction, and three-dimensional rendering techniques will be described that optimize the depth information in these images and the display of the images to the operator.
NASA Astrophysics Data System (ADS)
Wilson, Rod; Brittain, Alan H.
1997-01-01
When a vehicle is used to transport narcotic contraband material trace levels of that material can be found on surfaces of the vehicle, people associated with the vehicle and surface they contact. The detection of these trace levels can help to target vehicles associated with the smuggling of the contraband. A study to determine the typical levels of narcotic material that can be detected from these surfaces has been performed by personnel from Graseby, using a variety of drug materials. The size and packaging of the drug materials has been prepared to try to reflect that typically found in smuggling operations. These tests show that for all hard drugs easily detectable traces of drug material can be found on the vehicle, the proxy and secondary surfaces handled by the proxy. For detection of cannabis, the condition of the original material had a great bearing ont he reliability of detection.
Study on multispectral imaging detection and recognition
NASA Astrophysics Data System (ADS)
Jun, Wang; Na, Ding; Gao, Jiaobo; Yu, Hu; Jun, Wu; Li, Junna; Zheng, Yawei; Fei, Gao; Sun, Kefeng
2009-07-01
Multispectral imaging detecting technology use target radiation character in spectral spatial distribution and relation between spectral and image to detect target and remote sensing measure. Its speciality is multi channel, narrow bandwidth, large amount of information, high accuracy. The ability of detecting target in environment of clutter, camouflage, concealment and beguilement is improved. At present, spectral imaging technology in the range of multispectral and hyperspectral develop greatly. The multispectral imaging equipment of unmanned aerial vehicle can be used in mine detection, information, surveillance and reconnaissance. Spectral imaging spectrometer operating in MWIR and LWIR has already been applied in the field of remote sensing and military in the advanced country. The paper presents the technology of multispectral imaging. It can enhance the reflectance, scatter and radiation character of the artificial targets among nature background. The targets among complex background and camouflage/stealth targets can be effectively identified. The experiment results and the data of spectral imaging is obtained.
Detecting insider activity using enhanced directory virtualization.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Shin, Dongwan; Claycomb, William R.
2010-07-01
Insider threats often target authentication and access control systems, which are frequently based on directory services. Detecting these threats is challenging, because malicious users with the technical ability to modify these structures often have sufficient knowledge and expertise to conceal unauthorized activity. The use of directory virtualization to monitor various systems across an enterprise can be a valuable tool for detecting insider activity. The addition of a policy engine to directory virtualization services enhances monitoring capabilities by allowing greater flexibility in analyzing changes for malicious intent. The resulting architecture is a system-based approach, where the relationships and dependencies between datamore » sources and directory services are used to detect an insider threat, rather than simply relying on point solutions. This paper presents such an architecture in detail, including a description of implementation results.« less
Authenticating concealed private data while maintaining concealment
Thomas, Edward V [Albuquerque, NM; Draelos, Timothy J [Albuquerque, NM
2007-06-26
A method of and system for authenticating concealed and statistically varying multi-dimensional data comprising: acquiring an initial measurement of an item, wherein the initial measurement is subject to measurement error; applying a transformation to the initial measurement to generate reference template data; acquiring a subsequent measurement of an item, wherein the subsequent measurement is subject to measurement error; applying the transformation to the subsequent measurement; and calculating a Euclidean distance metric between the transformed measurements; wherein the calculated Euclidean distance metric is identical to a Euclidean distance metric between the measurement prior to transformation.
Pan, Xin; Lopez-Olivo, Maria A; Song, Juhee; Pratt, Gregory; Suarez-Almazor, Maria E
2017-01-01
Objectives We appraised the methodological and reporting quality of randomised controlled clinical trials (RCTs) evaluating the efficacy and safety of Chinese herbal medicine (CHM) in patients with rheumatoid arthritis (RA). Design For this systematic review, electronic databases were searched from inception until June 2015. The search was limited to humans and non-case report studies, but was not limited by language, year of publication or type of publication. Two independent reviewers selected RCTs, evaluating CHM in RA (herbals and decoctions). Descriptive statistics were used to report on risk of bias and their adherence to reporting standards. Multivariable logistic regression analysis was performed to determine study characteristics associated with high or unclear risk of bias. Results Out of 2342 unique citations, we selected 119 RCTs including 18 919 patients: 10 108 patients received CHM alone and 6550 received one of 11 treatment combinations. A high risk of bias was observed across all domains: 21% had a high risk for selection bias (11% from sequence generation and 30% from allocation concealment), 85% for performance bias, 89% for detection bias, 4% for attrition bias and 40% for reporting bias. In multivariable analysis, fewer authors were associated with selection bias (allocation concealment), performance bias and attrition bias, and earlier year of publication and funding source not reported or disclosed were associated with selection bias (sequence generation). Studies published in non-English language were associated with reporting bias. Poor adherence to recommended reporting standards (<60% of the studies not providing sufficient information) was observed in 11 of the 23 sections evaluated. Limitations Study quality and data extraction were performed by one reviewer and cross-checked by a second reviewer. Translation to English was performed by one reviewer in 85% of the included studies. Conclusions Studies evaluating CHM often fail to meet expected methodological criteria, and high-quality evidence is lacking. PMID:28249848
Quantifying camouflage: how to predict detectability from appearance.
Troscianko, Jolyon; Skelhorn, John; Stevens, Martin
2017-01-06
Quantifying the conspicuousness of objects against particular backgrounds is key to understanding the evolution and adaptive value of animal coloration, and in designing effective camouflage. Quantifying detectability can reveal how colour patterns affect survival, how animals' appearances influence habitat preferences, and how receiver visual systems work. Advances in calibrated digital imaging are enabling the capture of objective visual information, but it remains unclear which methods are best for measuring detectability. Numerous descriptions and models of appearance have been used to infer the detectability of animals, but these models are rarely empirically validated or directly compared to one another. We compared the performance of human 'predators' to a bank of contemporary methods for quantifying the appearance of camouflaged prey. Background matching was assessed using several established methods, including sophisticated feature-based pattern analysis, granularity approaches and a range of luminance and contrast difference measures. Disruptive coloration is a further camouflage strategy where high contrast patterns disrupt they prey's tell-tale outline, making it more difficult to detect. Disruptive camouflage has been studied intensely over the past decade, yet defining and measuring it have proven far more problematic. We assessed how well existing disruptive coloration measures predicted capture times. Additionally, we developed a new method for measuring edge disruption based on an understanding of sensory processing and the way in which false edges are thought to interfere with animal outlines. Our novel measure of disruptive coloration was the best predictor of capture times overall, highlighting the importance of false edges in concealment over and above pattern or luminance matching. The efficacy of our new method for measuring disruptive camouflage together with its biological plausibility and computational efficiency represents a substantial advance in our understanding of the measurement, mechanism and definition of disruptive camouflage. Our study also provides the first test of the efficacy of many established methods for quantifying how conspicuous animals are against particular backgrounds. The validation of these methods opens up new lines of investigation surrounding the form and function of different types of camouflage, and may apply more broadly to the evolution of any visual signal.
Predictive value of ADAMTS-13 on concealed chronic renal failure in COPD patients
Zeng, Mian; Chen, Qingui; Liang, Wenjie; He, Wanmei; Zheng, Haichong; Huang, Chunrong
2017-01-01
Background Impaired renal function is often neglected in COPD patients. Considering that COPD patients usually have an ongoing prothrombotic state and systemic inflammation status, we investigated the association among them and explored the predictive value of a disintegrin and metalloproteinase with a thrombospondin type 1 motif, member 13 (ADAMTS-13), on concealed chronic renal failure (CRF) in COPD patients. Methods COPD patients were recruited from the First Affiliated Hospital of Sun Yat-Sen University between January 2015 and December 2016. Control was selected from contemporaneous hospitalized patients without COPD and matched by age and gender at a ratio of 1:1. Estimated glomerular filtration rate (eGFR) was calculated by using the Chronic Kidney Disease Epidemiology Collaboration formula, and all subjects were categorized as having normal renal function (eGFR ≥60 mL min−1 1.73 m−2) and having concealed CRF (normal serum creatinine while eGFR <60 mL min−1 1.73 m−2). Independent correlates of concealed CRF were investigated by logistic regression analysis, and receiver operating characteristic (ROC) curves were used to determine the predictive value of ADAMTS-13. Results In total, 106 COPD and 106 non-COPD patients were finally recruited, and the incidences of concealed CRF were 19.81% and 7.55%, respectively. ADAMTS-13 (odds ratio [OR] =0.858, 95% CI =0.795–0.926), D-dimer (OR =1.095, 95% CI =1.027–1.169), and C-reactive protein (OR =1.252, 95% CI =1.058–1.480) were significantly associated with concealed CRF. Sensitivity and specificity at an ADAMTS-13 cutoff of 318.72 ng/mL were 100% and 81.2%, respectively. The area under the ROC curve was 0.959. Conclusion Prothrombotic state and systemic inflammation status might contribute to explaining the high incidence of concealed CRF in COPD, and plasma ADAMTS-13 levels may serve as a strong predictor. PMID:29255356
Concealed renal failure and adverse drug reactions in older patients with type 2 diabetes mellitus.
Corsonello, Andrea; Pedone, Claudio; Corica, Francesco; Mazzei, Bruno; Di Iorio, Angelo; Carbonin, Pierugo; Incalzi, Raffaele Antonelli
2005-09-01
In elderly patients serum creatinine may be normal despite decreased glomerular filtration rate (GFR). The aim of this study was to evaluate the prevalence of this "concealed" renal failure, i.e., renal failure with normal serum creatinine levels, in elderly diabetic patients, and to verify whether it is a risk factor for adverse drug reactions (ADR) to hydrosoluble drugs. We used data on 2257 hospitalized patients with type 2 diabetes mellitus enrolled in the Gruppo Italiano di Farmacovigilanza nell'Anziano study. On the basis of serum creatinine and calculated GFR, patients were grouped as follows: normal renal function (normal serum creatinine levels and normal GFR), concealed (normal serum creatinine levels and reduced GFR), or overt (increased creatinine levels and reduced GFR) renal failure. GFR was calculated using the Modification of Diet in Renal Disease (MDRD) equation. The outcome of the study was the incidence of ADR to hydrosoluble drugs during the hospital stay. The relationship between renal function and ADR was evaluated using Cox regression analysis including potential confounders. Concealed renal failure was observed in 363 (16.1%) of patients studied. Patients with concealed or overt renal failure were older, had more frequently cognitive impairment and polypharmacy, and had lower serum albumin levels than did those with normal renal function. Both concealed (hazard ratio = 1.90; 95% confidence interval, 1.04-3.48; p =.036) and overt (hazard ratio = 2.23; 95% confidence interval, 1.40-3.55; p =.001) renal failure were significantly associated with ADR to hydrosoluble drugs. The use of more than four drugs also qualified as an independent risk factor for ADRs to hydrosoluble drugs during hospital stay. Older diabetic patients should be systematically screened to ascertain the presence of concealed renal failure in an attempt to optimize the pharmacological treatment and reduce the risk of ADRs.
Psychological and social correlates of HIV status disclosure: the significance of stigma visibility.
Stutterheim, Sarah E; Bos, Arjan E R; Pryor, John B; Brands, Ronald; Liebregts, Maartje; Schaalma, Herman P
2011-08-01
HIV-related stigma, psychological distress, self-esteem, and social support were investigated in a sample comprising people who have concealed their HIV status to all but a selected few (limited disclosers), people who could conceal but chose to be open (full disclosers), and people who had visible symptoms that made concealing difficult (visibly stigmatized). The visibly stigmatized and full disclosers reported significantly more stigma experiences than limited disclosers, but only the visibly stigmatized reported more psychological distress, lower self-esteem, and less social support than limited disclosers. This suggests that having a visible stigma is more detrimental than having a concealable stigma. Differences in psychological distress and self-esteem between the visibly stigmatized and full disclosers were mediated by social support while differences between the visibly stigmatized and limited disclosers were mediated by both social support and stigma. These findings suggest that social support buffers psychological distress in people with HIV.
Fourier analysis: from cloaking to imaging
NASA Astrophysics Data System (ADS)
Wu, Kedi; Cheng, Qiluan; Wang, Guo Ping
2016-04-01
Regarding invisibility cloaks as an optical imaging system, we present a Fourier approach to analytically unify both Pendry cloaks and complementary media-based invisibility cloaks into one kind of cloak. By synthesizing different transfer functions, we can construct different devices to realize a series of interesting functions such as hiding objects (events), creating illusions, and performing perfect imaging. In this article, we give a brief review on recent works of applying Fourier approach to analysis invisibility cloaks and optical imaging through scattering layers. We show that, to construct devices to conceal an object, no constructive materials with extreme properties are required, making most, if not all, of the above functions realizable by using naturally occurring materials. As instances, we experimentally verify a method of directionally hiding distant objects and create illusions by using all-dielectric materials, and further demonstrate a non-invasive method of imaging objects completely hidden by scattering layers.
Mansh, Matthew; White, William; Gee-Tong, Lea; Lunn, Mitchell R; Obedin-Maliver, Juno; Stewart, Leslie; Goldsmith, Elizabeth; Brenman, Stephanie; Tran, Eric; Wells, Maggie; Fetterman, David; Garcia, Gabriel
2015-05-01
To assess identity disclosure among sexual and gender minority (SGM) students pursuing undergraduate medical training in the United States and Canada. From 2009 to 2010, a survey was made available to all medical students enrolled in the 176 MD- and DO-granting medical schools in the United States and Canada. Respondents were asked about their sexual and gender identity, whether they were "out" (i.e., had publicly disclosed their identity), and, if they were not, their reasons for concealing their identity. The authors used a mixed-methods approach and analyzed quantitative and qualitative survey data. Of 5,812 completed responses (of 101,473 eligible respondents; response rate 5.7%), 920 (15.8%) students from 152 (of 176; 86.4%) institutions identified as SGMs. Of the 912 sexual minorities, 269 (29.5%) concealed their sexual identity in medical school. Factors associated with sexual identity concealment included sexual minority identity other than lesbian or gay, male gender, East Asian race, and medical school enrollment in the South or Central regions of North America. The most common reasons for concealing one's sexual identity were "nobody's business" (165/269; 61.3%), fear of discrimination in medical school (117/269; 43.5%), and social or cultural norms (110/269; 40.9%). Of the 35 gender minorities, 21 (60.0%) concealed their gender identity, citing fear of discrimination in medical school (9/21; 42.9%) and lack of support (9/21; 42.9%). SGM students continue to conceal their identity during undergraduate medical training. Medical institutions should adopt targeted policies and programs to better support these individuals.
Simplified two-dimensional microwave imaging scheme using metamaterial-loaded Vivaldi antenna
NASA Astrophysics Data System (ADS)
Johari, Esha; Akhter, Zubair; Bhaskar, Manoj; Akhtar, M. Jaleel
2017-03-01
In this paper, a highly efficient, low-cost scheme for two-dimensional microwave imaging is proposed. To this end, the AZIM (anisotropic zero index metamaterial) cell-loaded Vivaldi antenna is designed and tested as effective electromagnetic radiation beam source required in the microwave imaging scheme. The designed antenna is first individually tested in the anechoic chamber, and its directivity along with the radiation pattern is obtained. The measurement setup for the imaging here involves a vector network analyzer, the AZIM cell-loaded ultra-wideband Vivaldi antenna, and other associated microwave components. The potential of the designed antenna for the microwave imaging is tested by first obtaining the two-dimensional reflectivity images of metallic samples of different shapes placed in front of the antenna, using the proposed scheme. In the next step, these sets of samples are hidden behind wooden blocks of different thicknesses and the reflectivity image of the test media is reconstructed by using the proposed scheme. Finally, the reflectivity images of various dielectric samples (Teflon, Plexiglas, permanent magnet moving coil) along with the copper sheet placed on a piece of cardboard are reconstructed by using the proposed setup. The images obtained for each case are plotted and compared with the actual objects, and a close match is observed which shows the applicability of the proposed scheme for through-wall imaging and the detection of concealed objects.
20 CFR 404.502 - Overpayments.
Code of Federal Regulations, 2010 CFR
2010-04-01
... representative payee for payments made after the beneficiary's death. We will not recover such overpayments from... intentional false statement or representation, or willful concealment of, or deliberate failure to furnish... individual's intentional false statement or representation, or willful concealment of, or deliberate failure...
NASA Astrophysics Data System (ADS)
Zurk, L. M.; Schecklman, S.
Terahertz (THz) Time Domain Spectroscopy (TDS) measurements have the unique ability to detect both the amplitude and phase of the electric field, simultaneously. This eliminates complications introduced by Kramers-Kronig relations typically used in near-infrared spectroscopy. Many materials of interest contain resonant features in their refractive indices in the far-infrared (THz) spectrum, while their packaging materials are generally transparent. Thus, an important application for THz TDS is the ability to see inside packaging materials and detect the material features of their contents. Such applications are promising for security screening (concealed drugs, explosives, etc.) in post offices and airports as well as for non-destructive evaluation (NDE) of products on an assembly line or tissue damage due to burns or cancer [1-6].
Management of concealed penis with modified penoplasty.
Xu, Jian-Guo; Lv, Chuan; Wang, Yu-Chong; Zhu, Ji; Xue, Chun-Yu
2015-03-01
To investigate the effect of penile degloving in combination with penoscrotal angle reconstruction for the correction of concealed penis. A foreskin circumcision incision was made along the coronal sulcus. After a sharp dissection under the superficial layer of tunica albuginea, the penile shaft was degloved to release the fibrous bands of the tunica dartos. Through a longitudinal incision or Z-plasty at the penoscrotal junction, securing of the tunica albuginea to the proximal tunica dartos was performed. The penoscrotal angle was reconstructed. This procedure effectively corrected the concealed penis, while correcting other problems such as phimosis. From August 2008 to August 2013, we performed 41 procedures for concealed penis. Correction was successful in all patients with an improved median length of 2.1 cm in the flaccid state. Follow-up ranged from 6 months to 2 years, and satisfactory cosmetic outcomes were obtained without scars or erectile discomfort. Our technique includes degloving and penoscrotal angle reconstruction, which provides proper visualization for fixation of the penile base. The longitudinal or Z-plasty incision also opened the degloving dead cavity, which was good for drainage. The procedure is straight forward with good functional and cosmetic outcomes and is thus ideal for correction of the concealed penis. Copyright © 2015 Elsevier Inc. All rights reserved.
Modified penoplasty for concealed penis in children.
Yang, Tianyou; Zhang, Liyu; Su, Cheng; Li, Zhongmin; Wen, Yingquan
2013-09-01
To report a modified penoplasty technique for concealed penis in children. Between January 2006 and June 2012, 201 cases of concealed penis were surgically repaired with modified penoplasty. The modified penoplasty technique consisted of 3 major steps: (1) degloved the penile skin and excised the inner prepuce, (2) advanced penoscrotal skin to cover penile shaft, and (3) fixed the penis base and reconstructed the penoscrotal angle. Two hundred one cases of concealed penis were enrolled in this study over a period of 6 years. Mean age at the time of surgery was 5.3 years (range 1-13 years) and mean operative time was 40 minutes (range 30-65minutes). All patients were routinely followed up at 1, 3, and 6 months after surgery. Most patients developed postoperative edema and were resolved within 1 month, whereas 20 cases developed prolonged postoperative edema, especially at the site of frenulum, which took 3 months to be resolved. Ten cases had retraction after surgery. No erection difficulties were recorded. Patients/parents reported better hygiene and improved visualization and accessibility of penis after surgery and were satisfied with the cosmetic outcome. The result of this study shows that the modified penoplasty technique is a simple, safe, and effective procedure for concealed penis with satisfied cosmetic outcome. Copyright © 2013 Elsevier Inc. All rights reserved.
Lyons, Anthony; Pepping, Christopher A
2017-09-01
Middle-aged and older gay men experience higher rates of depression and anxiety compared to their heterosexual counterparts, with internalized homonegativity and sexual identity concealment known to be major stress-related contributors. This study examined the prospective effect of different types and sources of social support on internalized homonegativity and sexual identity concealment experienced among middle-aged and older gay men. A longitudinal survey involving two waves of data collection separated by 12 months was conducted among a cohort of 186 gay-identified men aged 40 years and older. Two types of social support were found to be important. Greater baseline tangible or practical support independently predicted lower internalized homonegativity at 12-month follow-up, while greater baseline emotional or psychological support independently predicted a lower tendency toward sexual identity concealment at 12-month follow-up. Greater baseline support from community or government agencies, such as health services and support organizations, predicted higher internalized homonegativity at 12-month follow-up. These findings suggest that tangible and emotional support may be beneficial in reducing internalized homonegativity and sexual identity concealment among middle-aged and older gay men. Ensuring that services provide environments that do not compound the stressful impact of stigma also appears to be important.
Further evidence for GHB naturally occurring in common non-alcoholic beverages.
Elliott, Simon P; Fais, Paolo
2017-08-01
GHB has been implicated in many cases of suspected surreptitious administration with the purpose of increasing victim vulnerability to sexual assault. Low amounts of endogenous (or naturally occurring) GHB, which do not reach pharmacologically active levels, have been detected in alcoholic and non-alcoholic beverages. Due to the continued requirement to obtain data on the presence of endogenous GHB in various beverage types, GHB concentrations were measured in a series of non-alcoholic beverages. Tonic water and lemon flavoured tonic water beverages were analysed at 0, 24 and 96h after the bottle opening using gas chromatography coupled to tandem mass spectrometry (GC-MS/MS) on an Agilent 6890/7000C Triple Quadrupole. GHB was detected in all beverages at very low amounts ranging from 89 to 145ng/mL (0.089-0.145mg/L) and did not demonstrate a general trend of variation for concentration along the tested time span (96h). The presented data provide additional evidence for the endogenous nature of GHB in non-alcoholic beverages at very low concentrations, which are many orders of magnitude lower than those described to produce any pharmacological effect on the subject. However, when considering a case of alleged drug-facilitated sexual assault, a low level of GHB detected in a drink may be related both to a surreptitiously GHB administration with subsequent dilution for concealment or to the presence of endogenous GHB. On this basis, a comprehensive analysis of all the available information, including circumstantial data demonstrating possible attempts to conceal GHB administration and an assessment of levels of endogenous GHB in the suspected beverage type, is of the utmost importance for a proper interpretation of the toxicological results. Copyright © 2017 Elsevier B.V. All rights reserved.
Decoration Increases the Conspicuousness of Raptor Nests
Canal, David; Mulero-Pázmány, Margarita; Negro, Juan José; Sergio, Fabrizio
2016-01-01
Avian nests are frequently concealed or camouflaged, but a number of species builds noticeable nests or use conspicuous materials for nest decoration. In most cases, nest decoration has a role in mate choice or provides thermoregulatory or antiparasitic benefits. In territorial species however, decorations may serve additional or complementary functions, such as extended phenotypic signaling of nest-site occupancy and social status to potential intruders. The latter may benefit both signaler and receiver by minimizing the risk of aggressive interactions, especially in organisms with dangerous weaponry. Support for this hypothesis was recently found in a population of black kites (Milvus migrans), a territorial raptor that decorates its nest with white artificial materials. However, the crucial assumption that nest decorations increased nest-site visibility to conspecifics was not assessed, a key aspect given that black kite nests may be well concealed within the canopy. Here, we used an unmanned aircraft system to take pictures of black kite nests, with and without an experimentally placed decoration, from different altitudes and distances simulating the perspective of a flying and approaching, prospecting intruder. The pictures were shown to human volunteers through a standardized routine to determine whether detection rates varied according the nest decoration status and distance. Decorated nests consistently showed a higher detection frequency and a lower detection-latency, compared to undecorated versions of the same nests. Our results confirm that nest decoration in this species may act as a signaling medium that enhances nest visibility for aerial receivers, even at large distances. This finding complements previous work on this communication system, which showed that nest decoration was a threat informing trespassing conspecifics on the social dominance, territory quality and fighting capabilities of the signaler. PMID:27455066
Decoration Increases the Conspicuousness of Raptor Nests.
Canal, David; Mulero-Pázmány, Margarita; Negro, Juan José; Sergio, Fabrizio
2016-01-01
Avian nests are frequently concealed or camouflaged, but a number of species builds noticeable nests or use conspicuous materials for nest decoration. In most cases, nest decoration has a role in mate choice or provides thermoregulatory or antiparasitic benefits. In territorial species however, decorations may serve additional or complementary functions, such as extended phenotypic signaling of nest-site occupancy and social status to potential intruders. The latter may benefit both signaler and receiver by minimizing the risk of aggressive interactions, especially in organisms with dangerous weaponry. Support for this hypothesis was recently found in a population of black kites (Milvus migrans), a territorial raptor that decorates its nest with white artificial materials. However, the crucial assumption that nest decorations increased nest-site visibility to conspecifics was not assessed, a key aspect given that black kite nests may be well concealed within the canopy. Here, we used an unmanned aircraft system to take pictures of black kite nests, with and without an experimentally placed decoration, from different altitudes and distances simulating the perspective of a flying and approaching, prospecting intruder. The pictures were shown to human volunteers through a standardized routine to determine whether detection rates varied according the nest decoration status and distance. Decorated nests consistently showed a higher detection frequency and a lower detection-latency, compared to undecorated versions of the same nests. Our results confirm that nest decoration in this species may act as a signaling medium that enhances nest visibility for aerial receivers, even at large distances. This finding complements previous work on this communication system, which showed that nest decoration was a threat informing trespassing conspecifics on the social dominance, territory quality and fighting capabilities of the signaler.
Concealed semantic and episodic autobiographical memory electrified.
Ganis, Giorgio; Schendan, Haline E
2012-01-01
Electrophysiology-based concealed information tests (CIT) try to determine whether somebody possesses concealed information about a crime-related item (probe) by comparing event-related potentials (ERPs) between this item and comparison items (irrelevants). Although the broader field is sometimes referred to as "memory detection," little attention has been paid to the precise type of underlying memory involved. This study begins addressing this issue by examining the key distinction between semantic and episodic memory in the autobiographical domain within a CIT paradigm. This study also addresses the issue of whether multiple repetitions of the items over the course of the session habituate the brain responses. Participants were tested in a 3-stimulus CIT with semantic autobiographical probes (their own date of birth) and episodic autobiographical probes (a secret date learned just before the study). Results dissociated these two memory conditions on several ERP components. Semantic probes elicited a smaller frontal N2 than episodic probes, consistent with the idea that the frontal N2 decreases with greater pre-existing knowledge about the item. Likewise, semantic probes elicited a smaller central N400 than episodic probes. Semantic probes also elicited a larger P3b than episodic probes because of their richer meaning. In contrast, episodic probes elicited a larger late positive complex (LPC) than semantic probes, because of the recent episodic memory associated with them. All these ERPs showed a difference between probes and irrelevants in both memory conditions, except for the N400, which showed a difference only in the semantic condition. Finally, although repetition affected the ERPs, it did not reduce the difference between probes and irrelevants. These findings show that the type of memory associated with a probe has both theoretical and practical importance for CIT research.
Concealed semantic and episodic autobiographical memory electrified
Ganis, Giorgio; Schendan, Haline E.
2013-01-01
Electrophysiology-based concealed information tests (CIT) try to determine whether somebody possesses concealed information about a crime-related item (probe) by comparing event-related potentials (ERPs) between this item and comparison items (irrelevants). Although the broader field is sometimes referred to as “memory detection,” little attention has been paid to the precise type of underlying memory involved. This study begins addressing this issue by examining the key distinction between semantic and episodic memory in the autobiographical domain within a CIT paradigm. This study also addresses the issue of whether multiple repetitions of the items over the course of the session habituate the brain responses. Participants were tested in a 3-stimulus CIT with semantic autobiographical probes (their own date of birth) and episodic autobiographical probes (a secret date learned just before the study). Results dissociated these two memory conditions on several ERP components. Semantic probes elicited a smaller frontal N2 than episodic probes, consistent with the idea that the frontal N2 decreases with greater pre-existing knowledge about the item. Likewise, semantic probes elicited a smaller central N400 than episodic probes. Semantic probes also elicited a larger P3b than episodic probes because of their richer meaning. In contrast, episodic probes elicited a larger late positive complex (LPC) than semantic probes, because of the recent episodic memory associated with them. All these ERPs showed a difference between probes and irrelevants in both memory conditions, except for the N400, which showed a difference only in the semantic condition. Finally, although repetition affected the ERPs, it did not reduce the difference between probes and irrelevants. These findings show that the type of memory associated with a probe has both theoretical and practical importance for CIT research. PMID:23355816
Geven, Linda M; Ben-Shakhar, Gershon; Kindt, Merel; Verschuere, Bruno
2018-06-15
From a cognitive perspective, lying can be regarded as a complex cognitive process requiring the interplay of several executive functions. Meta-analytic research on 114 studies encompassing 3,307 participants (Suchotzki, Verschuere, Van Bockstaele, Ben-Shakhar, & Crombez, ) suggests that computerized paradigms can reliably assess the cognitive burden of lying, with large reaction time differences between lying and truth telling. These studies, however, lack a key ingredient of real-life deception, namely self-initiated behavior. Research participants have typically been instructed to commit a mock crime and conceal critical information, whereas in real life, people freely choose whether or not to engage in antisocial behavior. In this study, participants (n = 433) engaged in a trivia quiz and were provided with a monetary incentive for high accuracy performance. Participants were randomly allocated to either a condition where they were instructed to cheat on the quiz (mimicking the typical laboratory set-up) or to a condition in which they were provided with the opportunity to cheat, yet without explicit instructions to do so. Assessments of their response times in a subsequent Concealed Information Test (CIT) revealed that both instructed cheaters (n = 107) and self-initiated cheaters (n = 142) showed the expected RT-slowing for concealed information. The data indicate that the cognitive signature of lying is not restricted to explicitly instructed cheating, but it can also be observed for self-initiated cheating. These findings are highly encouraging from an ecological validity perspective. Copyright © 2018 The Authors. Topics in Cognitive Science published by Wiley Periodicals, Inc. on behalf of Cognitive Science Society. Inc.
An investigation into regular recruit wastage from the British Army, 1988.
Jefferson, T O
1990-10-01
A study was made of recruit medical discharges in the British Army in 1988 with the aim of ascertaining the number of medical discharges amongst recruits. AFBs 6863 (Notification of Discharge of a Regular Recruit) were used as the source of data. Recruit medical wastage rate for 1988 was 897 cases, or 16.7% of all known discharges. Three types of medical discharges were present. Four hundred and ninety-six Type 1 or concealed discharges, (9.2% of discharges for all reasons) were made up of cases who had not been boarded and had mainly been discharged under QR 9.381 (defect of enlistment). Two hundred and seventy-five Type 2 discharges (5.1% of discharges for all reasons) represented boarded cases discharged under QR 9.385 (ceasing to fulfil medical requirements). One hundred and twenty-six Type 3 discharges (2.3% of all discharges) were boarded cases mainly discharged under QR 9.381 (defect of enlistment). As all discharges under paragraphs other than QR 9.385 are given administrative discharge outflow code, only the 275 Type 2 discharges (or 31.7% of medical discharges) appeared on the Army's own source of medical data, the TRIMEDS database. This had the effect of concealing the majority of those discharges caused by conditions predating enlistment therefore decreasing the number of known false negatives not detected at recruiting medicals. The biggest causes of discharge were conditions of the lower limbs and back (54.5% of medical discharges), a conglomerate of minor categories of pathology (14.6%), asthma (9.6%) and deformities (7.4%). Within each type the bulk of the discharges was concealed in Type 1 discharges especially for conditions predating enlistment.(ABSTRACT TRUNCATED AT 250 WORDS)
NASA Astrophysics Data System (ADS)
Murrill, Steven R.; Franck, Charmaine C.; Espinola, Richard L.; Petkie, Douglas T.; De Lucia, Frank C.; Jacobs, Eddie L.
2011-11-01
The U.S. Army Research Laboratory (ARL) and the U.S. Army Night Vision and Electronic Sensors Directorate (NVESD) have developed a terahertz-band imaging system performance model/tool for detection and identification of concealed weaponry. The details of the MATLAB-based model which accounts for the effects of all critical sensor and display components, and for the effects of atmospheric attenuation, concealment material attenuation, and active illumination, were reported on at the 2005 SPIE Europe Security & Defence Symposium (Brugge). An advanced version of the base model that accounts for both the dramatic impact that target and background orientation can have on target observability as related to specular and Lambertian reflections captured by an active-illumination-based imaging system, and for the impact of target and background thermal emission, was reported on at the 2007 SPIE Defense and Security Symposium (Orlando). This paper will provide a comprehensive review of an enhanced, user-friendly, Windows-executable, terahertz-band imaging system performance analysis and design tool that now includes additional features such as a MODTRAN-based atmospheric attenuation calculator and advanced system architecture configuration inputs that allow for straightforward performance analysis of active or passive systems based on scanning (single- or line-array detector element(s)) or staring (focal-plane-array detector elements) imaging architectures. This newly enhanced THz imaging system design tool is an extension of the advanced THz imaging system performance model that was developed under the Defense Advanced Research Project Agency's (DARPA) Terahertz Imaging Focal-Plane Technology (TIFT) program. This paper will also provide example system component (active-illumination source and detector) trade-study analyses using the new features of this user-friendly THz imaging system performance analysis and design tool.
George, Mathew Sunil; Lambert, Helen
2015-01-01
In HIV prevention and care programmes, disclosure of status by HIV-positive individuals is generally encouraged to contain the infection and provide adequate support to the person concerned. Lack of disclosure is generally framed as a barrier to preventive behaviours and accessing support. The assumption that disclosure is beneficial is also reflected in studies that aim to identify determinants of disclosure and recommend individual-level measures to promote disclosure. However, in contexts where HIV infection is stigmatised and there is fear of rejection and discrimination among those living with HIV, concealment of status becomes a way to try and regain as much as possible the life that was disrupted by the discovery of HIV infection. In this study of HIV-positive women and children in India, concealment was considered essential by individuals and families of those living with HIV to re-establish and maintain their normal lives in an environment where stigma and discrimination were prevalent. This paper describes why women and care givers of children felt the need to conceal HIV status, the various ways in which people tried to do so and the implications for treatment of people living with HIV. We found that while women were generally willing to disclose their status to their husband or partner, they were very keen to conceal their status from all others, including family members. Parents and carers with an HIV-positive child were not willing to disclose this status to the child or to others. Understanding the different rationales for concealment would help policy makers and programme managers to develop more appropriate care management strategies and train care providers to assist clients in accessing care and support without disrupting their lives.
George, Mathew Sunil; Lambert, Helen
2015-01-01
In HIV prevention and care programmes, disclosure of status by HIV-positive individuals is generally encouraged to contain the infection and provide adequate support to the person concerned. Lack of disclosure is generally framed as a barrier to preventive behaviours and accessing support. The assumption that disclosure is beneficial is also reflected in studies that aim to identify determinants of disclosure and recommend individual-level measures to promote disclosure. However, in contexts where HIV infection is stigmatised and there is fear of rejection and discrimination among those living with HIV, concealment of status becomes a way to try and regain as much as possible the life that was disrupted by the discovery of HIV infection. In this study of HIV-positive women and children in India, concealment was considered essential by individuals and families of those living with HIV to re-establish and maintain their normal lives in an environment where stigma and discrimination were prevalent. This paper describes why women and care givers of children felt the need to conceal HIV status, the various ways in which people tried to do so and the implications for treatment of people living with HIV. We found that while women were generally willing to disclose their status to their husband or partner, they were very keen to conceal their status from all others, including family members. Parents and carers with an HIV-positive child were not willing to disclose this status to the child or to others. Understanding the different rationales for concealment would help policy makers and programme managers to develop more appropriate care management strategies and train care providers to assist clients in accessing care and support without disrupting their lives. PMID:25706959
Long, Ashley S; Ambegaonkar, Jatin P; Fahringer, Patty M
2011-12-01
The performing arts style of cirque has grown in popularity, with high-school participants increasingly practicing this style. Still, little research has examined the injury reporting rates and patterns in this population. Our study aimed to compare injury reporting rates and injury concealment patterns between high-school cirque performers and a peer-group of basketball players. Fifty participants (30 cirque, 20 basketball) completed a 12-item injury history and concealment instrument with chi-squared analyses and Fisher's exact tests comparing groups (p = 0.05). While no group differences (p = 0.36) existed in injuries reported, basketball players were more likely (p = 0.01) to miss participation due to injury than cirque performers. No significant difference existed between participants regarding which healthcare provider they reported to first (p = 0.27), but basketball players reported their injuries to the athletic trainer at higher rates (50%) than cirque performers (20%). A nonsignificant trend (p = 0.08) was noted in promptness to report injury, with more cirque performers (13%) concealing their injuries than basketball players (5%). Several reasons were noted for concealment of injury, with the most common being the belief that the injury would "go away" on its own. Knee injuries were most common in basketball players (23.7%) and back and knee injuries (10.5% each) in cirque performers. Despite similar injury rates, cirque participants concealed injuries more than peer-basketball players. Reasons may include losing performance roles, unfamiliarity and low trust with healthcare providers, ignorance about initially minor-looking injuries, and higher pain tolerance thresholds. Education and communication are essential to allow performing artists to seek healthcare support. Research is needed to appropriately understand and meet the needs of this underserved performing artist population.
The need for randomization in animal trials: an overview of systematic reviews.
Hirst, Jennifer A; Howick, Jeremy; Aronson, Jeffrey K; Roberts, Nia; Perera, Rafael; Koshiaris, Constantinos; Heneghan, Carl
2014-01-01
Randomization, allocation concealment, and blind outcome assessment have been shown to reduce bias in human studies. Authors from the Collaborative Approach to Meta Analysis and Review of Animal Data from Experimental Studies (CAMARADES) collaboration recently found that these features protect against bias in animal stroke studies. We extended the scope the work from CAMARADES to include investigations of treatments for any condition. We conducted an overview of systematic reviews. We searched Medline and Embase for systematic reviews of animal studies testing any intervention (against any control) and we included any disease area and outcome. We included reviews comparing randomized versus not randomized (but otherwise controlled), concealed versus unconcealed treatment allocation, or blinded versus unblinded outcome assessment. Thirty-one systematic reviews met our inclusion criteria: 20 investigated treatments for experimental stroke, 4 reviews investigated treatments for spinal cord diseases, while 1 review each investigated treatments for bone cancer, intracerebral hemorrhage, glioma, multiple sclerosis, Parkinson's disease, and treatments used in emergency medicine. In our sample 29% of studies reported randomization, 15% of studies reported allocation concealment, and 35% of studies reported blinded outcome assessment. We pooled the results in a meta-analysis, and in our primary analysis found that failure to randomize significantly increased effect sizes, whereas allocation concealment and blinding did not. In our secondary analyses we found that randomization, allocation concealment, and blinding reduced effect sizes, especially where outcomes were subjective. Our study demonstrates the need for randomization, allocation concealment, and blind outcome assessment in animal research across a wide range of outcomes and disease areas. Since human studies are often justified based on results from animal studies, our results suggest that unduly biased animal studies should not be allowed to constitute part of the rationale for human trials.
Active terahertz imaging with Ne indicator lamp detector arrays
NASA Astrophysics Data System (ADS)
Kopeika, N. S.; Abramovich, A.; Yadid-Pecht, O.; Yitzhaky, Y.
2009-08-01
The advantages of terahertz (THz) imaging are well known. They penetrate well most non-conducting media and there are no known biological hazards, This makes such imaging systems important for homeland security, as they can be used to image concealed objects and often into rooms or buildings from the outside. There are also biomedical applications that are arising. Unfortunately, THz imaging is quite expensive, especially for real time systems, largely because of the price of the detector. Bolometers and pyroelectric detectors can each easily cost at least hundreds of dollars if not more, thus making focal plane arrays of them quite expensive. We have found that common miniature commercial neon indicator lamps costing typically about 30 cents each exhibit high sensitivity to THz radiation [1-3], with microsecond order rise times, thus making them excellent candidates for such focal plane arrays. NEP is on the order of 10-10 W/Hz1/2. Significant improvement of detection performance is expected when heterodyne detection is used Efforts are being made to develop focal plane array imagers using such devices at 300 GHz. Indeed, preliminary images using 4x4 arrays have already been obtained. An 8x8 VLSI board has been developed and is presently being tested. Since no similar imaging systems have been developed previously, there are many new problems to be solved with such a novel and unconventional imaging system. These devices act as square law detectors, with detected signal proportional to THz power. This allows them to act as mixers in heterodyne detection, thus allowing NEP to be reduced further by almost two orders of magnitude. Plans are to expand the arrays to larger sizes, and to employ super resolution techniques to improve image quality beyond that ordinarily obtainable at THz frequencies.
The inconspicuous penis in children.
Cimador, Marcello; Catalano, Pieralba; Ortolano, Rita; Giuffrè, Mario
2015-04-01
The term 'inconspicuous penis' refers to a group of anatomical abnormalities in which the penis looks smaller than is expected. Micropenis can be defined as 'true micropenis'--which results from a defect in the hypothalamic-pituitary-gonadal axis--and 'micropenis secondary to congenital anatomical anomalies of the surrounding and overlying structures'--also known as 'concealed penis'. The different forms of concealed penis include webbed penis, congenital megaprepuce and partially hidden penis caused by prepubic adiposity. This disorder can also have iatrogenic causes resulting from adhesions that are secondary to circumcision--this type of concealed penis is known as 'trapped penis'. However, in both groups, micropenis is defined as a stretched penile length that is at least 2.5 SD below the mean for the patient's age, but without any other penile defects. Patients with true micropenis can be managed with testosterone, which has demonstrated good penile elongation results in the long term. Surgery also has a pivotal role in reconstruction for elongating the penis and for correction of anatomical abnormalities in concealed penis.
NASA Astrophysics Data System (ADS)
Gitlin, M. S.; Glyavin, M. Yu.; Fedotov, A. E.; Tsvetkov, A. I.
2017-07-01
The paper presents the second part of the review on a high-sensitive technique for time-resolved imaging and measurements of the 2D intensity profiles of millimeter-wave radiation by means of Visible Continuum Radiation emitted by the positive column of a medium-pressure Cs-Xe DC Discharge (VCRD method). The first part of the review was focused on the operating principles and fundamentals of this new technique [Plasma Phys. Rep. 43, 253 (2017)]. The second part of the review focuses on experiments demonstrating application of this imaging technique to measure the parameters of radiation at the output of moderate-power millimeter-wave sources. In particular, the output waveguide mode of a moderate-power W-band gyrotron with a pulsed magnetic field was identified and the relative powers of some spurious modes at the outputs of this gyrotron and a pulsed D-band orotron were evaluated. The paper also reviews applications of the VCRD technique for real-time imaging and nondestructive testing with a frame rate of higher than 10 fps by using millimeter waves. Shadow projection images of objects opaque and transparent for millimeter waves have been obtained using pulsed watt-scale millimeter waves for object illumination. Near video frame rate millimeter-wave shadowgraphy has been demonstrated. It is shown that this technique can be used for single-shot screening (including detection of concealed objects) and time-resolved imaging of time-dependent processes.
Coincident disruptive coloration
Cuthill, Innes C.; Székely, Aron
2008-01-01
Even if an animal matches its surroundings perfectly in colour and texture, any mismatch between the spatial phase of its pattern and that of the background, or shadow created by its three-dimensional relief, is potentially revealing. Nevertheless, for camouflage to be fully broken, the shape must be recognizable. Disruptive coloration acts against object recognition by the use of high-contrast internal colour boundaries to break up shape and form. As well as the general outline, characteristic features such as eyes and limbs must also be concealed; this can be achieved by having the colour patterns on different, but adjacent, body parts aligned to match each other (i.e. in phase). Such ‘coincident disruptive coloration’ ensures that there is no phase disjunction where body parts meet, and causes different sections of the body to blend perceptually. We tested this theory using field experiments with predation by wild birds on artificial moth-like targets, whose wings and (edible pastry) bodies had colour patterns that were variously coincident or not. We also carried out an experiment with humans searching for analogous targets on a computer screen. Both experiments show that coincident disruptive coloration is an effective mechanism for concealing an otherwise revealing body form. PMID:18990668
Object permanence in cats: Analysis in locomotor space.
Thinus-Blanc, C; Poucet, B; Chapuis, N
1982-04-01
Stages IV and V object permanence were studied with 38-40-week-old cats. A constraining apparatus preventing animals from pursuing the bowl containing meat before it was concealed was used. Either the bowl was seen moving and disappeared from view behind a screen (stage IV trials), or after this sequence, it reappeared from behind the first screen and disappeared behind a second screen (stage V trials). In both situations cats performed significantly above chance but the paths taken to reach the food were different according to the stage. In stage V trials, cats expressed a preference for the path leading to the end of the second screen where the food was last seen disappearing. Copyright © 1982. Published by Elsevier B.V.
The "double life" of bulimia: patients' experiences in daily life interactions.
Pettersen, Gunn; Rosenvinge, Jan H; Ytterhus, Borgunn
2008-01-01
This qualitative study, using interviews with 38 subjects, explored how and why they conceal bulimic symptoms and the understanding of concealing in terms of social interaction. A "double life" was described as a dichotomy between being active and outgoing versus performing shameful bulimic behaviors and constantly living with fear of stigmatization, and striving against exposure. Concealing was well planned to avoid such fear, and to preserve dignity. Bulimia may be understood as volitional exertion of interaction control, not just as a result of poor impulse regulation. Understanding the meaning of secrecy and "double life" may facilitate help seeking behavior and guide treatment.
Sampson, Jay A.; Rodriguez, Brian D.
2010-01-01
The Sunnyside porphyry copper system is part of the concealed San Rafael Valley porphyry system located in the Patagonia Mountains of Arizona. The U.S. Geological Survey is conducting a series of multidisciplinary studies as part of the Assessment Techniques for Concealed Mineral Resources project. To help characterize the size, resistivity, and skin depth of the polarizable mineral deposit concealed beneath thick overburden, a regional east-west audio-magnetotelluric sounding profile was acquired. The purpose of this report is to release the audio-magnetotelluric sounding data collected along that east-west profile. No interpretation of the data is included.
College Students' Reasons for Concealing Suicidal Ideation
ERIC Educational Resources Information Center
Burton Denmark, Adryon; Hess, Elaine; Becker, Martin Swanbrow
2012-01-01
Self-reported reasons for concealing suicidal ideation were explored using data from a national survey of undergraduate and graduate students: 558 students indicated that they seriously considered attempting suicide during the previous year and did not tell anyone about their suicidal thoughts. Content analysis of students' qualitative responses…
Behavioral Indicators of Legal and Illegal Gun Carrying
2015-05-01
wide variety of handguns , in a wide variety of sizes and shapes, made of a wide variety of materials , and this variation is likely to have a subtle...Under Clothing/Belt ..................................................................................................... 23 Concealment of Handgun ...in Center of Chest ..................................................................................... 24 Concealment of Handgun in Groin Area with
Anxiety and Related Disorders and Concealment in Sexual Minority Young Adults.
Cohen, Jeffrey M; Blasey, Christine; Barr Taylor, C; Weiss, Brandon J; Newman, Michelle G
2016-01-01
Sexual minorities face greater exposure to discrimination and rejection than heterosexuals. Given these threats, sexual minorities may engage in sexual orientation concealment in order to avoid danger. This social stigma and minority stress places sexual minorities at risk for anxiety and related disorders. Given that three fourths of anxiety disorder onset occurs before the age of 24, the current study investigated the symptoms of generalized anxiety disorder, social phobia, panic disorder, posttraumatic stress disorder, and depression in sexual minority young adults relative to their heterosexual peers. Secondarily, the study investigated sexual orientation concealment as a predictor of anxiety and related disorders. A sample of 157 sexual minority and 157 heterosexual young adults matched on age and gender completed self-report measures of the aforementioned disorders, and indicated their level of sexual orientation concealment. Results revealed that sexual minority young adults reported greater symptoms relative to heterosexuals across all outcome measures. There were no interactions between sexual minority status and gender, however, women had higher symptoms across all disorders. Sexual minority young women appeared to be at the most risk for clinical levels of anxiety and related disorders. In addition, concealment of sexual orientation significantly predicted symptoms of social phobia. Implications are offered for the cognitive and behavioral treatment of anxiety and related disorders in this population. Copyright © 2015. Published by Elsevier Ltd.
27 CFR 447.62 - False statements or concealment of facts.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 27 Alcohol, Tobacco Products and Firearms 3 2011-04-01 2010-04-01 true False statements or concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION IMPORTATION OF ARMS, AMMUNITION AND...
27 CFR 447.62 - False statements or concealment of facts.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false False statements or concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION IMPORTATION OF ARMS, AMMUNITION AND...
27 CFR 447.62 - False statements or concealment of facts.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 27 Alcohol, Tobacco Products and Firearms 3 2012-04-01 2010-04-01 true False statements or concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION IMPORTATION OF ARMS, AMMUNITION AND...
27 CFR 447.62 - False statements or concealment of facts.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 27 Alcohol, Tobacco Products and Firearms 3 2013-04-01 2013-04-01 false False statements or concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION IMPORTATION OF ARMS, AMMUNITION AND...
27 CFR 447.62 - False statements or concealment of facts.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 27 Alcohol, Tobacco Products and Firearms 3 2014-04-01 2014-04-01 false False statements or concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION IMPORTATION OF ARMS, AMMUNITION AND...
ERIC Educational Resources Information Center
Laird, Robert D.; Marrero, Matthew D.; Melching, Jessica A.; Kuhn, Emily S.
2013-01-01
Adolescents use various strategies to manage their parents' access to information. This study tested developmental change in strategy use, longitudinal associations between disclosing and concealing strategies, and longitudinal associations linking disclosing and concealing strategies with antisocial behavior and depressive symptoms. Self-report…
The Effects of Concealing Academic Achievement Information on Adolescents' Self-Concept
ERIC Educational Resources Information Center
Zhang, Baoshan; Wang, Mo; Li, Juan; Yu, Guoliang; Bi, Yan-Ling
2011-01-01
Using an experimental design, the effect of concealing academic achievement information on adolescents' self-concept was examined in the current study. Specifically, adolescents with low academic achievement and adolescents with average to high academic achievement (N = 129) were randomly assigned to different interview contexts wherein…
Concealed Questions. In Search of Answers
ERIC Educational Resources Information Center
Frana, Ilaria
2010-01-01
This dissertation examines the semantic interpretation of various types of DPs in so-called concealed-question (CQ) constructions, as "Bill's phone number" in the sentence "John knows Bill's phone number". The peculiar characteristic of DP-CQs is that they are interpreted as having the meaning of an embedded question. So, for instance, the…
Ground roost resource selection for Merriam's wild turkeys
Chad P. Lehman; Daniel J. Thompson; Mark A. Rumble
2010-01-01
Concealment cover is important for ground-roosting wild turkey (Meleagris gallopavo) poults immediately following hatch during the vulnerable, preflight stage. We compared concealment cover resources selected at ground roosts to those of nest sites and available resources for Merriam's turkeys (Meleagris gallopavo merriami) in the Black Hills of South Dakota, USA...
A definitional framework for the human/biometric sensor interaction model
NASA Astrophysics Data System (ADS)
Elliott, Stephen J.; Kukula, Eric P.
2010-04-01
Existing definitions for biometric testing and evaluation do not fully explain errors in a biometric system. This paper provides a definitional framework for the Human Biometric-Sensor Interaction (HBSI) model. This paper proposes six new definitions based around two classifications of presentations, erroneous and correct. The new terms are: defective interaction (DI), concealed interaction (CI), false interaction (FI), failure to detect (FTD), failure to extract (FTX), and successfully acquired samples (SAS). As with all definitions, the new terms require a modification to the general biometric model developed by Mansfield and Wayman [1].
NASA Astrophysics Data System (ADS)
Warren, John L.; Vadnais, Kenneth G.
1997-01-01
Recent advances in miniature photomultiplier tubes and low power electronics have made possible a new generation of small gamma-ray radiation detectors specifically designed for use by government and law enforcement agencies for the detection and interdiction of concealed nuclear materials. This paper describes an inexpensive pager sized radiation detector that can be worn on the belt or carried in a pocket for hands free operation, and which can quietly alert the operator to the presence of nuclear material. The sensitivity performance of the detector technology and the application of the instrument to law enforcement and nuclear smuggling are discussed.
Apparatus and methods for real-time detection of explosives devices
Blackburn, Brandon W [Idaho Falls, ID; Hunt, Alan W [Pocatello, ID; Chichester, David L [Idaho Falls, ID
2014-01-07
The present disclosure relates, according to some embodiments, to apparatus, devices, systems, and/or methods for real-time detection of a concealed or camouflaged explosive device (e.g., EFPs and IEDs) from a safe stand-off distance. Apparatus, system and/or methods of the disclosure may also be operable to identify and/or spatially locate and/or detect an explosive device. An apparatus or system may comprise an x-ray generator that generates high-energy x-rays and/or electrons operable to contact and activate a metal comprised in an explosive device from a stand-off distance; and a detector operable to detect activation of the metal. Identifying an explosive device may comprise detecting characteristic radiation signatures emitted by metals specific to an EFP, an IED or a landmine. Apparatus and systems of the disclosure may be mounted on vehicles and methods of the disclosure may be performed while moving in the vehicle and from a safe stand-off distance.
Detection and Localization of Money Bills Concealed Behind Wooden Walls Using Compton Scattering
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wart, Jason A. van; Hussein, Esam M.A.; Waller, Edward J
2005-05-15
This work presents a portable device for detecting visually obscured contraband money bills that may be hidden within conventional household walls for the purpose of avoiding confiscation. The device utilizes the Compton backscattering of photons emitted from a collimated {sup 241}Am source. The scattered photons are detected with a thin NaI(Tl) detector, either over a wide field of view for surface scanning of the wall or within a confined view field for depth scanning. The design of the device was optimized for best density contrast and highest count rate for a given source activity. It was shown that the minimummore » detectable amount of contraband, with >95% confidence level, is 86 paper bills. The contraband was detectable when hidden in household walls made of gyprock or wooden paneling, even when masked by higher density materials such as metallic piping. The device's capability exceeded those of commercially available density-based portable contraband detectors.« less
EURITRACK tagged neutron inspection system design
NASA Astrophysics Data System (ADS)
Perret, G.; Perot, B.; Artaud, J.-L.; Mariani, A.
2006-05-01
The EURITRACK project aims at developing a non-destructive measurement system, using an associated particle sealed tube neutron generator, to detect explosives or other threat materials concealed in cargo containers. Chemical composition of the suspect item is determined by coincidence measurements between alpha particles and photons resulting from neutron interactions in the inspected voxel of the container. We present the design and the performances of the measurement system obtained by Monte Carlo calculations. Selected gamma detectors are clusters of 5''×5''×10'' and 5''×5'' sodium iodide scintillators, and a block of 100 kg of TNT located in a container filled with a metallic matrix having a density of 0.2 g/cm3 is shown to be detectable in 10 minutes.
Steganography on multiple MP3 files using spread spectrum and Shamir's secret sharing
NASA Astrophysics Data System (ADS)
Yoeseph, N. M.; Purnomo, F. A.; Riasti, B. K.; Safiie, M. A.; Hidayat, T. N.
2016-11-01
The purpose of steganography is how to hide data into another media. In order to increase security of data, steganography technique is often combined with cryptography. The weakness of this combination technique is the data was centralized. Therefore, a steganography technique is develop by using combination of spread spectrum and secret sharing technique. In steganography with secret sharing, shares of data is created and hidden in several medium. Medium used to concealed shares were MP3 files. Hiding technique used was Spread Spectrum. Secret sharing scheme used was Shamir's Secret Sharing. The result showed that steganography with spread spectrum combined with Shamir's Secret Share using MP3 files as medium produce a technique that could hid data into several cover. To extract and reconstruct the data hidden in stego object, it is needed the amount of stego object which more or equal to its threshold. Furthermore, stego objects were imperceptible and robust.
Marginally perceptible outcome feedback, motor learning and implicit processes.
Masters, Rich S W; Maxwell, Jon P; Eves, Frank F
2009-09-01
Participants struck 500 golf balls to a concealed target. Outcome feedback was presented at the subjective or objective threshold of awareness of each participant or at a supraliminal threshold. Participants who received fully perceptible (supraliminal) feedback learned to strike the ball onto the target, as did participants who received feedback that was only marginally perceptible (subjective threshold). Participants who received feedback that was not perceptible (objective threshold) showed no learning. Upon transfer to a condition in which the target was unconcealed, performance increased in both the subjective and the objective threshold condition, but decreased in the supraliminal condition. In all three conditions, participants reported minimal declarative knowledge of their movements, suggesting that deliberate hypothesis testing about how best to move in order to perform the motor task successfully was disrupted by the impoverished disposition of the visual outcome feedback. It was concluded that sub-optimally perceptible visual feedback evokes implicit processes.
Williams, Charlotte J; Cropley, Mark
2014-10-01
If perfectionists avoid engaging in preventive health behaviours, they may be putting their long-term health and well-being at risk. Correlational analyses based on a sample of 370 university students identified maladaptive perfectionism to be associated with decreased levels of engagement in preventive health behaviours, life satisfaction and well-being and increased levels of self-concealment and psychological distress. Adaptive perfectionism was associated with higher levels of engagement in preventive health behaviours. Self-concealment was identified as a partial mediator in the relationship between maladaptive perfectionism and both engagement in preventive health behaviours and psychological distress. Implications of the findings are discussed. © The Author(s) 2013.
Being and feeling unique: statistical deviance and psychological marginality.
Frable, D E
1993-03-01
Two studies tested the hypothesis that people with culturally stigmatized and concealable conditions (e.g., gays, epileptics, juvenile delinquents, and incest victims) would be more likely to feel unique than people with culturally valued or conspicuous conditions (e.g., the physically attractive, the intellectually gifted, the obese, and the facially scarred). In Study 1, culturally stigmatized individuals with concealable conditions were least likely to perceive consensus between their personal preferences and those of others. In Study 2, they were most likely to describe themselves as unique and to make these self-relevant decisions quickly. Marginality is a psychological reality, not just a statistical one, for those with stigmatized and concealable "master status" conditions.
Do Children Understand That People Selectively Conceal or Express Emotion?
ERIC Educational Resources Information Center
Hayashi, Hajimu; Shiomi, Yuki
2015-01-01
This study examined whether children understand that people selectively conceal or express emotion depending upon the context. We prepared two contexts for a verbal display task for 70 first-graders, 80 third-graders, 64 fifth-graders, and 71 adults. In both contexts, protagonists had negative feelings because of the behavior of the other…
The Psychological Implications of Concealing a Stigma: A Cognitive-Affective-Behavioral Model
ERIC Educational Resources Information Center
Pachankis, John E.
2007-01-01
Many assume that individuals with a hidden stigma escape the difficulties faced by individuals with a visible stigma. However, recent research has shown that individuals with a concealable stigma also face considerable stressors and psychological challenges. The ambiguity of social situations combined with the threat of potential discovery makes…
The Cost of Question Concealment: Eye-Tracking and MEG Evidence
ERIC Educational Resources Information Center
Harris, Jesse; Pylkkanen, Liina; McElree, Brian; Frisson, Steven
2008-01-01
Although natural language appears to be largely compositional, the meanings of certain expressions cannot be straightforwardly recovered from the meanings of their parts. This study examined the online processing of one such class of expressions: "concealed questions", in which the meaning of a complex noun phrase ("the proof of the theorem")…
Turkey habitat use and nesting characteristics in ponderosa pine
Mark A. Rumble; Stanley H. Anderson
1987-01-01
Turkeys (Meleagris gallapovo) selected nest sites that provided good horizontal concealment. Rock or rock outcrops were selected most frequently for nest concealment on first-nest attempts. Renest attempts showed a selection preference for shrubs as nest cover; most of these were located in meadows. Nesting success doubled for renests versus first...
Gender-specific health implications of minority stress among lesbians and gay men.
Bariola, Emily; Lyons, Anthony; Leonard, William
2016-12-01
Lesbians and gay men are exposed to unique minority stressors. We examined the health implications of one type of distal minority stressor (victimisation) and one type of proximal minority stressor (sexual identity concealment due to anticipated stigma) among lesbians and gay men. Gender-specific health implications were assessed. Data were collected via an online survey involving an Australian sample of 1,470 gay men and 1,264 lesbians. Survey questions assessed demographics, experiences of different forms of sexual identity-related victimisation and sexual identity concealment in a variety of contexts. Health outcomes included self-reported general health, illicit drug use, frequency of alcohol consumption, smoking status, and weight status. Gay men reported higher rates of victimisation and identity concealment than lesbians. Controlling for demographic differences, experiences of victimisation were associated with poorer self-rated health, illicit drug use, and smoking among both gay men and lesbians. In contrast, identity concealment was linked with poorer health outcomes among lesbians only. Our findings offer new insights into the potential antecedents of the health inequalities that have previously been reported for these populations. © 2016 Public Health Association of Australia.
NASA Astrophysics Data System (ADS)
Calvert, Nick; Betcke, Marta M.; Cresswell, John R.; Deacon, Alick N.; Gleeson, Anthony J.; Judson, Daniel S.; Mason, Peter; McIntosh, Peter A.; Morton, Edward J.; Nolan, Paul J.; Ollier, James; Procter, Mark G.; Speller, Robert D.
2015-05-01
Using a short pulse width x-ray source and measuring the time-of-flight of photons that scatter from an object under inspection allows for the point of interaction to be determined, and a profile of the object to be sampled along the path of the beam. A three dimensional image can be formed by interrogating the entire object. Using high energy x rays enables the inspection of cargo containers with steel walls, in the search for concealed items. A longer pulse width x-ray source can also be used with deconvolution techniques to determine the points of interaction. We present time-of-flight results from both short (picosecond) width and long (hundreds of nanoseconds) width x-ray sources, and show that the position of scatter can be localised with a resolution of 2 ns, equivalent to 30 cm, for a 3 cm thick plastic test object.
Effects of modified penoplasty for concealed penis in children.
Chen, Chao; Li, Ning; Luo, Yi-Ge; Wang, Hong; Tang, Xian-Ming; Chen, Jia-Bo; Dong, Chun-Qiang; Liu, Qiang; Dong, Kun; Su, Cheng; Yang, Ti-Quan
2016-10-01
To evaluate the effect of modified penoplasty in the management of concealed penis. We retrospectively reviewed 96 consecutive patients with concealed penis, which had been surgically corrected between July 2013 and July 2015. All patients underwent modified Shiraki phalloplasty. All patients were scheduled for regular follow-up at 1, 3, and 6 months after the surgery. Data on the patients' age, operative time, postoperative complications, and parents' satisfaction grade were collected and analyzed. The mean follow-up period was 17.4 months (range 7-31 months). The mean operative time was 63.2 ± 8.7 min. The mean perpendicular penile length was 1.89 ± 0.77 cm preoperatively and 4.42 ± 0.87 cm postoperatively, with an improved mean length of 2.5 ± 0.68 cm in the flaccid state postoperatively (p < 0.05). The patients' satisfaction grades after the surgery were improved significantly (p < 0.05). Fifty-two patients had penile lymphedema postoperatively; however, it disappeared spontaneously within 3 months. Additionally, postoperative wound infection occurred in two patients. There were no complications such as flap necrosis, penile shaft contracture, voiding difficulty, and erection difficulties. The modified Shiraki phalloplasty for concealed penis can achieve maximum utilization of prepuce to assure coverage of the exposed penile shaft. It has fewer complications, achieving marked asthetics, and functional improvement. It is a relatively ideal means for treating concealed penis.
Crandall, Marie; Eastman, Alexander; Violano, Pina; Greene, Wendy; Allen, Steven; Block, Ernest; Christmas, Ashley Britton; Dennis, Andrew; Duncan, Thomas; Foster, Shannon; Goldberg, Stephanie; Hirsh, Michael; Joseph, D'Andrea; Lommel, Karen; Pappas, Peter; Shillinglaw, William
2016-11-01
In the past decade, more than 300,000 people in the United States have died from firearm injuries. Our goal was to assess the effectiveness of two particular prevention strategies, restrictive licensing of firearms and concealed carry laws, on firearm-related injuries in the US Restrictive Licensing was defined to include denials of ownership for various offenses, such as performing background checks for domestic violence and felony convictions. Concealed carry laws allow licensed individuals to carry concealed weapons. A comprehensive review of the literature was performed. We used Grading of Recommendations Assessment, Development, and Evaluation methodology to assess the breadth and quality of the data specific to our Population, Intervention, Comparator, Outcomes (PICO) questions. A total of 4673 studies were initially identified, then seven more added after two subsequent, additional literature reviews. Of these, 3,623 remained after removing duplicates; 225 case reports, case series, and reviews were excluded, and 3,379 studies were removed because they did not focus on prevention or did not address our comparators of interest. This left a total of 14 studies which merited inclusion for PICO 1 and 13 studies which merited inclusion for PICO 2. PICO 1: We recommend the use of restrictive licensing to reduce firearm-related injuries.PICO 2: We recommend against the use of concealed carry laws to reduce firearm-related injuries.This committee found an association between more restrictive licensing and lower firearm injury rates. All 14 studies were population-based, longitudinal, used modeling to control for covariates, and 11 of the 14 were multi-state. Twelve of the studies reported reductions in firearm injuries, from 7% to 40%. We found no consistent effect of concealed carry laws. Of note, the varied quality of the available data demonstrates a significant information gap, and this committee recommends that we as a society foster a nurturing and encouraging environment that can strengthen future evidence based guidelines. Systematic review, level III.
Carrell, David; Malin, Bradley; Aberdeen, John; Bayer, Samuel; Clark, Cheryl; Wellner, Ben; Hirschman, Lynette
2013-01-01
Secondary use of clinical text is impeded by a lack of highly effective, low-cost de-identification methods. Both, manual and automated methods for removing protected health information, are known to leave behind residual identifiers. The authors propose a novel approach for addressing the residual identifier problem based on the theory of Hiding In Plain Sight (HIPS). HIPS relies on obfuscation to conceal residual identifiers. According to this theory, replacing the detected identifiers with realistic but synthetic surrogates should collectively render the few 'leaked' identifiers difficult to distinguish from the synthetic surrogates. The authors conducted a pilot study to test this theory on clinical narrative, de-identified by an automated system. Test corpora included 31 oncology and 50 family practice progress notes read by two trained chart abstractors and an informaticist. Experimental results suggest approximately 90% of residual identifiers can be effectively concealed by the HIPS approach in text containing average and high densities of personal identifying information. This pilot test suggests HIPS is feasible, but requires further evaluation. The results need to be replicated on larger corpora of diverse origin under a range of detection scenarios. Error analyses also suggest areas where surrogate generation techniques can be refined to improve efficacy. If these results generalize to existing high-performing de-identification systems with recall rates of 94-98%, HIPS could increase the effective de-identification rates of these systems to levels above 99% without further advancements in system recall. Additional and more rigorous assessment of the HIPS approach is warranted.
Noise analysis for near-field 3D FM-CW radar imaging systems
NASA Astrophysics Data System (ADS)
Sheen, David M.
2015-05-01
Near field radar imaging systems are used for demanding security applications including concealed weapon detection in airports and other high-security venues. Despite the near-field operation, phase noise and thermal noise can limit performance in several ways. Practical imaging systems can employ arrays with low gain antennas and relatively large signal distribution networks that have substantial losses which limit transmit power and increase the effective noise figure of the receiver chain, resulting in substantial thermal noise. Phase noise can also limit system performance. The signal coupled from transmitter to receiver is much larger than expected target signals. Phase noise from this coupled signal can set the system noise floor if the oscillator is too noisy. Frequency modulated continuous wave (FM-CW) radar transceivers used in short range systems are relatively immune to the effects of the coupled phase noise due to range correlation effects. This effect can reduce the phase-noise floor such that it is below the thermal noise floor for moderate performance oscillators. Phase noise is also manifested in the range response around bright targets, and can cause smaller targets to be obscured. Noise in synthetic aperture imaging systems is mitigated by the processing gain of the system. In this paper, the effects of thermal noise, phase noise, and processing gain are analyzed in the context of a near field 3-D FM-CW imaging radar as might be used for concealed weapon detection. In addition to traditional frequency domain analysis, a time-domain simulation is employed to graphically demonstrate the effect of these noise sources on a fast-chirping FM-CW system.
On the optimisation of the use of 3He in radiation portal monitors
NASA Astrophysics Data System (ADS)
Tomanin, Alice; Peerani, Paolo; Janssens-Maenhout, Greet
2013-02-01
Radiation Portal Monitors (RPMs) are used to detect illicit trafficking of nuclear or other radioactive material concealed in vehicles, cargo containers or people at strategic check points, such as borders, seaports and airports. Most of them include neutron detectors for the interception of potential plutonium smuggling. The most common technology used for neutron detection in RPMs is based on 3He proportional counters. The recent severe shortage of this rare and expensive gas has created a problem of capacity for manufacturers to provide enough detectors to satisfy the market demand. In this paper we analyse the design of typical commercial RPMs and try to optimise the detector parameters in order either to maximise the efficiency using the same amount of 3He or minimise the amount of gas needed to reach the same detection performance: by reducing the volume or gas pressure in an optimised design.
Herrera, Aubrey V.; Méndez, Enrique; Casanova, Leticia; Medina-Mora, Maria Elena
2016-01-01
The normative process of autonomy development in adolescence involves changes in adolescents’ information management typically characterized by decreasing disclosure and increasing concealment. These changes may have an important impact on the early detection and timely treatment of mental health conditions and risky behavior. Therefore, the objective was to extend our understanding of how these developmental changes in adolescent disclosure might impact adolescent mental health interviews. Specifically, we estimated the effects of third party presence and type of third party presence (adult, child, or both) on adolescents’ reports of psychiatric symptoms, substance use, suicidal behavior, and childhood adversity. In this representative sample of 3005 adolescents from Mexico City (52.1 % female), administered the World Mental Health Composite International Diagnostic Interview (WMH-CIDI-A), adult presence influenced reporting the most; in their presence, adolescents reported more ADHD, parental mental illness and economic adversity, but less panic disorder, PTSD, drug use and disorder, and suicidal behavior. The presence of children was associated with increased odds of reporting conduct disorder, opportunity for drug use, parental criminal behavior, neglect, and the death of a parent. While adolescent information management strategies are normative and even desirable as a means of gaining emotional autonomy, they may also interfere with timely detection and treatment or intervention for mental health conditions and risky behaviors. Research and practical implications of these findings are discussed. PMID:26792265
Herrera, Aubrey V; Benjet, Corina; Méndez, Enrique; Casanova, Leticia; Medina-Mora, Maria Elena
2017-02-01
The normative process of autonomy development in adolescence involves changes in adolescents' information management typically characterized by decreasing disclosure and increasing concealment. These changes may have an important impact on the early detection and timely treatment of mental health conditions and risky behavior. Therefore, the objective was to extend our understanding of how these developmental changes in adolescent disclosure might impact adolescent mental health interviews. Specifically, we estimated the effects of third party presence and type of third party presence (adult, child, or both) on adolescents' reports of psychiatric symptoms, substance use, suicidal behavior, and childhood adversity. In this representative sample of 3005 adolescents from Mexico City (52.1 % female), administered the World Mental Health Composite International Diagnostic Interview (WMH-CIDI-A), adult presence influenced reporting the most; in their presence, adolescents reported more ADHD, parental mental illness and economic adversity, but less panic disorder, PTSD, drug use and disorder, and suicidal behavior. The presence of children was associated with increased odds of reporting conduct disorder, opportunity for drug use, parental criminal behavior, neglect, and the death of a parent. While adolescent information management strategies are normative and even desirable as a means of gaining emotional autonomy, they may also interfere with timely detection and treatment or intervention for mental health conditions and risky behaviors. Research and practical implications of these findings are discussed.
ERIC Educational Resources Information Center
Cepeda-Benito, Antonio; Short, Paul
1998-01-01
New information about the role of self-concealment in the decision to seek psychological services is investigated. Different types of distress selectively predict students' perceived likelihood of seeking help according to the problems for which help would be sought (N=732). Results are discussed in contrast to previous researchers' findings. (EMK)
Concealment of Child Sexual Abuse in Sports
ERIC Educational Resources Information Center
Hartill, Mike
2013-01-01
When the sexual abuse of children is revealed, it is often found that other nonabusing adults were aware of the abuse but failed to act. During the past twenty years or so, the concealment of child sexual abuse (CSA) within organizations has emerged as a key challenge for child protection work. Recent events at Pennsylvania State University (PSU)…
Guns on Campus: A Current Debate. E-Fact Sheet
ERIC Educational Resources Information Center
Higher Education Center for Alcohol, Drug Abuse, and Violence Prevention, 2010
2010-01-01
Almost all U.S. college campuses ban concealed weapons. But in the aftermath of the tragic shooting deaths at Virginia Tech in 2007, the debate on whether guns should be permitted at colleges and universities has intensified. Dozens of states have considered proposals to lift bans on concealed weapons at colleges and universities, but so far none…
A hybrid frame concealment algorithm for H.264/AVC.
Yan, Bo; Gharavi, Hamid
2010-01-01
In packet-based video transmissions, packets loss due to channel errors may result in the loss of the whole video frame. Recently, many error concealment algorithms have been proposed in order to combat channel errors; however, most of the existing algorithms can only deal with the loss of macroblocks and are not able to conceal the whole missing frame. In order to resolve this problem, in this paper, we have proposed a new hybrid motion vector extrapolation (HMVE) algorithm to recover the whole missing frame, and it is able to provide more accurate estimation for the motion vectors of the missing frame than other conventional methods. Simulation results show that it is highly effective and significantly outperforms other existing frame recovery methods.
NASA Astrophysics Data System (ADS)
Aghamaleki, Javad Abbasi; Behrad, Alireza
2018-01-01
Double compression detection is a crucial stage in digital image and video forensics. However, the detection of double compressed videos is challenging when the video forger uses the same quantization matrix and synchronized group of pictures (GOP) structure during the recompression history to conceal tampering effects. A passive approach is proposed for detecting double compressed MPEG videos with the same quantization matrix and synchronized GOP structure. To devise the proposed algorithm, the effects of recompression on P frames are mathematically studied. Then, based on the obtained guidelines, a feature vector is proposed to detect double compressed frames on the GOP level. Subsequently, sparse representations of the feature vectors are used for dimensionality reduction and enrich the traces of recompression. Finally, a support vector machine classifier is employed to detect and localize double compression in temporal domain. The experimental results show that the proposed algorithm achieves the accuracy of more than 95%. In addition, the comparisons of the results of the proposed method with those of other methods reveal the efficiency of the proposed algorithm.
Detection of latent bloodstains beneath painted surfaces using reflected infrared photography.
Farrar, Andrew; Porter, Glenn; Renshaw, Adrian
2012-09-01
Bloodstain evidence is a highly valued form of physical evidence commonly found at scenes involving violent crimes. However, painting over bloodstains will often conceal this type of evidence. There is limited research in the scientific literature that describes methods of detecting painted-over bloodstains. This project employed a modified digital single-lens reflex camera to investigate the effectiveness of infrared (IR) photography in detecting latent bloodstain evidence beneath a layer or multiple layers of paint. A qualitative evaluation was completed by comparing images taken of a series of samples using both IR and standard (visible light) photography. Further quantitative image analysis was used to verify the findings. Results from this project indicate that bloodstain evidence can be detected beneath up to six layers of paint using reflected IR; however, the results vary depending on the characteristics of the paint. This technique provides crime scene specialists with a new field method to assist in locating, visualizing, and documenting painted-over bloodstain evidence. © 2012 American Academy of Forensic Sciences.
Three-dimensional invisibility cloaks functioning at terahertz frequencies
NASA Astrophysics Data System (ADS)
Cao, Wei; Zhou, Fan; Liang, Dachuan; Gu, Jianqiang; Han, Jiaguang; Sun, Cheng; Zhang, Weili
2014-05-01
Quasi-three-dimensional invisibility cloaks, comprised of either homogeneous or inhomogeneous media, are experimentally demonstrated in the terahertz regime. The inhomogeneous cloak was lithographically fabricated using a scalable Projection Microstereolithography process. The triangular cloaking structure has a total thickness of 4.4 mm, comprised of 220 layers of 20 μm thickness. The cloak operates at a broad frequency range between 0.3 and 0.6 THz, and is placed over an α-lactose monohydrate absorber with rectangular shape. Characterized using angular-resolved reflection terahertz time-domain spectroscopy, the results indicate that the terahertz invisibility cloak has successfully concealed both the geometrical and spectroscopic signatures of the absorber, making it undetectable to the observer. The homogeneous cloaking device made from birefringent crystalline sapphire features a large concealed volume, low loss, and broad bandwidth. It is capable of hiding objects with a dimension nearly an order of magnitude larger than that of its lithographic counterpart, but without involving complex and time-consuming cleanroom processing. The cloak device was made from two 20-mm-thick high-purity sapphire prisms. The cloaking region has a maximum height 1.75 mm with a volume of approximately 5% of the whole sample. The reflected TM beam from the cloak shows nearly the same profile as that reflected by a flat mirror.
Artemisinin derivatives for treating severe malaria.
McIntosh, H M; Olliaro, P
2000-01-01
Artemisinin derivatives may have advantages over quinoline drugs for treating severe malaria since they are fast acting and effective against quinine resistant malaria parasites. The objective of this review was to assess the effects of artemisinin drugs for severe and complicated falciparum malaria in adults and children. We searched the Cochrane Infectious Diseases Group trials register, Cochrane Controlled Trials Register, Medline, Embase, Science Citation Index, Lilacs, African Index Medicus, conference abstracts and reference lists of articles. We contacted organisations, researchers in the field and drug companies. Randomised and pseudo-randomised trials comparing artemisinin drugs (rectal, intramuscular or intravenous) with standard treatment, or comparisons between artemisinin derivatives in adults or children with severe or complicated falciparum malaria. Eligibility, trial quality assessment and data extraction were done independently by two reviewers. Study authors were contacted for additional information. Twenty three trials are included, allocation concealment was adequate in nine. Sixteen trials compared artemisinin drugs with quinine in 2653 patients. Artemisinin drugs were associated with better survival (mortality odds ratio 0.61, 95% confidence interval 0.46 to 0.82, random effects model). In trials where concealment of allocation was adequate (2261 patients), this was barely statistically significant (odds ratio 0.72, 95% CI 0.54 to 0.96, random effects model). In 1939 patients with cerebral malaria, mortality was also lower with artemisinin drugs overall (odds ratio 0.63, 95% CI 0.44 to 0.88, random effects model). The difference was not significant however when only trials reporting adequate concealment of allocation were analysed (odds ratio 0.78, 95% CI 0.55 to 1.10, random effects model) based on 1607 patients. No difference in neurological sequelae was shown. Compared with quinine, artemisinin drugs showed faster parasite clearance from the blood and similar adverse effects. The evidence suggests that artemisinin drugs are no worse than quinine in preventing death in severe or complicated malaria. No artemisinin derivative appears to be better than the others.
Gauld, Cassandra S; Lewis, Ioni; White, Katherine M
2014-01-01
Making a conscious effort to hide the fact that you are texting while driving (i.e., concealed texting) is a deliberate and risky behaviour involving attention diverted away from the road. As the most frequent users of text messaging services and mobile phones while driving, young people appear at heightened risk of crashing from engaging in this behaviour. This study investigated the phenomenon of concealed texting while driving, and utilised an extended Theory of Planned Behaviour (TPB) including the additional predictors of moral norm, mobile phone involvement, and anticipated regret to predict young drivers' intentions and subsequent behaviour. Participants (n=171) were aged 17-25 years, owned a mobile phone, and had a current driver's licence. Participants completed a questionnaire measuring their intention to conceal texting while driving, and a follow-up questionnaire a week later to report their behavioural engagement. The results of hierarchical multiple regression analyses showed overall support for the predictive utility of the TPB with the standard constructs accounting for 69% of variance in drivers' intentions, and the extended predictors contributing an additional 6% of variance in intentions over and above the standard constructs. Attitude, subjective norm, PBC, moral norm, and mobile phone involvement emerged as significant predictors of intentions; and intention was the only significant predictor of drivers' self-reported behaviour. These constructs can provide insight into key focal points for countermeasures including advertising and other public education strategies aimed at influencing young drivers to reconsider their engagement in this risky behaviour. Copyright © 2013 Elsevier Ltd. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sheen, David M.; Fernandes, Justin L.; Tedeschi, Jonathan R.
2013-06-12
Active millimeter-wave imaging is currently being used for personnel screening at airports and other high-security facilities. The lateral resolution, depth resolution, clothing penetration, and image illumination quality obtained from next-generation systems can be significantly enhanced through the selection the aperture size, antenna beamwidth, center frequency, and bandwidth. In this paper, the results of an extensive imaging trade study are presented using both planar and cylindrical three-dimensional imaging techniques at frequency ranges of 10-20 GHz, 10 – 40 GHz, 40 – 60 GHz, and 75 – 105 GHz
Forensic and homeland security applications of modern portable Raman spectroscopy.
Izake, Emad L
2010-10-10
Modern detection and identification of chemical and biological hazards within the forensic and homeland security contexts may well require conducting the analysis in field while adapting a non-contact approach to the hazard. Technological achievements on both surface and resonance enhancement Raman scattering re-developed Raman spectroscopy to become the most adaptable spectroscopy technique for stand-off and non-contact analysis of hazards. On the other hand, spatially offset Raman spectroscopy proved to be very valuable for non-invasive chemical analysis of hazards concealed within non-transparent containers and packaging. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.
Non-destructive terahertz imaging of illicit drugs using spectral fingerprints
NASA Astrophysics Data System (ADS)
Kawase, Kodo; Ogawa, Yuichi; Watanabe, Yuuki; Inoue, Hiroyuki
2003-10-01
The absence of non-destructive inspection techniques for illicit drugs hidden in mail envelopes has resulted in such drugs being smuggled across international borders freely. We have developed a novel basic technology for terahertz imaging, which allows detection and identification of drugs concealed in envelopes, by introducing the component spatial pattern analysis. The spatial distributions of the targets are obtained from terahertz multispectral transillumination images, using absorption spectra measured with a tunable terahertz-wave source. The samples we used were methamphetamine and MDMA, two of the most widely consumed illegal drugs in Japan, and aspirin as a reference.
AGUA TIBIA PRIMITIVE AREA, CALIFORNIA.
Irwin, William P.; Thurber, Horace K.
1984-01-01
The Agua Tibia Primitive Area in southwestern California is underlain by igneous and metamorphic rocks that are siilar to those widely exposed throughout much of the Peninsular Ranges. To detect the presence of any concealed mineral deposits, samples of stream sediments were collected along the various creeks that head in the mountain. As an additional aid in evaluating the mineral potential, an aeromagnetic survey was made and interpreted. A search for records of past or existing mining claims within the primitive area was made but none was found. Evidence of deposits of metallic or nonmetallic minerals was not seen during the study.
ERIC Educational Resources Information Center
Chaudoir, Stephenie R.; Fisher, Jeffrey D.
2010-01-01
Disclosure is a critical aspect of the experience of people who live with concealable stigmatized identities. This article presents the disclosure processes model (DPM)--a framework with which to examine when and why interpersonal disclosure may be beneficial. The DPM suggests that antecedent goals representing approach and avoidance motivational…
ERIC Educational Resources Information Center
Bouffard, Jeffrey A.; Nobles, Matt R.; Wells, William; Cavanaugh, Michael R.
2012-01-01
Among other arguments, advocates for lifting bans on carrying concealed handguns on campus propose that this would increase the prevalence of legitimately carried handguns, which might then deter crimes or be used to intervene in campus shooting incidents like the one that took place at Virginia Tech in 2007. Opponents suggest that increased…
ERIC Educational Resources Information Center
Masuda, Akihiko; Boone, Matthew S.
2011-01-01
The present study examined whether mental health stigma (i.e., negative attitudes toward people with a psychological disorder) and self-concealment are unique predictors of help-seeking attitudes in Asian American and European American college students with no history of seeking professional psychological services. The Asian American group had…
ERIC Educational Resources Information Center
Jorgensen, Lisa J.; Ellis, Gary D.; Ruddell, Edward
2013-01-01
This research examined the effect of concealment (environmental cues), presence or absence of people recreating (social cues), and gender on individuals' fear of crime in a community park setting. Using a 7-point single-item indicator, 732 participants from two samples (540 park visitors and 192 college students) rated their estimates of fear of…
ERIC Educational Resources Information Center
Horan, Sean M.; Bryant, Leah E.
2017-01-01
This essay encourages research on the presence of guns in college classrooms. Readers are asked to consider that around 11 million individuals have concealed carry permits (Crime Prevention Research Center, 2014), and roughly 20% of states allow concealed guns on campus (e.g., Anderson, 2016). Given the centrality of guns in our culture, and…
ERIC Educational Resources Information Center
Mendoza, Hadrian; Masuda, Akihiko; Swartout, Kevin M.
2015-01-01
The study examined whether mental health stigma and self-concealment are uniquely related to various dimensions of attitudes toward seeking professional psychological services (i.e., help-seeking attitudes) in Latina/o college students. Data from 129 Latina/o undergraduates (76% female) were used in the analysis. Results revealed that mental…
Self-stigma among concealable minorities in Hong Kong: conceptualization and unified measurement.
Mak, Winnie W S; Cheung, Rebecca Y M
2010-04-01
Self-stigma refers to the internalized stigma that individuals may have toward themselves as a result of their minority status. Not only can self-stigma dampen the mental health of individuals, it can deter them from seeking professional help lest disclosing their minority status lead to being shunned by service providers. No unified instrument has been developed to measure consistently self-stigma that could be applied to different concealable minority groups. The present study presented findings based on 4 studies on the development and validation of the Self-Stigma Scale, conducted in Hong Kong with community samples of mental health consumers, recent immigrants from Mainland China, and sexual minorities. Upon a series of validation procedures, a 9-item Self-Stigma Scale-Short Form was developed. Initial support on its reliability and construct validity (convergent and criterion validities) were found among 3 stigmatized groups. Utility of this unified measure was to establish an empirical basis upon which self-stigma of different concealable minority groups could be assessed under the same dimensions. Health-care professionals could make use of this short scale to assess potential self-stigmatization among concealable minorities, which may hamper their treatment process as well as their overall well-being.
[Half-gloving cordectomy: a modified procedure for concealed penis].
Sun, Wei-Gui; Zheng, Qi-Chuan; Jiang, Kun
2012-06-01
To search for a simple surgical procedure for the treatment of concealed penis that may have better effect and less complications. We used a modified surgical method in the treatment of 58 patients with concealed penis aged from 3 to 15 (mean 6.8) years. The operation was simplified and involved the following steps: wholly unveiling the penis glans, half-degloving the foreskins, cutting off all the adhesive fibers up to the penile suspensory ligaments, and liberating the external penis. The operation was successful in all the patients, with the operative time of 15 -45 (mean 33) minutes, hospital stay of 2 - 5 (mean 3.5) days, but no complications except mild foreskin edema in 5 cases. The external penis was prolonged from 0.5 - 2.8 (mean 1.4) cm preoperatively to 3.2 - 8.5 (mean 3.9) cm postoperatively. The patients were followed up for 1 -3 years, all satisfied with the length and appearance of the penis, and their sexual and reproductive functions were normal. The modified surgical procedure for concealed penis is simple and effective, with desirable outcomes, few postoperative complications and no damage to sexual and reproductive functions.
Keene, Danya E; Cowan, Sarah K; Baker, Amy Castro
2015-05-01
We analyzed experiences of stigmatization, concealment, and isolation among African American homeowners who were experiencing mortgage strain. We conducted semistructured interviews between March 2012 and May 2013 with 28 African American homeowners in a northeastern US city who were experiencing mortgage strain. We coded all of the transcripts and reviewed data for codes relating to stigma, sharing information, social support, social isolation, and the meaning of homeownership. Our data showed that mortgage strain can be a concealable stigma. Participants internalized this stigma, expressing shame about their mortgage situation. Additionally, some participants anticipated that others would view them as less worthy given their mortgage trouble. In an effort to avoid stigmatization, many concealed their mortgage trouble, which often led to isolation. This stigmatization, concealment, and isolation seemed to contribute to participants' depression, anxiety, and emotional distress. Stigma may exacerbate stress associated with mortgage strain and contribute to poor mental health, particularly among upwardly mobile African Americans who have overcome significant structural barriers to home ownership. Reducing stigma associated with mortgage strain may help to reduce the health consequences of this stressful life event.
Examination of an Electronic Patient Record Display Method to Protect Patient Information Privacy.
Niimi, Yukari; Ota, Katsumasa
2017-02-01
Electronic patient records facilitate the provision of safe, high-quality medical care. However, because personnel can view almost all stored information, this study designed a display method using a mosaic blur (pixelation) to temporarily conceal information patients do not want shared. This study developed an electronic patient records display method for patient information that balanced the patient's desire for personal information protection against the need for information sharing among medical personnel. First, medical personnel were interviewed about the degree of information required for both individual duties and team-based care. Subsequently, they tested a mock display method that partially concealed information using a mosaic blur, and they were interviewed about the effectiveness of the display method that ensures patient privacy. Participants better understood patients' demand for confidentiality, suggesting increased awareness of patients' privacy protection. However, participants also indicated that temporary concealment of certain information was problematic. Other issues included the inconvenience of removing the mosaic blur to obtain required information and risk of insufficient information for medical care. Despite several issues with using a display method that temporarily conceals information according to patient privacy needs, medical personnel could accept this display method if information essential to medical safety remains accessible.
McClive, Cathy
2002-08-01
For early modern men and women and their medical practitioners, the experience and understanding of pregnancy was primarily uncertain. This uncertainty extended to the whole process of pregnancy--from the moment of conception to delivery, the detection and bearing of a 'true fruit' was doubtful. This 'uncertainty' was heightened by the fact that both body and language could conceal the truth. The woman herself was frequently uncertain and could be mistaken in her interpretation of the condition of her belly. This ambiguity is expressed in the vague and faltering language used to describe such experiences. Women's bodies were believed to conceal the truth more readily than their male counterparts. Equally a woman's physical narrative was more likely to be distrusted. Tensions surrounding the appropriate nature of women's 'knowledge' of such hidden 'secrets' also affected the ways in which women and their practitioners described the 'truths' of the belly. This article traces the ambiguities faced by women and their midwives/accoucheurs through three areas of pregnancy: quickening, false conceptions, and the threat of miscarriage. The much-neglected source of medical texts and observations is drawn upon, alongside letters and diaries and judicial material.
Acoustic Parametric Array for Identifying Standoff Targets
NASA Astrophysics Data System (ADS)
Hinders, M. K.; Rudd, K. E.
2010-02-01
An integrated simulation method for investigating nonlinear sound beams and 3D acoustic scattering from any combination of complicated objects is presented. A standard finite-difference simulation method is used to model pulsed nonlinear sound propagation from a source to a scattering target via the KZK equation. Then, a parallel 3D acoustic simulation method based on the finite integration technique is used to model the acoustic wave interaction with the target. Any combination of objects and material layers can be placed into the 3D simulation space to study the resulting interaction. Several example simulations are presented to demonstrate the simulation method and 3D visualization techniques. The combined simulation method is validated by comparing experimental and simulation data and a demonstration of how this combined simulation method assisted in the development of a nonlinear acoustic concealed weapons detector is also presented.
ERIC Educational Resources Information Center
McKenna-Buchanan, Tim; Munz, Stevie; Rudnick, Justin
2015-01-01
Lesbian, gay, and queer (LGQ) teachers often deal with the tension between disclosing and concealing their sexual orientations in the college classroom. This article presents the results of a qualitative interview study with 29 self-identified LGQ college teachers about their choices to disclose or conceal their sexual identities. Using…
ERIC Educational Resources Information Center
Dogan, Ugur; Çolak, Tugba Seda
2016-01-01
This study was tested a model for explain to social networks sites (SNS) usage with structural equation modeling (SEM). Using SEM on a sample of 475 high school students (35% male, 65% female) students, model was investigated the relationship between self-concealment, social appearance anxiety, loneliness on SNS such as Twitter and Facebook usage.…
Initial results from a multiple monoenergetic gamma radiography system for nuclear security
NASA Astrophysics Data System (ADS)
O'Day, Buckley E.; Hartwig, Zachary S.; Lanza, Richard C.; Danagoulian, Areg
2016-10-01
The detection of assembled nuclear devices and concealed special nuclear materials (SNM) such as plutonium or uranium in commercial cargo traffic is a major challenge in mitigating the threat of nuclear terrorism. Currently available radiographic and active interrogation systems use ∼1-10 MeV bremsstrahlung photon beams. Although simple to build and operate, bremsstrahlung-based systems deliver high radiation doses to the cargo and to potential stowaways. To eliminate problematic issues of high dose, we are developing a novel technique known as multiple monoenergetic gamma radiography (MMGR). MMGR uses ion-induced nuclear reactions to produce two monoenergetic gammas for dual-energy radiography. This allows us to image the areal density and effective atomic number (Zeff) of scanned cargo. We present initial results from the proof-of-concept experiment, which was conducted at the MIT Bates Research and Engineering Center. The purpose of the experiment was to assess the capabilities of MMGR to measure areal density and Zeff of container cargo mockups. The experiment used a 3.0 MeV radiofrequency quadrupole accelerator to create sources of 4.44 MeV and 15.11 MeV gammas from the 11B(d,nγ)12C reaction in a thick natural boron target; the gammas are detected by an array of NaI(Tl) detectors after transmission through cargo mockups . The measured fluxes of transmitted 4.44 MeV and 15.11 MeV gammas were used to assess the areal density and Zeff. Initial results show that MMGR is capable of discriminating the presence of high-Z materials concealed in up to 30 cm of iron shielding from low- and mid-Z materials present in the cargo mockup.
Liu, Huijie; Li, Nianqiang; Zhao, Qingchun
2015-05-10
Optical chaos generated by chaotic lasers has been widely used in several important applications, such as chaos-based communications and high-speed random-number generators. However, these applications are susceptible to degradation by the presence of time-delay (TD) signature identified from the chaotic output. Here we propose to achieve the concealment of TD signature, along with the enhancement of chaos bandwidth, in three-cascaded vertical-cavity surface-emitting lasers (VCSELs). The cascaded system is composed of an external-cavity master VCSEL, a solitary intermediate VCSEL, and a solitary slave VCSEL. Through mapping the evolutions of TD signature and chaos bandwidth in the parameter space of the injection strength and frequency detuning, photonic generation of polarization-resolved wideband chaos with TD concealment is numerically demonstrated for wide regions of the injection parameters.
How Men Manage Bulbar Urethral Stricture by Concealing Urinary Symptoms.
Whybrow, Paul; Rapley, Tim; Pickard, Robert; Hrisos, Susan
2015-10-01
In this article, we present findings from research conducted as part of a multi-center surgical trial. Bulbar urethral stricture, a narrowing of the middle urethra, is a common cause of urinary problems in men that can have a profound impact on their lives. Semi-structured interviews were conducted with a sample of 19 men seeking treatment for urethral stricture. The findings reveal how men tend to develop routines and tactics to adapt to their symptoms and hide them from others rather than seek help. We argue that this concealment becomes an inseparable part of how the disease is managed and is an additional hidden practical and emotional burden for these men. In addition, we suggest that the patients only sought curative treatments once practices of social concealment are no longer viable. © The Author(s) 2015.
Design of a steganographic virtual operating system
NASA Astrophysics Data System (ADS)
Ashendorf, Elan; Craver, Scott
2015-03-01
A steganographic file system is a secure file system whose very existence on a disk is concealed. Customarily, these systems hide an encrypted volume within unused disk blocks, slack space, or atop conventional encrypted volumes. These file systems are far from undetectable, however: aside from their ciphertext footprint, they require a software or driver installation whose presence can attract attention and then targeted surveillance. We describe a new steganographic operating environment that requires no visible software installation, launching instead from a concealed bootstrap program that can be extracted and invoked with a chain of common Unix commands. Our system conceals its payload within innocuous files that typically contain high-entropy data, producing a footprint that is far less conspicuous than existing methods. The system uses a local web server to provide a file system, user interface and applications through a web architecture.
Use of thermal neutron reflection method for chemical analysis of bulk samples
NASA Astrophysics Data System (ADS)
Papp, A.; Csikai, J.
2014-09-01
Microscopic, σβ, and macroscopic, Σβ, reflection cross-sections of thermal neutrons averaged over bulk samples as a function of thickness (z) are given. The σβ values are additive even for bulk samples in the z=0.5-8 cm interval and so the σβmol(z) function could be given for hydrogenous substances, including some illicit drugs, explosives and hiding materials of ~1000 cm3 dimensions. The calculated excess counts agree with the measured R(z) values. For the identification of concealed objects and chemical analysis of bulky samples, different neutron methods need to be used simultaneously.
Seamless Image Mosaicking via Synchronization
NASA Astrophysics Data System (ADS)
Santellani, E.; Maset, E.; Fusiello, A.
2018-05-01
This paper proposes an innovative method to create high-quality seamless planar mosaics. The developed pipeline ensures good robustness against many common mosaicking problems (e.g., misalignments, colour distortion, moving objects, parallax) and differs from other works in the literature because a global approach, known as synchronization, is used for image registration and colour correction. To better conceal the mosaic seamlines, images are cut along specific paths, computed using a Voronoi decomposition of the mosaic area and a shortest path algorithm. Results obtained on challenging real datasets show that the colour correction mitigates significantly the colour variations between the original images and the seams on the final mosaic are not evident.
ERIC Educational Resources Information Center
Bathje, Geoff J.; Kim, Eunha; Rau, Ellen; Bassiouny, Muhammad Adam; Kim, Taehoon
2014-01-01
This study examined attitudes toward face-to-face (f2f) and online counseling among 228 Korean college students. In addition, it tested a hypothesized model proposing that general propensities (i.e., self-concealment, openness to experience, and loss of face) would influence counseling-specific expectations (i.e., self-stigma and disclosure…
Gu, Jing; Wang, Qi; Wang, Xiaogang; Li, Hailong; Gu, Mei; Ming, Haixia; Dong, Xiaoli; Yang, Kehu; Wu, Hongyan
2014-01-01
Background. This review provides the first methodological information assessment of protocol of acupuncture RCTs registered in WHO International Clinical Trials Registry Platform (ICTRP). Methods. All records of acupuncture RCTs registered in the ICTRP have been collected. The methodological design assessment involved whether the randomization methods, allocation concealment, and blinding were adequate or not based on the information of registration records (protocols of acupuncture RCTs). Results. A total of 453 records, found in 11 registries, were examined. Methodological details were insufficient in registration records; there were 76.4%, 89.0%, and 21.4% records that did not provide information on randomization methods, allocation concealment, and blinding respectively. The proportions of adequate randomization methods, allocation concealment, and blinding were only 107 (23.6%), 48 (10.6%), and 210 (46.4%), respectively. The methodological design improved year by year, especially after 2007. Additionally, methodology of RCTs with ethics approval was clearly superior to those without ethics approval and different among registries. Conclusions. The overall methodological design based on registration records of acupuncture RCTs is not very well but improved year by year. The insufficient information on randomization methods, allocation concealment, and blinding maybe due to the relevant description is not taken seriously in acupuncture RCTs' registration. PMID:24688591
Gu, Jing; Wang, Qi; Wang, Xiaogang; Li, Hailong; Gu, Mei; Ming, Haixia; Dong, Xiaoli; Yang, Kehu; Wu, Hongyan
2014-01-01
Background. This review provides the first methodological information assessment of protocol of acupuncture RCTs registered in WHO International Clinical Trials Registry Platform (ICTRP). Methods. All records of acupuncture RCTs registered in the ICTRP have been collected. The methodological design assessment involved whether the randomization methods, allocation concealment, and blinding were adequate or not based on the information of registration records (protocols of acupuncture RCTs). Results. A total of 453 records, found in 11 registries, were examined. Methodological details were insufficient in registration records; there were 76.4%, 89.0%, and 21.4% records that did not provide information on randomization methods, allocation concealment, and blinding respectively. The proportions of adequate randomization methods, allocation concealment, and blinding were only 107 (23.6%), 48 (10.6%), and 210 (46.4%), respectively. The methodological design improved year by year, especially after 2007. Additionally, methodology of RCTs with ethics approval was clearly superior to those without ethics approval and different among registries. Conclusions. The overall methodological design based on registration records of acupuncture RCTs is not very well but improved year by year. The insufficient information on randomization methods, allocation concealment, and blinding maybe due to the relevant description is not taken seriously in acupuncture RCTs' registration.
Concealed neuroanatomy in Michelangelo's Separation of Light From Darkness in the Sistine Chapel.
Suk, Ian; Tamargo, Rafael J
2010-05-01
Michelangelo Buonarroti (1475-1564) was a master anatomist as well as an artistic genius. He dissected cadavers numerous times and developed a profound understanding of human anatomy. From 1508 to 1512, Michelangelo painted the ceiling of the Sistine Chapel in Rome. His Sistine Chapel frescoes are considered one of the monumental achievements of Renaissance art. In the winter of 1511, Michelangelo entered the final stages of the Sistine Chapel project and painted 4 frescoes along the longitudinal apex of the vault, which completed a series of 9 central panels depicting scenes from the Book of Genesis. It is reported that Michelangelo concealed an image of the brain in the first of these last 4 panels, namely, the Creation of Adam. Here we present evidence that he concealed another neuronanatomic structure in the final panel of this series, the Separation of Light From Darkness, specifically a ventral view of the brainstem. The Separation of Light From Darkness is an important panel in the Sistine Chapel iconography because it depicts the beginning of Creation and is located directly above the altar. We propose that Michelangelo, a deeply religious man and an accomplished anatomist, intended to enhance the meaning of this iconographically critical panel and possibly document his anatomic accomplishments by concealing this sophisticated neuroanatomic rendering within the image of God.
Magsamen-Conrad, Kate; Billotte-Verhoff, China; Greene, Kathryn
2014-11-01
This research examines the effect of online social capital and Internet use on the normally negative effects of technology addiction, especially for individuals prone to self-concealment. Self-concealment is a personality trait that describes individuals who are more likely to withhold personal and private information, inhibiting catharsis and wellbeing. Addiction, in any context, is also typically associated with negative outcomes. However, we investigate the hypothesis that communication technology addiction may positively affect wellbeing for self-concealing individuals when online interaction is positive, builds relationships, or fosters a sense of community. Within these parameters, increased communication through mediated channels (and even addiction) may reverse the otherwise negative effects of self-concealment on wellbeing. Overall, the proposed model offers qualified support for the continued analysis of mediated communication as a potential source for improving the wellbeing for particular individuals. This study is important because we know that healthy communication in relationships, including disclosure, is important to wellbeing. This study recognizes that not all people are comfortable communicating in face-to-face settings. Our findings offer evidence that the presence of computers in human behaviors (e.g., mediated channels of communication and NCTs) enables some individuals to communicate and fos ter beneficial interpersonal relationships, and improve their wellbeing.
Magsamen-Conrad, Kate; Billotte-Verhoff, China; Greene, Kathryn
2014-01-01
This research examines the effect of online social capital and Internet use on the normally negative effects of technology addiction, especially for individuals prone to self-concealment. Self-concealment is a personality trait that describes individuals who are more likely to withhold personal and private information, inhibiting catharsis and wellbeing. Addiction, in any context, is also typically associated with negative outcomes. However, we investigate the hypothesis that communication technology addiction may positively affect wellbeing for self-concealing individuals when online interaction is positive, builds relationships, or fosters a sense of community. Within these parameters, increased communication through mediated channels (and even addiction) may reverse the otherwise negative effects of self-concealment on wellbeing. Overall, the proposed model offers qualified support for the continued analysis of mediated communication as a potential source for improving the wellbeing for particular individuals. This study is important because we know that healthy communication in relationships, including disclosure, is important to wellbeing. This study recognizes that not all people are comfortable communicating in face-to-face settings. Our findings offer evidence that the presence of computers in human behaviors (e.g., mediated channels of communication and NCTs) enables some individuals to communicate and fos ter beneficial interpersonal relationships, and improve their wellbeing. PMID:25568591
NASA Tech Briefs, September 2004
NASA Technical Reports Server (NTRS)
2004-01-01
Topics covered include: Brazing SiC/SiC Composites to Metals; Composite-Material Tanks with Chemically Resistant Liners; Thermally Conductive Metal-Tube/Carbon-Composite Joints; Improved BN Coatings on SiC Fibers in SiC Matrices; Iterative Demodulation and Decoding of Non-Square QAM; Measuring Radiation Patterns of Reconfigurable Patch Antennas on Wafers; Low-Cutoff, High-Pass Digital Filtering of Neural Signals; Further Improvement in 3DGRAPE; Ground Support Software for Spaceborne Instrumentation; MER SPICE Interface; Simulating Operation of a Planetary Rover; Analyzing Contents of a Computer Cache; Discrepancy Reporting Management System; Silicone-Rubber Microvalves Actuated by Paraffin; Hydraulic Apparatus for Mechanical Testing of Nuts; Heat Control via Torque Control in Friction Stir Welding; Manufacturing High-Quality Carbon Nanotubes at Lower Cost; Setup for Visual Observation of Carbon-Nanotube Arc Process; Solution Preserves Nucleic Acids in Body-Fluid Specimens; Oligodeoxynucleotide Probes for Detecting Intact Cells; Microwave-Spectral Signatures Would Reveal Concealed Objects; Digital Averaging Phasemeter for Heterodyne Interferometry; Optoelectronic Instrument Monitors pH in a Culture Medium; Imaging of gamma-Irradiated Regions of a Crystal; Photodiode-Based, Passive Ultraviolet Dosimeters; Discrete Wavelength-Locked External Cavity Laser; Flexible Shields for Protecting Spacecraft Against Debris; Part 2 of a Computational Study of a Drop-Laden Mixing Layer; Controllable Curved Mirrors Made from Single-Layer EAP Films; and Demonstration of a Pyrotechnic Bolt-Retractor System.
Conceptual development of a transportable/deployable x-ray inspection system for cars and vans
NASA Astrophysics Data System (ADS)
Swift, Roderick D.
1997-02-01
The technology of transmission and backscatter imaging by flying-spot x-ray beams was extended to 450 kV beam energies with the installation of a prototype CargoSearchTM system at Otay Mesa, California in the summer of 1994. CargoSearchTM is a fixed-site system designed for the inspection of large over-the-road vehicles at border crossings. A self-contained, mobile implementation of the same technology has also been developed to scan objects ranging in size from a small car up to a full-scale tractor- trailer rig. MobileSearchTM is able to be moved over ordinary roadways to its intended operating site and set up easily by two or three people, but is currently limited to backscatter imaging only. It also lacks the ability to effectively image the vehicle's undercarriage, which is important for the detection of contraband concealed in the vehicle itself rather than its cargo. There is a need for a transportable, deployable scanning system that combines the self-contained mobility of MobileSearchTM and the combined transmission and backscatter imaging characteristics of CargoSearchTM, including its good geometry for backscatter imaging of the undercarriage of inspected vehicles. Concepts for two approaches that meet these needs are presented.
THz-wave parametric source and its imaging applications
NASA Astrophysics Data System (ADS)
Kawase, Kodo
2004-08-01
Widely tunable coherent terahertz (THz) wave generation has been demonstrated based on the parametric oscillation using MgO doped LiNbO3 crystal pumped by a Q-switched Nd:YAG laser. This method exhibits multiple advantages like wide tunability, coherency and compactness of its system. We have developed a novel basic technology for terahertz (THz) imaging, which allows detection and identification of chemicals by introducing the component spatial pattern analysis. The spatial distributions of the chemicals were obtained from terahertz multispectral transillumination images, using absorption spectra previously measured with a widely tunable THz-wave parametric oscillator. Further we have applied this technique to the detection and identification of illicit drugs concealed in envelopes. The samples we used were methamphetamine and MDMA, two of the most widely consumed illegal drugs in Japan, and aspirin as a reference.
Principles and status of neutron-based inspection technologies
NASA Astrophysics Data System (ADS)
Gozani, Tsahi
2011-06-01
Nuclear based explosive inspection techniques can detect a wide range of substances of importance for a wide range of objectives. For national and international security it is mainly the detection of nuclear materials, explosives and narcotic threats. For Customs Services it is also cargo characterization for shipment control and customs duties. For the military and other law enforcement agencies it could be the detection and/or validation of the presence of explosive mines, improvised explosive devices (IED) and unexploded ordnances (UXO). The inspection is generally based on the nuclear interactions of the neutrons (or high energy photons) with the various nuclides present and the detection of resultant characteristic emissions. These can be discrete gamma lines resulting from the thermal neutron capture process (n,γ) or inelastic neutron scattering (n,n'γ) occurring with fast neutrons. The two types of reactions are generally complementary. The capture process provides energetic and highly penetrating gamma rays in most inorganic substances and in hydrogen, while fast neutron inelastic scattering provides relatively strong gamma-ray signatures in light elements such as carbon and oxygen. In some specific important cases unique signatures are provided by the neutron capture process in light elements such as nitrogen, where unusually high-energy gamma ray is produced. This forms the basis for key explosive detection techniques. In some cases the elastically scattered source (of mono-energetic) neutrons may provide information on the atomic weight of the scattering elements. The detection of nuclear materials, both fissionable (e.g., 238U) and fissile (e.g., 235U), are generally based on the fissions induced by the probing neutrons (or photons) and detecting one or more of the unique signatures of the fission process. These include prompt and delayed neutrons and gamma rays. These signatures are not discrete in energy (typically they are continua) but temporally and energetically significantly different from the background, thus making them readily distinguishable. The penetrability of neutrons as probes and signatures as well as the gamma ray signatures make neutron interrogation applicable to the inspection of large conveyances such as cars, trucks, marine containers and also smaller objects like explosive mines concealed in the ground. The application of nuclear interrogation techniques greatly depends on operational requirements. For example explosive mines and IED detection clearly require one-sided inspection, which excludes transmission based inspection (e.g., transmission radiography) and greatly limits others. The technologies developed over the last decades are now being implemented with good results. Further advances have been made over the last several years that increase the sensitivity, applicability and robustness of these systems. The principle, applications and status of neutron-based inspection techniques will be reviewed.
Magnetic sensor technology for detecting mines, UXO, and other concealed security threats
NASA Astrophysics Data System (ADS)
Czipott, Peter V.; Iwanowski, Mark D.
1997-01-01
Magnetic sensors have been the sensor of choice in the detection and classification of buried mines and unexploded ordnance (UXO), both on land and underwater, Quantum Magnetics (QM), together with its research partner IBM, have developed a variety of advanced, very high sensitivity superconducting and room temperature magnetic sensors to meet military needs. This work has led to the development and utilization of a three-sensor gradiometer (TSG) patented by IBM, which cannot only detect, but also localize mines and ordnance. QM is also working with IBM and the U.S. Navy to develop an advanced superconducting gradiometer for buried underwater mine detection. The ability to both detect and classify buried non-metallic mines is virtually impossible with existing magnetic sensors. To solve this problem, Quantum Magnetics, building on work of the Naval Research Laboratory (NRL), is pioneering work in the development of quadrupole resonance (QR) methods which can be used to detect the explosive material directly. Based on recent laboratory work done at QM and previous work done in the U.S., Russia and the United Kingdom, we are confident that QR can be effectively applied to the non-metallic mine identification problem.
CART V: recent advancements in computer-aided camouflage assessment
NASA Astrophysics Data System (ADS)
Müller, Thomas; Müller, Markus
2011-05-01
In order to facilitate systematic, computer aided improvements of camouflage and concealment assessment methods, the software system CART (Camouflage Assessment in Real-Time) was built up for the camouflage assessment of objects in multispectral image sequences (see contributions to SPIE 2007-2010 [1], [2], [3], [4]). It comprises a semi-automatic marking of target objects (ground truth generation) including their propagation over the image sequence and the evaluation via user-defined feature extractors as well as methods to assess the object's movement conspicuity. In this fifth part in an annual series at the SPIE conference in Orlando, this paper presents the enhancements over the recent year and addresses the camouflage assessment of static and moving objects in multispectral image data that can show noise or image artefacts. The presented methods fathom the correlations between image processing and camouflage assessment. A novel algorithm is presented based on template matching to assess the structural inconspicuity of an object objectively and quantitatively. The results can easily be combined with an MTI (moving target indication) based movement conspicuity assessment function in order to explore the influence of object movement to a camouflage effect in different environments. As the results show, the presented methods contribute to a significant benefit in the field of camouflage assessment.
NASA Astrophysics Data System (ADS)
Clayton, James E.; Bjorkholm, Paul
2006-05-01
The Dual Energy X-ray technique employs two X-ray projection images of an object with X-ray energy spectra at a low X-ray energy and a high X-ray energy. The two energies are both high enough to penetrate all cargoes. The endpoint energies for low and high will be approximately 5-6 MeV and 8-9.5 MeV respectively. These energies are chosen such that pair production is the dominant energy loss mechanism for the high energy mode. By defining the ratio of the transmitted X-ray photon R = T high/T low it can be shown that there is a difference in the ratio that will permit the detection of materials that are significantly higher in atomic number than the low to mid atomic numbered elements that normally appear in the stream of commerce. This difference can be used to assist in the automatic detection of high atomic numbered materials. These materials might be a WMD or dirty bomb. When coupled with detectors that can observe the delayed signature of photon induced fission a confirmation of a WMD may be made. The use of the delayed photons and neutrons from Photofission can confirm the presence of Special Nuclear Materials (SNM). The energy required to induce fission in SNM by a photon is approximately 6 MeV with the maximum fission production rate from X-ray photons in the energy range of 12-15 MeV.
Near-field three-dimensional radar imaging techniques and applications.
Sheen, David; McMakin, Douglas; Hall, Thomas
2010-07-01
Three-dimensional radio frequency imaging techniques have been developed for a variety of near-field applications, including radar cross-section imaging, concealed weapon detection, ground penetrating radar imaging, through-barrier imaging, and nondestructive evaluation. These methods employ active radar transceivers that operate at various frequency ranges covering a wide range, from less than 100 MHz to in excess of 350 GHz, with the frequency range customized for each application. Computational wavefront reconstruction imaging techniques have been developed that optimize the resolution and illumination quality of the images. In this paper, rectilinear and cylindrical three-dimensional imaging techniques are described along with several application results.
Avramovic, Nemanja; Weckesser, Matthias; Velasco, Aglaé; Stenner, Markus; Noto, Benjamin
2017-02-01
A 60-year-old woman was referred to contrast-enhanced CT for evaluation of jugular vein thrombosis incidentally detected by ultrasound. Contrast-enhanced CT showed an enhanced tumor of the right skull base highly suspicious of jugulotympanic paraganglioma. However, the jugular veins showed a nearly symmetric contrast enhancement without clear evidence of thrombosis. Consecutive Ga-DOTATATE PET/CT depicted high tumor uptake, which comprised the entire internal jugular vein. Endovascular growth of paraganglioma might be missed on contrast-enhanced CT because of high vascularization of the lesion. Ga-DOTATATE PET is suited for accurate determination of tumor extent.
NASA Astrophysics Data System (ADS)
Watanabe, Yuuki; Kawase, Kodo; Ikari, Tomofumi; Ito, Hiromasa; Ishikawa, Youichi; Minamide, Hiroaki
2003-10-01
We separated the component spatial patterns of frequency-dependent absorption in chemicals and frequency-independent components such as plastic, paper, and measurement noise in terahertz (THz) spectroscopic images, using known spectral curves. Our measurement system, which uses a widely tunable coherent THz-wave parametric oscillator source, can image at a specific frequency in the range 1-2 THz. The component patterns of chemicals can easily be extracted by use of the frequency-independent components. This method could be successfully used for nondestructive inspection for the detection of illegal drugs and devices of bioterrorism concealed, e.g., inside mail and packages.
NASA Astrophysics Data System (ADS)
Waldman, Jerry; Danylov, Andriy A.; Goyette, Thomas M.; Coulombe, Michael J.; Giles, Robert H.; Gatesman, Andrew J.; Goodhue, William D.; Li, Jin; Linden, Kurt J.; Nixon, William E.
2009-02-01
Coherent terahertz radar systems, using CO2 laser-pumped molecular lasers have been used during the past decade for radar scale modeling applications, as well as proof-of-principle demonstrations of remote detection of concealed weapons. The presentation will consider the potential for replacement of molecular laser sources by quantum cascade lasers. While the temporal and spatial characteristics of current THz QCLs limit their applicability, rapid progress is being made in resolving these issues. Specifications for satisfying the requirements of coherent short-range THz radars will be reviewed and the feasibility of incorporating existing QCL devices into such systems will be described.
Medical makeup for concealing facial scars.
Mee, Donna; Wong, Brian J F
2012-10-01
Surgical, laser, and pharmacological therapies are all used to correct scars and surgical incisions, though have limits with respect to how well facial skin can be restored or enhanced. The use of cosmetics has long been a relevant adjunct to all scar treatment modalities. In recent years, technical advancements in the chemistry and composition of cosmetic products have provided the patient with a broader range of products to employ for concealing scars. This review will provide an overview of contemporary methods for concealing facial scars, birthmarks, and pigmentary changes without the use of traditional/dated, heavy appearing camouflage products. Additionally, general guidelines and information will be provided with respect to identifying competent makeup artists for care of the medical patient. The article by no means is meant to be a tutorial, but rather serves as a starting point in this allied field of medicine. Thieme Medical Publishers 333 Seventh Avenue, New York, NY 10001, USA.
Vavken, P; Culen, G; Dorotka, R
2008-01-01
The demand to routinely apply evidence-based methods in orthopedic surgery increases steadily. In order to do so, however, the validity and reliability of the "evidence" has to be scrutinized. The object of this study was to assess the quality of the most recent orthopedic evidence and to determine variables that have an influence on quality. All 2006 controlled trials from orthopedic journals with high impact factors were analysed in a cross-sectional study. A score based on the CONSORT statement was used to assess study quality. Selected variables were tested for their influence on the quality of the study. Two independent blinded observers reviewed 126 studies. The overall quality was moderate to high. The most neglected parameters were power analysis, intention-to-treat, and concealment. The participation of a methodologically trained investigator increases study quality significantly. There was no difference in study quality irrespective of whether or not there was statistically significant result. Using our quality score we were able show fairly good results for recent orthopedic studies. The most frequently neglected issues in orthopedic research are blinding, power analysis, and intention-to-treat. This may distort the results of clinical investigations considerably and, especially, lack of concealment causes false-positive findings. Our data show furthermore that participation of a methodologist significantly increases quality of the study and consequently strengthens the reliability of results.
Jung, Eun-hong; Jang, Seok-heun; Lee, Jae-won
2011-01-01
Purpose The aim of this study was to categorize concealed penis and buried penis by preoperative physical examination including the manual prepubic compression test and to describe a simple surgical technique to correct buried penis that was based on surgical experience and comprehension of the anatomical components. Materials and Methods From March 2007 to November 2010, 17 patients were diagnosed with buried penis after differentiation of this condition from concealed penis. The described surgical technique consisted of a minimal incision and simple fixation of the penile shaft skin and superficial fascia to the prepubic deep fascia, without degloving the penile skin. Results The mean age of the patients was 10.2 years, ranging from 8 years to 15 years. The median follow-up was 19 months (range, 5 to 49 months). The mean penile lengths were 1.8 cm (range, 1.1 to 2.5 cm) preoperatively and 4.5 cm (range, 3.3 to 5.8 cm) postoperatively. The median difference between preoperative and postoperative penile lengths was 2.7 cm (range, 2.1 to 3.9 cm). There were no serious intra- or postoperative complications. Conclusions With the simple anchoring of the penopubic skin to the prepubic deep fascia, we obtained successful subjective and objective outcomes without complications. We suggest that this is a promising surgical method for selected patients with buried penis. PMID:22195270
Detection of MAVs (Micro Aerial Vehicles) based on millimeter wave radar
NASA Astrophysics Data System (ADS)
Noetel, Denis; Johannes, Winfried; Caris, Michael; Hommes, Alexander; Stanko, Stephan
2016-10-01
In this paper we present two system approaches for perimeter surveillance with radar techniques focused on the detection of Micro Aerial Vehicles (MAVs). The main task of such radars is to detect movements of targets such as an individual or a vehicle approaching a facility. The systems typically cover a range of several hundred meters up to several kilometers. In particular, the capability of identifying Remotely Piloted Aircraft Systems (RPAS), which pose a growing threat on critical infrastructure areas, is of great importance nowadays. The low costs, the ease of handling and a considerable payload make them an excellent tool for unwanted surveillance or attacks. Most platforms can be equipped with all kind of sensors or, in the worst case, with destructive devices. A typical MAV is able to take off and land vertically, to hover, and in many cases to fly forward at high speed. Thus, it can reach all kinds of places in short time while the concealed operator of the MAV resides at a remote and riskless place.
NASA Astrophysics Data System (ADS)
Kuznetsov, Andrey; Evsenin, Alexey; Vakhtin, Dmitry; Gorshkov, Igor; Osetrov, Oleg; Kalinin, Valery
2006-05-01
Nanosecond Neutron Analysis / Associated Particles Technique (NNA/APT) has been used to create devices for detection of explosives, radioactive and heavily shielded nuclear materials in cargo containers. Explosives and other hazardous materials are detected by analyzing secondary high-energy gamma-rays form reactions of fast neutrons with the materials inside the container. Depending on the dimensions of the inspected containers, the detecting system consists of one or several detection modules, each of which contains a small neutron generator with built-in position sensitive detector of associated alpha-particles and several scintillator-based gamma-ray detectors. The same gamma-ray detectors are used to detect unshielded radioactive and nuclear materials. Array of several detectors of fast neutrons is used to detect neutrons from spontaneous and induced fission of nuclear materials. These neutrons can penetrate thick layers of lead shielding, which can be used to conceal gamma-radioactivity from nuclear materials. Coincidence and timing analysis allows one to discriminate between fission neutrons and scattered probing neutrons. Mathematical modeling by MCNP5 code was used to estimate the sensitivity of the device and its optimal configuration. Capability of the device to detect 1 kg of explosive imitator inside container filled with suitcases and other baggage items has been confirmed experimentally. First experiments with heavily shielded nuclear materials have been carried out.
The Verriest Lecture: Color lessons from space, time, and motion
Shevell, Steven K.
2012-01-01
The appearance of a chromatic stimulus depends on more than the wavelengths composing it. The scientific literature has countless examples showing that spatial and temporal features of light influence the colors we see. Studying chromatic stimuli that vary over space, time or direction of motion has a further benefit beyond predicting color appearance: the unveiling of otherwise concealed neural processes of color vision. Spatial or temporal stimulus variation uncovers multiple mechanisms of brightness and color perception at distinct levels of the visual pathway. Spatial variation in chromaticity and luminance can change perceived three-dimensional shape, an example of chromatic signals that affect a percept other than color. Chromatic objects in motion expose the surprisingly weak link between the chromaticity of objects and their physical direction of motion, and the role of color in inducing an illusory motion direction. Space, time and motion – color’s colleagues – reveal the richness of chromatic neural processing. PMID:22330398
Invisibility cloak with image projection capability
Banerjee, Debasish; Ji, Chengang; Iizuka, Hideo
2016-01-01
Investigations of invisibility cloaks have been led by rigorous theories and such cloak structures, in general, require extreme material parameters. Consequently, it is challenging to realize them, particularly in the full visible region. Due to the insensitivity of human eyes to the polarization and phase of light, cloaking a large object in the full visible region has been recently realized by a simplified theory. Here, we experimentally demonstrate a device concept where a large object can be concealed in a cloak structure and at the same time any images can be projected through it by utilizing a distinctively different approach; the cloaking via one polarization and the image projection via the other orthogonal polarization. Our device structure consists of commercially available optical components such as polarizers and mirrors, and therefore, provides a significant further step towards practical application scenarios such as transparent devices and see-through displays. PMID:27958334
Invisibility Cloak Printed on a Photonic Chip
Feng, Zhen; Wu, Bing-Hong; Zhao, Yu-Xi; Gao, Jun; Qiao, Lu-Feng; Yang, Ai-Lin; Lin, Xiao-Feng; Jin, Xian-Min
2016-01-01
Invisibility cloak capable of hiding an object can be achieved by properly manipulating electromagnetic field. Such a remarkable ability has been shown in transformation and ray optics. Alternatively, it may be realistic to create a spatial cloak by means of confining electromagnetic field in three-dimensional arrayed waveguides and introducing appropriate collective curvature surrounding an object. We realize the artificial structure in borosilicate by femtosecond laser direct writing, where we prototype up to 5,000 waveguides to conceal millimeter-scale volume. We characterize the performance of the cloak by normalized cross correlation, tomography analysis and continuous three-dimensional viewing angle scan. Our results show invisibility cloak can be achieved in waveguide optics. Furthermore, directly printed invisibility cloak on a photonic chip may enable controllable study and novel applications in classical and quantum integrated photonics, such as invisualising a coupling or swapping operation with on-chip circuits of their own. PMID:27329510
Invisibility cloak with image projection capability
NASA Astrophysics Data System (ADS)
Banerjee, Debasish; Ji, Chengang; Iizuka, Hideo
2016-12-01
Investigations of invisibility cloaks have been led by rigorous theories and such cloak structures, in general, require extreme material parameters. Consequently, it is challenging to realize them, particularly in the full visible region. Due to the insensitivity of human eyes to the polarization and phase of light, cloaking a large object in the full visible region has been recently realized by a simplified theory. Here, we experimentally demonstrate a device concept where a large object can be concealed in a cloak structure and at the same time any images can be projected through it by utilizing a distinctively different approach; the cloaking via one polarization and the image projection via the other orthogonal polarization. Our device structure consists of commercially available optical components such as polarizers and mirrors, and therefore, provides a significant further step towards practical application scenarios such as transparent devices and see-through displays.
Invisibility Cloak Printed on a Photonic Chip
NASA Astrophysics Data System (ADS)
Feng, Zhen; Wu, Bing-Hong; Zhao, Yu-Xi; Gao, Jun; Qiao, Lu-Feng; Yang, Ai-Lin; Lin, Xiao-Feng; Jin, Xian-Min
2016-06-01
Invisibility cloak capable of hiding an object can be achieved by properly manipulating electromagnetic field. Such a remarkable ability has been shown in transformation and ray optics. Alternatively, it may be realistic to create a spatial cloak by means of confining electromagnetic field in three-dimensional arrayed waveguides and introducing appropriate collective curvature surrounding an object. We realize the artificial structure in borosilicate by femtosecond laser direct writing, where we prototype up to 5,000 waveguides to conceal millimeter-scale volume. We characterize the performance of the cloak by normalized cross correlation, tomography analysis and continuous three-dimensional viewing angle scan. Our results show invisibility cloak can be achieved in waveguide optics. Furthermore, directly printed invisibility cloak on a photonic chip may enable controllable study and novel applications in classical and quantum integrated photonics, such as invisualising a coupling or swapping operation with on-chip circuits of their own.
Invisibility cloak with image projection capability.
Banerjee, Debasish; Ji, Chengang; Iizuka, Hideo
2016-12-13
Investigations of invisibility cloaks have been led by rigorous theories and such cloak structures, in general, require extreme material parameters. Consequently, it is challenging to realize them, particularly in the full visible region. Due to the insensitivity of human eyes to the polarization and phase of light, cloaking a large object in the full visible region has been recently realized by a simplified theory. Here, we experimentally demonstrate a device concept where a large object can be concealed in a cloak structure and at the same time any images can be projected through it by utilizing a distinctively different approach; the cloaking via one polarization and the image projection via the other orthogonal polarization. Our device structure consists of commercially available optical components such as polarizers and mirrors, and therefore, provides a significant further step towards practical application scenarios such as transparent devices and see-through displays.
Clothing adjustments for concealed soft body armor during moderate physical exertion.
Ryan, Greg A; Bishop, Stacy H; Herron, Robert L; Katica, Charles P; Elbon, Bre'anna L; Bosak, Andrew M; Bishop, Phillip
2015-01-01
Previous research has studied the impact of Level II concealed soft body armor (SBA) on the augmentation of heat storage in a hot environment simulating a typical summer day in the southeastern United States (wet bulb globe temperature [WBGT] = 30°C) and noted a significant difference between macro- and micro-WBGTs. The purpose of this study was to characterize the microclimate (micro-WBGT) under a concealed Level II SBA during 60 min of moderately intense work at two separate macro-WBGTs (26°C and 30°C), and to establish WBGT corrections to allow prediction of heat strain in an individual wearing a concealed Level II SBA. A single trial was performed with nine volunteers (27 ± 4 years) outfitted with a simulated standard law enforcement uniform and a traditional concealed Level II SBA, in a moderately warm environment (WBGT = 26°C). Each participant performed cycles of 12 min of walking (1.25 L · min(-1)) and 3 min of arm curls (14.3 kg, 0.6 L · min(-1)) with a 5 min rest after every other cycle, for a total of 60 minutes. This trial was compared to an identical previously completed 60-min work bout at 30°C. A two-way repeated measures ANOVA with Post hoc Bonferroni and paired samples t-test analysis was conducted. A greater difference between macro- micro-WBGTs existed at 26°C compared to the 30°C macro-WBGT. Under these conditions, a moderate work in Level II SBA requires a WBGT correction of 8.9°C and 6.2°C at macro-WBGTs of 26°C and 30°C, respectively. A modified simple linear regression prediction model was established for mean Micro-WBGT for each macro-WBGTs after the plateau point at the 30 min mark. The derivation regressions at 26°C (R(2) = 0.99), and 30°C (R(2) = 0.99) indicate that micro-WBGT could be predicted for each 15 minutes time at both macro-WBGTs tested for individuals doing moderate intensity (300 Kcals · hr(-1)) work wearing concealed Level II SBA.
2016-06-01
media sources on the public discourse. This research compares and contrasts the roles and importance of traditional and social media in the public...alternative media , social media 15. NUMBER OF PAGES 73 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY...importance of traditional and social media in the public sphere today, as evidenced by the coverage of concealed-carry laws and related stories. The
Kinoshita, Shinji; Katoh, Takakazu; Yoshida, Hiroshi
2010-05-01
In 1974, Kinoshita reported a case of 'irregular parasystole' due to type I second-degree entrance block. Since then, many cases of such 'irregular' parasystole have been reported by us. To explain the mechanism of 'irregular' parasystole, two theories have been suggested, namely, 'electrotonic modulation' by Jalife and Moe, and 'type I second-degree entrance block' by us. On the contrary, in 1960, Kinoshita et al. reported a case of concealed bigeminy for the first time. The electrocardiographic findings in concealed bigeminy have suggested that there are dual re-entrant pathways with markedly long effective refractory periods in the re-entrant pathway. We have suggested that parasystole may be caused by re-entry in such re-entrant pathways. In this article, attempts are made to explain the mechanism of all the electrocardiographic findings in our cases of parasystole by 'parasystole due to re-entry'. Using 24 studies on parasystole and 21 studies on concealed extrasystoles that we have reported over 50 years, as well as three exemplary cases in this article, attempts are made to explain all electrocardiographic findings in parasystole by 'parasystole due to re-entry'. The electrocardiographic findings in our previous clinical cases of parasystole and concealed extrasystoles, as well as exemplary cases and diagrams in the present article, strongly suggest 'parasystole due to re-entry' as the mechanism of ventricular parasystole with second-degree entrance block.
[Concealed penis and its surgical correction: a report of 63 cases].
Cheng, Fan; Zhang, Xiaobin; Liu, Xiuheng; Zhou, Jiangqiao; Xia, Yue; Ge, Minghuan
2004-02-01
To evaluate the basic principles of surgical correction of concealed penis. From Jan. 1999 to Dec. 2002, 63 cases of concealed penis, aged from 1 year and 6 months to 19 years with a mean age of 7 years and 2 months, were corrected with two different approaches: 37 cases of group A with obesity were corrected by anchoring micrus tissue onto the pubis at the base of the penis, and 26 cases of group B by fixing the subcutateous tissues at both sides of the penile shaft to the deep tunica albuginea at the penile root. Then prepuce plasty was carried out. Six-month postoperative follow-up found adequate exposure of the penis in all of group A, prepuce oedema in 7 cases, abdomen fat liquidization in 3 cases, unsatisfactory recovery of incision hollow in 3 cases and patchy numbness of the glans in 1 case. The 25 cases of group B had satisfactory exposure of the penis, with no obvious prepuce oedema, 1 case with retraction of the penis 7 days after operation. Various surgical procedures could be adopted for concealed penis, and the key to the satisfactory appearance is the restoration of penile tunicae and the fixation at the base of the penis. Further study is needed to determine the natural history of these disorders as well as which conditions and what age will benefit most from surgical intervention.
Micro-topography mediates interactions between corals, algae, and herbivorous fishes on coral reefs
NASA Astrophysics Data System (ADS)
Brandl, S. J.; Hoey, A. S.; Bellwood, D. R.
2014-06-01
Processes occurring during the early life stages of corals are important for the replenishment of coral assemblages and the resilience of coral reefs. However, the factors influencing early life stages of corals are not well understood, and the role of micro-topographic complexity for habitat associations of juvenile corals is largely unexplored. This study investigated the microhabitat distribution patterns of early life stages of corals and a potential macroalgal competitor ( Turbinaria ornata) across two reef zones (reef crest and outer reef flat) on Lizard Island, Great Barrier Reef. In both reef zones, both corals and T. ornata were significantly more abundant in concealed microhabitats than in semi-concealed or open microhabitats (GLMM: P < 0.001). The prevalence of juvenile corals and T. ornata within concealed environments suggests that they might be effective refuges from grazing by herbivorous fishes. The density of juvenile corals was positively related, and density of T. ornata negatively related to the abundance of two groups of herbivorous fishes, pairing rabbitfishes, and surgeonfishes in the genus Zebrasoma (BEST ENV-BIO: r s = 0.72, P < 0.01), which feed in concealed microhabitats. This correlative evidence suggests that crevices may be important for early life stages of both coral and macroalgae, and that a specific suite of crevice-feeding fishes may influence benthic community dynamics in these microhabitats.
Kawai, Nobuyuki; He, Hongshen
2016-01-01
Humans and non-human primates are extremely sensitive to snakes as exemplified by their ability to detect pictures of snakes more quickly than those of other animals. These findings are consistent with the Snake Detection Theory, which hypothesizes that as predators, snakes were a major source of evolutionary selection that favored expansion of the visual system of primates for rapid snake detection. Many snakes use camouflage to conceal themselves from both prey and their own predators, making it very challenging to detect them. If snakes have acted as a selective pressure on primate visual systems, they should be more easily detected than other animals under difficult visual conditions. Here we tested whether humans discerned images of snakes more accurately than those of non-threatening animals (e.g., birds, cats, or fish) under conditions of less perceptual information by presenting a series of degraded images with the Random Image Structure Evolution technique (interpolation of random noise). We find that participants recognize mosaic images of snakes, which were regarded as functionally equivalent to camouflage, more accurately than those of other animals under dissolved conditions. The present study supports the Snake Detection Theory by showing that humans have a visual system that accurately recognizes snakes under less discernible visual conditions.
He, Hongshen
2016-01-01
Humans and non-human primates are extremely sensitive to snakes as exemplified by their ability to detect pictures of snakes more quickly than those of other animals. These findings are consistent with the Snake Detection Theory, which hypothesizes that as predators, snakes were a major source of evolutionary selection that favored expansion of the visual system of primates for rapid snake detection. Many snakes use camouflage to conceal themselves from both prey and their own predators, making it very challenging to detect them. If snakes have acted as a selective pressure on primate visual systems, they should be more easily detected than other animals under difficult visual conditions. Here we tested whether humans discerned images of snakes more accurately than those of non-threatening animals (e.g., birds, cats, or fish) under conditions of less perceptual information by presenting a series of degraded images with the Random Image Structure Evolution technique (interpolation of random noise). We find that participants recognize mosaic images of snakes, which were regarded as functionally equivalent to camouflage, more accurately than those of other animals under dissolved conditions. The present study supports the Snake Detection Theory by showing that humans have a visual system that accurately recognizes snakes under less discernible visual conditions. PMID:27783686
Autonomous mine detection system (AMDS) neutralization payload module
NASA Astrophysics Data System (ADS)
Majerus, M.; Vanaman, R.; Wright, N.
2010-04-01
The Autonomous Mine Detection System (AMDS) program is developing a landmine and explosive hazards standoff detection, marking, and neutralization system for dismounted soldiers. The AMDS Capabilities Development Document (CDD) has identified the requirement to deploy three payload modules for small robotic platforms: mine detection and marking, explosives detection and marking, and neutralization. This paper addresses the neutralization payload module. There are a number of challenges that must be overcome for the neutralization payload module to be successfully integrated into AMDS. The neutralizer must meet stringent size, weight, and power (SWaP) requirements to be compatible with a small robot. The neutralizer must be effective against a broad threat, to include metal and plastic-cased Anti-Personnel (AP) and Anti-Tank (AT) landmines, explosive devices, and Unexploded Explosive Ordnance (UXO.) It must adapt to a variety of threat concealments, overburdens, and emplacement methods, to include soil, gravel, asphalt, and concrete. A unique neutralization technology is being investigated for adaptation to the AMDS Neutralization Module. This paper will describe review this technology and how the other two payload modules influence its design for minimizing SWaP. Recent modeling and experimental efforts will be included.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Candy, J V; Chambers, D H; Breitfeller, E F
2010-03-02
The detection of radioactive contraband is a critical problem is maintaining national security for any country. Photon emissions from threat materials challenge both detection and measurement technologies especially when concealed by various types of shielding complicating the transport physics significantly. This problem becomes especially important when ships are intercepted by U.S. Coast Guard harbor patrols searching for contraband. The development of a sequential model-based processor that captures both the underlying transport physics of gamma-ray emissions including Compton scattering and the measurement of photon energies offers a physics-based approach to attack this challenging problem. The inclusion of a basic radionuclide representationmore » of absorbed/scattered photons at a given energy along with interarrival times is used to extract the physics information available from the noisy measurements portable radiation detection systems used to interdict contraband. It is shown that this physics representation can incorporated scattering physics leading to an 'extended' model-based structure that can be used to develop an effective sequential detection technique. The resulting model-based processor is shown to perform quite well based on data obtained from a controlled experiment.« less
High-resolution three-dimensional imaging radar
NASA Technical Reports Server (NTRS)
Cooper, Ken B. (Inventor); Chattopadhyay, Goutam (Inventor); Siegel, Peter H. (Inventor); Dengler, Robert J. (Inventor); Schlecht, Erich T. (Inventor); Mehdi, Imran (Inventor); Skalare, Anders J. (Inventor)
2010-01-01
A three-dimensional imaging radar operating at high frequency e.g., 670 GHz, is disclosed. The active target illumination inherent in radar solves the problem of low signal power and narrow-band detection by using submillimeter heterodyne mixer receivers. A submillimeter imaging radar may use low phase-noise synthesizers and a fast chirper to generate a frequency-modulated continuous-wave (FMCW) waveform. Three-dimensional images are generated through range information derived for each pixel scanned over a target. A peak finding algorithm may be used in processing for each pixel to differentiate material layers of the target. Improved focusing is achieved through a compensation signal sampled from a point source calibration target and applied to received signals from active targets prior to FFT-based range compression to extract and display high-resolution target images. Such an imaging radar has particular application in detecting concealed weapons or contraband.
THz-wave parametric sources and imaging applications
NASA Astrophysics Data System (ADS)
Kawase, Kodo
2004-12-01
We have studied the generation of terahertz (THz) waves by optical parametric processes based on laser light scattering from the polariton mode of nonlinear crystals. Using parametric oscillation of MgO-doped LiNbO3 crystal pumped by a nano-second Q-switched Nd:YAG laser, we have realized a widely tunable coherent THz-wave sources with a simple configuration. We have also developed a novel basic technology for THz imaging, which allows detection and identification of chemicals by introducing the component spatial pattern analysis. The spatial distributions of the chemicals were obtained from terahertz multispectral trasillumination images, using absorption spectra previously measured with a widely tunable THz-wave parametric oscillator. Further we have applied this technique to the detection and identification of illicit drugs concealed in envelopes. The samples we used were methamphetamine and MDMA, two of the most widely consumed illegal drugs in Japan, and aspirin as a reference.
Terahertz technology for imaging and spectroscopy
NASA Astrophysics Data System (ADS)
Crowe, T. W.; Porterfield, D. W.; Hesler, J. L.; Bishop, W. L.; Kurtz, D. S.; Hui, K.
2006-05-01
The terahertz region of the electromagnetic spectrum has unique properties that make it especially useful for imaging and spectroscopic detection of concealed weapons, explosives and chemical and biological materials. However, terahertz energy is difficult to generate and detect, and this has led to a technology gap in this frequency band. Nonlinear diodes can be used to bridge this gap by translating the functionality achieved at microwave frequencies to the terahertz band. Basic building blocks include low-noise mixers, frequency multipliers, sideband generators and direct detectors. These terahertz components rely on planar Schottky diodes and recently developed integrated diode circuits make them easier to assemble and more robust. The new generation of terahertz sources and receivers requires no mechanical tuning, yet achieves high efficiency and broad bandwidth. This paper reviews the basic design of terahertz transmitters and receivers, with special emphasis on the recent development of systems that are compact, easy to use and have excellent performance.
Psychometric Evaluation of the Pain Attitudes Questionnaire-Revised for People With Advanced Cancer.
Mah, Kenneth; Tran, Kim T; Gauthier, Lynn R; Rodin, Gary; Zimmermann, Camilla; Warr, David; Librach, S Lawrence; Moore, Malcolm; Shepherd, Frances A; Gagliese, Lucia
2017-07-01
Pain-related stoicism and cautiousness are theorized to be more prevalent in older than younger patients and to lead to greater pain under-reporting and consequently inadequate pain management in older patients. The Pain Attitudes Questionnaire-Revised (PAQ-R), which measures 5 pain-related stoicism (fortitude, concealment, superiority) and cautiousness (self-doubt, reluctance) factors in chronic pain, can help test this hypothesis in advanced cancer but requires validation. We conducted a psychometric evaluation of the PAQ-R in 155 younger (younger than 60 years) and 114 older (aged 60 years and older) patients with advanced cancer. Participants showed disagreement with self-doubt items and floor effects with the subscale. Confirmatory factor analyses revealed good fit of the PAQ-R's 5 factors to younger and older groups' data but collinearity between fortitude and concealment. Multisample confirmatory factor analyses supported partial scalar invariance between age groups. Few hypothesized age-related differences were observed. Younger patients reported higher superiority scores than older patients. Whereas older patients showed greater fortitude and superiority with lower average pain intensity, younger patients showed greater concealment or fortitude with greater worst and average pain intensity. Furthermore, whereas older patients displayed greater superiority with lower interference in relations with others, younger patients displayed greater concealment and superiority with greater interference in walking ability and greater concealment and self-doubt with more interference in relations with others. Cross-validation of the PAQ-R's factor structure and identification of pathways to the factors and effect on pain-related outcomes using multivariate approaches are warranted. This article presents the psychometric properties of a measure of 2 particular pain-related attitudes. The measure can help clarify whether these attitudes adversely influence pain reporting in older patients with advanced cancer as hypothesized and, in turn, explain the inadequate pain management frequently reported with this clinical group. Copyright © 2017 American Pain Society. Published by Elsevier Inc. All rights reserved.
Is anterior N2 enhancement a reliable electrophysiological index of concealed information?
Ganis, Giorgio; Bridges, David; Hsu, Chun-Wei; Schendan, Haline E
2016-12-01
Concealed information tests (CITs) are used to determine whether an individual possesses information about an item of interest. Event-related potential (ERP) measures in CITs have focused almost exclusively on the P3b component, showing that this component is larger when lying about the item of interest (probe) than telling the truth about control items (irrelevants). Recent studies have begun to examine other ERP components, such as the anterior N2, with mixed results. A seminal CIT study found that visual probes elicit a larger anterior N2 than irrelevants (Gamer and Berti, 2010) and suggested that this component indexes cognitive control processes engaged when lying about probes. However, this study did not control for potential intrinsic differences among the stimuli: the same probe and irrelevants were used for all participants, and there was no control condition composed of uninformed participants. Here, first we show that the N2 effect found in the study by Gamer and Berti (2010) was in large part due to stimulus differences, as the effect observed in a concealed information condition was comparable to that found in two matched control conditions without any concealed information (Experiments 1 and 2). Next, we addressed the issue of the generality of the N2 findings by counterbalancing a new set of stimuli across participants and by using a control condition with uninformed participants (Experiment 3). Results show that the probe did not elicit a larger anterior N2 than the irrelevants under these controlled conditions. These findings suggest that caution should be taken in using the N2 as an index of concealed information in CITs. Furthermore, they are a reminder that results of CIT studies (not only with ERPs) performed without stimulus counterbalancing and suitable control conditions may be confounded by differential intrinsic properties of the stimuli employed. Copyright © 2016 Elsevier Inc. All rights reserved.
2013-01-01
Background There is little or no information available on the impact of funding by the food industry on trial outcomes and methodological quality of synbiotics, probiotics and prebiotics research in infants. The objective of this study was to compare the methodological quality, outcomes of food industry sponsored trials versus non industry sponsored trials, with regards to supplementation of synbiotics, probiotics and prebiotics in infant formula. Methods A comprehensive search was conducted to identify published and unpublished randomized clinical trials (RCTs). Cochrane methodology was used to assess the risk of bias of included RCTs in the following domains: 1) sequence generation; 2) allocation concealment; 3) blinding; 4) incomplete outcome data; 5) selective outcome reporting; and 6) other bias. Clinical outcomes and authors’ conclusions were reported in frequencies and percentages. The association between source of funding, risk of bias, clinical outcomes and conclusions were assessed using Pearson’s Chi-square test and the Fisher’s exact test. A p-value < 0.05 was statistically significant. Results Sixty seven completed and 3 on-going RCTs were included. Forty (59.7%) were funded by food industry, 11 (16.4%) by non-industry entities and 16 (23.9%) did not specify source of funding. Several risk of bias domains, especially sequence generation, allocation concealment and blinding, were not adequately reported. There was no significant association between the source of funding and sequence generation, allocation concealment, blinding and selective reporting, majority of reported clinical outcomes or authors’ conclusions. On the other hand, source of funding was significantly associated with the domains of incomplete outcome data, free of other bias domains as well as reported antibiotic use and conclusions on weight gain. Conclusion In RCTs on infants fed infant formula containing probiotics, prebiotics or synbiotics, the source of funding did not influence the majority of outcomes in favour of the sponsors’ products. More non-industry funded research is needed to further assess the impact of funding on methodological quality, reported clinical outcomes and authors’ conclusions. PMID:24219082
High resolution, wide field of view, real time 340GHz 3D imaging radar for security screening
NASA Astrophysics Data System (ADS)
Robertson, Duncan A.; Macfarlane, David G.; Hunter, Robert I.; Cassidy, Scott L.; Llombart, Nuria; Gandini, Erio; Bryllert, Tomas; Ferndahl, Mattias; Lindström, Hannu; Tenhunen, Jussi; Vasama, Hannu; Huopana, Jouni; Selkälä, Timo; Vuotikka, Antti-Jussi
2017-05-01
The EU FP7 project CONSORTIS (Concealed Object Stand-Off Real-Time Imaging for Security) is developing a demonstrator system for next generation airport security screening which will combine passive and active submillimeter wave imaging sensors. We report on the development of the 340 GHz 3D imaging radar which achieves high volumetric resolution over a wide field of view with high dynamic range and a high frame rate. A sparse array of 16 radar transceivers is coupled with high speed mechanical beam scanning to achieve a field of view of 1 x 1 x 1 m3 and a 10 Hz frame rate.
Bultman, Mark W.
2002-01-01
This report tests the usefulness of airborne time-domain electromagnetic (TEM) data on three mineral-resource-related issues: (1) to test whether known mineral deposits at or near the surface display any signal in the TEM data; 2) determine whether TEM data can be used to locate bedrock concealed by basin fill; and (3) if the exposed mineral deposits display a signal in the TEM data, to determine if whether deposits are recognizable at depth in outcropping bedrock or in bedrock concealed beneath basin fill. Because Earth's total-intensity magnetic field data are also acquired with the TEM data, these data are included in the analysis. The Cottonwood Canyon area in Santa Cruz County, Arizona, contains several polymetallic vein deposits, including those of the Tyndall, Salero, and Wrightson mining districts, all of which have had significant mineral production. Polymetallic vein deposits, which generally consist of veins of disseminated metallic minerals, commonly exhibit a response to electrical geophysical methods. Also, on the basis of other studies, the conditions that produced the polymetallic vein mineralization in the region are believed to extend offshore into the bedrock concealed by basin fill. The polymetallic vein deposits of the Cottonwood Canyon area all display a geophysical signature in the TEM data. These deposits occur in bedrock that has, in general, a very low resistivity. The polymetallic vein deposits are associated with high-conductivity regions that extend from deep in the bedrock to the surface. These high-conductivity regions can be quite narrow (100 m) or quite wide (1 km); most are relatively narrow. Every known mineral deposit or prospect is associated with a high-conductivity feature. High-conductivity regions can also occur without an association with known mineral deposits. Airborne TEM data appear to be able to locate the basin fill/bedrock contact beneath basin fill. The basin fill (both dry and saturated) is generally more conductive than the bedrock. The low conductivity of the bedrock ensures that no signal from the bedrock is received from under the basin fill in most places. Therefore, in most areas of basin fill, the bedrock is interpreted to be the bottom of the signal in the conductivity-depth transforms (CDTs). Although the CDTs locate the basin-fill/bedrock contact, on the basis of a comparison with a recent report, they mostly overstate its depth by a factor of at least 2. Because CDTs based on airborne TEM data do not see into bedrock below basin fill, it is impossible to detect mineralization in the bedrock concealed by such fill. Although the geophysical signature of polymetallic vein deposits is seen at depth in outcropping bedrock, the existence of this geophysical signal does not guarantee the occurrence of polymetallic vein deposits.
Feasibility of culvert IED detection using thermal neutron activation
NASA Astrophysics Data System (ADS)
Faust, Anthony A.; McFee, John E.; Clifford, Edward T. H.; Andrews, Hugh Robert; Mosquera, Cristian; Roberts, William C.
2012-06-01
Bulk explosives hidden in culverts pose a serious threat to the Canadian and allied armies. Culverts provide an opportunity to conceal insurgent activity, avoid the need for detectable surface disturbances, and limit the applicability of conventional sub-surface sensing techniques. Further, in spite of the large masses of explosives that can be employed, the large sensor{target separation makes detection of the bulk explosive content challeng- ing. Defence R&D Canada { Sueld and Bubble Technology Industries have been developing thermal neutron activation (TNA) sensors for detection of buried bulk explosives for over 15 years. The next generation TNA sensor, known as TNA2, incorporates a number of improvements that allow for increased sensor-to-target dis- tances, making it potentially feasible to detect large improvised explosive devices (IEDs) in culverts using TNA. Experiments to determine the ability of TNA2 to detect improvised explosive devices in culverts are described, and the resulting signal levels observed for relevant quantities of explosives are presented. Observations conrm that bulk explosives detection using TNA against a culvert-IED is possible, with large charges posing a detection challenge at least as dicult as that of a deeply buried anti-tank landmine. Because of the prototype nature of the TNA sensor used, it is not yet possible to make denitive statements about the absolute sensitivity or detection time. Further investigation is warranted.
Saklofske, Donald H; Austin, Elizabeth J; Yan, Gonggu; Smith, Martin M
2016-02-01
The English-language version of the Managing the Emotions of Others (MEOS) scale has been found to have a six-factor structure. This includes two pairs (Enhance, Divert and Worsen, Inauthentic) that respectively describe prosocial and non-prosocial interpersonal emotion management, together with an emotional concealment factor (Conceal) and a factor assessing poor self-rated emotional skills. A Mandarin translation of the MEOS was completed by 277 Chinese student participants. Factor analysis indicated a four-factor structure comprising a merged Enhance/Divert factor, together with Worsen, Inauthentic and Conceal factors. The emergence of a different factor structure compared to Western samples may be related to culture-dependent attitudes to emotional expression. The associations of the MEOS factors with Five-Factor model personality, the Dark Triad and trait emotional intelligence (EI) were examined; these were similar to but generally weaker than those found for the English-language version. © 2015 International Union of Psychological Science.
Body packing and intra-vaginal body pushing of cocaine: A case report.
Wankhade, Vishwajit Kishor; Chikhalkar, B G
2018-03-01
Drug trafficking is an international problem. The prevalence of drug trafficking and newer concealing methods has been ever increasing. Body packing is described as using the abdominal or pelvic cavity for concealing illegal drugs. Body pushers smuggle illicit drugs by inserting them into rectum or vagina. These cases are either presented to the emergency departments as Body Packer Syndrome or as asymptomatic cases for observation, detained for alleged possession of contraband substances. We report a unique case of an asymptomatic white female who was detained at Mumbai International Airport under suspicion and brought to hospital for observation. X ray and CT scan examination revealed 7 wrapped packets in gastrointestinal track and 1 large packet in vagina. A case of female body packer using multiple modalities of concealment especially in vagina is rare in India so it is becomes imperative to present this case in the light of body packing and body pushing of contraband substances. Copyright © 2017 Elsevier B.V. All rights reserved.
NASA Astrophysics Data System (ADS)
Bates, Tiffany R.; Mc Leod, Roger D.; Mc Leod, David M.
2003-10-01
The Pequakets Molocket (adherent of God La[ngued]oc Christ Cathar Spirit-signal) and Metallak operated in NH and the western border area of ME, during the early 1800s. Molocket requested shelter in South Paris, ME during a powerful thunderstorm. Denied access, she cursed that area. Our interests have led us to recognize that there may be psychological reasons that deception is good strategic procedure for concealing valuable activities associated with impact power groups striving to protect their operating turf. Many sites associated with tradition-respecting Native Americans are quite electromagnetically responsive to climate change. Metallak (mathematician-applied astronomer God Spirit-signal) is purported to have driven off his son over purloined furs; that elder son then operated among the MiKmaw/Micmacs of ME and the Canadian Maritimes. They are purported to make the weather. Information protection and surreptitious data collection may indicate an impact groups concealed interests.
Minority Stress and Same-Sex Relationship Satisfaction: The Role of Concealment Motivation.
Pepping, Christopher A; Cronin, Timothy J; Halford, W Kim; Lyons, Anthony
2018-04-30
Most lesbian, gay, and bisexual (LGB) people want a stable, satisfying romantic relationship. Although many of the predictors of relationship outcomes are similar to those of heterosexual couples, same-sex couples face some additional challenges associated with minority stress that also impact upon relationship quality. Here, we investigate the association between minority stressors and relationship quality in a sample of 363 adults (M age = 30.37, SD = 10.78) currently in a same-sex romantic relationship. Internalized homophobia and difficulties accepting one's LGB identity were each negatively associated with relationship satisfaction via heightened concealment motivation. We also examined the protective role of identity affirmation on relationship quality, finding a direct positive relationship between the two variables. Minority stressors were negatively associated with couple relationship satisfaction via heightened concealment motivation. The finding that identity affirmation directly predicted increased couple satisfaction also highlights the important role of protective factors in same-sex couple relationships. © 2018 Family Process Institute.
Sampson, Jay A.; Rodriguez, Brian D.
2011-01-01
The Revett-type deposits at Rock Creek are part of the concealed stratabound copper-silver deposits located in the Cabinet Mountains Wilderness of Montana. The U.S. Geological Survey is conducting a series of multidisciplinary studies as part of the Assessment Techniques for Concealed Mineral Resources project. Geologic, geochemical, geophysical, and mineral resources data are being evaluated with existing and new mineral deposit models to predict the possibility and probability of undiscovered deposits in covered terranes. To help characterize the size, resistivity, and depth of the mineral deposit concealed beneath thick overburden, a regional southwest-northeast audiomagnetotelluric sounding profile was acquired. Further studies will attempt to determine if induced polarization parameters can be extracted from the magnetotelluric data to determine the size of the mineralized area. The purpose of this report is to release the audiomagnetotelluric sounding data collected along that southwest-northeast profile. No interpretation of the data is included.
[Day surgery in breast reconstructive surgery: our experience].
Fierro, N; D'Ermo, G; Barbetti, E; Mazza, E; Gallinaro, L S; Amanti, C; De Biasio, G; Galassi, G; Galassi, G
2004-10-01
Breast cancer is the most common tumour in Italy in the female population, counting for about 40000 new cases every year. The psychological aspects of breast mutilation and the social and economic implications are receiving increasing attention. Despite of the diffusion of screening programs to detect pre-clinical breast cancers, 30% of patients still undergo radical interventions. Therefore, many women present serious limitations of their social-life that can lead to severe depression since, in occidental countries, the biological function of the breast is less considered than its primary role of femininity and sexuality. The gold-standard is to conceal oncological radicality and aesthetic preservation. The Authors present their experience analysing the techniques employed.
Lin, Junshan; Li, Dumiao; Zhang, Jianxing; Wu, Qiang; Xu, Yali; Lin, Li
2015-09-01
To investigate effectiveness of advanced skin flap and V-shaped ventral incision along the root of penile shaft for concealed penis in children. Between July 2007 and January 2015, 121 boys with concealed penis were treated with advanced skin flap and V-shaped ventral incision along the root of penile shaft. The age varied from 18 months to 13 years (mean, 7.2 years). Repair was based on a vertical incision in median raphe, complete degloving of penis and tacking its base to the dermis of the skin. Advanced skin flap and a V-shaped ventral incision along the root of penile shaft were used to cover the penile shaft. The operation time ranged from 60 to 100 minutes (mean, 75 minutes). Disruption of wound occurred in 1 case, and was cured after dressing change; and primary healing of incision was obtained in the others. The follow-up period ranged from 3 months to 7 years (median, 24 months). All patients achieved good to excellent cosmetic results with a low incidence of complications. The results were satisfactory in exposure of penis and prepuce appearance. No obvious scar was observed. The penis had similar appearance to that after prepuce circumcision. A combination of advanced skin flap and V-shaped ventral incision along the root of penile shaft is a simple, safe, and effective procedure for concealed penis with a similar appearance result to the prepuce circumcision.
Concealed Accessory Pathways with a Single Ventricular and Two Discrete Atrial Insertion Sites.
Kipp, Ryan T; Abu Sham'a, Raed; Hiroyuki, Ito; Han, Frederick T; Refaat, Marwan; Hsu, Jonathan C; Field, Michael E; Kopp, Douglas E; Marcus, Gregory M; Scheinman, Melvin M; Hoffmayer, Kurt S
2017-03-01
Atrioventricular reciprocating tachycardia (AVRT) utilizing a concealed accessory pathway is common. It is well appreciated that some patients may have multiple accessory pathways with separate atrial and ventricular insertion sites. We present three cases of AVRT utilizing concealed pathways with evidence that each utilizing a single ventricular insertion and two discrete atrial insertion sites. In case one, two discrete atrial insertion sites were mapped in two separate procedures, and only during the second ablation was the Kent potential identified. Ablation of the Kent potential at this site remote from the two atrial insertion sites resulted in the termination of the retrograde conduction in both pathways. Case two presented with supraventricular tachycardia (SVT) with alternating eccentric atrial activation patterns without alteration in the tachycardia cycle length. The two distinct atrial insertion sites during orthodromic AVRT and ventricular pacing were targeted and each of the two atrial insertion sites were successfully mapped and ablated. In case three, retrograde decremental conduction utilizing both atrial insertion sites was identified prior to ablation. After mapping and ablation of the first discrete atrial insertion site, tachycardia persisted utilizing the second atrial insertion site. Only after ablation of the second atrial insertion site was SVT noninducible, and VA conduction was no longer present. Concealed retrograde accessory pathways with discrete atrial insertion sites may have a common ventricular insertion site. Identification and ablation of the ventricular insertion site or the separate discrete atrial insertion sites result in successful treatment. © 2017 Wiley Periodicals, Inc.
Use of a Parasitic Wasp as a Biosensor
Olson, Dawn; Rains, Glen
2014-01-01
Screening cargo for illicit substances is in need of rapid high-throughput inspection systems that accurately identify suspicious cargo. Here we investigate the ability of a parasitic wasp, Microplitis croceipes to detect and respond to methyl benzoate, the volatile component of cocaine, by examining their response to training concentrations, their sensitivity at low concentrations, and their ability to detect methyl benzoate when two concealment substances (green tea and ground coffee) are added to the testing arena. Utilizing classical associative learning techniques with sucrose as reward, we found that M. croceipes learns individual concentrations of methyl benzoate, and they can generalize this learning to concentrations 100× lower than the training concentration. Their sensitivity to methyl benzoate is very low at an estimated 3 ppb. They are also able to detect methyl benzoate when covered completely by green tea, but were not able to detect methyl benzoate when covered completely by coffee grounds. Habituation to the tea and coffee odors prior to testing improves their responses, resulting in effective detection of methyl benzoate covered by the coffee grounds. With the aid of the portable device called ‘the wasp hound’, the wasps appear to have potential to be effective on-site biosensors for the detection of cocaine. PMID:25587415
Correction of concealed penis with preservation of the prepuce.
Valioulis, I A; Kallergis, I C; Ioannidou, D C
2015-10-01
By definition, congenital concealed penis presents at birth. Children are usually referred to physicians because of parental anxiety caused by their child's penile size. Several surgical procedures have been described to treat this condition, but its correction is still technically challenging. The present study reports a simple surgical approach, which allows preservation of the prepuce. During the last 6 years, 18 children with concealed penis (according to the classification by Maizels et al.) have been treated in the present department (mean age 4.5 years, range 3-12 years). Patients with other conditions that caused buried penis were excluded from the study. The operation was performed through a longitudinal midline ventral incision, which was extended hemi-circumferentially at the penile base. The dysgenetic dartos was identified and its distal part was resected. Dissection of the corpora cavernosa was carried down to the suspensory ligament, which was sectioned. Buck's fascia was fixed to Scarpa's fascia and shaft skin was approximated in the midline. Penoscrotal angle was fashioned by Z-plasty or V-Y plasty. The median follow-up was 24 months (range 8-36). The postoperative edema was mild and resolved within a week. All children had good to excellent outcomes. The median pre-operative to postoperative difference in penile length in the flaccid state was 2.6 cm (range 2.0-3.5). No serious complications or recurrent penile retraction were noted. Recent literature mostly suggests that concealed penis is due to deficient proximal attachments of dysgenetic dartos. Consequences of this include: difficulties in maintaining proper hygiene, balanitis, voiding difficulties with prepuce ballooning and urine spraying, and embarrassment among peers. Surgical treatment for congenital concealed penis is warranted in children aged 3 years or older. The basis of the technique is the perception that in boys with congenital concealed penis, the penile integuments are normal but they have abnormal attachments, and that incision of the skin and dartos will allow the shaft to extend. Furthermore, incisions of the fundiform and suspensory ligaments facilitate this maneuver. With this technique, the blood supply of the penile skin is not interrupted and postoperative lymphedema, a difficult complication to deal with, is prevented. One major advantage is the preservation of the prepuce, giving a normal penile appearance and an excellent cosmetic result. The method proposed here is simple and has no serious complications. It is suggested that this condition be treated in pre-school-aged children in order to prevent psychological impairment. Copyright © 2015 Journal of Pediatric Urology Company. Published by Elsevier Ltd. All rights reserved.
Faggion, Clovis Mariano; Wu, Yun-Chun; Scheidgen, Moritz; Tu, Yu-Kang
2015-01-01
Background Risk of bias (ROB) may threaten the internal validity of a clinical trial by distorting the magnitude of treatment effect estimates, although some conflicting information on this assumption exists. Objective The objective of this study was evaluate the effect of ROB on the magnitude of treatment effect estimates in randomized controlled trials (RCTs) in periodontology and implant dentistry. Methods A search for Cochrane systematic reviews (SRs), including meta-analyses of RCTs published in periodontology and implant dentistry fields, was performed in the Cochrane Library in September 2014. Random-effect meta-analyses were performed by grouping RCTs with different levels of ROBs in three domains (sequence generation, allocation concealment, and blinding of outcome assessment). To increase power and precision, only SRs with meta-analyses including at least 10 RCTs were included. Meta-regression was performed to investigate the association between ROB characteristics and the magnitudes of intervention effects in the meta-analyses. Results Of the 24 initially screened SRs, 21 SRs were excluded because they did not include at least 10 RCTs in the meta-analyses. Three SRs (two from periodontology field) generated information for conducting 27 meta-analyses. Meta-regression did not reveal significant differences in the relationship of the ROB level with the size of treatment effect estimates, although a trend for inflated estimates was observed in domains with unclear ROBs. Conclusion In this sample of RCTs, high and (mainly) unclear risks of selection and detection biases did not seem to influence the size of treatment effect estimates, although several confounders might have influenced the strength of the association. PMID:26422698
The passing dilemma in socially invisible diseases: narratives on chronic headache.
Lonardi, Cristina
2007-10-01
This contribution concerns the experience of chronic diseases and how it disrupts the trajectory of a person's biography, undermining his/her identity, self-reliance and social relationships. The study focuses particular attention on those diseases which have not yet been fully acknowledged and can, therefore, be considered a socially invisible disease: chronic headache is one of these. Thirty-one life stories were collected from patients attending a specialized headache centre in Northern Italy, and selected in order to include all common varieties of chronic headache. Following the principles of grounded theory, interviews began by adopting a minimal theoretical framework which consisted of asking people how they became aware of the objective (disease), subjective (illness) and social (sickness) aspects of their condition. The analysis highlighted particular points in the patients' life trajectories: first, the biographical disruption that takes place because of the disease; second, how people succeed or fail in identity negotiation, which is vital for developing an acceptable social representation of the disease. Results show that patient's choices follow a vicious circle, where a partial social representation of the disease is produced. People who suffer from chronic headache face a dilemma in social relationships: should they conceal their disease, or make it evident? If they conceal, any possible social representation of the disease is denied, which could lead to carrying the burden of the disease alone, with no social support. On the other hand, making chronic headache visible could result in stigma.
Nesting ecology of Whimbrels in boreal Alaska
Harwood, Christopher M.; Gill, Robert E.; Powell, Abby
2016-01-01
Breeding ecology studies of boreal waders have been relatively scarce in North America. This paucity is due in part to boreal habitats being difficult to access, and boreal waders being widely dispersed and thus difficult to monitor. Between 2008 and 2014 we studied the nesting ecology of Whimbrels Numenius phaeopus hudsonicus in interior Alaska, a region characterized by an active wildfire regime. Our objectives were to (1) describe the nesting ecology of Whimbrels in tundra patches within the boreal forest, (2) assess the influence of habitat features at multiple scales on nest-site selection, and (3) characterize factors affecting nest survival. Whimbrels nested in the largest patches and exhibited a consistently compressed annual breeding schedule. We hypothesized that these Whimbrels would exhibit synchronous and clustered nesting, but observed synchronous nesting in only 2009 and 2011, and evidence of clustered nesting at just one study area in 2009, providing limited support for the hypothesis. Nests tended to be on hummocks and exhibited lateral concealment around the bowl, suggesting a trade-off between a greater view from the nest and concealment. However, our analysis failed to identify other important habitat features at scales from 1–400 m from the nest. Our best-supported nest survival model showed a strong difference between our two main study areas, but this difference remains largely unexplained. Given the increased frequency, severity, and extent of wildfires predicted under climate change scenarios, our study highlights the importance of monitoring the persistence of boreal tundra patches and the Whimbrels breeding therein.
Identifying explosives using broadband millimeter-wave imaging
NASA Astrophysics Data System (ADS)
Weatherall, James C.; Yam, Kevin; Barber, Jeffrey; Smith, Barry T.; Smith, Peter R.; Greca, Joseph
2017-05-01
Millimeter wave imaging is employed in Advanced Technology Imaging (AIT) systems to screen personnel for concealed explosives and weapons. AIT systems deployed in airports auto-detect potential threats by highlighting their location on a generic outline of a person using imaging data collected over a range of frequency. We show how the spectral information from the imaging data can be used to identify the composition of an anomalous object, in particular if it is an explosive material. The discriminative value of the technique was illustrated on military sheet explosive using millimeter-wave reflection data at frequencies 18 - 40 GHz, and commercial explosives using 2 - 18 GHz, but the free-space measurement was limited to a single horn with a large-area sample. This work extends the method to imaging data collected at high resolution with a 18 - 40 GHz imaging system. The identification of explosives is accomplished by extracting the dielectric constant from the free-space, multifrequency data. The reflection coefficient is a function of frequency because of propagation effects associated with the material's complex dielectric constant, which include interference from multiple reflections and energy loss in the sample. The dielectric constant is obtained by numerically fitting the reflection coefficient as a function of frequency to an optical model. In principal, the implementation of this technique in standoff imaging systems would allow threat assessment to be accomplished within the scope of millimeter-wave screening.
Muth, Claudia; Raab, Marius H; Carbon, Claus-Christian
2016-01-01
Research in the field of psychological aesthetics points to the appeal of stimuli which defy easy recognition by being "semantically unstable" but which still allow for creating meaning-in the ongoing process of elaborative perception or as an end product of the entire process. Such effects were reported for hidden images (Muth and Carbon, 2013) as well as Cubist artworks concealing detectable-although fragmented-objects (Muth et al., 2013). To test the stability of the relationship between semantic determinacy and appreciation across different episodic contexts, 30 volunteers evaluated an artistic movie continuously on visual determinacy or liking via the Continuous Evaluation Procedure (CEP, Muth et al., 2015b). The movie consisted of five episodes with emerging Gestalts. In the first between-participants condition, the hidden Gestalts in the movie episodes were of increasing determinacy, in the second condition, the episodes showed decreasing determinacies of hidden Gestalts. In the increasing-determinacy group, visual determinacy was rated higher and showed better predictive quality for liking than in the decreasing-determinacy group. Furthermore, when the movie started with low visual determinacy of hidden Gestalts, unexpectedly strong increases in visual determinacy had a bigger effect on liking than in the condition which allowed for weaker Gestalt recognition after having started with highly determinate Gestalts. The resulting pattern calls for consideration of the episodic context when examining art appreciation.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Andersson, P., E-mail: peter.andersson@physics.uu.se; Andersson-Sunden, E.; Sjöstrand, H.
2014-08-01
In nuclear boiling water reactor cores, the distribution of water and steam (void) is essential for both safety and efficiency reasons. In order to enhance predictive capabilities, void distribution assessment is performed in two-phase test-loops under reactor-relevant conditions. This article proposes the novel technique of fast-neutron tomography using a portable deuterium-tritium neutron generator to determine the time-averaged void distribution in these loops. Fast neutrons have the advantage of high transmission through the metallic structures and pipes typically concealing a thermal-hydraulic test loop, while still being fairly sensitive to the water/void content. However, commercially available fast-neutron generators also have the disadvantagemore » of a relatively low yield and fast-neutron detection also suffers from relatively low detection efficiency. Fortunately, some loops are axially symmetric, a property which can be exploited to reduce the amount of data needed for tomographic measurement, thus limiting the interrogation time needed. In this article, three axially symmetric test objects depicting a thermal-hydraulic test loop have been examined; steel pipes with outer diameter 24 mm, thickness 1.5 mm, and with three different distributions of the plastic material POM inside the pipes. Data recorded with the FANTOM fast-neutron tomography instrument have been used to perform tomographic reconstructions to assess their radial material distribution. Here, a dedicated tomographic algorithm that exploits the symmetry of these objects has been applied, which is described in the paper. Results are demonstrated in 20 rixel (radial pixel) reconstructions of the interior constitution and 2D visualization of the pipe interior is demonstrated. The local POM attenuation coefficients in the rixels were measured with errors (RMS) of 0.025, 0.020, and 0.022 cm{sup −1}, solid POM attenuation coefficient. The accuracy and precision is high enough to provide a useful indication on the flow mode, and a visualization of the radial material distribution can be obtained. A benefit of this system is its potential to be mounted at any axial height of a two-phase test section without requirements for pre-fabricated entrances or windows. This could mean a significant increase in flexibility of the void distribution assessment capability at many existing two-phase test loops.« less
Andersson, P; Andersson-Sunden, E; Sjöstrand, H; Jacobsson-Svärd, S
2014-08-01
In nuclear boiling water reactor cores, the distribution of water and steam (void) is essential for both safety and efficiency reasons. In order to enhance predictive capabilities, void distribution assessment is performed in two-phase test-loops under reactor-relevant conditions. This article proposes the novel technique of fast-neutron tomography using a portable deuterium-tritium neutron generator to determine the time-averaged void distribution in these loops. Fast neutrons have the advantage of high transmission through the metallic structures and pipes typically concealing a thermal-hydraulic test loop, while still being fairly sensitive to the water/void content. However, commercially available fast-neutron generators also have the disadvantage of a relatively low yield and fast-neutron detection also suffers from relatively low detection efficiency. Fortunately, some loops are axially symmetric, a property which can be exploited to reduce the amount of data needed for tomographic measurement, thus limiting the interrogation time needed. In this article, three axially symmetric test objects depicting a thermal-hydraulic test loop have been examined; steel pipes with outer diameter 24 mm, thickness 1.5 mm, and with three different distributions of the plastic material POM inside the pipes. Data recorded with the FANTOM fast-neutron tomography instrument have been used to perform tomographic reconstructions to assess their radial material distribution. Here, a dedicated tomographic algorithm that exploits the symmetry of these objects has been applied, which is described in the paper. Results are demonstrated in 20 rixel (radial pixel) reconstructions of the interior constitution and 2D visualization of the pipe interior is demonstrated. The local POM attenuation coefficients in the rixels were measured with errors (RMS) of 0.025, 0.020, and 0.022 cm(-1), solid POM attenuation coefficient. The accuracy and precision is high enough to provide a useful indication on the flow mode, and a visualization of the radial material distribution can be obtained. A benefit of this system is its potential to be mounted at any axial height of a two-phase test section without requirements for pre-fabricated entrances or windows. This could mean a significant increase in flexibility of the void distribution assessment capability at many existing two-phase test loops.
Terahertz imaging systems: a non-invasive technique for the analysis of paintings
NASA Astrophysics Data System (ADS)
Fukunaga, K.; Hosako, I.; Duling, I. N., III; Picollo, M.
2009-07-01
Terahertz (THz) imaging is an emerging technique for non-invasive analysis. Since THz waves can penetrate opaque materials, various imaging systems that use THz waves have been developed to detect, for instance, concealed weapons, illegal drugs, and defects in polymer products. The absorption of THz waves by water is extremely strong, and hence, THz waves can be used to monitor the water content in various objects. THz imaging can be performed either by transmission or by reflection of THz waves. In particular, time domain reflection imaging uses THz pulses that propagate in specimens, and in this technique, pulses reflected from the surface and from the internal boundaries of the specimen are detected. In general, the internal structure is observed in crosssectional images obtained using micro-specimens taken from the work that is being analysed. On the other hand, in THz time-domain imaging, a map of the layer of interest can be easily obtained without collecting any samples. When realtime imaging is required, for example, in the investigation of the effect of a solvent or during the monitoring of water content, a THz camera can be used. The first application of THz time-domain imaging in the analysis of a historical tempera masterpiece was performed on the panel painting Polittico di Badia by Giotto, of the permanent collection of the Uffizi Gallery. The results of that analysis revealed that the work is composed of two layers of gypsum, with a canvas between these layers. In the paint layer, gold foils covered by paint were clearly observed, and the consumption or ageing of gold could be estimated by noting the amount of reflection. These results prove that THz imaging can yield useful information for conservation and restoration purposes.
NASA Astrophysics Data System (ADS)
Grimes, T. F.; Hagen, A. R.; Archambault, B. C.; Taleyarkhan, R. P.
2018-03-01
This paper describes the development of a SNM detection system for interrogating 1m3 cargos via the combination of a D-D neutron interrogation source (with and without reflectors) and tensioned metastable fluid detectors (TMFDs). TMFDs have been previously shown (Taleyarkhan et al., 2008; Grimes et al., 2015; Grimes and Taleyarkhan, 2016; Archambault et al., 2017; Hagen et al., 2016) to be capable of using Threshold Energy Neutron Analysis (TENA) techniques to reject the ∼2.45 MeV D-D interrogating neutrons while still remaining sensitive to >2.45 MeV neutrons resulting from fission in the target (HEU) material. In order to enhance the performance, a paraffin reflector was included around the accelerator head. This reflector was used to direct neutrons into the package to increase the fission signal, lower the energy of the interrogating neutrons to increase the fission cross-section with HEU, and, also to direct interrogating neutrons away from the detectors in order to enhance the required discrimination between interrogating and fission neutrons. Experiments performed with a 239 Pu-Be neutron source and MnO2 indicated that impressive performance gains could be made by placing a parabolic paraffin moderator between the interrogation source and an air-filled cargo container with HEU placed at the center. However, experiments with other cargo fillers (as specified in the well-known ANSI N42.41-2007 report), and with HEU placed in locations other than the center of the package indicated that other reflector geometries might be superior due to over-"focusing" and the increased solid angle effects due to the accommodation of the moderator geometry. The best performance for the worst case of source location and box fill was obtained by placing the reflector only behind the D-D neutron source rather than in front of it. Finally, it was shown that there could be significant gains in the ability to detect concealed SNM by operating the system in multiple geometric configurations. Worst case scenarios were created by filling the box with hydrogenous material and placing the HEU as far away as possible from the neutron source. The performance of the system in the worst-case scenarios were greatly improved by exchanging the location of the accelerator and the opposite TMFD panel half way through interrogation. Using this operation, scenarios with positions of the concealed SNM that were once the most challenging to successfully detect became readily detectable.
COSMETIC CAMOUFLAGE IN VITILIGO
Sarveswari, K N
2010-01-01
Vitiligo is not a life–threatening nor a contagious disease. But the disfigurement of vitiligo can be devastating to its sufferers, especially dark-skinned individuals. Available treatment options are disappointing and sufferers often use various forms of camouflage. Remedial cosmetic cover creams help conceal the blemish of vitiligo at least temporarily. A high concentration of pigment is incorporated into water–free or anhydrous foundations to give a color that matches the patient’s skin, thereby concealing vitiligo patches. The article highlights the content and technique of application of these creams. PMID:21063508
NASA Astrophysics Data System (ADS)
Alfonso, Krystal; Elsalim, Mashal; King, Michael; Strellis, Dan; Gozani, Tsahi
2013-04-01
MCNPX simulations have been used to guide the development of a portable inspection system for narcotics, explosives, and special nuclear material (SNM) detection. The system seeks to address these threats to national security by utilizing a high-yield, compact neutron source to actively interrogate the threats and produce characteristic signatures that can then be detected by radiation detectors. The portability of the system enables rapid deployment and proximity to threats concealed in small spaces. Both dD and dT electronic neutron generators (ENG) were used to interrogate ammonium nitrate fuel oil (ANFO) and cocaine hydrochloride, and the detector response of NaI, CsI, and LaBr3 were compared. The effect of tungsten shielding on the neutron flux in the gamma ray detectors was investigated, while carbon, beryllium, and polyethylene ENG moderator materials were optimized by determining the reaction rate density in the threats. In order to benchmark the modeling results, experimental measurements are compared with MCNPX simulations. In addition, the efficiency and die-away time of a portable differential die-away analysis (DDAA) detector using 3He proportional counters for SNM detection has been determined.
Compressed Sensing Techniques Applied to Ultrasonic Imaging of Cargo Containers.
López, Yuri Álvarez; Lorenzo, José Ángel Martínez
2017-01-15
One of the key issues in the fight against the smuggling of goods has been the development of scanners for cargo inspection. X-ray-based radiographic system scanners are the most developed sensing modality. However, they are costly and use bulky sources that emit hazardous, ionizing radiation. Aiming to improve the probability of threat detection, an ultrasonic-based technique, capable of detecting the footprint of metallic containers or compartments concealed within the metallic structure of the inspected cargo, has been proposed. The system consists of an array of acoustic transceivers that is attached to the metallic structure-under-inspection, creating a guided acoustic Lamb wave. Reflections due to discontinuities are detected in the images, provided by an imaging algorithm. Taking into consideration that the majority of those images are sparse, this contribution analyzes the application of Compressed Sensing (CS) techniques in order to reduce the amount of measurements needed, thus achieving faster scanning, without compromising the detection capabilities of the system. A parametric study of the image quality, as a function of the samples needed in spatial and frequency domains, is presented, as well as the dependence on the sampling pattern. For this purpose, realistic cargo inspection scenarios have been simulated.
Compressed Sensing Techniques Applied to Ultrasonic Imaging of Cargo Containers
Álvarez López, Yuri; Martínez Lorenzo, José Ángel
2017-01-01
One of the key issues in the fight against the smuggling of goods has been the development of scanners for cargo inspection. X-ray-based radiographic system scanners are the most developed sensing modality. However, they are costly and use bulky sources that emit hazardous, ionizing radiation. Aiming to improve the probability of threat detection, an ultrasonic-based technique, capable of detecting the footprint of metallic containers or compartments concealed within the metallic structure of the inspected cargo, has been proposed. The system consists of an array of acoustic transceivers that is attached to the metallic structure-under-inspection, creating a guided acoustic Lamb wave. Reflections due to discontinuities are detected in the images, provided by an imaging algorithm. Taking into consideration that the majority of those images are sparse, this contribution analyzes the application of Compressed Sensing (CS) techniques in order to reduce the amount of measurements needed, thus achieving faster scanning, without compromising the detection capabilities of the system. A parametric study of the image quality, as a function of the samples needed in spatial and frequency domains, is presented, as well as the dependence on the sampling pattern. For this purpose, realistic cargo inspection scenarios have been simulated. PMID:28098841
Emotional Arousal at Memory Encoding Enhanced P300 in the Concealed Information Test
Osugi, Akemi; Ohira, Hideki
2018-01-01
Previous studies have reported that the concealed information test (CIT) is a reliable and powerful method for detecting information. However, the external validity of the CIT studies has not been fully proven. In particular, few studies have examined the effects of emotional arousal at memory encoding on physiological responses in the CIT. The present study investigated the influence on the CIT of the magnitude of emotional arousal at memory encoding of a mock crime, using the P300 component of the event-related brain potential (ERP). In accord with the assumptions of excitation-transfer theory, we presented emotionally arousing pictures before a mock crime. Participants were randomly assigned to either a high emotional arousal group (n = 10) or a low emotional arousal group (n = 11), viewing pictures expected to arouse emotion at a high or low level, respectively. Subsequently, all participants enacted the same mock crime, in which they were instructed to stab a pillow with a sharp-edged tool (e.g., a kitchen knife or ice pick) as if harassing a mannequin lying on a bed. After the antecedent emotional experience, the P300-based CIT was conducted. Participants in the high arousal group showed significantly greater P300 amplitudes in response to a probe stimulus compared with the low arousal group. No differences were found between the groups in response to irrelevant stimuli. These results support the notion that emotional arousal influences the P300 in the CIT paradigm. PMID:29375446
Steganalysis feature improvement using expectation maximization
NASA Astrophysics Data System (ADS)
Rodriguez, Benjamin M.; Peterson, Gilbert L.; Agaian, Sos S.
2007-04-01
Images and data files provide an excellent opportunity for concealing illegal or clandestine material. Currently, there are over 250 different tools which embed data into an image without causing noticeable changes to the image. From a forensics perspective, when a system is confiscated or an image of a system is generated the investigator needs a tool that can scan and accurately identify files suspected of containing malicious information. The identification process is termed the steganalysis problem which focuses on both blind identification, in which only normal images are available for training, and multi-class identification, in which both the clean and stego images at several embedding rates are available for training. In this paper an investigation of a clustering and classification technique (Expectation Maximization with mixture models) is used to determine if a digital image contains hidden information. The steganalysis problem is for both anomaly detection and multi-class detection. The various clusters represent clean images and stego images with between 1% and 10% embedding percentage. Based on the results it is concluded that the EM classification technique is highly suitable for both blind detection and the multi-class problem.
A Novel Arc Fault Detector for Early Detection of Electrical Fires
Yang, Kai; Zhang, Rencheng; Yang, Jianhong; Liu, Canhua; Chen, Shouhong; Zhang, Fujiang
2016-01-01
Arc faults can produce very high temperatures and can easily ignite combustible materials; thus, they represent one of the most important causes of electrical fires. The application of arc fault detection, as an emerging early fire detection technology, is required by the National Electrical Code to reduce the occurrence of electrical fires. However, the concealment, randomness and diversity of arc faults make them difficult to detect. To improve the accuracy of arc fault detection, a novel arc fault detector (AFD) is developed in this study. First, an experimental arc fault platform is built to study electrical fires. A high-frequency transducer and a current transducer are used to measure typical load signals of arc faults and normal states. After the common features of these signals are studied, high-frequency energy and current variations are extracted as an input eigenvector for use by an arc fault detection algorithm. Then, the detection algorithm based on a weighted least squares support vector machine is designed and successfully applied in a microprocessor. Finally, an AFD is developed. The test results show that the AFD can detect arc faults in a timely manner and interrupt the circuit power supply before electrical fires can occur. The AFD is not influenced by cross talk or transient processes, and the detection accuracy is very high. Hence, the AFD can be installed in low-voltage circuits to monitor circuit states in real-time to facilitate the early detection of electrical fires. PMID:27070618
Security inspection in ports by anomaly detection using hyperspectral imaging technology
NASA Astrophysics Data System (ADS)
Rivera, Javier; Valverde, Fernando; Saldaña, Manuel; Manian, Vidya
2013-05-01
Applying hyperspectral imaging technology in port security is crucial for the detection of possible threats or illegal activities. One of the most common problems that cargo suffers is tampering. This represents a danger to society because it creates a channel to smuggle illegal and hazardous products. If a cargo is altered, security inspections on that cargo should contain anomalies that reveal the nature of the tampering. Hyperspectral images can detect anomalies by gathering information through multiple electromagnetic bands. The spectrums extracted from these bands can be used to detect surface anomalies from different materials. Based on this technology, a scenario was built in which a hyperspectral camera was used to inspect the cargo for any surface anomalies and a user interface shows the results. The spectrum of items, altered by different materials that can be used to conceal illegal products, is analyzed and classified in order to provide information about the tampered cargo. The image is analyzed with a variety of techniques such as multiple features extracting algorithms, autonomous anomaly detection, and target spectrum detection. The results will be exported to a workstation or mobile device in order to show them in an easy -to-use interface. This process could enhance the current capabilities of security systems that are already implemented, providing a more complete approach to detect threats and illegal cargo.
Education and training of professional industrial hygienists for 2020
NASA Technical Reports Server (NTRS)
Sherwood, R. J.
1993-01-01
Four questions are addressed: (1) Are we giving sufficient attention to the professional education of industrial hygienists?; (2) Are we achieving an adequate measure of control of hazards at the workplace?; (3) What is our record of success in this field?; and (4) Do we have clear objectives, both as a profession and as individuals? I discuss some aspects of these but will not attempt to provide answers, hoping thereby to stimulate discussion and to conceal the fact that I do not know the answers myself. I will, however, follow this discussion with a review of the overall need for training in industrial hygiene, and will conclude with some comments about needed changes in the education of future professional industrial hygienists.
Infectious Disease and Imperfections of Self-Image.
Ackerman, Joshua M; Tybur, Joshua M; Mortensen, Chad R
2018-02-01
Infectious disease is an ever-present threat in daily life. Recent literature indicates that people manage this threat with a suite of antipathogenic psychological and behavioral defense mechanisms, which motivate the avoidance of people and objects bearing cues to pathogen risk. Here, we demonstrate that self-image is also impacted by these mechanisms. In seven studies, pathogen cues led individuals chronically averse to germs to express greater concern about their own physical appearance. Correspondingly, these people exhibited behavioral intentions and decisions intended to conceal or improve their appearance, such as purchasing facial products, taking pharmaceuticals, and undergoing cosmetic surgery. This work opens a new area of investigation for infectious-disease psychology research and highlights the central role played by physical appearance in pathogen-related cognition.
Chew, Elizabeth; Griva, Konstadina; Cheung, Peter P
2016-11-01
To evaluate coping strategies of Asian RA patients and their associations with health-related quality of life (HRQoL). A cross-sectional sample of patients with established RA was evaluated using measures of coping (Coping in Rheumatoid Arthritis Questionnaire [C-RAQ]; appraisal of coping effectiveness and helplessness), HRQoL (Mental and Physical Components [MCS/PCS] of the Short Form 12v2; Rheumatoid Arthritis Impact of Disease score [RAID]) and clinical/laboratory assessments. Principal component analysis was conducted to identify coping strategies. Multiple linear regression analyses were performed to evaluate the associations between coping strategies and HRQoL outcomes. The study sample comprised 101 patients, 81% female, 72.3% Chinese, mean age 54.2 ± 12.6 years. Five coping strategies were identified: Active problem solving (E = 5.36), Distancing (E = 2.30), Concealment (E = 1.89), Cognitive reframing (E = 1.55) and Emotional expression (E = 1.26). Concealment was consistently associated with PCS (r s = -0.23, P = 0.049), MCS (r s = -0.24, P = 0.04) and RAID (r s = 0.39, P < 0.001), and was significant in the multivariate model to explain lower disease-specific HRQoL (RAID) even after adjusting for disease activity, coping effectiveness and helplessness (β = 0.20, P = 0.04). Emotional expression was associated with poorer physical HRQoL (PCS), after adjusting for disease severity, body mass index, coping effectiveness, helplessness and Concealment (β = -0.39, P < 0.001). Perceived coping-related helplessness was significant in multivariate correlates for PCS (β = -0.25, P = 0.036), MCS (β = -0.29, P = 0.02) and RAID (β = 0.53, P < 0.001), after adjusting for covariates. Concealment and Emotional expression are associated with lower disease-specific HRQoL and physical HRQoL respectively, with the former coping strategy likely to be culture-specific. Interventions should tailor psychosocial support needs to address not only coping strategies, but patients' perception of their coping. © 2016 Asia Pacific League of Associations for Rheumatology and John Wiley & Sons Australia, Ltd.
Bartos, Daniel C; Giudicessi, John R; Tester, David J; Ackerman, Michael J; Ohno, Seiko; Horie, Minoru; Gollob, Michael H; Burgess, Don E; Delisle, Brian P
2014-03-01
Type 1 long QT syndrome (LQT1) is caused by loss-of-function mutations in the KCNQ1-encoded Kv7.1 channel that conducts the slowly activating component of the delayed rectifier K(+) current (IKs). Clinically, the diagnosis of LQT1 is complicated by variable phenotypic expressivity, whereby approximately 25% of genotype-positive individuals present with concealed LQT1 (resting corrected QT [QTc] interval ≤460 ms). To determine whether a specific molecular mechanism contributes to concealed LQT1. We identified a multigenerational LQT1 family whereby 79% of the patients genotype-positive for p.Ile235Asn-KCNQ1 (I235N-Kv7.1) have concealed LQT1. We assessed the effect I235N-Kv7.1 has on IKs and the ventricular action potential (AP) by using in vitro analysis and computational simulations. Clinical data showed that all 10 patients with I235N-Kv7.1 have normal resting QTc intervals but abnormal QTc interval prolongation during the recovery phase of an electrocardiographic treadmill stress test. Voltage-clamping HEK293 cells coexpressing wild-type Kv7.1 and I235N-Kv7.1 (to mimic the patients' genotypes) showed that I235N-Kv7.1 generated relatively normal functioning Kv7.1 channels but were insensitive to protein kinase A (PKA) activation. Phosphomimetic and quinidine sensitivity studies suggest that I235N-Kv7.1 limits the conformational changes in Kv7.1 channels, which are necessary to upregulate IKs after PKA phosphorylation. Computational ventricular AP simulations predicted that the PKA insensitivity of I235N-Kv7.1 is primarily responsible for prolonging the AP with β-adrenergic stimulation, especially at slower cycle lengths. KCNQ1 mutations that generate relatively normal Kv7.1 channels, but limit the upregulation of IKs by PKA activation, likely contribute to concealed LQT1. Copyright © 2014 Heart Rhythm Society. Published by Elsevier Inc. All rights reserved.
[Ladder step strategy for surgical repair of congenital concealed penis in children].
Wang, Fu-Ran; Zhong, Hong-Ji; Chen, Yi; Zhao, Jun-Feng; Li, Yan
2016-11-01
To assess the feasibility of the ladder step strategy in surgical repair of congenital concealed penis in children. This study included 52 children with congenital concealed penis treated in the past two years by surgical repair using the ladder step strategy, which consists of five main steps: cutting the narrow ring of the foreskin, degloving the penile skin, fixing the penile skin at the base, covering the penile shaft, and reshaping the prepuce. The perioperative data of the patients were prospectively collected and statistically described. Of the 52 patients, 20 needed remodeling of the frenulum and 27 received longitudinal incision in the penoscrotal junction to expose and deglove the penile shaft. The advanced scrotal flap technique was applied in 8 children to cover the penile shaft without tension, the pedicled foreskin flap technique employed in 11 to repair the penile skin defect, and excision of the webbed skin of the ventral penis performed in another 44 to remodel the penoscrotal angle. The operation time, blood loss, and postoperative hospital stay were 40-100 minutes, 5-30 ml, and 3-6 days, respectively. Wound bleeding and infection occurred in 1 and 5 cases, respectively. Follow-up examinations at 3 and 6 months after surgery showed that all the children had a satisfactory penile appearance except for some minor complications (2 cases of penile retraction, 2 cases of redundant ventral skin, and 1 case of iatrogenic penile curvature). The ladder step strategy for surgical repair of congenital concealed penis in children is a simple procedure with minor injury and satisfactory appearance of the penis.
Kraskov, Alexander; Dancause, Numa; Quallo, Marsha M; Shepherd, Samantha; Lemon, Roger N
2009-12-24
The discovery of "mirror neurons" in area F5 of the ventral premotor cortex has prompted many theories as to their possible function. However, the identity of mirror neurons remains unknown. Here, we investigated whether identified pyramidal tract neurons (PTNs) in area F5 of two adult macaques exhibited "mirror-like" activity. About half of the 64 PTNs tested showed significant modulation of their activity while monkeys observed precision grip of an object carried out by an experimenter, with somewhat fewer showing modulation during precision grip without an object or grasping concealed from the monkey. Therefore, mirror-like activity can be transmitted directly to the spinal cord via PTNs. A novel finding is that many PTNs (17/64) showed complete suppression of discharge during action observation, while firing actively when the monkey grasped food rewards. We speculate that this suppression of PTN discharge might be involved in the inhibition of self-movement during action observation. 2009 Elsevier Inc. All rights reserved.
Low cost mobile explosive/drug detection devices
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gozani, T.; Bendahan, J.
1999-06-10
Inspection technologies based on Thermal Neutron Analysis (TNA) and/or Fast Neutron Analysis (FNA) are the basis for relatively compact and low-cost, material-sensitive devices for a wide variety of inspection needs. The TNA allows the use of either isotropic neutron sources such as a {sup 252}Cf, or electronic neutron generators such as the d-T sealed neutron generator tubes. The latter could be used in a steady state mode or in slow (>{mu}s) pulsing mode, to separate the thermal neutron capture signatures following the pulse from the combination of the FNA plus TNA signatures during the pulse. Over the years, Ancore Corporationmore » has built and is continuing to develop a variety of inspection devices based on its TNA and FNA technologies: SPEDS--an explosive detection device for small parcels, portable electronics, briefcases and other similar carry-on items; MDS - a system for the detection or confirmation of buried mines; VEDS - a system for the detection of varied amounts of explosives and/or drugs concealed in passenger vehicles, pallets, lightly loaded trucks or containers, etc.; ACD - a device to clear alarms from a primary, non-specific explosive detection system for passenger luggage. The principle and performance of these devices will be shown and discussed.« less
Detection of exogenous gene doping of IGF-I by a real-time quantitative PCR assay.
Zhang, Jin-Ju; Xu, Jing-Feng; Shen, Yong-Wei; Ma, Shi-Jiao; Zhang, Ting-Ting; Meng, Qing-Lin; Lan, Wen-Jun; Zhang, Chun; Liu, Xiao-Mei
2017-07-01
Gene doping can be easily concealed since its product is similar to endogenous protein, making its effective detection very challenging. In this study, we selected insulin-like growth factor I (IGF-I) exogenous gene for gene doping detection. First, the synthetic IGF-I gene was subcloned to recombinant adeno-associated virus (rAAV) plasmid to produce recombinant rAAV2/IGF-I-GFP vectors. Second, in an animal model, rAAV2/IGF-I-GFP vectors were injected into the thigh muscle tissue of mice, and then muscle and blood specimens were sampled at different time points for total DNA isolation. Finally, real-time quantitative PCR was employed to detect the exogenous gene doping of IGF-I. In view of the characteristics of endogenous IGF-I gene sequences, a TaqMan probe was designed at the junction of exons 2 and 3 of IGF-I gene to distinguish it from the exogenous IGF-I gene. In addition, an internal reference control plasmid and its probe were used in PCR to rule out false-positive results through comparison of their threshold cycle (Ct) values. Thus, an accurate exogenous IGF-I gene detection approach was developed in this study. © 2016 International Union of Biochemistry and Molecular Biology, Inc.
Stutterheim, Sarah E; Brands, Ronald; Baas, Ineke; Lechner, Lilian; Kok, Gerjo; Bos, Arjan E R
We explored workplace experiences of 10 health care providers with HIV in the Netherlands. We used semi-structured interviews to discuss motivations for disclosure and concealment, reactions to disclosures, the impact of reactions, and coping with negative reactions. Reasons for disclosure were wanting to share the secret, expecting positive responses, observing positive reactions to others, wanting to prevent negative reactions, and being advised to disclose. Reasons for concealment included fearing negative reactions, observing negative reactions, previous negative experiences, having been advised to conceal, and considering disclosure unnecessary. Positive reactions included seeing HIV as a nonissue; showing interest, support, and empathy; and maintaining confidentiality. Negative reactions included management wanting to inform employees, work restrictions, hiring difficulties, gossip, and hurtful comments, resulting in participants being upset, taken aback, angry, depressed, or feeling resignation. Participants coped by providing information, standing above the experience, attributing reactions to ignorance, seeking social support, or leaving their jobs. Copyright © 2017 Association of Nurses in AIDS Care. Published by Elsevier Inc. All rights reserved.
Chaudoir, Stephenie R.; Earnshaw, Valerie A.; Andel, Stephanie
2013-01-01
In his classic treatise, Goffman (1963) delineates between people who are discredited—whose stigma is clearly known or visible—and people who are discreditable—whose stigma is unknown and can be concealable. To what extent has research in the past 50 years advanced Goffman’s original ideas regarding the impact of concealability on stigma management strategies and outcomes? In the current article, we outline a framework that articulates how stigma can “get under the skin” in order to lead to psychological and physical health disparities. Further, we consider when and to what degree concealability moderates these effects, creating divergent outcomes for the discredited and discreditable. Does the stigmatized individual assume his differentness is known about already or is evident on the spot, or does he assume it is neither known about by those present nor immediately perceivable by them? In the first case one deals with the plight of the discredited, in the second with that of the discreditable. This is an important difference.— Goffman (1963, p. 4) PMID:23729948
Sweet, Monica A; Heyman, Gail D; Fu, Genyue; Lee, Kang
2010-07-01
This study explored the effects of collectivism on lying to conceal a group transgression. Seven-, 9-, and 11-year-old US and Chinese children (N = 374) were asked to evaluate stories in which protagonists either lied or told the truth about their group's transgression and were then asked about either the protagonist's motivations or justification for their own evaluations. Previous research suggests that children in collectivist societies such as China find lying for one's group to be more acceptable than do children from individualistic societies such as the United States. The current study provides evidence that this is not always the case: Chinese children in this study viewed lies told to conceal a group's transgressions less favourably than did US children. An examination of children's reasoning about protagonists' motivations for lying indicated that children in both countries focused on an impact to self when discussing motivations for protagonists to lie for their group. Overall, results suggest that children living in collectivist societies do not always focus on the needs of the group.
Sweet, Monica A.; Heyman, Gail D.; Fu, Genyue; Lee, Kang
2010-01-01
This study explored the effects of collectivism on lying to conceal a group transgression. Seven-, 9-, and 11-year-old US and Chinese children (N = 374) were asked to evaluate stories in which protagonists either lied or told the truth about their group’s transgression and were then asked about either the protagonist’s motivations or justification for their own evaluations. Previous research suggests that children in collectivist societies such as China find lying for one’s group to be more acceptable than do children from individualistic societies such as the United States. The current study provides evidence that this is not always the case: Chinese children in this study viewed lies told to conceal a group’s transgressions less favourably than did US children. An examination of children’s reasoning about protagonists’ motivations for lying indicated that children in both countries focused on an impact to self when discussing motivations for protagonists to lie for their group. Overall, results suggest that children living in collectivist societies do not always focus on the needs of the group. PMID:20953286
Mismatches in genetic markers in a large family study.
Ashton, G C
1980-01-01
The Hawaii Family Study of Cognition provided an opportunity to investigate the frequency and implications of non-agreement, or mismatches, between observed and expected genetic marker phenotypes of husbands, wives, and children. Mismatch data from 68 families in which one or both spouses were known not to be a biological parent were used to determine the rate of undeclared nonparentage in 1,748 families in which conventional relationships were claimed. Two independent approaches gave consistent estimates, suggesting that approximately 2.3% of the 2,839 tested children from these families were probably the result of infidelity, concealed adoption, or another event. About two-thirds of the mismatches detected were probably due to properties of the techniques employed. PMID:6930820
Kaposi's sarcoma concealed by stasis dermatitis in a patient with psoriasis.
Erdoğan, Hilal Kaya; Bulur, Işıl; Saraçoğlu, Zeynep Nurhan; Karapınar, Tekden; Arık, Deniz
2017-09-01
Kaposi's sarcoma (KS) is a multifocal and angioproliferative neoplasm. KS may be accompanied by psoriasis; however, in most of these cases the main mechanism involves iatrogenic KS associated with the immunosuppressive drugs that are used in psoriasis treatment. In angioproliferative lesions as a result of venous insufficiency and stasis dermatitis, acroangiodermatitis (pseudo-KS) is initially considered. However, the concurrent occurrence of psoriasis, stasis dermatitis, and KS has not been previously reported. We report a case of classic-type KS in an 83-year-old man that was concealed by stasis dermatitis and accompanied by psoriasis.
Creating fair lineups for suspects with distinctive features.
Zarkadi, Theodora; Wade, Kimberley A; Stewart, Neil
2009-12-01
In their descriptions, eyewitnesses often refer to a culprit's distinctive facial features. However, in a police lineup, selecting the only member with the described distinctive feature is unfair to the suspect and provides the police with little further information. For fair and informative lineups, the distinctive feature should be either replicated across foils or concealed on the target. In the present experiments, replication produced more correct identifications in target-present lineups--without increasing the incorrect identification of foils in target-absent lineups--than did concealment. This pattern, and only this pattern, is predicted by the hybrid-similarity model of recognition.
Rodriguez, Brian D.; Sampson, Jay A.
2010-01-01
The Sunnyside porphyry copper system is part of the concealed San Rafael Valley porphyry system located in the Patagonia Mountains of Arizona. The U.S. Geological Survey is conducting a series of multidisciplinary studies as part of the Assessment Techniques for Concealed Mineral Resources project. To help characterize the size and resistivity of the mineralized area beneath overburden, a regional east-west magnetotelluric sounding profile was acquired. This is a data release report of the magnetotelluric sounding data collected along the east-west profile; no interpretation of the data is included.
[Effects of false memories on the Concealed Information Test].
Zaitsu, Wataru
2012-10-01
The effects of false memories on polygraph examinations with the Concealed Information Test (CIT) were investigated by using the Deese-Roediger-McDermott (DRM) paradigm, which allows participants to evoke false memories. Physiological responses to questions consisting of learned, lure, and unlearned items were measured and recorded. The results indicated that responses to lure questions showed critical responses to questions about learned items. These responses included repression of respiration, an increase in electrodermal activity, and a drop in heart rate. These results suggest that critical response patterns are generated in the peripheral nervous system by true and false memories.
Managing age discrimination: an examination of the techniques used when seeking employment.
Berger, Ellie D
2009-06-01
This article examines the age-related management techniques used by older workers in their search for employment. Data are drawn from interviews with individuals aged 45-65 years (N = 30). Findings indicate that participants develop "counteractions" and "concealments" to manage perceived age discrimination. Individuals counteract employers' ageist stereotypes by maintaining their skills and changing their work-related expectations and conceal age by altering their résumés, physical appearance, and language used. This research suggests that there is a need to reexamine the hiring practices of employers and to improve legislation in relation to their accountability.
NASA Astrophysics Data System (ADS)
López, Cristian; Zhong, Wei; Lu, Siliang; Cong, Feiyun; Cortese, Ignacio
2017-12-01
Vibration signals are widely used for bearing fault detection and diagnosis. When signals are acquired in the field, usually, the faulty periodic signal is weak and is concealed by noise. Various de-noising methods have been developed to extract the target signal from the raw signal. Stochastic resonance (SR) is a technique that changed the traditional denoising process, in which the weak periodic fault signal can be identified by adding an expression, the potential, to the raw signal and solving a differential equation problem. However, current SR methods have some deficiencies such us limited filtering performance, low frequency input signal and sequential search for optimum parameters. Consequently, in this study, we explore the application of SR based on the FitzHug-Nagumo (FHN) potential in rolling bearing vibration signals. Besides, we improve the search of the SR optimum parameters by the use of particle swarm optimization (PSO). The effectiveness of the proposed method is verified by using both simulated and real bearing data sets.
A Bernoulli Gaussian Watermark for Detecting Integrity Attacks in Control Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Weerakkody, Sean; Ozel, Omur; Sinopoli, Bruno
We examine the merit of Bernoulli packet drops in actively detecting integrity attacks on control systems. The aim is to detect an adversary who delivers fake sensor measurements to a system operator in order to conceal their effect on the plant. Physical watermarks, or noisy additive Gaussian inputs, have been previously used to detect several classes of integrity attacks in control systems. In this paper, we consider the analysis and design of Gaussian physical watermarks in the presence of packet drops at the control input. On one hand, this enables analysis in a more general network setting. On the othermore » hand, we observe that in certain cases, Bernoulli packet drops can improve detection performance relative to a purely Gaussian watermark. This motivates the joint design of a Bernoulli-Gaussian watermark which incorporates both an additive Gaussian input and a Bernoulli drop process. We characterize the effect of such a watermark on system performance as well as attack detectability in two separate design scenarios. Here, we consider a correlation detector for attack recognition. We then propose efficiently solvable optimization problems to intelligently select parameters of the Gaussian input and the Bernoulli drop process while addressing security and performance trade-offs. Finally, we provide numerical results which illustrate that a watermark with packet drops can indeed outperform a Gaussian watermark.« less
Less is more? Detecting lies in veiled witnesses.
Leach, Amy-May; Ammar, Nawal; England, D Nicole; Remigio, Laura M; Kleinberg, Bennett; Verschuere, Bruno J
2016-08-01
Judges in the United States, the United Kingdom, and Canada have ruled that witnesses may not wear the niqab-a type of face veil-when testifying, in part because they believed that it was necessary to see a person's face to detect deception (Muhammad v. Enterprise Rent-A-Car, 2006; R. v. N. S., 2010; The Queen v. D(R), 2013). In two studies, we used conventional research methods and safeguards to empirically examine the assumption that niqabs interfere with lie detection. Female witnesses were randomly assigned to lie or tell the truth while remaining unveiled or while wearing a hijab (i.e., a head veil) or a niqab (i.e., a face veil). In Study 1, laypersons in Canada (N = 232) were more accurate at detecting deception in witnesses who wore niqabs or hijabs than in those who did not wear veils. Concealing portions of witnesses' faces led laypersons to change their decision-making strategies without eliciting negative biases. Lie detection results were partially replicated in Study 2, with laypersons in Canada, the United Kingdom, and the Netherlands (N = 291): observers' performance was better when witnesses wore either niqabs or hijabs than when witnesses did not wear veils. These findings suggest that, contrary to judicial opinion, niqabs do not interfere with-and may, in fact, improve-the ability to detect deception. (PsycINFO Database Record (c) 2016 APA, all rights reserved).
Disposition and health outcomes among infants born to mothers with no prenatal care.
Friedman, Susan Hatters; Heneghan, Amy; Rosenthal, Miriam
2009-02-01
This study assessed infant disposition and health outcomes among offspring born to mothers without prenatal care, based on maternal characteristics and the reason for lack of prenatal care (i.e., denial of pregnancy, concealment of pregnancy, primary substance use, financial barriers and multiparity). A retrospective record review was completed at an urban academic medical center. Subjects were women who presented at delivery or immediately postpartum with no history of prenatal care (N=211), and their infants. Infants of mothers with substance use problems had the highest rates of referral to child protective services and out-of-home placement at discharge, though mothers with other reasons for no prenatal care also experienced both referral and placement. Infants born to mothers using substances experienced the highest rates of neonatal intensive care unit admission, and the lowest mean birth weight. Though those without prenatal care experienced a variety of adverse outcomes, substance use problems were most frequently correlated with adverse infant outcomes. Mothers who either had lost custody of other children or with substance use problems were at highest risk of losing custody of their infants. Those who denied or concealed their pregnancy still frequently retained custody. Among mothers without prenatal care, those with substance use problems were least likely to retain custody of their infant at hospital discharge. Custody status of the mother's other children was also independently associated with infant custody. Mothers who denied or concealed their pregnancy still often retained custody. Referrals of mothers with no prenatal care for psychiatric evaluation were rare, though referrals to social work were frequent. Child protective services occasionally did not investigate referrals in the denial and concealment groups. Healthcare providers should be aware of the medical and psychological needs of this vulnerable population of infants and mothers.
Bruce, Douglas; Harper, Gary W.; Bauermeister, Jose A.
2015-01-01
Introduction Minority stress processes have been shown to have significant associations with negative mental health outcomes among sexual minority populations. Given that adversity may be experienced growing up as a sexual minority in heteronormative, if not heterosexist, environments, our research on resilience among sexual minority male youth proposes that positive identity development may buffer the effects of a range of minority stress processes. Methods An ethnically diverse sample of 200 sexual minority males ages 16–24 (mean age, 20.9 years) was recruited using mixed recruitment methods. We developed and tested two new measures: concealment stress during adolescence and sexual minority-related positive identity development. We then tested a path model that assessed the effects of minority stressors, positive identity development, and social support on major depressive symptoms. Results Experience of stigma was associated with internalized homophobia (β=.138, p<.05) and major depressive symptoms (β=1.076, OR=2.933, p<.001), and internalized homophobia partially mediated experience’s effects on major depression (β=.773, OR=2.167, p<.001). Concealment stress was associated with positive identity development (β=.155, p<.05) and internalized homophobia (β=.418, p<.001), and positive identity development partially mediated concealment stress’s effects on internalized homophobia (β=−.527, p<.001). Concealment stress demonstrated a direct effect on major depression (β=1.400, OR=4.056, p<.001), and indirect paths to social support through positive identity development. Conclusions With these results, we offer an exploratory model that empirically identifies significant paths among minority stress dimensions, positive identity development, and major depressive symptoms. This study helps further our understanding of minority stress, identity development, and resources of resilience among sexual minority male youth. PMID:26478901
Bruce, Douglas; Harper, Gary W; Bauermeister, Jose A
2015-09-01
Minority stress processes have been shown to have significant associations with negative mental health outcomes among sexual minority populations. Given that adversity may be experienced growing up as a sexual minority in heteronormative, if not heterosexist, environments, our research on resilience among sexual minority male youth proposes that positive identity development may buffer the effects of a range of minority stress processes. An ethnically diverse sample of 200 sexual minority males ages 16-24 (mean age, 20.9 years) was recruited using mixed recruitment methods. We developed and tested two new measures: concealment stress during adolescence and sexual minority-related positive identity development. We then tested a path model that assessed the effects of minority stressors, positive identity development, and social support on major depressive symptoms. Experience of stigma was associated with internalized homophobia (β=.138, p<.05) and major depressive symptoms (β=1.076, OR=2.933, p<.001), and internalized homophobia partially mediated experience's effects on major depression (β=.773, OR=2.167, p<.001). Concealment stress was associated with positive identity development (β=.155, p<.05) and internalized homophobia (β=.418, p<.001), and positive identity development partially mediated concealment stress's effects on internalized homophobia (β=-.527, p<.001). Concealment stress demonstrated a direct effect on major depression (β=1.400, OR=4.056, p<.001), and indirect paths to social support through positive identity development. With these results, we offer an exploratory model that empirically identifies significant paths among minority stress dimensions, positive identity development, and major depressive symptoms. This study helps further our understanding of minority stress, identity development, and resources of resilience among sexual minority male youth.
Psychosocial burden among offshore drilling platform employees.
Leszczyńska, Irena; Jeżewska, Maria
2010-01-01
Conditions of work on offshore drilling platforms are particularly hard due to extreme environmental situations created both by nature and technological processes. Oil drilling workers employed on the open sea are potentially exposed to permanently high stress. Apart from the obvious objective factors affecting drilling platform employees, a great role in the general work-related stress level is played by the working conditions and work-related psychosocial factors, defined according to Karask's concept as demands, control, and social support. A total of 184 drill platform workers were examined using objective and subjective research methods. The level of subjective stress among drilling platform workers is lower than the level of objective stress and the stress resulting from prognoses related with specificity of work in extremely hard conditions (audit). The examinations of drilling platform workers reveal a positive role of stress in psychological adaptation, being a special case of the "work ethos" and attachment to the firm. In such investigations of work-related stress on drilling platforms, which are very specific workplaces, a multi-aspect character, sociological and economic aspects, organizational culture conditions in the firm, and a tendency to conceal ailments and the stress experienced should be taken into account. It is important to apply measures referring to at least three different types of evidence (objective demands, subjective stress, health problems reported). Otherwise, the result reflecting work-related stress may not be objective and far from the truth.
A hybrid double-observer sightability model for aerial surveys
Griffin, Paul C.; Lubow, Bruce C.; Jenkins, Kurt J.; Vales, David J.; Moeller, Barbara J.; Reid, Mason; Happe, Patricia J.; Mccorquodale, Scott M.; Tirhi, Michelle J.; Schaberi, Jim P.; Beirne, Katherine
2013-01-01
Raw counts from aerial surveys make no correction for undetected animals and provide no estimate of precision with which to judge the utility of the counts. Sightability modeling and double-observer (DO) modeling are 2 commonly used approaches to account for detection bias and to estimate precision in aerial surveys. We developed a hybrid DO sightability model (model MH) that uses the strength of each approach to overcome the weakness in the other, for aerial surveys of elk (Cervus elaphus). The hybrid approach uses detection patterns of 2 independent observer pairs in a helicopter and telemetry-based detections of collared elk groups. Candidate MH models reflected hypotheses about effects of recorded covariates and unmodeled heterogeneity on the separate front-seat observer pair and back-seat observer pair detection probabilities. Group size and concealing vegetation cover strongly influenced detection probabilities. The pilot's previous experience participating in aerial surveys influenced detection by the front pair of observers if the elk group was on the pilot's side of the helicopter flight path. In 9 surveys in Mount Rainier National Park, the raw number of elk counted was approximately 80–93% of the abundance estimated by model MH. Uncorrected ratios of bulls per 100 cows generally were low compared to estimates adjusted for detection bias, but ratios of calves per 100 cows were comparable whether based on raw survey counts or adjusted estimates. The hybrid method was an improvement over commonly used alternatives, with improved precision compared to sightability modeling and reduced bias compared to DO modeling.
Hair camouflage: A comprehensive review.
Saed, Stephanie; Ibrahim, Omer; Bergfeld, Wilma F
2016-12-01
Hair is venerated, cherished, and desired in societies throughout the world. Both women and men express their individual identities through their hairstyles. Healthy hair contributes to successful social assimilation, employment, and overall quality of life. Therefore, hair loss can have detrimental effects on almost every aspect of a person's life. In this review, we discuss the myriad of options that aid in concealing and camouflaging hair loss to facilitate a healthier-appearing scalp. Camouflage options for patients who suffer from hair loss include full or partial wigs, hair extensions, concealing powders and sprays, surgical tattoos, and hair transplants. We describe these modalities in detail and discuss their respective advantages and disadvantages.
Hair camouflage: A comprehensive review.
Saed, Stephanie; Ibrahim, Omer; Bergfeld, Wilma F
2017-03-01
Hair is venerated, cherished, and desired in societies throughout the world. Both women and men express their individual identities through their hairstyles. Healthy hair contributes to successful social assimilation, employment, and overall quality of life. Therefore, hair loss can have detrimental effects on almost every aspect of a person's life. In this review, we discuss the myriad of options that aid in concealing and camouflaging hair loss to facilitate a healthier-appearing scalp. Camouflage options for patients who suffer from hair loss include full or partial wigs, hair extensions, concealing powders and sprays, surgical tattoos, and hair transplants. We describe these modalities in detail and discuss their respective advantages and disadvantages.
Strategies for nest-site selection by king eiders
Bentzen, R.L.; Powell, A.N.; Suydam, R.S.
2009-01-01
Nest site selection is a critical component of reproduction and has presumably evolved in relation to predation, local resources, and microclimate. We investigated nest-site choice by king eiders (Somateria spectabilis) on the coastal plain of northern Alaska, USA, 2003-2005. We hypothesized that nest-site selection is driven by predator avoidance and that a variety of strategies including concealment, seclusion, and conspecific or inter-specific nest defense might lead to improved nesting success. We systematically searched wetland basins for king eider nests and measured habitat and social variables at nests (n = 212) and random locations (n = 493). King eiders made use of both secluded and concealed breeding strategies; logistic regression models revealed that females selected nests close to water, on islands, and in areas with high willow (Salix spp.) cover but did not select sites near conspecific or glaucous gull (Larus hyperboreus) nests. The most effective nest-placement strategy may vary depending on density and types of nest predators; seclusion is likely a mammalian-predator avoidance tactic whereas concealment may provide protection from avian predators. We recommend that managers in northern Alaska attempt to maintain wetland basins with islands and complex shorelines to provide potential nest sites in the vicinity of water. ?? The Wildlife Society.
Rockenbach, Bettina; Milinski, Manfred
2011-11-08
Conflicts of interest between the community and its members are at the core of human social dilemmas. If observed selfishness has future costs, individuals may hide selfish acts but display altruistic ones, and peers aim at identifying the most selfish persons to avoid them as future social partners. An interaction involving hiding and seeking information may be inevitable. We staged an experimental social-dilemma game in which actors could pay to conceal information about their contribution, giving, and punishing decisions from an observer who selects her future social partners from the actors. The observer could pay to conceal her observation of the actors. We found sophisticated dynamic strategies on either side. Actors hide their severe punishment and low contributions but display high contributions. Observers select high contributors as social partners; remarkably, punishment behavior seems irrelevant for qualifying as a social partner. That actors nonetheless pay to conceal their severe punishment adds a further puzzle to the role of punishment in human social behavior. Competition between hiding and seeking information about social behavior may be even more relevant and elaborate in the real world but usually is hidden from our eyes.
JPEG2000-coded image error concealment exploiting convex sets projections.
Atzori, Luigi; Ginesu, Giaime; Raccis, Alessio
2005-04-01
Transmission errors in JPEG2000 can be grouped into three main classes, depending on the affected area: LL, high frequencies at the lower decomposition levels, and high frequencies at the higher decomposition levels. The first type of errors are the most annoying but can be concealed exploiting the signal spatial correlation like in a number of techniques proposed in the past; the second are less annoying but more difficult to address; the latter are often imperceptible. In this paper, we address the problem of concealing the second class or errors when high bit-planes are damaged by proposing a new approach based on the theory of projections onto convex sets. Accordingly, the error effects are masked by iteratively applying two procedures: low-pass (LP) filtering in the spatial domain and restoration of the uncorrupted wavelet coefficients in the transform domain. It has been observed that a uniform LP filtering brought to some undesired side effects that negatively compensated the advantages. This problem has been overcome by applying an adaptive solution, which exploits an edge map to choose the optimal filter mask size. Simulation results demonstrated the efficiency of the proposed approach.
A methodology for the optimisation of a mm-wave scanner
NASA Astrophysics Data System (ADS)
Stec, L. Zoë; Podd, Frank J. W.; Peyton, Anthony J.
2016-10-01
The need to detect non-metallic items under clothes to prevent terrorism at transport hubs is becoming vital. Millimetre wave technology is able to penetrate clothing, yet able to interact with objects concealed underneath. This paper considers active illumination using multiple transmitter and receiver antennas. The positioning of these antennas must achieve full body coverage, whilst minimising the number of antenna elements and the number of required measurements. It sets out a rapid simulation methodology, based on the Kirchhoff equations, to explore different scenarios for scanner architecture optimisation. The paper assumes that the electromagnetic waves used are at lower frequencies (say, 10-30 GHz) where the body temperature does not need to be considered. This range allows better penetration of clothing than higher frequencies, yet still provides adequate resolution. Since passengers vary greatly in shape and size, the system needs to be able to work well with a range of body morphologies. Thus we have used two very differently shaped avatars to test the portal simulations. This simulation tool allows many different avatars to be generated quickly. Findings from these simulations indicated that the dimensions of the avatar did indeed have an effect on the pattern of illumination, and that the data for each antenna pair can easily be combined to compare different antenna geometries for a given portal architecture, resulting in useful insights into antenna placement. The data generated could be analysed both quantitatively and qualitatively, at various levels of scale.