Detection and identification of concealed weapons using matrix pencil
NASA Astrophysics Data System (ADS)
Adve, Raviraj S.; Thayaparan, Thayananthan
2011-06-01
The detection and identification of concealed weapons is an extremely hard problem due to the weak signature of the target buried within the much stronger signal from the human body. This paper furthers the automatic detection and identification of concealed weapons by proposing the use of an effective approach to obtain the resonant frequencies in a measurement. The technique, based on Matrix Pencil, a scheme for model based parameter estimation also provides amplitude information, hence providing a level of confidence in the results. Of specific interest is the fact that Matrix Pencil is based on a singular value decomposition, making the scheme robust against noise.
25 CFR 11.444 - Carrying concealed weapons.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 25 Indians 1 2014-04-01 2014-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor unless...
25 CFR 11.444 - Carrying concealed weapons.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 25 Indians 1 2013-04-01 2013-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor unless...
25 CFR 11.444 - Carrying concealed weapons.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 25 Indians 1 2011-04-01 2011-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor unless...
25 CFR 11.444 - Carrying concealed weapons.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 25 Indians 1 2010-04-01 2010-04-01 false Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor unless...
25 CFR 11.444 - Carrying concealed weapons.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 25 Indians 1 2012-04-01 2011-04-01 true Carrying concealed weapons. 11.444 Section 11.444 Indians... ORDER CODE Criminal Offenses § 11.444 Carrying concealed weapons. A person who goes about in public places armed with a dangerous weapon concealed upon his or her person is guilty of a misdemeanor unless...
Goldstein, Adam O; Viera, Anthony J; Pierson, John; Barnhouse, Kathy K; Tulsky, James A; Richman, Barak D
2015-06-01
Law enforcement officials have asked health care providers to evaluate patient applications for concealed weapon permits. The current study was designed to examine physician beliefs regarding competency to carry a concealed weapon for patients with specific physical and mental conditions. Among 222 North Carolina physicians who participated in this survey (40% response rate), large variation and uncertainty existed for determining competency. Physicians most frequently chose mild dementia, post-traumatic stress disorder, and recent depression as conditions that would render a patient not competent to carry a concealed weapon. Male physicians and those owning a gun were more likely to deem a patient competent. Almost a third of physicians were unsure about competence for most conditions. Physicians asked to assess competency of patients to carry a concealed weapon have quite disparate views on competency and little confidence in their decisions. If physicians are expected to assess patient competence to carry a concealed weapon, more objective criteria and training are needed. Copyright © 2015 John Wiley & Sons, Ltd.
Fusion of radar and ultrasound sensors for concealed weapons detection
NASA Astrophysics Data System (ADS)
Felber, Franklin S.; Davis, Herbert T., III; Mallon, Charles E.; Wild, Norbert C.
1996-06-01
An integrated radar and ultrasound sensor, capable of remotely detecting and imaging concealed weapons, is being developed. A modified frequency-agile, mine-detection radar is intended to specify with high probability of detection at ranges of 1 to 10 m which individuals in a moving crowd may be concealing metallic or nonmetallic weapons. Within about 1 to 5 m, the active ultrasound sensor is intended to enable a user to identify a concealed weapon on a moving person with low false-detection rate, achieved through a real-time centimeter-resolution image of the weapon. The goal for sensor fusion is to have the radar acquire concealed weapons at long ranges and seamlessly hand over tracking data to the ultrasound sensor for high-resolution imaging on a video monitor. We have demonstrated centimeter-resolution ultrasound images of metallic and non-metallic weapons concealed on a human at ranges over 1 m. Processing of the ultrasound images includes filters for noise, frequency, brightness, and contrast. A frequency-agile radar has been developed by JAYCOR under the U.S. Army Advanced Mine Detection Radar Program. The signature of an armed person, detected by this radar, differs appreciably from that of the same person unarmed.
2005-01-01
Nations Observer Badges, Defense Intelligence Agency identification, and a Federal Concealed Weapons Permit—to Edward Feltus , a member of the New...federal weap- ons charges, and in May 2004 were sentenced to 135 months and 57 months in federal custody, respectively. Feltus pled guilty to
Concealed weapons detection using electromagnetic resonances
NASA Astrophysics Data System (ADS)
Hunt, Allen R.; Hogg, R. Douglas; Foreman, William
1998-12-01
Concealed weapons pose a significant threat to both law enforcement and security agency personnel. The uncontrolled environments associated with peacekeeping and the move toward relaxation of concealed weapons laws here in the U.S. provide a strong motivation for developing weapons detection technologies which are noninvasive and can function noncooperatively. Existing weapons detection systems are primarily oriented to detecting metal and require the cooperation of the person being searched. The new generation of detectors under development that focuses primarily on imaging methods, faces problems associated with privacy issues. There remains a need for a weapons detector which is portable, detects weapons remotely, avoids the issues associated with privacy rights, can tell the difference between car keys and a knife, and is affordable enough that one can be issued to every peacekeeper and law enforcement officer. AKELA is developing a concealed weapons detector that uses wideband radar techniques to excite natural electromagnetic resonances that characterize the size, shape, and material composition of an object. Neural network processing is used to classify the difference between weapons and nuisance objects. We have constructed both time and frequency domain test systems and used them to gather experimental data on a variety of armed and unarmed individuals. These experiments have been performed in an environment similar to the operational environment. Preliminary results from these experiments show that it is possible to detect a weapon being carried by an individual from a distance of 10 to 15 feet, and to detect a weapon being concealed behind the back. The power required is about 100 milliwatts. A breadboard system is being fabricated and will be used by AKELA and our law enforcement partner to gather data in operationally realistic situations. While a laptop computer will control the breadboard system, the wideband radar electronics will fit in a box the size of a CD ROM drive of a computer.
Microwave Technique for Detecting and Locating Concealed Weapons
DOT National Transportation Integrated Search
1971-12-01
The subject of this report is the evaluation of a microwave technique for detecting and locating weapons concealed under clothing. The principal features of this technique are: persons subjected to search are not exposed to 'objectional' microwave ra...
Open-area concealed-weapon detection system
NASA Astrophysics Data System (ADS)
Pati, P.; Mather, P.
2011-06-01
Concealed Weapon Detection (CWD) has become a significant challenge to present day security needs; individuals carrying weapons into airplanes, schools, and secured establishments are threat to public security. Although controlled screening, of people for concealed weapons, has been employed in many establishments, procedures and equipment are designed to work in restricted environments like airport passport control, military checkpoints, hospitals, school and university entrance. Furthermore, screening systems do not effectively decipher between threat and non-threat metal objects, thus leading to high rate of false alarms which can become a liability to daily operational needs of establishments. Therefore, the design and development of a new CWD system to operate in a large open area environment with large numbers of people reduced incidences of false alarms and increased location accuracy is essential.
Passive millimeter-wave concealed weapon detection
NASA Astrophysics Data System (ADS)
Sinclair, Gordon N.; Anderton, Rupert N.; Appleby, Roger
2001-02-01
A method of detecting weapons concealed under clothing using passive millimeter wave imaging is described. The optical properties of clothing are discussed and examples given of the spectral reflectivity and transmission. The transmission tends to be constant from 60 to 150 GHz above which it decreases for some clothing materials. The transmission of a cotton T-shirt is typically 95% and of a leather jacket up to 85% at lower frequencies. A model is presented for calculating the contrast of a metallic concealed weapon when hidden under clothing and it indicates contrasts as large as 200 K can be realized outdoors. The advantages of real time over static frame imagery are discussed. It is concluded that real time imagery offers considerable advantages as weapons can be very varied in size, position and orientation and movement offers vital clues to the human observer which aid the recognition process.
Guns on Campus: A Current Debate. E-Fact Sheet
ERIC Educational Resources Information Center
Higher Education Center for Alcohol, Drug Abuse, and Violence Prevention, 2010
2010-01-01
Almost all U.S. college campuses ban concealed weapons. But in the aftermath of the tragic shooting deaths at Virginia Tech in 2007, the debate on whether guns should be permitted at colleges and universities has intensified. Dozens of states have considered proposals to lift bans on concealed weapons at colleges and universities, but so far none…
Campaign for Right to Carry Concealed Guns on Campuses Gains Traction
ERIC Educational Resources Information Center
Wiseman, Rachel
2012-01-01
Five years after the Virginia Tech massacre prompted a student in Texas to start a Facebook page in favor of the right to carry concealed weapons on college campuses, the resulting group, Students for Concealed Carry, has advanced its cause. In more than a dozen states, legislation has been introduced to allow the carrying of concealed firearms on…
Protection of Public Figures. Symposium Proceedings, May 16-18, 1972
1972-01-01
192 EXPLOSIVE TRACE VAPOR DETECTION, Maryland D. Keyrw, USAMERDC.. 194 ATOMIC AND MOLECULAR DETECTION...subject through a doorway, a hallway, a portal, a fence, and thus subject him to co- vert surveillance for weapons or explosives concealed on his person...who has weapons or conceal- ed explosives on his person. So insofar as 4ERDC is concerned, the two broad scenarios that we will be talking about are
Image fusion based on millimeter-wave for concealed weapon detection
NASA Astrophysics Data System (ADS)
Zhu, Weiwen; Zhao, Yuejin; Deng, Chao; Zhang, Cunlin; Zhang, Yalin; Zhang, Jingshui
2010-11-01
This paper describes a novel multi sensors image fusion technology which is presented for concealed weapon detection (CWD). It is known to all, because of the good transparency of the clothes at millimeter wave band, a millimeter wave radiometer can be used to image and distinguish concealed contraband beneath clothes, for example guns, knives, detonator and so on. As a result, we adopt the passive millimeter wave (PMMW) imaging technology for airport security. However, in consideration of the wavelength of millimeter wave and the single channel mechanical scanning, the millimeter wave image has law optical resolution, which can't meet the need of practical application. Therefore, visible image (VI), which has higher resolution, is proposed for the image fusion with the millimeter wave image to enhance the readability. Before the image fusion, a novel image pre-processing which specifics to the fusion of millimeter wave imaging and visible image is adopted. And in the process of image fusion, multi resolution analysis (MRA) based on Wavelet Transform (WT) is adopted. In this way, the experiment result shows that this method has advantages in concealed weapon detection and has practical significance.
7 CFR 502.13 - Weapons and explosives.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 6 2010-01-01 2010-01-01 false Weapons and explosives. 502.13 Section 502.13....13 Weapons and explosives. No person while in or on BARC property shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except as officially authorized for...
36 CFR 520.15 - Weapons and explosives.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 36 Parks, Forests, and Public Property 3 2012-07-01 2012-07-01 false Weapons and explosives. 520... Weapons and explosives. No person while on the premises shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except for official purposes, nor shall any person...
7 CFR 501.12 - Weapons and explosives.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 6 2014-01-01 2014-01-01 false Weapons and explosives. 501.12 Section 501.12... OF AGRICULTURE CONDUCT ON U.S. MEAT ANIMAL RESEARCH CENTER, CLAY CENTER, NEBRASKA § 501.12 Weapons... arrows, darts, other dangerous or deadly weapons, or explosives, either openly or concealed, except as...
7 CFR 501.12 - Weapons and explosives.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 6 2012-01-01 2012-01-01 false Weapons and explosives. 501.12 Section 501.12... OF AGRICULTURE CONDUCT ON U.S. MEAT ANIMAL RESEARCH CENTER, CLAY CENTER, NEBRASKA § 501.12 Weapons... arrows, darts, other dangerous or deadly weapons, or explosives, either openly or concealed, except as...
36 CFR 520.15 - Weapons and explosives.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 36 Parks, Forests, and Public Property 3 2011-07-01 2011-07-01 false Weapons and explosives. 520... Weapons and explosives. No person while on the premises shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except for official purposes, nor shall any person...
7 CFR 500.12 - Weapons and explosives.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 6 2014-01-01 2014-01-01 false Weapons and explosives. 500.12 Section 500.12... OF AGRICULTURE NATIONAL ARBORETUM Conduct on U.S. National Arboreturm Property § 500.12 Weapons and... weapons, or explosives, either openly or concealed, except for authorized official purposes. (b) No person...
15 CFR 265.39 - Weapons and explosives.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 15 Commerce and Foreign Trade 1 2012-01-01 2012-01-01 false Weapons and explosives. 265.39 Section..., GAITHERSBURG, MARYLAND, AND BOULDER AND FORT COLLINS, COLORADO Buildings and Grounds § 265.39 Weapons and... dangerous or deadly weapons or materials, or explosives, either openly or concealed, without the written...
7 CFR 501.12 - Weapons and explosives.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 6 2010-01-01 2010-01-01 false Weapons and explosives. 501.12 Section 501.12... OF AGRICULTURE CONDUCT ON U.S. MEAT ANIMAL RESEARCH CENTER, CLAY CENTER, NEBRASKA § 501.12 Weapons... arrows, darts, other dangerous or deadly weapons, or explosives, either openly or concealed, except as...
7 CFR 501.12 - Weapons and explosives.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 7 Agriculture 6 2011-01-01 2011-01-01 false Weapons and explosives. 501.12 Section 501.12... OF AGRICULTURE CONDUCT ON U.S. MEAT ANIMAL RESEARCH CENTER, CLAY CENTER, NEBRASKA § 501.12 Weapons... arrows, darts, other dangerous or deadly weapons, or explosives, either openly or concealed, except as...
31 CFR 91.13 - Weapons and explosives.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 31 Money and Finance: Treasury 1 2011-07-01 2011-07-01 false Weapons and explosives. 91.13 Section... GROUNDS § 91.13 Weapons and explosives. No person while on the property shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except for official purposes. ...
7 CFR 502.13 - Weapons and explosives.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 7 Agriculture 6 2014-01-01 2014-01-01 false Weapons and explosives. 502.13 Section 502.13....13 Weapons and explosives. No person while in or on BARC property shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except as officially authorized for...
15 CFR 265.39 - Weapons and explosives.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 15 Commerce and Foreign Trade 1 2011-01-01 2011-01-01 false Weapons and explosives. 265.39 Section..., GAITHERSBURG, MARYLAND, AND BOULDER AND FORT COLLINS, COLORADO Buildings and Grounds § 265.39 Weapons and... dangerous or deadly weapons or materials, or explosives, either openly or concealed, without the written...
36 CFR 520.15 - Weapons and explosives.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Weapons and explosives. 520... Weapons and explosives. No person while on the premises shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except for official purposes, nor shall any person...
7 CFR 501.12 - Weapons and explosives.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 7 Agriculture 6 2013-01-01 2013-01-01 false Weapons and explosives. 501.12 Section 501.12... OF AGRICULTURE CONDUCT ON U.S. MEAT ANIMAL RESEARCH CENTER, CLAY CENTER, NEBRASKA § 501.12 Weapons... arrows, darts, other dangerous or deadly weapons, or explosives, either openly or concealed, except as...
7 CFR 500.12 - Weapons and explosives.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 6 2012-01-01 2012-01-01 false Weapons and explosives. 500.12 Section 500.12... OF AGRICULTURE NATIONAL ARBORETUM Conduct on U.S. National Arboreturm Property § 500.12 Weapons and... weapons, or explosives, either openly or concealed, except for authorized official purposes. (b) No person...
15 CFR 265.39 - Weapons and explosives.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 15 Commerce and Foreign Trade 1 2014-01-01 2014-01-01 false Weapons and explosives. 265.39 Section..., GAITHERSBURG, MARYLAND, AND BOULDER AND FORT COLLINS, COLORADO Buildings and Grounds § 265.39 Weapons and... dangerous or deadly weapons or materials, or explosives, either openly or concealed, without the written...
7 CFR 500.12 - Weapons and explosives.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 7 Agriculture 6 2011-01-01 2011-01-01 false Weapons and explosives. 500.12 Section 500.12... OF AGRICULTURE NATIONAL ARBORETUM Conduct on U.S. National Arboreturm Property § 500.12 Weapons and... weapons, or explosives, either openly or concealed, except for authorized official purposes. (b) No person...
7 CFR 502.13 - Weapons and explosives.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 7 Agriculture 6 2012-01-01 2012-01-01 false Weapons and explosives. 502.13 Section 502.13....13 Weapons and explosives. No person while in or on BARC property shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except as officially authorized for...
31 CFR 91.13 - Weapons and explosives.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 31 Money and Finance: Treasury 1 2012-07-01 2012-07-01 false Weapons and explosives. 91.13 Section... GROUNDS § 91.13 Weapons and explosives. No person while on the property shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except for official purposes. ...
7 CFR 500.12 - Weapons and explosives.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 6 2010-01-01 2010-01-01 false Weapons and explosives. 500.12 Section 500.12... OF AGRICULTURE NATIONAL ARBORETUM Conduct on U.S. National Arboreturm Property § 500.12 Weapons and... weapons, or explosives, either openly or concealed, except for authorized official purposes. (b) No person...
7 CFR 502.13 - Weapons and explosives.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 7 Agriculture 6 2013-01-01 2013-01-01 false Weapons and explosives. 502.13 Section 502.13....13 Weapons and explosives. No person while in or on BARC property shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except as officially authorized for...
15 CFR 265.39 - Weapons and explosives.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 15 Commerce and Foreign Trade 1 2013-01-01 2013-01-01 false Weapons and explosives. 265.39 Section..., GAITHERSBURG, MARYLAND, AND BOULDER AND FORT COLLINS, COLORADO Buildings and Grounds § 265.39 Weapons and... dangerous or deadly weapons or materials, or explosives, either openly or concealed, without the written...
31 CFR 91.13 - Weapons and explosives.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 31 Money and Finance: Treasury 1 2014-07-01 2014-07-01 false Weapons and explosives. 91.13 Section... GROUNDS § 91.13 Weapons and explosives. No person while on the property shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except for official purposes. ...
31 CFR 91.13 - Weapons and explosives.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 31 Money and Finance: Treasury 1 2013-07-01 2013-07-01 false Weapons and explosives. 91.13 Section... GROUNDS § 91.13 Weapons and explosives. No person while on the property shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except for official purposes. ...
36 CFR 520.15 - Weapons and explosives.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 36 Parks, Forests, and Public Property 3 2014-07-01 2014-07-01 false Weapons and explosives. 520... Weapons and explosives. No person while on the premises shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except for official purposes, nor shall any person...
7 CFR 502.13 - Weapons and explosives.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 7 Agriculture 6 2011-01-01 2011-01-01 false Weapons and explosives. 502.13 Section 502.13....13 Weapons and explosives. No person while in or on BARC property shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except as officially authorized for...
7 CFR 500.12 - Weapons and explosives.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 7 Agriculture 6 2013-01-01 2013-01-01 false Weapons and explosives. 500.12 Section 500.12... OF AGRICULTURE NATIONAL ARBORETUM Conduct on U.S. National Arboreturm Property § 500.12 Weapons and... weapons, or explosives, either openly or concealed, except for authorized official purposes. (b) No person...
Standoff concealed weapon detection using a 350-GHz radar imaging system
NASA Astrophysics Data System (ADS)
Sheen, David M.; Hall, Thomas E.; Severtsen, Ronald H.; McMakin, Douglas L.; Hatchell, Brian K.; Valdez, Patrick L. J.
2010-04-01
The sub-millimeter (sub-mm) wave frequency band from 300 - 1000 GHz is currently being developed for standoff concealed weapon detection imaging applications. This frequency band is of interest due to the unique combination of high resolution and clothing penetration. The Pacific Northwest National Laboratory (PNNL) is currently developing a 350 GHz, active, wideband, three-dimensional, radar imaging system to evaluate the feasibility of active sub-mm imaging for standoff detection. Standoff concealed weapon and explosive detection is a pressing national and international need for both civilian and military security, as it may allow screening at safer distances than portal screening techniques. PNNL has developed a prototype active wideband 350 GHz radar imaging system based on a wideband, heterodyne, frequency-multiplier-based transceiver system coupled to a quasi-optical focusing system and high-speed rotating conical scanner. This prototype system operates at ranges up to 10+ meters, and can acquire an image in 10 - 20 seconds, which is fast enough to scan cooperative personnel for concealed weapons. The wideband operation of this system provides accurate ranging information, and the images obtained are fully three-dimensional. During the past year, several improvements to the system have been designed and implemented, including increased imaging speed using improved balancing techniques, wider bandwidth, and improved image processing techniques. In this paper, the imaging system is described in detail and numerous imaging results are presented.
36 CFR § 520.15 - Weapons and explosives.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 36 Parks, Forests, and Public Property 3 2013-07-01 2012-07-01 true Weapons and explosives. § 520... § 520.15 Weapons and explosives. No person while on the premises shall carry firearms, other dangerous or deadly weapons, or explosives, either openly or concealed, except for official purposes, nor shall...
Color image fusion for concealed weapon detection
NASA Astrophysics Data System (ADS)
Toet, Alexander
2003-09-01
Recent advances in passive and active imaging sensor technology offer the potential to detect weapons that are concealed underneath a person's clothing or carried along in bags. Although the concealed weapons can sometimes easily be detected, it can be difficult to perceive their context, due to the non-literal nature of these images. Especially for dynamic crowd surveillance purposes it may be impossible to rapidly asses with certainty which individual in the crowd is the one carrying the observed weapon. Sensor fusion is an enabling technology that may be used to solve this problem. Through fusion the signal of the sensor that depicts the weapon can be displayed in the context provided by a sensor of a different modality. We propose an image fusion scheme in which non-literal imagery can be fused with standard color images such that the result clearly displays the observed weapons in the context of the original color image. The procedure is such that the relevant contrast details from the non-literal image are transferred to the color image without altering the original color distribution of this image. The result is a natural looking color image that fluently combines all details from both input sources. When an observer who performs a dynamic crowd surveillance task, detects a weapon in the scene, he will also be able to quickly determine which person in the crowd is actually carrying the observed weapon (e.g. "the man with the red T-shirt and blue jeans"). The method is illustrated by the fusion of thermal 8-12 μm imagery with standard RGB color images.
Specific NIST projects in support of the NIJ Concealed Weapon Detection and Imaging Program
NASA Astrophysics Data System (ADS)
Paulter, Nicholas G.
1998-12-01
The Electricity Division of the National Institute of Standards and Technology is developing revised performance standards for hand-held (HH) and walk-through (WT) metal weapon detectors, test procedures and systems for these detectors, and a detection/imaging system for finding concealed weapons. The revised standards will replace the existing National Institute of Justice (NIJ) standards for HH and WT devices and will include detection performance specifications as well as system specifications (environmental conditions, mechanical strength and safety, response reproducibility and repeatability, quality assurance, test reporting, etc.). These system requirements were obtained from the Law Enforcement and corrections Technology Advisory Council, an advisory council for the NIJ. Reproducible and repeatable test procedures and appropriate measurement systems will be developed for evaluating HH and WT detection performance. A guide to the technology and application of non- eddy-current-based detection/imaging methods (such as acoustic, passive millimeter-wave and microwave, active millimeter-wave and terahertz-wave, x-ray, etc.) Will be developed. The Electricity Division is also researching the development of a high- frequency/high-speed (300 GH to 1 THz) pulse-illuminated, stand- off, video-rate, concealed weapons/contraband imaging system.
NASA Astrophysics Data System (ADS)
Yeom, Seokwon
2013-05-01
Millimeter waves imaging draws increasing attention in security applications for weapon detection under clothing. In this paper, concealed object segmentation and three-dimensional localization schemes are reviewed. A concealed object is segmented by the k-means algorithm. A feature-based stereo-matching method estimates the longitudinal distance of the concealed object. The distance is estimated by the discrepancy between the corresponding centers of the segmented objects. Experimental results are provided with the analysis of the depth resolution.
Detection and classification of concealed weapons using a magnetometer-based portal
NASA Astrophysics Data System (ADS)
Kotter, Dale K.; Roybal, Lyle G.; Polk, Robert E.
2002-08-01
A concealed weapons detection technology was developed through the support of the National Institute of Justice (NIJ) to provide a non intrusive means for rapid detection, location, and archiving of data (including visual) of potential suspects and weapon threats. This technology, developed by the Idaho National Engineering and Environmental Laboratory (INEEL), has been applied in a portal style weapons detection system using passive magnetic sensors as its basis. This paper will report on enhancements to the weapon detection system to enable weapon classification and to discriminate threats from non-threats. Advanced signal processing algorithms were used to analyze the magnetic spectrum generated when a person passes through a portal. These algorithms analyzed multiple variables including variance in the magnetic signature from random weapon placement and/or orientation. They perform pattern recognition and calculate the probability that the collected magnetic signature correlates to a known database of weapon versus non-weapon responses. Neural networks were used to further discriminate weapon type and identify controlled electronic items such as cell phones and pagers. False alarms were further reduced by analyzing the magnetic detector response by using a Joint Time Frequency Analysis digital signal processing technique. The frequency components and power spectrum for a given sensor response were derived. This unique fingerprint provided additional information to aid in signal analysis. This technology has the potential to produce major improvements in weapon detection and classification.
Portable concealed weapon detection using millimeter-wave FMCW radar imaging
NASA Astrophysics Data System (ADS)
Johnson, Michael A.; Chang, Yu-Wen
2001-02-01
Unobtrusive detection of concealed weapons on persons or in abandoned bags would provide law enforcement a powerful tool to focus resources and increase traffic throughput in high- risk situations. We have developed a fast image scanning 94 GHz radar system that is suitable for portable operation and remote viewing of radar data. This system includes a novel fast image-scanning antenna that allows for the acquisition of medium resolution 3D millimeter wave images of stationary targets with frame times on order of one second. The 3D radar data allows for potential isolation of concealed weapons from body and environmental clutter such as nearby furniture or other people. The radar is an active system so image quality is not affected indoors, emitted power is however very low so there are no health concerns for operator or targets. The low power operation is still sufficient to penetrate heavy clothing or material. Small system size allows for easy transport and rapid deployment of the system as well as an easy migration path to future hand held systems.
Ethics and Leadership: Integration or Disharmony
2013-03-01
recent studies confirm that chemical, biological and several varieties of remote weapons could also become much more deadly and easier to conceal...include the expansion of terrorism and guerrilla warfare, the use of new weapons , new forms of political associations, and new moral and political...specific weapons , but, as with many aspects of the law, existing standards are inadequate for contemporary technologies and circumstances.൸
15 CFR 742.9 - Anti-terrorism: Syria.
Code of Federal Regulations, 2014 CFR
2014-01-01
... will generally be denied: (i) Items that are controlled for chemical and biological weapons... fertilizers containing ammonium nitrate, controlled under ECCN 1C997. (xi) Technology for the production of Chemical Weapons Convention (CWC) Schedule 2 and 3 chemicals controlled under ECCN 1E355. (xii) Concealed...
44 CFR 15.15 - Weapons and explosives.
Code of Federal Regulations, 2013 CFR
2013-10-01
... HOMELAND SECURITY GENERAL CONDUCT AT THE MT. WEATHER EMERGENCY ASSISTANCE CENTER AND AT THE NATIONAL EMERGENCY TRAINING CENTER § 15.15 Weapons and explosives. No person entering or while at Mt. Weather or the... openly or concealed, except: (a) For official purposes if the Administrator, Mt. Weather Executive...
44 CFR 15.15 - Weapons and explosives.
Code of Federal Regulations, 2010 CFR
2010-10-01
... HOMELAND SECURITY GENERAL CONDUCT AT THE MT. WEATHER EMERGENCY ASSISTANCE CENTER AND AT THE NATIONAL EMERGENCY TRAINING CENTER § 15.15 Weapons and explosives. No person entering or while at Mt. Weather or the... openly or concealed, except: (a) For official purposes if the Administrator, Mt. Weather Executive...
44 CFR 15.15 - Weapons and explosives.
Code of Federal Regulations, 2012 CFR
2012-10-01
... HOMELAND SECURITY GENERAL CONDUCT AT THE MT. WEATHER EMERGENCY ASSISTANCE CENTER AND AT THE NATIONAL EMERGENCY TRAINING CENTER § 15.15 Weapons and explosives. No person entering or while at Mt. Weather or the... openly or concealed, except: (a) For official purposes if the Administrator, Mt. Weather Executive...
44 CFR 15.15 - Weapons and explosives.
Code of Federal Regulations, 2014 CFR
2014-10-01
... HOMELAND SECURITY GENERAL CONDUCT AT THE MT. WEATHER EMERGENCY ASSISTANCE CENTER AND AT THE NATIONAL EMERGENCY TRAINING CENTER § 15.15 Weapons and explosives. No person entering or while at Mt. Weather or the... openly or concealed, except: (a) For official purposes if the Administrator, Mt. Weather Executive...
44 CFR 15.15 - Weapons and explosives.
Code of Federal Regulations, 2011 CFR
2011-10-01
... HOMELAND SECURITY GENERAL CONDUCT AT THE MT. WEATHER EMERGENCY ASSISTANCE CENTER AND AT THE NATIONAL EMERGENCY TRAINING CENTER § 15.15 Weapons and explosives. No person entering or while at Mt. Weather or the... openly or concealed, except: (a) For official purposes if the Administrator, Mt. Weather Executive...
Small threat and contraband detection with TNA-based systems.
Shaw, T J; Brown, D; D'Arcy, J; Liu, F; Shea, P; Sivakumar, M; Gozani, T
2005-01-01
The detection of small threats, such as explosives, drugs, and chemical weapons, concealed or encased in surrounding material, is a major concern in areas from security checkpoints to UneXploded Ordnance (UXO) clearance. Techniques such as X-ray and trace detection are often ineffectual in these applications. Thermal neutron analysis (TNA) provides an effective method for detecting concealed threats. This paper shows the effectiveness of Ancore's SPEDS, based on TNA, in detecting concealed liquid threats and differentiating live from inert mortar shells.
Veteran Transfer Students and Concealed Weapons on Campus
ERIC Educational Resources Information Center
Pesetski, Christine; Ofstein, Jennifer; Outlaw, Stacy; Brooks, Racheal
2014-01-01
This case details the challenges faced by various members of a 4-year university regarding Kathryn, a non-traditional transfer student and military veteran who recently returned from a traumatic deployment in Afghanistan. Precisely, this study identifies ambiguities pertaining to (a) threat assessment, (b) university weapons policies, (c) transfer…
27 CFR 479.11 - Meaning of terms.
Code of Federal Regulations, 2014 CFR
2014-04-01
.... Any other weapon. Any weapon or device capable of being concealed on the person from which a shot can...) missile having an explosive or incendiary charge of more than one-quarter ounce, (5) mine, or (6) similar... have a bore of more than one-half inch in diameter, except a shotgun or shotgun shell which the...
27 CFR 479.11 - Meaning of terms.
Code of Federal Regulations, 2013 CFR
2013-04-01
.... Any other weapon. Any weapon or device capable of being concealed on the person from which a shot can...) missile having an explosive or incendiary charge of more than one-quarter ounce, (5) mine, or (6) similar... have a bore of more than one-half inch in diameter, except a shotgun or shotgun shell which the...
27 CFR 479.11 - Meaning of terms.
Code of Federal Regulations, 2010 CFR
2010-04-01
.... Any other weapon. Any weapon or device capable of being concealed on the person from which a shot can...) missile having an explosive or incendiary charge of more than one-quarter ounce, (5) mine, or (6) similar... have a bore of more than one-half inch in diameter, except a shotgun or shotgun shell which the...
27 CFR 479.11 - Meaning of terms.
Code of Federal Regulations, 2012 CFR
2012-04-01
.... Any other weapon. Any weapon or device capable of being concealed on the person from which a shot can...) missile having an explosive or incendiary charge of more than one-quarter ounce, (5) mine, or (6) similar... have a bore of more than one-half inch in diameter, except a shotgun or shotgun shell which the...
27 CFR 479.11 - Meaning of terms.
Code of Federal Regulations, 2011 CFR
2011-04-01
.... Any other weapon. Any weapon or device capable of being concealed on the person from which a shot can...) missile having an explosive or incendiary charge of more than one-quarter ounce, (5) mine, or (6) similar... have a bore of more than one-half inch in diameter, except a shotgun or shotgun shell which the...
Ultra-wide-band 3D microwave imaging scanner for the detection of concealed weapons
NASA Astrophysics Data System (ADS)
Rezgui, Nacer-Ddine; Andrews, David A.; Bowring, Nicholas J.
2015-10-01
The threat of concealed weapons, explosives and contraband in footwear, bags and suitcases has led to the development of new devices, which can be deployed for security screening. To address known deficiencies of metal detectors and x-rays, an UWB 3D microwave imaging scanning apparatus using FMCW stepped frequency working in the K and Q bands and with a planar scanning geometry based on an x y stage, has been developed to screen suspicious luggage and footwear. To obtain microwave images of the concealed weapons, the targets are placed above the platform and the single transceiver horn antenna attached to the x y stage is moved mechanically to perform a raster scan to create a 2D synthetic aperture array. The S11 reflection signal of the transmitted sweep frequency from the target is acquired by a VNA in synchronism with each position step. To enhance and filter from clutter and noise the raw data and to obtain the 2D and 3D microwave images of the concealed weapons or explosives, data processing techniques are applied to the acquired signals. These techniques include background subtraction, Inverse Fast Fourier Transform (IFFT), thresholding, filtering by gating and windowing and deconvolving with the transfer function of the system using a reference target. To focus the 3D reconstructed microwave image of the target in range and across the x y aperture without using focusing elements, 3D Synthetic Aperture Radar (SAR) techniques are applied to the post-processed data. The K and Q bands, between 15 to 40 GHz, show good transmission through clothing and dielectric materials found in luggage and footwear. A description of the system, algorithms and some results with replica guns and a comparison of microwave images obtained by IFFT, 2D and 3D SAR techniques are presented.
Non-Linear Acoustic Concealed Weapons Detector
2006-05-01
signature analysis 8 the interactions of the beams with concealed objects. The Khokhlov- Zabolotskaya-Kuznetsov ( KZK ) equation is the most widely used...Hamilton developed a finite difference method based on the KZK equation to model pulsed acoustic emissions from axial symmetric sources. Using a...College of William & Mary, we have developed a simulation code using the KZK equation to model non-linear acoustic beams and visualize beam patterns
Noise analysis for near field 3-D FM-CW radar imaging systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sheen, David M.
2015-06-19
Near field radar imaging systems are used for several applications including concealed weapon detection in airports and other high-security venues. Despite the near-field operation, phase noise and thermal noise can limit the performance in several ways including reduction in system sensitivity and reduction of image dynamic range. In this paper, the effects of thermal noise, phase noise, and processing gain are analyzed in the context of a near field 3-D FM-CW imaging radar as might be used for concealed weapon detection. In addition to traditional frequency domain analysis, a time-domain simulation is employed to graphically demonstrate the effect of thesemore » noise sources on a fast-chirping FM-CW system.« less
Millimeter wave imaging for concealed weapon detection and surveillance at up to 220 GHz
NASA Astrophysics Data System (ADS)
Stanko, S.; Nötel, D.; Huck, J.; Wirtz, S.; Klöppel, F.; Essen, H.
2008-04-01
Sensors used for security purposes have to cover the non-invasive control of men and direct surroundings of buildings and camps to detect weapons, explosives and chemical or biological threat material. Those sensors have to cope with different environmental conditions. Ideally, the control of people has to be done at a longer distance as standoff detection. The work described in this paper concentrates on passive radiometric sensors at 0.1 and 0.2 THz which are able to detect non-metallic objects like ceramic knifes. Also the identification of objects like mobile phones or PDAs will be shown. Additionally, standoff surveillance is possible, which is of high importance with regard to suicide bombers. The presentation will include images at both mentioned frequencies comparing the efficiency in terms of range and resolution. In addition, the concept of the sensor design showing a Dicke-type 220GHz radiometer using new LNAs and the results along with image enhancement methods are shown. 2.1 Main principle
Campaigns to Overrule Campus Gun Bans Have Failed in Many States
ERIC Educational Resources Information Center
Lipka, Sara
2008-01-01
People can bring guns most places in Arizona, but the state's Board of Regents has long banned all weapons from public college campuses. Now some lawmakers are trying to change that. State Senator Karen S. Johnson, a Republican, proposed a bill in January that would trump the regents' ban, allowing anyone with a concealed-weapons permit to carry a…
NASA Astrophysics Data System (ADS)
Murrill, Steven R.; Franck, Charmaine C.; Espinola, Richard L.; Petkie, Douglas T.; De Lucia, Frank C.; Jacobs, Eddie L.
2011-11-01
The U.S. Army Research Laboratory (ARL) and the U.S. Army Night Vision and Electronic Sensors Directorate (NVESD) have developed a terahertz-band imaging system performance model/tool for detection and identification of concealed weaponry. The details of the MATLAB-based model which accounts for the effects of all critical sensor and display components, and for the effects of atmospheric attenuation, concealment material attenuation, and active illumination, were reported on at the 2005 SPIE Europe Security & Defence Symposium (Brugge). An advanced version of the base model that accounts for both the dramatic impact that target and background orientation can have on target observability as related to specular and Lambertian reflections captured by an active-illumination-based imaging system, and for the impact of target and background thermal emission, was reported on at the 2007 SPIE Defense and Security Symposium (Orlando). This paper will provide a comprehensive review of an enhanced, user-friendly, Windows-executable, terahertz-band imaging system performance analysis and design tool that now includes additional features such as a MODTRAN-based atmospheric attenuation calculator and advanced system architecture configuration inputs that allow for straightforward performance analysis of active or passive systems based on scanning (single- or line-array detector element(s)) or staring (focal-plane-array detector elements) imaging architectures. This newly enhanced THz imaging system design tool is an extension of the advanced THz imaging system performance model that was developed under the Defense Advanced Research Project Agency's (DARPA) Terahertz Imaging Focal-Plane Technology (TIFT) program. This paper will also provide example system component (active-illumination source and detector) trade-study analyses using the new features of this user-friendly THz imaging system performance analysis and design tool.
Concealed identification symbols and nondestructive determination of the identification symbols
Nance, Thomas A.; Gibbs, Kenneth M.
2014-09-16
The concealing of one or more identification symbols into a target object and the subsequent determination or reading of such symbols through non-destructive testing is described. The symbols can be concealed in a manner so that they are not visible to the human eye and/or cannot be readily revealed to the human eye without damage or destruction of the target object. The identification symbols can be determined after concealment by e.g., the compilation of multiple X-ray images. As such, the present invention can also provide e.g., a deterrent to theft and the recovery of lost or stolen objects.
Beam Width Robustness of a 670 GHz Imaging Radar
NASA Technical Reports Server (NTRS)
Cooper, K. B.; Llombart, N.; Dengler, R. J.; Siegel, P. H.
2009-01-01
Detection of a replica bomb belt concealed on a mannequin at 4 m standoff range is achieved using a 670 GHz imaging radar. At a somewhat larger standoff range of 4.6 m, the radar's beam width increases substantially, but the through-shirt image quality remains good. This suggests that a relatively modest increase in aperture size over the current design will be sufficient to detect person-borne concealed weapons at ranges exceeding 25 meters.
2016-06-01
media sources on the public discourse. This research compares and contrasts the roles and importance of traditional and social media in the public...alternative media , social media 15. NUMBER OF PAGES 73 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY...importance of traditional and social media in the public sphere today, as evidenced by the coverage of concealed-carry laws and related stories. The
32 CFR 228.7 - Prohibition on weapons and explosives.
Code of Federal Regulations, 2012 CFR
2012-07-01
... entering or while on protected property shall carry or possess, either openly or concealed, firearms, any....) on protected property in circumstances that do not include an immediate and unlawful threat of...
32 CFR 228.7 - Prohibition on weapons and explosives.
Code of Federal Regulations, 2011 CFR
2011-07-01
... entering or while on protected property shall carry or possess, either openly or concealed, firearms, any....) on protected property in circumstances that do not include an immediate and unlawful threat of...
32 CFR 228.7 - Prohibition on weapons and explosives.
Code of Federal Regulations, 2013 CFR
2013-07-01
... entering or while on protected property shall carry or possess, either openly or concealed, firearms, any....) on protected property in circumstances that do not include an immediate and unlawful threat of...
ERIC Educational Resources Information Center
Fennell, Reginald
2009-01-01
Crimes on college campuses can "strike fear" into the lives of those in higher education and a shooting is one of the crimes that ranks at the top of the most feared acts of violence. Maybe more direct counseling for clients who have weapons with regard to anticipatory guidance on firearms is needed. However, the debate continues with proposed…
NASA Astrophysics Data System (ADS)
Murrill, Steven R.; Jacobs, Eddie L.; Franck, Charmaine C.; Petkie, Douglas T.; De Lucia, Frank C.
2015-10-01
The U.S. Army Research Laboratory (ARL) has continued to develop and enhance a millimeter-wave (MMW) and submillimeter- wave (SMMW)/terahertz (THz)-band imaging system performance prediction and analysis tool for both the detection and identification of concealed weaponry, and for pilotage obstacle avoidance. The details of the MATLAB-based model which accounts for the effects of all critical sensor and display components, for the effects of atmospheric attenuation, concealment material attenuation, and active illumination, were reported on at the 2005 SPIE Europe Security and Defence Symposium (Brugge). An advanced version of the base model that accounts for both the dramatic impact that target and background orientation can have on target observability as related to specular and Lambertian reflections captured by an active-illumination-based imaging system, and for the impact of target and background thermal emission, was reported on at the 2007 SPIE Defense and Security Symposium (Orlando). Further development of this tool that includes a MODTRAN-based atmospheric attenuation calculator and advanced system architecture configuration inputs that allow for straightforward performance analysis of active or passive systems based on scanning (single- or line-array detector element(s)) or staring (focal-plane-array detector elements) imaging architectures was reported on at the 2011 SPIE Europe Security and Defence Symposium (Prague). This paper provides a comprehensive review of a newly enhanced MMW and SMMW/THz imaging system analysis and design tool that now includes an improved noise sub-model for more accurate and reliable performance predictions, the capability to account for postcapture image contrast enhancement, and the capability to account for concealment material backscatter with active-illumination- based systems. Present plans for additional expansion of the model's predictive capabilities are also outlined.
A Concealed Barcode Identification System Using Terahertz Time-domain Spectroscopy
NASA Astrophysics Data System (ADS)
Guan, Yu; Yamamoto, Manabu; Kitazawa, Toshiyuki; Tripathi, Saroj R.; Takeya, Kei; Kawase, Kodo
2015-03-01
We present a concealed terahertz barcode/chipless tag to achieve remote identification through an obstructing material using terahertz radiation. We show scanned terahertz reflection spectral images of barcodes concealed by a thick obstacle. A concealed and double- side printed terahertz barcode structure is proposed, and we demonstrate that our design has better performance in definition than a single-side printed barcode using terahertz time-domain spectroscopy. This technique combines the benefits of a chipless tag to read encoded information covered by an optically opaque material with low cost and a simple fabrication process. Simulations are also described, along with an explanation of the principle of the terahertz barcode identification system.
NASA Astrophysics Data System (ADS)
Franck, Charmaine C.; Lee, Dave; Espinola, Richard L.; Murrill, Steven R.; Jacobs, Eddie L.; Griffin, Steve T.; Petkie, Douglas T.; Reynolds, Joe
2007-04-01
This paper describes the design and performance of the U.S. Army RDECOM CERDEC Night Vision and Electronic Sensors Directorate's (NVESD), active 0.640-THz imaging testbed, developed in support of the Defense Advanced Research Project Agency's (DARPA) Terahertz Imaging Focal-Plane Technology (TIFT) program. The laboratory measurements and standoff images were acquired during the development of a NVESD and Army Research Laboratory terahertz imaging performance model. The imaging testbed is based on a 12-inch-diameter Off-Axis Elliptical (OAE) mirror designed with one focal length at 1 m and the other at 10 m. This paper will describe the design considerations of the OAE-mirror, dual-capability, active imaging testbed, as well as measurement/imaging results used to further develop the model.
FY71 Engineering Report on Surveillance Techniques for Civil Aviation Security
DOT National Transportation Integrated Search
1971-11-01
This document discusses the work performed by the TSC task group on surveillance techniques in FY71. The principal section is devoted to the technical description, classification and evaluation of commercial metal detectors for concealed weapons. It ...
Technical Evaluation of Metal Detectors for Concealed Weapons (Supplement 1)
DOT National Transportation Integrated Search
1972-04-01
This document augments the classification and technical evaluation of Commercial Metal Detectors presented in Report No. DOT-TSC-OST-71-15, June 1971. Data based on extensive laboratory tests are presented on two hand-held models and two walk-through...
Director of Innovation. Volume 3, November 2009
2009-11-01
evaluated at Crimson Vi- per 2009 included the Portable Acoustic Contraband Detector (PACD) and the Fluxgate Magnetometer , two projects from SPAWAR...concealed within the containers. The Fluxgate Magnetometer is a hockey puck-sized sensor head that can detect vehicles and weapons by measuring
Detection of contraband concealed on the body using x-ray imaging
NASA Astrophysics Data System (ADS)
Smith, Gerald J.
1997-01-01
In an effort to avoid detection, smugglers and terrorists are increasingly using the body as a vehicle for transporting illicit drugs, weapons, and explosives. This trend illustrates the natural tendency of traffickers to seek the path of least resistance, as improved interdiction technology and operational effectiveness have been brought to bear on other trafficking avenues such as luggage, cargo, and parcels. In response, improved technology for human inspection is being developed using a variety of techniques. ASE's BodySearch X-ray Inspection Systems uses backscatter x-ray imaging of the human body to quickly, safely, and effectively screen for drugs, weapons, and explosives concealed on the body. This paper reviews the law enforcement and social issues involved in human inspections, and briefly describes the ASE BodySearch systems. Operator training, x-ray image interpretation, and maximizing systems effectiveness are also discussed. Finally, data collected from operation of the BodySearch system in the field is presented, and new law enforcement initiatives which have come about due to recent events are reviewed.
Contemporary Responses to Violent Attacks on College Campuses
ERIC Educational Resources Information Center
Sulkowski, Michael L.; Lazarus, Philip J.
2011-01-01
In this article, the authors review efforts to increase the availability of crime data to students and parents, utilize security technologies on campus, allow members of campus communities to carry concealed weapons, use criminal or potential shooter profiling, employ threat assessment techniques, and implement emergency response plans to address…
32 CFR 228.7 - Prohibition on weapons and explosives.
Code of Federal Regulations, 2010 CFR
2010-07-01
... entering or while on protected property shall carry or possess, either openly or concealed, firearms, any... of Security or his designee at each Agency facility. The use of chemical agents (Mace, tear gas, etc.) on protected property in circumstances that do not include an immediate and unlawful threat of...
Okaying the Use of Metal Detectors Proves Easier than Actually Using Them.
ERIC Educational Resources Information Center
Stelly, Philip
1984-01-01
Discusses legal problems of a policy permitting the use of metal detectors to search students suspected of carrying concealed weapons. A wholesale search policy was challenged as a violation of students' rights, so the board adopted a selective search policy based on reasonable suspicion. (TE)
Decision-Making Processes in Texas School Districts That Arm Personnel
ERIC Educational Resources Information Center
Domain, Melinda Willoughby
2014-01-01
This qualitative phenomenological study employed narrative inquiry to describe the decision-making processes that Texas school districts followed in enacting firearms policies that allow school employees to carry concealed weapons on district property. Exploration of the lived experiences of eight Texas superintendents in such schools contributed…
Three-dimensional radar imaging techniques and systems for near-field applications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sheen, David M.; Hall, Thomas E.; McMakin, Douglas L.
2016-05-12
The Pacific Northwest National Laboratory has developed three-dimensional holographic (synthetic aperture) radar imaging techniques and systems for a wide variety of near-field applications. These applications include radar cross-section (RCS) imaging, personnel screening, standoff concealed weapon detection, concealed threat detection, through-barrier imaging, ground penetrating radar (GPR), and non-destructive evaluation (NDE). Sequentially-switched linear arrays are used for many of these systems to enable high-speed data acquisition and 3-D imaging. In this paper, the techniques and systems will be described along with imaging results that demonstrate the utility of near-field 3-D radar imaging for these compelling applications.
32 CFR 552.103 - Requirements for carrying and use.
Code of Federal Regulations, 2010 CFR
2010-07-01
... and return. Stopping at other installation facilities while enroute is prohibited (i.e., Post Exchange..., weapons will be carried in an open manner (not concealed). Firearms will be unloaded when carried (i.e... readily accessible from the passenger area (i.e., locked tool box secured to bed of a truck). Firearms...
A Practical Millimeter-Wave Holographic Imaging System with Tunable IF Attenuator
NASA Astrophysics Data System (ADS)
Zhu, Yu-Kun; Yang, Ming-Hui; Wu, Liang; Sun, Yun; Sun, Xiao-Wei
2017-10-01
A practical millimeter-wave (mmw) holographic imaging system with tunable intermediate frequency (IF) attenuator has been developed. It can be used for the detection of concealed weapons at security checkpoints, especially the airport. The system is utilized to scan the passenger and detect the weapons hidden in the clothes. To reconstruct the three dimensions (3-D) image, a holographic mmw imaging algorithm based on aperture synthesis and back scattering is presented. The system is active and works at 28-33 GHz. Tunable IF attenuator is applied to compensate the intensity and phase differences between multi-channels and multi-frequencies.
Combined illumination cylindrical millimeter-wave imaging technique for concealed weapon detection
NASA Astrophysics Data System (ADS)
Sheen, David M.; McMakin, Douglas L.; Hall, Thomas E.
2000-07-01
A novel millimeter-wave imaging technique has been developed for personnel surveillance applications, including the detection of concealed weapons, explosives, drugs, and other contraband material. Millimeter-waves are high-frequency radio waves in the frequency band of 30 - 300 GHz, and pose no health threat to humans at moderate power levels. These waves readily penetrate common clothing materials, and are reflected by the human body and by concealed items. The combined illumination cylindrical imaging concept consists of a vertical, high-resolution, millimeter-wave array of antennas which is scanned in a cylindrical manner about the person under surveillance. Using a computer, the data from this scan is mathematically reconstructed into a series of focused 3D images of the person. After reconstruction, the images are combined into a single high-resolution 3D image of the person under surveillance. This combined image is then rendered using 3D computer graphics techniques. The combined cylindrical illumination is critical as it allows the display of information from all angles. This is necessary because millimeter-waves do not penetrate the body. Ultimately, the images displayed to the operate will be icon-based to protect the privacy of the person being screened. Novel aspects of this technique include the cylindrical scanning concept and the image reconstruction algorithm, which was developed specifically for this imaging system. An engineering prototype based on this cylindrical imaging technique has been fabricated and tested. This work has been sponsored by the Federal Aviation Administration.
Impact of frequency and polarization diversity on a terahertz radar's imaging performance
NASA Astrophysics Data System (ADS)
Cooper, Ken B.; Dengler, Robert J.; Llombart, Nuria
2011-05-01
The Jet Propulsion Laboratory's 675 GHz, 25 m standoff imaging radar can achieve >1 Hz real time frame rates over 40x40 cm fields of view for rapid detection of person-borne concealed weapons. In its normal mode of operation, the radar generates imagery based solely on the time-of-flight, or range, between the radar and target. With good clothing penetration at 675 GHz, a hidden object will be detectable as an anomaly in the range-to-surface profile of a subject. Here we report on results of two modifications in the radar system that were made to asses its performance using somewhat different detection approaches. First, the radar's operating frequency and bandwidth were cut in half, to 340 GHz and 13 GHz, where there potential system advantages include superior transmit power and clothing penetration, as well as a lower cost of components. In this case, we found that the twofold reduction in range and cross-range resolution sharply limited the quality of through-clothes imagery, although some improvement is observed for detection of large targets concealed by very thick clothing. The second radar modification tested involved operation in a fully polarimetric mode, where enhanced image contrast might occur between surfaces with different material or geometric characteristics. Results from these tests indicated that random speckle dominates polarimetric power imagery, making it an unattractive approach for contrast improvement. Taken together, the experiments described here underscore the primary importance of high resolution imaging in THz radar applications for concealed weapons detection.
Guns Don't Belong in the Hands of Administrators, Professors, or Students
ERIC Educational Resources Information Center
Villahermosa, Jesus M., Jr.
2008-01-01
In the wake of the shootings at Virginia Tech and Northern Illinois University, a number of state legislatures are considering bills that would allow people to carry concealed weapons on college campuses. The author recently spoke at a conference on higher-education law, sponsored by Stetson University and the National Association of Student…
Teachers Already Armed in Some Districts
ERIC Educational Resources Information Center
Shah, Nirvi
2013-01-01
Shooting instructor Johnny Price looked at the teachers lined up in front of him. Mr. Price, the owner of Big Iron Concealed Handgun Training in Waco, Texas, spent two days this month training teachers and staff members from the Clifton school district in all they need to know to earn licenses to carry weapons out of sight. There is no indication…
Millimetre wave and terahertz technology for the detection of concealed threats: a review
NASA Astrophysics Data System (ADS)
Kemp, Michael C.
2006-09-01
There has been intense interest in the use of millimetre wave and terahertz technology for the detection of concealed weapons, explosives and other threats. Electromagnetic waves at these frequencies are safe, penetrate barriers and have short enough wavelengths to allow discrimination between objects. In addition, many solids including explosives have characteristic spectroscopic signatures at terahertz wavelengths which can be used to identify them. This paper reviews the progress which has been made in recent years and identifies the achievements, challenges and prospects for these technologies in checkpoint people screening, stand off detection of improvised explosive devices (IEDs) and suicide bombers as well as more specialized screening tasks.
Legislative Review. A Look at Higher Education in Week 10: March 9-13, 2009
ERIC Educational Resources Information Center
North Dakota University System, 2009
2009-01-01
This issue of "Legislative Review" takes a look at the news in higher education from March 9 to 13, 2009. It reports that this week: (1) HB 1348, a bill that would permit the carrying of concealed weapons at North Dakota University System (NDUS) campus student apartments, was heard in the Senate Government and Veterans Affairs Committee…
Legislative Review. A Look at Higher Education in Week 6: February 9-13, 2009
ERIC Educational Resources Information Center
North Dakota University System, 2009
2009-01-01
This issue of "Legislative Review" takes a look at the news in higher education from February 9 to 13, 2009. This Legislative Review reports that: (1) the House Government and Veterans Affairs Committee acted on HB 1348, the concealed weapons bill, Friday, February 13. The House will consider the proposed amendment and vote on the bill,…
Legislative Review. A Look at Higher Education in Week 4: January 26-30, 2009
ERIC Educational Resources Information Center
North Dakota University System, 2009
2009-01-01
This Legislative Review reports that: (1) HB 1348, a bill to permit concealed weapons at public events and places, including North Dakota University System (NDUS) campuses, was heard in the House Government and Veterans Affairs Committee Friday, January 30. The State Board of Higher Education (SBHE) opposes this bill unless it is amended to…
Arming the Academy: How Carry-on-Campus Impact Incidence of Reported Sexual Assault Crimes
ERIC Educational Resources Information Center
Biastro, Leslie A.; Larwin, Karen H.; Carano, Marla E.
2017-01-01
Discussions have recently intensified regarding how to curtail the disturbingly high amount of sexual assaults that occur each year on U.S. College and university campuses. One suggestion to assist in the reduction of these crimes would be to allow students to carry concealed weapons as a means of self-protection. Considering the current culture…
Review of terahertz technology development at INO
NASA Astrophysics Data System (ADS)
Dufour, Denis; Marchese, Linda; Terroux, Marc; Oulachgar, Hassane; Généreux, Francis; Doucet, Michel; Mercier, Luc; Tremblay, Bruno; Alain, Christine; Beaupré, Patrick; Blanchard, Nathalie; Bolduc, Martin; Chevalier, Claude; D'Amato, Dominic; Desroches, Yan; Duchesne, François; Gagnon, Lucie; Ilias, Samir; Jerominek, Hubert; Lagacé, François; Lambert, Julie; Lamontagne, Frédéric; Le Noc, Loïc; Martel, Anne; Pancrati, Ovidiu; Paultre, Jacques-Edmond; Pope, Tim; Provençal, Francis; Topart, Patrice; Vachon, Carl; Verreault, Sonia; Bergeron, Alain
2015-10-01
Over the past decade, INO has leveraged its expertise in the development of uncooled microbolometer detectors for infrared imaging to produce terahertz (THz) imaging systems. By modifying its microbolometer-based focal plane arrays to enhance absorption in the THz bands and by developing custom THz imaging lenses, INO has developed a leading-edge THz imaging system, the IRXCAM-THz-384 camera, capable of exploring novel applications in the emerging field of terahertz imaging and sensing. Using appropriate THz sources, results show that the IRXCAM-THz-384 camera is able to image a variety of concealed objects of interest for applications such as non-destructive testing and weapons detections. By using a longer wavelength (94 GHz) source, it is also capable of sensing the signatures of various objects hidden behind a drywall panel. This article, written as a review of THz research at INO over the past decade, describes the technical components that form the IRXCAM-THz-384 camera and the experimental setup used for active THz imaging. Image results for concealed weapons detection experiments, an exploration of wavelength choice on image quality, and the detection of hidden objects behind drywall are also presented.
New approach for detecting and classifying concealed weapons
NASA Astrophysics Data System (ADS)
Roybal, Lyle G.; Rice, Philip M.; Manhardt, Joseph M.
1997-02-01
The possession of a weapon in the courtroom of our American justice system is a Federal offense. A weapon in the courtroom is a particularly serious problem for judges, plaintiffs, defendants, and bystanders because of the emotional nature and environment of the courtroom. Potential violators include organized criminals and gangsters, individuals with personal vendettas, and otherwise sane and reasonable people who, because of the emotion of the moment, lose sight of right and wrong in our justice system. Most Federal courthouses incorporate some sort of metal detection apparatus used to screen and prevent individuals from carrying personal weapons into courtrooms. These devices are considered conventional in the sense that they employ an active electromagnetic induction technique that is sensitive to the presence of metal. This technique provides no information concerning the massiveness and location of the offending metal object and is prone to false alarms. This work introduces an alternative method for weapons discrimination that is based on passive magnetics technology in concert with simple comparative algorithms such that massiveness and location of suspected weapons may be determined. Since this system provides information not available from conventional metal detectors, false alarms will be greatly reduced, allowing remote monitoring of all entrances into a courtroom from a single vantage point, thereby saving considerable resources used on personnel costs.
Army Synthetic Validity Project Report of Phase 2 Results. Volume 3. Research Instruments
1990-10-01
Areas 7. The type of secondary arms room lock shown at A in the diagram below requires rotation A. monthly B. quarterly C. semiannually D. annually E...building concrete, stone, or other structures (for example, roads, fortifications , buildings, etc.). 16. Operate wheeled vehicles - drive wheeled...for cover and concealment and to place weapons, fortifications , mines, and detectors. 64. Translate foreign languages - translate written or spoken
Terahertz Imaging of Subjects With Concealed Weapons
2006-05-01
pulsed imaging", Advanced Characterization, Therapeutics, and Systems XIV, Proceedings of SPIE, Vol. 5318: 23-33 6. Anthony E. Siegman , Lasers , p667...imagery. Both methods made use of in-house transceivers, consisting of two ultra-stable far-infrared lasers , terahertz heterodyne detection systems...SYSTEM The 1.56THz transceiver system at STL uses two carbon dioxide lasers paired individually with two far-infrared lasers . All four units are
Virtual Prototyping: Concept to Production
1994-03-01
element analysis. Meshing refers to the gen - following page. The FEA enables designers to eration of nodal coordinates and elements evaluate complex...pants. It is not acceptable to have one weapon technology. This is especially true when gen - system believe it is concealed by a terrain fea- erating...conducted by Gen - process there is ample opportunity to utilize eral Paul F Gorman, USA (Ret.), who led the virtual prototyping and simulation to en
Passive millimeter-wave imaging for concealed article detection
NASA Astrophysics Data System (ADS)
Lovberg, John A.; Galliano, Joseph A., Jr.; Clark, Stuart E.
1997-02-01
Passive-millimeter-wave imaging (PMI) provides a powerful sensing tool for law enforcement, allowing an unobtrusive means for detecting concealed weapons, explosives, or contraband on persons or in baggage. Natural thermal emissions at millimeter wavelengths from bodies, guns, explosives, and other articles pass easily through clothing or other concealment materials, where they can be detected and converted into conventional 2-dimensional images. A new implementation of PMI has demonstrated a large-area, near- real-time staring capability for personnel inspection at standoff ranges of greater than 10 meters. In this form, PMI does not require operator cuing based on subjective 'profiles' of suspicious appearance or behaviors, which may otherwise be construed as violations of civil rights. To the contrary, PMI detects and images heat generated by any object with no predisposition as to its nature or function (e.g. race or gender of humans). As a totally passive imaging tool, it generates no radio-frequency or other radiation which might raise public health concerns. Specifics of the new PMI architecture are presented along with a host of imaging data representing the current state- of-the-art.
Mitigating the Backlash: US Airpower as a Military Instrument of Policy
2003-06-01
maintain their preeminence by employing strategies based more on benevolence than coercion.”31 This is a key point , as it marks a line of departure...weapons are easily defeated with smoke or fire in the target area (to defeat laser designators and thermal imaging), by adequate concealment and...create decoy surface-to-air missiles (SAMs) and radars, some quite sophisticated, and to employ previously “strategic” (immobile, point -defense
East Europe Report: Political, Sociological and Military Affairs, No. 2194
1983-09-07
dropping its grey veil. A sparkling starry sky and pale moonlight promise a cold night. With their weapons at the ready, concealed by tree trunks...that the realization and preparation of films on contemporary themes is occasionally more difficult than that of films examining other times. It was...Sports Hall, the Round Hall, and :the National Stadium./ Photographic, industrial, folklore and fine artists, and film and theater studios can show
Development of a High-Throughput Microwave Imaging System for Concealed Weapons Detection
2016-07-15
hardware. Index Terms—Microwave imaging, multistatic radar, Fast Fourier Transform (FFT). I. INTRODUCTION Near-field microwave imaging is a non-ionizing...configuration, but its computational demands are extreme. Fast Fourier Transform (FFT) imaging has long been used to efficiently construct images sampled with...Simulated image of 25 point scatterers imaged at range 1.5m, with array layout depicted in Fig. 3. Left: image formed with Equation (5) ( Fourier
Creating fair lineups for suspects with distinctive features.
Zarkadi, Theodora; Wade, Kimberley A; Stewart, Neil
2009-12-01
In their descriptions, eyewitnesses often refer to a culprit's distinctive facial features. However, in a police lineup, selecting the only member with the described distinctive feature is unfair to the suspect and provides the police with little further information. For fair and informative lineups, the distinctive feature should be either replicated across foils or concealed on the target. In the present experiments, replication produced more correct identifications in target-present lineups--without increasing the incorrect identification of foils in target-absent lineups--than did concealment. This pattern, and only this pattern, is predicted by the hybrid-similarity model of recognition.
Rezos, Mary M; Schultz, John J; Murdock, Ronald A; Smith, Stephen A
2010-02-25
Incorporating geophysical technologies into forensic investigations has become a growing practice. Oftentimes, forensic professionals rely on basic metal detectors to assist their efforts during metallic weapons searches. This has created a need for controlled research in the area of weapons searches, specifically to formulate guidelines for geophysical methods that may be appropriate for locating weapons that have been discarded or buried by criminals attempting to conceal their involvement in a crime. Controlled research allows not only for testing of geophysical equipment, but also for updating search methodologies. This research project was designed to demonstrate the utility of an all-metal detector for locating a buried metallic weapon through detecting and identifying specific types of buried metal targets. Controlled testing of 32 buried targets which represented a variety of sizes and metallic compositions included 16 decommissioned street-level firearms, 6 pieces of assorted scrap metals, and 10 blunt or bladed weapons. While all forensic targets included in the project were detected with the basic all-metal detector, the size of the weapon and surface area were the two variables that affected maximum depth of detection, particularly with the firearm sample. For example, when using a High setting the largest firearms were detected at a maximum depth of 55 cm, but the majority of the remaining targets were only detected at a maximum depth of 40 cm or less. Overall, the all-metal detector proved to be a very good general purpose metal detector best suited for detecting metallic items at shallow depths. 2009 Elsevier Ireland Ltd. All rights reserved.
Crandall, Marie; Eastman, Alexander; Violano, Pina; Greene, Wendy; Allen, Steven; Block, Ernest; Christmas, Ashley Britton; Dennis, Andrew; Duncan, Thomas; Foster, Shannon; Goldberg, Stephanie; Hirsh, Michael; Joseph, D'Andrea; Lommel, Karen; Pappas, Peter; Shillinglaw, William
2016-11-01
In the past decade, more than 300,000 people in the United States have died from firearm injuries. Our goal was to assess the effectiveness of two particular prevention strategies, restrictive licensing of firearms and concealed carry laws, on firearm-related injuries in the US Restrictive Licensing was defined to include denials of ownership for various offenses, such as performing background checks for domestic violence and felony convictions. Concealed carry laws allow licensed individuals to carry concealed weapons. A comprehensive review of the literature was performed. We used Grading of Recommendations Assessment, Development, and Evaluation methodology to assess the breadth and quality of the data specific to our Population, Intervention, Comparator, Outcomes (PICO) questions. A total of 4673 studies were initially identified, then seven more added after two subsequent, additional literature reviews. Of these, 3,623 remained after removing duplicates; 225 case reports, case series, and reviews were excluded, and 3,379 studies were removed because they did not focus on prevention or did not address our comparators of interest. This left a total of 14 studies which merited inclusion for PICO 1 and 13 studies which merited inclusion for PICO 2. PICO 1: We recommend the use of restrictive licensing to reduce firearm-related injuries.PICO 2: We recommend against the use of concealed carry laws to reduce firearm-related injuries.This committee found an association between more restrictive licensing and lower firearm injury rates. All 14 studies were population-based, longitudinal, used modeling to control for covariates, and 11 of the 14 were multi-state. Twelve of the studies reported reductions in firearm injuries, from 7% to 40%. We found no consistent effect of concealed carry laws. Of note, the varied quality of the available data demonstrates a significant information gap, and this committee recommends that we as a society foster a nurturing and encouraging environment that can strengthen future evidence based guidelines. Systematic review, level III.
Schrimshaw, Eric W; Siegel, Karolynn; Downing, Martin J; Parsons, Jeffrey T
2013-02-01
Although bisexual men report lower levels of mental health relative to gay men, few studies have examined the factors that contribute to bisexual men's mental health. Bisexual men are less likely to disclose, and more likely to conceal (i.e., a desire to hide), their sexual orientation than gay men. Theory suggests that this may adversely impact their mental health. This report examined the factors associated with disclosure and with concealment of sexual orientation, the association of disclosure and concealment with mental health, and the potential mediators (i.e., internalized homophobia, social support) of this association with mental health. An ethnically diverse sample of 203 non-gay-identified, behaviorally bisexual men who do not disclose their same-sex behavior to their female partners were recruited in New York City to complete a single set of self-report measures. Concealment was associated with higher income, a heterosexual identification, living with a wife or girlfriend, more frequent sex with women, and less frequent sex with men. Greater concealment, but not disclosure to friends and family, was significantly associated with lower levels of mental health. Multiple mediation analyses revealed that both internalized homophobia and general emotional support significantly mediated the association between concealment and mental health. The findings demonstrate that concealment and disclosure are independent constructs among bisexual men. Further, they suggest that interventions addressing concerns about concealment, emotional support, and internalized homophobia may be more beneficial for increasing the mental health of bisexual men than those focused on promoting disclosure.
Schrimshaw, Eric W.; Siegel, Karolynn; Downing, Martin J.; Parsons, Jeffrey T.
2013-01-01
Objective Although bisexual men report lower levels of mental health relative to gay men, few studies have examined the factors that contribute to bisexual men’s mental health. Bisexual men are less likely to disclose, and more likely to conceal (i.e., a desire to hide), their sexual orientation than gay men. Theory suggests that this may adversely impact their mental health. This report examined the factors associated with disclosure and with concealment of sexual orientation, the association of disclosure and concealment with mental health, and the potential mediators (i.e., internalized homophobia, social support) of this association with mental health. Method An ethnically-diverse sample of 203 non-gay-identified, behaviorally-bisexual men who do not disclose their same-sex behavior to their female partners were recruited in New York City to complete a single set of self-report measures. Results Concealment was associated with higher income, a heterosexual identification, living with a wife or girlfriend, more frequent sex with women, and less frequent sex with men. Greater concealment, but not disclosure to friends and family, was significantly associated with lower levels of mental health. Multiple mediation analyses revealed that both internalized homophobia and general emotional support significantly mediated the association between concealment and mental health. Conclusions The findings demonstrate that concealment and disclosure are independent constructs among bisexual men. Further, they suggest that interventions addressing concerns about concealment, emotional support, and internalized homophobia may be more beneficial for increasing the mental health of bisexual men than those focused on promoting disclosure. PMID:23276123
Classifying threats with a 14-MeV neutron interrogation system.
Strellis, Dan; Gozani, Tsahi
2005-01-01
SeaPODDS (Sea Portable Drug Detection System) is a non-intrusive tool for detecting concealed threats in hidden compartments of maritime vessels. This system consists of an electronic neutron generator, a gamma-ray detector, a data acquisition computer, and a laptop computer user-interface. Although initially developed to detect narcotics, recent algorithm developments have shown that the system is capable of correctly classifying a threat into one of four distinct categories: narcotic, explosive, chemical weapon, or radiological dispersion device (RDD). Detection of narcotics, explosives, and chemical weapons is based on gamma-ray signatures unique to the chemical elements. Elements are identified by their characteristic prompt gamma-rays induced by fast and thermal neutrons. Detection of RDD is accomplished by detecting gamma-rays emitted by common radioisotopes and nuclear reactor fission products. The algorithm phenomenology for classifying threats into the proper categories is presented here.
2004-08-05
KENNEDY SPACE CENTER, FLA. - At the ribbon cutting for the Enhanced Firing Range on Schwartz Rd. at Kennedy Space Center, Dave Saleeba (left with weapon) and Center Director Jim Kennedy (right, with weapon) practice firing on the new range. Saleeba is assistant administrator with the Office of Security Management and Safeguards at NASA Headquarters and was a guest speaker at the ceremony. NASA’s Federal Law Enforcement Training Academy’s firing range has been upgraded to include a “rifle-grade” shoot house, a portable, tactical “shoot-back” trailer for cover and concealment drills, automated running targets and a new classroom facility. They are added to the existing three firearms ranges, “pistol-grade” shoot house, obstacle course and rappel tower. NASA’s Security Management and Safeguards Office funded the enhancements in order to improve ability to train the KSC security force and to support local, state and federal law enforcement agencies in Homeland Security.
NASA Technical Reports Server (NTRS)
2004-01-01
KENNEDY SPACE CENTER, FLA. At the ribbon cutting for the Enhanced Firing Range on Schwartz Rd. at Kennedy Space Center, Dave Saleeba (left with weapon) and Center Director Jim Kennedy (right, with weapon) practice firing on the new range. Saleeba is assistant administrator with the Office of Security Management and Safeguards at NASA Headquarters and was a guest speaker at the ceremony. NASAs Federal Law Enforcement Training Academys firing range has been upgraded to include a rifle-grade shoot house, a portable, tactical shoot-back trailer for cover and concealment drills, automated running targets and a new classroom facility. They are added to the existing three firearms ranges, pistol-grade shoot house, obstacle course and rappel tower. NASAs Security Management and Safeguards Office funded the enhancements in order to improve ability to train the KSC security force and to support local, state and federal law enforcement agencies in Homeland Security.
Three applications of backscatter x-ray imaging technology to homeland defense
NASA Astrophysics Data System (ADS)
Chalmers, Alex
2005-05-01
A brief review of backscatter x-ray imaging and a description of three systems currently applying it to homeland defense missions (BodySearch, ZBV and ZBP). These missions include detection of concealed weapons, explosives and contraband on personnel, in vehicles and large cargo containers. An overview of the x-ray imaging subsystems is provided as well as sample images from each system. Key features such as x-ray safety, throughput and detection are discussed. Recent trends in operational modes are described that facilitate 100% inspection at high throughput chokepoints.
Sauerland, Melanie; Wolfs, Andrea C F; Crans, Samantha; Verschuere, Bruno
2017-11-27
Direct eyewitness identification is widely used, but prone to error. We tested the validity of indirect eyewitness identification decisions using the reaction time-based concealed information test (CIT) for assessing cooperative eyewitnesses' face memory as an alternative to traditional lineup procedures. In a series of five experiments, a total of 401 mock eyewitnesses watched one of 11 different stimulus events that depicted a breach of law. Eyewitness identifications in the CIT were derived from longer reaction times as compared to well-matched foil faces not encountered before. Across the five experiments, the weighted mean effect size d was 0.14 (95% CI 0.08-0.19). The reaction time-based CIT seems unsuited for testing cooperative eyewitnesses' memory for faces. The careful matching of the faces required for a fair lineup or the lack of intent to deceive may have hampered the diagnosticity of the reaction time-based CIT.
Noise analysis for near-field 3D FM-CW radar imaging systems
NASA Astrophysics Data System (ADS)
Sheen, David M.
2015-05-01
Near field radar imaging systems are used for demanding security applications including concealed weapon detection in airports and other high-security venues. Despite the near-field operation, phase noise and thermal noise can limit performance in several ways. Practical imaging systems can employ arrays with low gain antennas and relatively large signal distribution networks that have substantial losses which limit transmit power and increase the effective noise figure of the receiver chain, resulting in substantial thermal noise. Phase noise can also limit system performance. The signal coupled from transmitter to receiver is much larger than expected target signals. Phase noise from this coupled signal can set the system noise floor if the oscillator is too noisy. Frequency modulated continuous wave (FM-CW) radar transceivers used in short range systems are relatively immune to the effects of the coupled phase noise due to range correlation effects. This effect can reduce the phase-noise floor such that it is below the thermal noise floor for moderate performance oscillators. Phase noise is also manifested in the range response around bright targets, and can cause smaller targets to be obscured. Noise in synthetic aperture imaging systems is mitigated by the processing gain of the system. In this paper, the effects of thermal noise, phase noise, and processing gain are analyzed in the context of a near field 3-D FM-CW imaging radar as might be used for concealed weapon detection. In addition to traditional frequency domain analysis, a time-domain simulation is employed to graphically demonstrate the effect of these noise sources on a fast-chirping FM-CW system.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sheen, David M.; Fernandes, Justin L.; Tedeschi, Jonathan R.
2013-06-12
Active millimeter-wave imaging is currently being used for personnel screening at airports and other high-security facilities. The lateral resolution, depth resolution, clothing penetration, and image illumination quality obtained from next-generation systems can be significantly enhanced through the selection the aperture size, antenna beamwidth, center frequency, and bandwidth. In this paper, the results of an extensive imaging trade study are presented using both planar and cylindrical three-dimensional imaging techniques at frequency ranges of 10-20 GHz, 10 – 40 GHz, 40 – 60 GHz, and 75 – 105 GHz
Method and apparatus for detecting concealed weapons
Kotter, Dale K.; Fluck, Frederick D.
2006-03-14
Apparatus for classifying a ferromagnetic object within a sensing area may include a magnetic field sensor that produces magnetic field data. A signal processing system operatively associated with the magnetic field sensor includes a neural network. The neural network compares the magnetic field data with magnetic field data produced by known ferromagnetic objects to make a probabilistic determination as to the classification of the ferromagnetic object within the sensing area. A user interface operatively associated with the signal processing system produces a user-discernable output indicative of the probabilistic determination of the classification of the ferromagnetic object within a sensing area.
Aromatario, Mariarosaria; Cappelletti, Simone; Bottoni, Edoardo; Fiore, Paola Antonella; Ciallella, Costantino
2016-01-01
An interesting case of homicide involving the use of a heavy glass ashtray is described. The victim, a 81-years-old woman, has survived for few days and died in hospital. The external examination of the victim showed extensive blunt and sharp facial injuries and defense injuries on both the hands. The autopsy examination showed numerous tears on the face, as well as multiple fractures of the facial bones. Computer tomography scan, with 3D reconstruction, performed in hospital before death, was used to identify the weapon used for the crime. In recent years new diagnostics tools such as computer tomography has been widely used, especially in cases involving sharp and blunt forces. Computer tomography has proven to be very valuable in analyzing fractures of the cranial teca for forensic purpose, in particular antemortem computer tomography with 3D reconstruction is becoming an important tool in the process of weapon identification, thanks to the possibility to identify and make comparison between the shape of the object used to commit the crime, the injury and the objects found during the investigations. No previous reports on the use of this technique, for the weapon identification process, in cases of isolated facial fractures were described. We report a case in which, despite the correct use of this technique, it was not possible for the forensic pathologist to identify the weapon used to commit the crime. Authors wants to highlight the limits encountered in the use of computer tomography with 3D reconstruction as a tool for weapon identification when facial fractures occurred. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.
TeraSCREEN: multi-frequency multi-mode Terahertz screening for border checks
NASA Astrophysics Data System (ADS)
Alexander, Naomi E.; Alderman, Byron; Allona, Fernando; Frijlink, Peter; Gonzalo, Ramón; Hägelen, Manfred; Ibáñez, Asier; Krozer, Viktor; Langford, Marian L.; Limiti, Ernesto; Platt, Duncan; Schikora, Marek; Wang, Hui; Weber, Marc Andree
2014-06-01
The challenge for any security screening system is to identify potentially harmful objects such as weapons and explosives concealed under clothing. Classical border and security checkpoints are no longer capable of fulfilling the demands of today's ever growing security requirements, especially with respect to the high throughput generally required which entails a high detection rate of threat material and a low false alarm rate. TeraSCREEN proposes to develop an innovative concept of multi-frequency multi-mode Terahertz and millimeter-wave detection with new automatic detection and classification functionalities. The system developed will demonstrate, at a live control point, the safe automatic detection and classification of objects concealed under clothing, whilst respecting privacy and increasing current throughput rates. This innovative screening system will combine multi-frequency, multi-mode images taken by passive and active subsystems which will scan the subjects and obtain complementary spatial and spectral information, thus allowing for automatic threat recognition. The TeraSCREEN project, which will run from 2013 to 2016, has received funding from the European Union's Seventh Framework Programme under the Security Call. This paper will describe the project objectives and approach.
Foliage penetration by using 4-D point cloud data
NASA Astrophysics Data System (ADS)
Méndez Rodríguez, Javier; Sánchez-Reyes, Pedro J.; Cruz-Rivera, Sol M.
2012-06-01
Real-time awareness and rapid target detection are critical for the success of military missions. New technologies capable of detecting targets concealed in forest areas are needed in order to track and identify possible threats. Currently, LAser Detection And Ranging (LADAR) systems are capable of detecting obscured targets; however, tracking capabilities are severely limited. Now, a new LADAR-derived technology is under development to generate 4-D datasets (3-D video in a point cloud format). As such, there is a new need for algorithms that are able to process data in real time. We propose an algorithm capable of removing vegetation and other objects that may obfuscate concealed targets in a real 3-D environment. The algorithm is based on wavelets and can be used as a pre-processing step in a target recognition algorithm. Applications of the algorithm in a real-time 3-D system could help make pilots aware of high risk hidden targets such as tanks and weapons, among others. We will be using a 4-D simulated point cloud data to demonstrate the capabilities of our algorithm.
Being seen or being watched? A psychoanalytic perspective on body dysmorphia.
Lemma, Alessandra
2009-08-01
The focus of this paper is on individuals who present as excessively preoccupied with their body, perceiving some aspect(s) to be 'ugly' such that they feel compelled to alter and/or conceal this 'ugly' body part. These difficulties are understood as symptoms of an underlying narcissistic disturbance. The author suggests that the relative pervasiveness of an identification with a 'super'-ego accounts for the degree of severity of the disturbance (increasing the compulsion to alter and/or conceal the hated body part) and that it has implications for the patient's accessibility in analytic treatment. Understanding the vicissitudes of the development of the body-self in the context of the earliest relationship with the 'object of desire' is core to helping these patients because of the quality of the identifications that ensue and that are then enacted the transference.
Invited Review Article: Current State of Research on Biological Effects of Terahertz Radiation
NASA Astrophysics Data System (ADS)
Wilmink, Gerald J.; Grundt, Jessica E.
2011-10-01
Terahertz (THz) imaging and sensing technologies are increasingly being used in a host of medical, military, and security applications. For example, THz systems are now being tested at international airports for security screening purposes, at major medical centers for cancer and burn diagnosis, and at border patrol checkpoints for identification of concealed explosives, drugs, and weapons. Recent advances in THz applications have stimulated renewed interest regarding the biological effects associated with this frequency range. Biological effects studies are a valuable type of basic science research because they serve to enhance our fundamental understanding of the mechanisms that govern THz interactions with biological systems. Such studies are also important because they often times lay the foundation for the development of future applications. In addition, from a practical standpoint, THz biological effects research is also necessary for accurate health hazard evaluation, the development of empirically-based safety standards, and for the safe use of THz systems. Given the importance and timeliness of THz bioeffects data, the purpose of this review is twofold. First, to provide readers with a common reference, which contains the necessary background concepts in biophysics and THz technology, that are required to both conduct and evaluate THz biological research. Second, to provide a critical review of the scientific literature.
Near-field three-dimensional radar imaging techniques and applications.
Sheen, David; McMakin, Douglas; Hall, Thomas
2010-07-01
Three-dimensional radio frequency imaging techniques have been developed for a variety of near-field applications, including radar cross-section imaging, concealed weapon detection, ground penetrating radar imaging, through-barrier imaging, and nondestructive evaluation. These methods employ active radar transceivers that operate at various frequency ranges covering a wide range, from less than 100 MHz to in excess of 350 GHz, with the frequency range customized for each application. Computational wavefront reconstruction imaging techniques have been developed that optimize the resolution and illumination quality of the images. In this paper, rectilinear and cylindrical three-dimensional imaging techniques are described along with several application results.
NASA Astrophysics Data System (ADS)
Waldman, Jerry; Danylov, Andriy A.; Goyette, Thomas M.; Coulombe, Michael J.; Giles, Robert H.; Gatesman, Andrew J.; Goodhue, William D.; Li, Jin; Linden, Kurt J.; Nixon, William E.
2009-02-01
Coherent terahertz radar systems, using CO2 laser-pumped molecular lasers have been used during the past decade for radar scale modeling applications, as well as proof-of-principle demonstrations of remote detection of concealed weapons. The presentation will consider the potential for replacement of molecular laser sources by quantum cascade lasers. While the temporal and spatial characteristics of current THz QCLs limit their applicability, rapid progress is being made in resolving these issues. Specifications for satisfying the requirements of coherent short-range THz radars will be reviewed and the feasibility of incorporating existing QCL devices into such systems will be described.
Real life identification of partially occluded weapons in video frames
NASA Astrophysics Data System (ADS)
Hempelmann, Christian F.; Arslan, Abdullah N.; Attardo, Salvatore; Blount, Grady P.; Sirakov, Nikolay M.
2016-05-01
We empirically test the capacity of an improved system to identify not just images of individual guns, but partially occluded guns and their parts appearing in a videoframe. This approach combines low-level geometrical information gleaned from the visual images and high-level semantic information stored in an ontology enriched with meronymic part-whole relations. The main improvements of the system are handling occlusion, new algorithms, and an emerging meronomy. Well-known and commonly deployed in ontologies, actual meronomies need to be engineered and populated with unique solutions. Here, this includes adjacency of weapon parts and essentiality of parts to the threat of and the diagnosticity for a weapon. In this study video sequences are processed frame by frame. The extraction method separates colors and removes the background. Then image subtraction of the next frame determines moving targets, before morphological closing is applied to the current frame in order to clean up noise and fill gaps. Next, the method calculates for each object the boundary coordinates and uses them to create a finite numerical sequence as a descriptor. Parts identification is done by cyclic sequence alignment and matching against the nodes of the weapons ontology. From the identified parts, the most-likely weapon will be determined by using the weapon ontology.
Identification of nuclear weapons
Mihalczo, J.T.; King, W.T.
1987-04-10
A method and apparatus for non-invasively indentifying different types of nuclear weapons is disclosed. A neutron generator is placed against the weapon to generate a stream of neutrons causing fissioning within the weapon. A first detects the generation of the neutrons and produces a signal indicative thereof. A second particle detector located on the opposite side of the weapon detects the fission particles and produces signals indicative thereof. The signals are converted into a detected pattern and a computer compares the detected pattern with known patterns of weapons and indicates which known weapon has a substantially similar pattern. Either a time distribution pattern or noise analysis pattern, or both, is used. Gamma-neutron discrimination and a third particle detector for fission particles adjacent the second particle detector are preferably used. The neutrons are generated by either a decay neutron source or a pulled neutron particle accelerator.
Target recognition in passive terahertz image of human body
NASA Astrophysics Data System (ADS)
Zhao, Ran; Zhao, Yuan-meng; Deng, Chao; Zhang, Cun-lin; Li, Yue
2014-11-01
THz radiation can penetrate through many nonpolar dielectric materials and can be used for nondestructive/noninvasive sensing and imaging of targets under nonpolar, nonmetallic covers or containers. Thus using THz systems to "see through" concealing barriers (i.e. packaging, corrugated cardboard, clothing) has been proposed as a new security screening method. Objects that can be detected by THz include concealed weapons, explosives, and chemical agents under clothing. Passive THz imaging system can detect THz wave from human body without transmit any electromagnetic wave, and the suspicious objects will become visible because the THz wave is blocked by this items. We can find out whether or not someone is carrying dangerous objects through this image. In this paper, the THz image enhancement, segmentation and contour extraction algorithms were studied to achieve effective target image detection. First, the terahertz images are enhanced and their grayscales are stretched. Then we apply global threshold segmentation to extract the target, and finally the targets are marked on the image. Experimental results showed that the algorithm proposed in this paper can extract and mark targets effectively, so that people can identify suspicious objects under clothing quickly. The algorithm can significantly improve the usefulness of the terahertz security apparatus.
NASA Astrophysics Data System (ADS)
Lieber, Keir
Nuclear deterrence rests on the survivability of nuclear arsenals. For much of the nuclear age, counterforce disarming attacks those aimed at eliminating nuclear forces were nearly impossible because of the ability of potential victims to hide and protect their weapons. However, technological developments are eroding this foundation of nuclear deterrence. Advances rooted in the computer revolution have made nuclear forces around the world far more vulnerable than before. Specifically, two key approaches that countries have relied on to ensure arsenal survivability since the dawn of the nuclear age hardening and concealment have been undercut by leaps in weapons accuracy and a revolution in remote sensing. Various models, methods, and evidence demonstrate the emergence of new possibilities for counterforce disarming strikes. In short, the task of securing nuclear arsenals against attack is a far greater challenge than it was in the past. The new era of counterforce challenges the basis for confidence in contemporary deterrence stability, raises critical issues for national and international security policy, and sheds light on one of the enduring theoretical puzzles of the nuclear era: why international security competition has endured in the shadow of the nuclear revolution.
NASA Astrophysics Data System (ADS)
Sirakov, Nikolay M.; Suh, Sang; Attardo, Salvatore
2011-06-01
This paper presents a further step of a research toward the development of a quick and accurate weapons identification methodology and system. A basic stage of this methodology is the automatic acquisition and updating of weapons ontology as a source of deriving high level weapons information. The present paper outlines the main ideas used to approach the goal. In the next stage, a clustering approach is suggested on the base of hierarchy of concepts. An inherent slot of every node of the proposed ontology is a low level features vector (LLFV), which facilitates the search through the ontology. Part of the LLFV is the information about the object's parts. To partition an object a new approach is presented capable of defining the objects concavities used to mark the end points of weapon parts, considered as convexities. Further an existing matching approach is optimized to determine whether an ontological object matches the objects from an input image. Objects from derived ontological clusters will be considered for the matching process. Image resizing is studied and applied to decrease the runtime of the matching approach and investigate its rotational and scaling invariance. Set of experiments are preformed to validate the theoretical concepts.
Identifying explosives using broadband millimeter-wave imaging
NASA Astrophysics Data System (ADS)
Weatherall, James C.; Yam, Kevin; Barber, Jeffrey; Smith, Barry T.; Smith, Peter R.; Greca, Joseph
2017-05-01
Millimeter wave imaging is employed in Advanced Technology Imaging (AIT) systems to screen personnel for concealed explosives and weapons. AIT systems deployed in airports auto-detect potential threats by highlighting their location on a generic outline of a person using imaging data collected over a range of frequency. We show how the spectral information from the imaging data can be used to identify the composition of an anomalous object, in particular if it is an explosive material. The discriminative value of the technique was illustrated on military sheet explosive using millimeter-wave reflection data at frequencies 18 - 40 GHz, and commercial explosives using 2 - 18 GHz, but the free-space measurement was limited to a single horn with a large-area sample. This work extends the method to imaging data collected at high resolution with a 18 - 40 GHz imaging system. The identification of explosives is accomplished by extracting the dielectric constant from the free-space, multifrequency data. The reflection coefficient is a function of frequency because of propagation effects associated with the material's complex dielectric constant, which include interference from multiple reflections and energy loss in the sample. The dielectric constant is obtained by numerically fitting the reflection coefficient as a function of frequency to an optical model. In principal, the implementation of this technique in standoff imaging systems would allow threat assessment to be accomplished within the scope of millimeter-wave screening.
Remote sensing based on hyperspectral data analysis
NASA Astrophysics Data System (ADS)
Sharifahmadian, Ershad
In remote sensing, accurate identification of far objects, especially concealed objects is difficult. In this study, to improve object detection from a distance, the hyperspecral imaging and wideband technology are employed with the emphasis on wideband radar. As the wideband data includes a broad range of frequencies, it can reveal information about both the surface of the object and its content. Two main contributions are made in this study: 1) Developing concept of return loss for target detection: Unlike typical radar detection methods which uses radar cross section to detect an object, it is possible to enhance the process of detection and identification of concealed targets using the wideband radar based on the electromagnetic characteristics --conductivity, permeability, permittivity, and return loss-- of materials. During the identification process, collected wideband data is evaluated with information from wideband signature library which has already been built. In fact, several classes (e.g. metal, wood, etc.) and subclasses (ex. metals with high conductivity) have been defined based on their electromagnetic characteristics. Materials in a scene are then classified based on these classes. As an example, materials with high electrical conductivity can be conveniently detected. In fact, increasing relative conductivity leads to a reduction in the return loss. Therefore, metals with high conductivity (ex. copper) shows stronger radar reflections compared with metals with low conductivity (ex. stainless steel). Thus, it is possible to appropriately discriminate copper from stainless steel. 2) Target recognition techniques: To detect and identify targets, several techniques have been proposed, in particular the Multi-Spectral Wideband Radar Image (MSWRI) which is able to localize and identify concealed targets. The MSWRI is based on the theory of robust capon beamformer. During identification process, information from wideband signature library is utilized. The WB signature library includes such parameters as conductivity, permeability, permittivity, and return loss at different frequencies for possible materials related to a target. In the MSWRI approach, identification procedure is performed by calculating the RLs at different selected frequencies. Based on similarity of the calculated RLs and RL from WB signature library, targets are detected and identified. Based on the simulation and experimental results, it is concluded that the MSWRI technique is a promising approach for standoff target detection.
Repeal of the concealed weapons law and its impact on gun-related injuries and deaths.
Ginwalla, Rashna; Rhee, Peter; Friese, Randall; Green, Donald J; Gries, Lynn; Joseph, Bellal; Kulvatunyou, Narong; Lubin, Dafney; O'Keeffe, Terence; Vercruysse, Gary; Wynne, Julie; Tang, Andrew
2014-03-01
Senate Bill 1108 (SB-1108) allows adult citizens to carry concealed weapons without a permit and without completion of a training course. It is unclear whether the law creates a "deterrent factor" to criminals or whether it escalates gun-related violence. We hypothesized that the enactment of SB-1108 resulted in an increase in gun-related injuries and deaths (GRIDs) in southern Arizona. We performed a retrospective cohort study spanning 24 months before (prelaw) and after (postlaw) SB-1108. We collected injury and death data and overall crime and accident trends. Injured patients were dichotomized based on whether their injuries were intentional (iGRIDs) or accidental (aGRIDs). The primary outcome was any GRID. To determine proportional differences in GRIDs between the two periods, we performed χ analyses. For each subgroup, we calculated relative risk (RR). The number of national and state background checks for firearms purchases increased in the postlaw period (national and state p < 0.001); that increase was proportionately reflected in a relative increase in state firearm purchase in the postlaw period (1.50% prelaw vs. 1.59% postlaw, p < 0.001). Overall, victims of events potentially involving guns had an 11% increased risk of being injured or killed by a firearm (p = 0.036) The proportion of iGRIDs to overall city violent crime remained the same during the two periods (9.74% prelaw vs. 10.36% postlaw; RR, 1.06; 95% confidence interval, 0.96-1.17). However, in the postlaw period, the proportion of gun-related homicides increased by 27% after SB-1108 (RR, 1.27; 95% confidence interval, 1.02-1.58). Both nationally and statewide, firearm purchases increased after the passage of SB-1108. Although the proportion of iGRIDs to overall city violent crime remained the same, the proportion of gun-related homicides increased. Liberalization of gun access is associated with an increase in fatalities from guns. Epidemiologic study, level III.
Status of VESAS: a fully-electronic microwave imaging radiometer system
NASA Astrophysics Data System (ADS)
Schreiber, Eric; Peichl, Markus; Suess, Helmut
2010-04-01
Present applications of microwave remote sensing systems cover a large variety. One utilisation of the frequency range from 1 - 300 GHz is the domain of security and reconnaissance. Examples are the observation of critical infrastructures or the performance of security checks on people in order to detect concealed weapons or explosives, both being frequent threats in our world of growing international terrorism. The imaging capability of concealed objects is one of the main advantages of microwave remote sensing, because of the penetration performance of electromagnetic waves through dielectric materials in this frequency domain. The main physical effects used in passive microwave sensing rely on the naturally generated thermal radiation and the physical properties of matter, the latter being surface characteristics, chemical and physical composition, and the temperature of the material. As a consequence it is possible to discriminate objects having different material characteristics like ceramic weapons or plastic explosives with respect to the human body. Considering the use of microwave imaging with respect to people scanning systems in airports, railway stations, or stadiums, it is advantageous that passively operating devices generate no exposure on the scanned objects like actively operating devices do. For frequently used security gateways it is additionally important to have a high through-put rate in order to minimize the queue time. Consequently fast imaging systems are necessary. In this regard the conceptual idea of a fully-electronic microwave imaging radiometer system is introduced. The two-dimensional scanning mechanism is divided into a frequency scan in one direction and the method of aperture synthesis in the other. The overall goal here is to design a low-cost, fully-electronic imaging system with a frame rate of around one second at Ka band. This frequency domain around a center frequency of 37 GHz offers a well-balanced compromise between the achievable spatial resolution for a given size, and the penetration depth of the electromagnetic wave, which are conflictive requirements.
Anklam, Charles; Kirby, Adam; Sharevski, Filipo; Dietz, J Eric
2015-01-01
Active shooting violence at confined settings, such as educational institutions, poses serious security concerns to public safety. In studying the effects of active shooter scenarios, the common denominator associated with all events, regardless of reason/intent for shooter motives, or type of weapons used, was the location chosen and time expended between the beginning of the event and its culmination. This in turn directly correlates to number of casualties incurred in any given event. The longer the event protracts, the more casualties are incurred until law enforcement or another barrier can react and culminate the situation. Using AnyLogic technology, devise modeling scenarios to test multiple hypotheses against free-agent modeling simulation to determine the best method to reduce casualties associated with active shooter scenarios. Test four possible scenarios of responding to active shooter in a public school setting using agent-based computer modeling techniques-scenario 1: basic scenario where no access control or any type of security is used within the school; scenario 2, scenario assumes that concealed carry individual(s) (5-10 percent of the work force) are present in the school; scenario 3, scenario assumes that the school has assigned resource officer; scenario 4, scenario assumes that the school has assigned resource officer and concealed carry individual(s) (5-10 percent) present in the school. Statistical data from modeling scenarios indicating which tested hypothesis resulted in fewer casualties and quicker culmination of event. The use of AnyLogic proved the initial hypothesis that a decrease on response time to an active shooter scenario directly reduced victim casualties. Modeling tests show statistically significant fewer casualties in scenarios where on scene armed responders such as resource officers and concealed carry personnel were present.
Detection of hidden objects using a real-time 3-D millimeter-wave imaging system
NASA Astrophysics Data System (ADS)
Rozban, Daniel; Aharon, Avihai; Levanon, Assaf; Abramovich, Amir; Yitzhaky, Yitzhak; Kopeika, N. S.
2014-10-01
Millimeter (mm)and sub-mm wavelengths or terahertz (THz) band have several properties that motivate their use in imaging for security applications such as recognition of hidden objects, dangerous materials, aerosols, imaging through walls as in hostage situations, and also in bad weather conditions. There is no known ionization hazard for biological tissue, and atmospheric degradation of THz radiation is relatively low for practical imaging distances. We recently developed a new technology for the detection of THz radiation. This technology is based on very inexpensive plasma neon indicator lamps, also known as Glow Discharge Detector (GDD), that can be used as very sensitive THz radiation detectors. Using them, we designed and constructed a Focal Plane Array (FPA) and obtained recognizable2-dimensional THz images of both dielectric and metallic objects. Using THz wave it is shown here that even concealed weapons made of dielectric material can be detected. An example is an image of a knife concealed inside a leather bag and also under heavy clothing. Three-dimensional imaging using radar methods can enhance those images since it can allow the isolation of the concealed objects from the body and environmental clutter such as nearby furniture or other people. The GDDs enable direct heterodyning between the electric field of the target signal and the reference signal eliminating the requirement for expensive mixers, sources, and Low Noise Amplifiers (LNAs).We expanded the ability of the FPA so that we are able to obtain recognizable 2-dimensional THz images in real time. We show here that the THz detection of objects in three dimensions, using FMCW principles is also applicable in real time. This imaging system is also shown here to be capable of imaging objects from distances allowing standoff detection of suspicious objects and humans from large distances.
Current Considerations About the Elderly and Firearms
Mertens, Brian
2012-01-01
In the United States, more than 17 million people aged 65 years or older own a firearm. They have the highest rate of suicide by a firearm, and recent data suggest that a disproportionate number apply to carry a concealed weapon. At least one new handgun has been designed and marketed for older people. Memory, thinking, and judgment as well as physical and behavioral competence issues related to an elderly person's safe operation of a motor vehicle apply to firearms, too. Gun availability can pose a particular risk to those with dementia and to their caretakers. The elderly constitute a substantial and rapidly growing population and market segment for whom the public health implications of firearm production, promotion, access, ownership, and use merit consideration. PMID:22390501
Current considerations about the elderly and firearms.
Mertens, Brian; Sorenson, Susan B
2012-03-01
In the United States, more than 17 million people aged 65 years or older own a firearm. They have the highest rate of suicide by a firearm, and recent data suggest that a disproportionate number apply to carry a concealed weapon. At least one new handgun has been designed and marketed for older people. Memory, thinking, and judgment as well as physical and behavioral competence issues related to an elderly person's safe operation of a motor vehicle apply to firearms, too. Gun availability can pose a particular risk to those with dementia and to their caretakers. The elderly constitute a substantial and rapidly growing population and market segment for whom the public health implications of firearm production, promotion, access, ownership, and use merit consideration.
NASA Astrophysics Data System (ADS)
Morgan, John S.
2005-05-01
Law enforcement agencies play a key role in protecting the nation from and responding to terrorist attacks. Preventing terrorism and promoting the nation"s security is the Department of Justice"s number one strategic priority. This is reflected in its technology development efforts, as well as its operational focus. The National Institute of Justice (NIJ) is the national focal point for the research, development, test and evaluation of technology for law enforcement. In addition to its responsibilities in supporting day-to-day criminal justice needs in areas such as less lethal weapons and forensic science, NIJ also provides critical support for counter-terrorism capacity improvements in state and local law enforcement in several areas. The most important of these areas are bomb response, concealed weapons detection, communications and information technology, which together offer the greatest potential benefit with respect to improving the ability to law enforcement agencies to respond to all types of crime including terrorist acts. NIJ coordinates its activities with several other key federal partners, including the Department of Homeland Security"s Science and Technology Directorate, the Technical Support Working Group, and the Department of Defense.
76 FR 66044 - 36(b)(1) Arms Sales Notification
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-25
... HAWKEYE Aircraft with weapon system sensor upgrades with Mode 5/S Identification Friend or Foe (IFF... system sensor upgrades with Mode 5/S Identification Friend or Foe (IFF). Included are 5 APX-122 IFF Mode...
Induction detection of concealed bulk banknotes
NASA Astrophysics Data System (ADS)
Fuller, Christopher; Chen, Antao
2011-10-01
Bulk cash smuggling is a serious issue that has grown in volume in recent years. By building on the magnetic characteristics of paper currency, induction sensing is found to be capable of quickly detecting large masses of banknotes. The results show that this method is effective in detecting bulk cash through concealing materials such as plastics, cardboards, fabrics and aluminum foil. The significant difference in the observed phase between the received signals caused by conducting materials and ferrite compounds, found in banknotes, provides a good indication that this process can overcome the interference by metal objects in a real sensing application. This identification strategy has the potential to not only detect the presence of banknotes, but also the number, while still eliminating false positives caused by metal objects.
Asha, Stephen Edward; Cooke, Andrew
2015-09-01
Suspected body packers may be brought to emergency departments (EDs) close to international airports for abdominal computed tomography (CT) scanning. Senior emergency clinicians may be asked to interpret these CT scans. Missing concealed drug packages have important clinical and forensic implications. The accuracy of emergency clinician interpretation of abdominal CT scans for concealed drugs is not known. Limited evidence suggests that accuracy for identification of concealed packages can be increased by viewing CT images on "lung window" settings. To determine the accuracy of senior emergency clinicians in interpreting abdominal CT scans for concealed drugs, and to determine if this accuracy was improved by viewing scans on both abdominal and lung window settings. Emergency clinicians blinded to all patient identifiers and the radiology report interpreted CT scans of suspected body packers using standard abdominal window settings and then with the addition of lung window settings. The reference standard was the radiologist's report. Fifty-five emergency clinicians reported 235 CT scans. The sensitivity, specificity, and accuracy of interpretation using abdominal windows was 89.9% (95% confidence interval [CI] 83.0-94.7), 81.9% (95% CI 73.7-88.4), and 86.0% (95% CI 81.5-90.4), respectively, and with both window settings was 94.1% (95% CI 88.3-97.6), 76.7% (95% CI 68.0-84.1), 85.5% (95% CI 81.0-90.0), respectively. Diagnostic accuracy was similar regardless of the clinician's experience. Interrater reliability was moderate (kappa 0.46). The accuracy of interpretation of abdominal CT scans performed for the purpose of detecting concealed drug packages by emergency clinicians is not high enough to safely discharge these patients from the ED. The use of lung windows improved sensitivity, but at the expense of specificity. Crown Copyright © 2015. Published by Elsevier Inc. All rights reserved.
Sovereignty and Collaboration: Affordable Strategies in Times of Austerity
2016-10-01
provide precision-guided bombs and a land-support SOVEREIGNTY—ANALYSIS 26 vehicle were delivered for more than 20 percent below the expenditure ini...weapon Precision-guided bomb Support vehicle Panther command & control vehicle Successor Identification Friend or Foe (IFF) Joint combat aircraft...GLMRS) Multi-role armoured vehicle (MRAV) Next-generation light anti-armoured weapon Precision-guided bomb Support vehicle Panther command & control
15 CFR 718.2 - Identification of confidential business information.
Code of Federal Regulations, 2010 CFR
2010-01-01
... business information. 718.2 Section 718.2 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS CONFIDENTIAL BUSINESS INFORMATION 718.2 Identification of confidential business...
Stephens, Skye; Day, David M
2013-07-01
Weapons and drug offences incur a large cost to society and tend to be strongly associated. Improved understanding of their antecedents could inform targeted early intervention and prevention programmes. This study aimed to examine differences in criminal careers, childhood predictors and adolescent correlates among weapons-only offenders, drugs-only offenders and a versatile group of weapons + drugs offenders. We conducted a longitudinal records study of 455 young Canadians charged with drug and/or weapons offences who started their offending in late childhood/early adolescence. Consistent with expectation, differences emerged in their criminal careers as the versatile group had a longer criminal career and desisted from offending at a later age than weapons-only offenders. Against prediction, weapons-only offenders experienced the greatest number of childhood predictors and adolescent correlates. The three offending groups could be differentiated on offending trajectories and developmental factors.In making links between past events and later behaviour, life-course criminology may inform development of effective early intervention and prevention strategies.As weapons-only offenders experience the greatest level of adversity in childhood and adolescence, they may benefit most (of these three groups) from early intervention and prevention programmes.A reduction in weapon carrying and use might be achieved by early identification of children risk factors (e.g. family adversity) and appropriate intervention. Copyright © 2013 John Wiley & Sons, Ltd.
Chemical Weapons Exposures in Iraq: Challenges of a Public Health Response a Decade Later.
Baird, Coleen; Mirza, Raul; Sharkey, Jessica M; Teichman, Ron; Longmire, Romarius; Harkins, Deanna; Llanos, Joseph; Abraham, Joseph; McCannon, Charles; Heller, Jack; Tinklepaugh, Carole; Rice, William
2016-01-01
An October 14, 2014 article in The New York Times reported that the US Department of Defense (DoD) concealed, for nearly a decade, circumstances surrounding service members' exposure to chemical warfare agents (CWA) while deployed to Iraq in support of Operations Iraqi Freedom and New Dawn from March 13, 2003, to December 31, 2011, and alleged failure of the DoD to provide expedient and adequate medical care. This report prompted the DoD to devise a public health investigation, with the Army Public Health Center (Provisional) as the lead agency to identify, evaluate, document, and track CWA casualties of the Iraq war. Further, the DoD revisited and revised clinical guidelines and health policies concerning CWA exposure based on current evidence-based guidelines and best practices.
Pendulum detector testing device
Gonsalves, J.M.
1997-09-30
A detector testing device is described which provides consistent, cost-effective, repeatable results. The testing device is primarily constructed of PVC plastic and other non-metallic materials. Sensitivity of a walk-through detector system can be checked by: (1) providing a standard test object simulating the mass, size and material content of a weapon or other contraband, (2) suspending the test object in successive positions, such as head, waist and ankle levels, simulating where the contraband might be concealed on a person walking through the detector system; and (3) swinging the suspended object through each of the positions, while operating the detector system and observing its response. The test object is retained in a holder in which the orientation of the test device or target can be readily changed, to properly complete the testing requirements. 5 figs.
Pendulum detector testing device
Gonsalves, John M.
1997-01-01
A detector testing device which provides consistent, cost-effective, repeatable results. The testing device is primarily constructed of PVC plastic and other non-metallic materials. Sensitivity of a walk-through detector system can be checked by: 1) providing a standard test object simulating the mass, size and material content of a weapon or other contraband, 2) suspending the test object in successive positions, such as head, waist and ankle levels, simulating where the contraband might be concealed on a person walking through the detector system; and 3) swinging the suspended object through each of the positions, while operating the detector system and observing its response. The test object is retained in a holder in which the orientation of the test device or target can be readily changed, to properly complete the testing requirements.
Sparse interferometric millimeter-wave array for centimeter-level 100-m standoff imaging
NASA Astrophysics Data System (ADS)
Suen, Jonathan Y.; Lubin, Philip M.; Solomon, Steven L.; Ginn, Robert P.
2013-05-01
We present work on the development of a long range standoff concealed weapons detection system capable of imaging under very heavy clothing at distances exceeding 100 m with a cm resolution. The system is based off a combination of phased array technologies used in radio astronomy and SAR radar by using a coherent, multi-frequency reconstruction algorithm which can run at up to 1000 Hz frame rates and high SNR with a multi-tone transceiver. We show the flexible design space of our system as well as algorithm development, predicted system performance and impairments, and simulated reconstructed images. The system can be used for a variety of purposes including portal applications, crowd scanning and tactical situations. Additional uses include seeing through dust and fog.
Ballistics projectile image analysis for firearm identification.
Li, Dongguang
2006-10-01
This paper is based upon the observation that, when a bullet is fired, it creates characteristic markings on the cartridge case and projectile. From these markings, over 30 different features can be distinguished, which, in combination, produce a "fingerprint" for a firearm. By analyzing features within such a set of firearm fingerprints, it will be possible to identify not only the type and model of a firearm, but also each and every individual weapon just as effectively as human fingerprint identification. A new analytic system based on the fast Fourier transform for identifying projectile specimens by the line-scan imaging technique is proposed in this paper. This paper develops optical, photonic, and mechanical techniques to map the topography of the surfaces of forensic projectiles for the purpose of identification. Experiments discussed in this paper are performed on images acquired from 16 various weapons. Experimental results show that the proposed system can be used for firearm identification efficiently and precisely through digitizing and analyzing the fired projectiles specimens.
Component pattern analysis of chemicals using multispectral THz imaging system
NASA Astrophysics Data System (ADS)
Kawase, Kodo; Ogawa, Yuichi; Watanabe, Yuki
2004-04-01
We have developed a novel basic technology for terahertz (THz) imaging, which allows detection and identification of chemicals by introducing the component spatial pattern analysis. The spatial distributions of the chemicals were obtained from terahertz multispectral transillumination images, using absorption spectra previously measured with a widely tunable THz-wave parametric oscillator. Further we have applied this technique to the detection and identification of illicit drugs concealed in envelopes. The samples we used were methamphetamine and MDMA, two of the most widely consumed illegal drugs in Japan, and aspirin as a reference.
The 871 keV gamma ray from 17O and the identification of plutonium oxide
NASA Astrophysics Data System (ADS)
Peurrung, Anthony; Arthur, Richard; Elovich, Robert; Geelhood, Bruce; Kouzes, Richard; Pratt, Sharon; Scheele, Randy; Sell, Richard
2001-12-01
Disarmament agreements and discussions between the United States and the Russian Federation for reducing the number of stockpiled nuclear weapons require verification of the origin of materials as having come from disassembled weapons. This has resulted in the identification of measurable "attributes" that characterize such materials. It has been proposed that the 871 keV gamma ray of 17O can be observed as an indicator of the unexpected presence of plutonium oxide, as opposed to plutonium metal, in such materials. We have shown that the observation of the 871 keV gamma ray is not a specific indicator of the presence of the oxide, but rather indicates the presence of nitrogen.
Concealed Accessory Pathways with a Single Ventricular and Two Discrete Atrial Insertion Sites.
Kipp, Ryan T; Abu Sham'a, Raed; Hiroyuki, Ito; Han, Frederick T; Refaat, Marwan; Hsu, Jonathan C; Field, Michael E; Kopp, Douglas E; Marcus, Gregory M; Scheinman, Melvin M; Hoffmayer, Kurt S
2017-03-01
Atrioventricular reciprocating tachycardia (AVRT) utilizing a concealed accessory pathway is common. It is well appreciated that some patients may have multiple accessory pathways with separate atrial and ventricular insertion sites. We present three cases of AVRT utilizing concealed pathways with evidence that each utilizing a single ventricular insertion and two discrete atrial insertion sites. In case one, two discrete atrial insertion sites were mapped in two separate procedures, and only during the second ablation was the Kent potential identified. Ablation of the Kent potential at this site remote from the two atrial insertion sites resulted in the termination of the retrograde conduction in both pathways. Case two presented with supraventricular tachycardia (SVT) with alternating eccentric atrial activation patterns without alteration in the tachycardia cycle length. The two distinct atrial insertion sites during orthodromic AVRT and ventricular pacing were targeted and each of the two atrial insertion sites were successfully mapped and ablated. In case three, retrograde decremental conduction utilizing both atrial insertion sites was identified prior to ablation. After mapping and ablation of the first discrete atrial insertion site, tachycardia persisted utilizing the second atrial insertion site. Only after ablation of the second atrial insertion site was SVT noninducible, and VA conduction was no longer present. Concealed retrograde accessory pathways with discrete atrial insertion sites may have a common ventricular insertion site. Identification and ablation of the ventricular insertion site or the separate discrete atrial insertion sites result in successful treatment. © 2017 Wiley Periodicals, Inc.
Harvey, Marc
2014-09-01
This paper proposes a model of human uniqueness based on an unusual distinction between two contrasted kinds of political competition and political status: (1) antagonistic competition, in quest of dominance (antagonistic status), a zero-sum, self-limiting game whose stake--who takes what, when, how--summarizes a classical definition of politics (Lasswell 1936), and (2) synergistic competition, in quest of merit (synergistic status), a positive-sum, self-reinforcing game whose stake becomes "who brings what to a team's common good." In this view, Rawls's (1971) famous virtual "veil of ignorance" mainly conceals politics' antagonistic stakes so as to devise the principles of a just, egalitarian society, yet without providing any means to enforce these ideals (Sen 2009). Instead, this paper proposes that human uniqueness flourished under a real "adapted veil of ignorance" concealing the steady inflation of synergistic politics which resulted from early humans' sturdy egalitarianism. This proposition divides into four parts: (1) early humans first stumbled on a purely cultural means to enforce a unique kind of within-team antagonistic equality--dyadic balanced deterrence thanks to handheld weapons (Chapais 2008); (2) this cultural innovation is thus closely tied to humans' darkest side, but it also launched the cumulative evolution of humans' brightest qualities--egalitarian team synergy and solidarity, together with the associated synergistic intelligence, culture, and communications; (3) runaway synergistic competition for differential merit among antagonistically equal obligate teammates is the single politically selective mechanism behind the cumulative evolution of all these brighter qualities, but numerous factors to be clarified here conceal this mighty evolutionary driver; (4) this veil of ignorance persists today, which explains why humans' unique prosocial capacities are still not clearly understood by science. The purpose of this paper is to start lifting this now-ill-adapted veil of ignorance, thus uncovering the tight functional relations between egalitarian team solidarity and the evolution of human uniqueness.
A review of legislation restricting the intersection of firearms and alcohol in the U.S.
Carr, Brendan G; Porat, Gali; Wiebe, Douglas J; Branas, Charles C
2010-01-01
In the United States, injury is a leading cause of alcohol-related death, and alcohol use is the leading risk factor for injury. We reviewed state and federal legislation regulating the intersection of alcohol and firearms. We examined the current criminal codes of all 50 states and the District of Columbia using the databases Westlaw and LexisNexis to review restrictions on firearm use while intoxicated. We found three types of laws in 26 states that restrict firearm use by intoxicated people: sales or transfers are restricted in six states, carrying of concealed weapons is restricted in four states, and possession or discharge of a firearm while intoxicated is restricted in 20 states. Regulation of the carrying and use of firearms by acutely intoxicated individuals may represent a public health opportunity to reduce firearm-related injury.
Acoustic Parametric Array for Identifying Standoff Targets
NASA Astrophysics Data System (ADS)
Hinders, M. K.; Rudd, K. E.
2010-02-01
An integrated simulation method for investigating nonlinear sound beams and 3D acoustic scattering from any combination of complicated objects is presented. A standard finite-difference simulation method is used to model pulsed nonlinear sound propagation from a source to a scattering target via the KZK equation. Then, a parallel 3D acoustic simulation method based on the finite integration technique is used to model the acoustic wave interaction with the target. Any combination of objects and material layers can be placed into the 3D simulation space to study the resulting interaction. Several example simulations are presented to demonstrate the simulation method and 3D visualization techniques. The combined simulation method is validated by comparing experimental and simulation data and a demonstration of how this combined simulation method assisted in the development of a nonlinear acoustic concealed weapons detector is also presented.
Standoff passive video imaging at 350 GHz with 251 superconducting detectors
NASA Astrophysics Data System (ADS)
Becker, Daniel; Gentry, Cale; Smirnov, Ilya; Ade, Peter; Beall, James; Cho, Hsiao-Mei; Dicker, Simon; Duncan, William; Halpern, Mark; Hilton, Gene; Irwin, Kent; Li, Dale; Paulter, Nicholas; Reintsema, Carl; Schwall, Robert; Tucker, Carole
2014-06-01
Millimeter wavelength radiation holds promise for detection of security threats at a distance, including suicide bomb belts and maritime threats in poor weather. The high sensitivity of superconducting Transition Edge Sensor (TES) detectors makes them ideal for passive imaging of thermal signals at these wavelengths. We have built a 350 GHz video-rate imaging system using a large-format array of feedhorn-coupled TES bolometers. The system operates at a standoff distance of 16m to 28m with a spatial resolution of 1:4 cm (at 17m). It currently contains one 251-detector subarray, and will be expanded to contain four subarrays for a total of 1004 detectors. The system has been used to take video images which reveal the presence of weapons concealed beneath a shirt in an indoor setting. We present a summary of this work.
1976-09-01
technology has made possible the deployment of very sophisticated and highly capable weapon systems. Taking advantage of this technology has carried...3) Ancillary Equipment 208 Types Numerous Notes : 1. Number of ships with this system 2. Includes Tartar used only for surface capability 3. These...maintains the Configuration Item Identification File (CIIF) . The CIIF provides storage and retrieval capability for technical and logistics data specified on
Psychometric Evaluation of the Pain Attitudes Questionnaire-Revised for People With Advanced Cancer.
Mah, Kenneth; Tran, Kim T; Gauthier, Lynn R; Rodin, Gary; Zimmermann, Camilla; Warr, David; Librach, S Lawrence; Moore, Malcolm; Shepherd, Frances A; Gagliese, Lucia
2017-07-01
Pain-related stoicism and cautiousness are theorized to be more prevalent in older than younger patients and to lead to greater pain under-reporting and consequently inadequate pain management in older patients. The Pain Attitudes Questionnaire-Revised (PAQ-R), which measures 5 pain-related stoicism (fortitude, concealment, superiority) and cautiousness (self-doubt, reluctance) factors in chronic pain, can help test this hypothesis in advanced cancer but requires validation. We conducted a psychometric evaluation of the PAQ-R in 155 younger (younger than 60 years) and 114 older (aged 60 years and older) patients with advanced cancer. Participants showed disagreement with self-doubt items and floor effects with the subscale. Confirmatory factor analyses revealed good fit of the PAQ-R's 5 factors to younger and older groups' data but collinearity between fortitude and concealment. Multisample confirmatory factor analyses supported partial scalar invariance between age groups. Few hypothesized age-related differences were observed. Younger patients reported higher superiority scores than older patients. Whereas older patients showed greater fortitude and superiority with lower average pain intensity, younger patients showed greater concealment or fortitude with greater worst and average pain intensity. Furthermore, whereas older patients displayed greater superiority with lower interference in relations with others, younger patients displayed greater concealment and superiority with greater interference in walking ability and greater concealment and self-doubt with more interference in relations with others. Cross-validation of the PAQ-R's factor structure and identification of pathways to the factors and effect on pain-related outcomes using multivariate approaches are warranted. This article presents the psychometric properties of a measure of 2 particular pain-related attitudes. The measure can help clarify whether these attitudes adversely influence pain reporting in older patients with advanced cancer as hypothesized and, in turn, explain the inadequate pain management frequently reported with this clinical group. Copyright © 2017 American Pain Society. Published by Elsevier Inc. All rights reserved.
Tomassoni, Anthony J; French, Robert N E; Walter, Frank G
2015-02-01
Toxidromes aid emergency care providers in the context of the patient presenting with suspected poisoning, unexplained altered mental status, unknown hazardous materials or chemical weapons exposure, or the unknown overdose. The ability to capture an adequate chemical exposure history and to recognize toxidromes may reduce dependence on laboratory tests, speed time to delivery of specific antidote therapy, and improve selection of supportive care practices tailored to the etiologic agent. This article highlights elements of the exposure history and presents selected toxidromes that may be caused by toxic industrial chemicals and chemical weapons. Specific antidotes for toxidromes and points regarding their use, and special supportive measures, are presented. Copyright © 2015 Elsevier Inc. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2009-01-01
Since September 11, 2001, the Department of Energy has, on several occasions, revised its security posture based on identified threats and adversaries. These revisions in security posture have driven Departmental sites to upgrade their defensive and tactical equipment. Subsequent changes in the perceived threats have, in some cases, led to a reduction in the need for certain types of weapons, thus creating a pool of surplus equipment. These surplus weapons could potentially be used by other Department sites and Federal law enforcement agencies. Recent Office of Inspector General reports have raised concerns with the adequacy of controls related to defensivemore » and tactical equipment. For example, our report on Management Controls Over Defense Related High Risk Property (OAS-M-08-06, April 2008) found that administrative controls over certain defense related high risk property were not sufficient for providing accountability over these items. Because of prior reported weaknesses in controls over defensive and tactical equipment, we initiated this audit to determine whether the Department and its contractors were properly managing excess weapons inventories and selected sensitive equipment used by protective forces. Our review disclosed that the Department was not always properly managing its inventories of excess weapons and selected sensitive equipment. We identified issues with the retention of unneeded weapons at many locations and with the identification and tracking of sensitive items. More specifically: Sites maintained large inventories of weapons that were no longer needed but had not been made available for use by either other Departmental sites or other Federal law enforcement agencies. For instance, at six of the locations included in our review we identified a total of 2,635 unneeded weapons with a total acquisition value of over $2.8 million that had not been officially declared as excess - an action that would have made them available for others to use. In addition; Sites were not always identifying, tracking and properly disposing of potentially high risk and sensitive equipment. In particular, we identified control weaknesses in this area related to weapons sights and scopes. These issues occurred because the Department did not have processes in place to properly manage excess inventories of weapons. In particular, the Department does not have requirements for ensuring timely declaration of excess weapons. Additionally, certain sites indicated that they were unwilling to give up excess weapons because of the possibility that they may be needed in the future. However, other sites had a need for some of these weapons and could have avoided purchasing them had they been made available through the excess screening process. Also, we found that the Department lacks clear guidance on the identification of high risk/sensitive equipment. Except for immaterial differences, we were able to locate and verify accountability over the items of defensive and tactical equipment we selected for review. Specifically, we took statistical samples of weapons, ammunition, and other related equipment and were able to verify their existence. While these accountability measures were noteworthy, additional action is necessary to strengthen controls over weapon and sensitive equipment management. Untimely declaration of excess weapons may result in an inefficient use of scarce Government resources. Similarly, if selected high risk/sensitive equipment is not properly categorized and tracked, accountability issues may occur. To address these issues, we made recommendations aimed at improving the management of these categories of defensive and tactical equipment.« less
Optical bullet-tracking algorithms for weapon localization in urban environments
DOE Office of Scientific and Technical Information (OSTI.GOV)
Roberts, R S; Breitfeller, E F
2006-03-31
Localization of the sources of small-arms fire, mortars, and rocket propelled grenades is an important problem in urban combat. Weapons of this type produce characteristic signatures, such as muzzle flashes, that are visible in the infrared. Indeed, several systems have been developed that exploit the infrared signature of muzzle flash to locate the positions of shooters. However, systems based on muzzle flash alone can have difficulty localizing weapons if the muzzle flash is obscured or suppressed. Moreover, optical clutter can be problematic to systems that rely on muzzle flash alone. Lawrence Livermore National Laboratory (LLNL) has developed a projectile trackingmore » system that detects and localizes sources of small-arms fire, mortars and similar weapons using the thermal signature of the projectile rather than a muzzle flash. The thermal signature of a projectile, caused by friction as the projectile travels along its trajectory, cannot be concealed and is easily discriminated from optical clutter. The LLNL system was recently demonstrated at the MOUT facility of the Aberdeen Test Center [1]. In the live-fire demonstration, shooters armed with a variety of small-arms, including M-16s, AK-47s, handguns, mortars and rockets, were arranged at several positions in around the facility. Experiments ranged from a single-weapon firing a single-shot to simultaneous fire of all weapons on full automatic. The LLNL projectile tracking system was demonstrated to localize multiple shooters at ranges up to 400m, far greater than previous demonstrations. Furthermore, the system was shown to be immune to optical clutter that is typical in urban combat. This paper describes the image processing and localization algorithms designed to exploit the thermal signature of projectiles for shooter localization. The paper begins with a description of the image processing that extracts projectile information from a sequence of infrared images. Key to the processing is an adaptive spatio-temporal filter developed to suppress scene clutter. The filtered image sequence is further processed to produce a set of parameterized regions, which are classified using several discriminate functions. Regions that are classified as projectiles are passed to a data association algorithm that matches features from these regions with existing tracks, or initializes new tracks as needed. A Kalman filter is used to smooth and extrapolate existing tracks. Shooter locations are determined by solving a combinatorial least-squares solution for all bullet tracks. It also provides an error ellipse for each shooter, quantifying the uncertainty of shooter location. The paper concludes with examples from the live-fire exercise at the Aberdeen Test Center.« less
Pro-anorexia websites: what a clinician should know.
Harshbarger, Jenni L; Ahlers-Schmidt, Carolyn R; Mayans, Laura; Mayans, David; Hawkins, Joseph H
2009-05-01
The purpose of this study was to conduct a content analysis of the "Tips and Tricks" section of pro-ana websites to better understand information shared on these sites, and aide clinicians in identification, treatment, and prevention of anorexia. Nine pro-ana websites were evaluated to identify categories of information in "Tips and Tricks." A content analysis was performed using emergent coding methods and 16 categories were determined. Reliability was acceptable (Cohen's Kappa = 0.702). Discrepancies were corrected by consensus. Frequencies of individual categories were computed. Most "Tips and Tricks" are directed at dieting/restricting calories (28.6%) and distraction (14.0%). Most disturbing, 11% of comments were directed at lying and concealing symptoms. Clinicians aware of "Tips and Tricks" might be better equipped to recognize the symptoms of anorexia early in treatment. Knowledge of "Tips and Tricks" can also facilitate better education, making it difficult for clients to conceal their illness.
15 CFR 718.2 - Identification of confidential business information.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS... exports and imports of Schedule 1 chemicals is not subject to the confidential business information...
A simulation study of detection of weapon of mass destruction based on radar
NASA Astrophysics Data System (ADS)
Sharifahmadian, E.; Choi, Y.; Latifi, S.
2013-05-01
Typical systems used for detection of Weapon of Mass Destruction (WMD) are based on sensing objects using gamma rays or neutrons. Nonetheless, depending on environmental conditions, current methods for detecting fissile materials have limited distance of effectiveness. Moreover, radiation related to gamma- rays can be easily shielded. Here, detecting concealed WMD from a distance is simulated and studied based on radar, especially WideBand (WB) technology. The WB-based method capitalizes on the fact that electromagnetic waves penetrate through different materials at different rates. While low-frequency waves can pass through objects more easily, high-frequency waves have a higher rate of absorption by objects, making the object recognition easier. Measuring the penetration depth allows one to identify the sensed material. During simulation, radar waves and propagation area including free space, and objects in the scene are modeled. In fact, each material is modeled as a layer with a certain thickness. At start of simulation, a modeled radar wave is radiated toward the layers. At the receiver side, based on the received signals from every layer, each layer can be identified. When an electromagnetic wave passes through an object, the wave's power will be subject to a certain level of attenuation depending of the object's characteristics. Simulation is performed using radar signals with different frequencies (ranges MHz-GHz) and powers to identify different layers.
High-resolution three-dimensional imaging radar
NASA Technical Reports Server (NTRS)
Cooper, Ken B. (Inventor); Chattopadhyay, Goutam (Inventor); Siegel, Peter H. (Inventor); Dengler, Robert J. (Inventor); Schlecht, Erich T. (Inventor); Mehdi, Imran (Inventor); Skalare, Anders J. (Inventor)
2010-01-01
A three-dimensional imaging radar operating at high frequency e.g., 670 GHz, is disclosed. The active target illumination inherent in radar solves the problem of low signal power and narrow-band detection by using submillimeter heterodyne mixer receivers. A submillimeter imaging radar may use low phase-noise synthesizers and a fast chirper to generate a frequency-modulated continuous-wave (FMCW) waveform. Three-dimensional images are generated through range information derived for each pixel scanned over a target. A peak finding algorithm may be used in processing for each pixel to differentiate material layers of the target. Improved focusing is achieved through a compensation signal sampled from a point source calibration target and applied to received signals from active targets prior to FFT-based range compression to extract and display high-resolution target images. Such an imaging radar has particular application in detecting concealed weapons or contraband.
Skitka, Linda J; Hanson, Brittany E; Wisneski, Daniel C
2017-02-01
People are more likely to become politically engaged (e.g., vote, engage in activism) when issues are associated with strong moral convictions. The goal of this research was to understand the underlying motivations that lead to this well-replicated effect. Specifically, to what extent is moralized political engagement motivated by proscriptive concerns (e.g., perceived harms, anticipated regret), prescriptive concerns (e.g., perceived benefits, anticipated pride), or some combination of these processes? And are the motivational pathways between moral conviction and political engagement the same or different for liberals and conservatives? Two studies (combined N = 2,069) found that regardless of political orientation, the association between moral conviction and political engagement was mediated by the perceived benefits of preferred but not the perceived harms of non-preferred policy outcomes, and by both anticipated pride and regret, findings that replicated in two contexts: legalizing same-sex marriage and allowing concealed weapons on college campuses.
Mechanical profiles of murder and murderers: An extensive review.
Kamaluddin, M R; Md Shariff, N S; Mat Saat, G A
2018-04-01
Murder is an extreme form of violent crime which occurs across all social, cultural, and ethnic spheres. It is therefore, crucial to understand the nature and the extent of mechanical profiles of murder and murderers. The purpose of this article is to review such critical aspects of murder in a nutshell. An archival research methodology was employed in this study where relevant search for literatures on these mechanical aspects related to murder was made across search engines such as Google Scholar and Elsevier with relevant articles selected for this review. This review discusses in an in-depth manner, pivotal mechanical profiles which include motives, methods of killing, choice of weapon, settings, targeted body parts, and murder victim concealment. In-depth understanding of each mechanical aspect offers an opportunity to the public at large to expand their knowledge on murder prevention manners which is vital for crime prevention efforts in the future.
Terahertz technology for imaging and spectroscopy
NASA Astrophysics Data System (ADS)
Crowe, T. W.; Porterfield, D. W.; Hesler, J. L.; Bishop, W. L.; Kurtz, D. S.; Hui, K.
2006-05-01
The terahertz region of the electromagnetic spectrum has unique properties that make it especially useful for imaging and spectroscopic detection of concealed weapons, explosives and chemical and biological materials. However, terahertz energy is difficult to generate and detect, and this has led to a technology gap in this frequency band. Nonlinear diodes can be used to bridge this gap by translating the functionality achieved at microwave frequencies to the terahertz band. Basic building blocks include low-noise mixers, frequency multipliers, sideband generators and direct detectors. These terahertz components rely on planar Schottky diodes and recently developed integrated diode circuits make them easier to assemble and more robust. The new generation of terahertz sources and receivers requires no mechanical tuning, yet achieves high efficiency and broad bandwidth. This paper reviews the basic design of terahertz transmitters and receivers, with special emphasis on the recent development of systems that are compact, easy to use and have excellent performance.
Elbasuney, Sherif; El-Sherif, Ashraf F
2017-01-01
The instant detection of explosives and explosive-related compounds has become an urgent priority in recent years for homeland security and counter-terrorism applications. Modern techniques should offer enhancement in selectivity, sensitivity, and standoff distances. Miniaturisation, portability, and field-ruggedisation are crucial requirements. This study reports on instant and standoff identification of concealed explosive-related compounds using customized Raman technique. Stokes Raman spectra of common explosive-related compounds were generated and spectrally resolved to create characteristic finger print spectra. The scattered Raman emissions over the band 400:2000cm -1 were compared to infrared absorption using FTIR. It has been demonstrated that the two vibrational spectroscopic techniques were opposite and completing each other. Molecular vibrations with strong absorption in infrared (those involve strong change in dipole moments) induced weak signals in Raman and vice versa. The tailored Raman offered instant detection, high sensitivity, and standoff detection capabilities. Raman demonstrated characteristic fingerprint spectra with stable baseline and sharp intense peaks. Complete correlations of absorption/scattered signals to certain molecular vibrations were conducted to generate an entire spectroscopic profile of explosive-related compounds. This manuscript shades the light on Raman as one of the prevailing technologies for instantaneous detection of explosive-related compounds. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Goal-Directed Modulation of Neural Memory Patterns: Implications for fMRI-Based Memory Detection.
Uncapher, Melina R; Boyd-Meredith, J Tyler; Chow, Tiffany E; Rissman, Jesse; Wagner, Anthony D
2015-06-03
Remembering a past event elicits distributed neural patterns that can be distinguished from patterns elicited when encountering novel information. These differing patterns can be decoded with relatively high diagnostic accuracy for individual memories using multivoxel pattern analysis (MVPA) of fMRI data. Brain-based memory detection--if valid and reliable--would have clear utility beyond the domain of cognitive neuroscience, in the realm of law, marketing, and beyond. However, a significant boundary condition on memory decoding validity may be the deployment of "countermeasures": strategies used to mask memory signals. Here we tested the vulnerability of fMRI-based memory detection to countermeasures, using a paradigm that bears resemblance to eyewitness identification. Participants were scanned while performing two tasks on previously studied and novel faces: (1) a standard recognition memory task; and (2) a task wherein they attempted to conceal their true memory state. Univariate analyses revealed that participants were able to strategically modulate neural responses, averaged across trials, in regions implicated in memory retrieval, including the hippocampus and angular gyrus. Moreover, regions associated with goal-directed shifts of attention and thought substitution supported memory concealment, and those associated with memory generation supported novelty concealment. Critically, whereas MVPA enabled reliable classification of memory states when participants reported memory truthfully, the ability to decode memory on individual trials was compromised, even reversing, during attempts to conceal memory. Together, these findings demonstrate that strategic goal states can be deployed to mask memory-related neural patterns and foil memory decoding technology, placing a significant boundary condition on their real-world utility. Copyright © 2015 the authors 0270-6474/15/358531-15$15.00/0.
Effect of laundering on visible damage to apparel fabric caused by sharp force impact.
Wells, S L; Laing, R M; Carr, D J; Niven, B E
2013-12-10
Sharp force violence is a common way of committing assault in numerous countries and regions around the world. When a stabbing occurs, the clothing worn by the victim may provide vital evidence: for example the weapon used to stab the victim may be identified from severance in the clothing. However, whether laundering the clothing after an attack affects the severance morphology of the fabric and fibres, and whether identification of the weapon is possible from the severance in the clothing after laundering is not known. This study focussed on the effect of laundering 100% cotton twill weave (drill) and single jersey (knit) fabrics. Specimens had been pre-treated and stabbed with either a kitchen knife or a Phillips screwdriver. These specimens were photographed and were again laundered for one wash cycle before being photographed again. Ten expert judges compared the photographs taken before and after laundering. A difference in the appearance of the fabrics before and after laundering was evident. The morphology of the fabric and fibres thus would be expected to differ after laundering the clothing, making identification of a weapon used to stab through clothing more difficult. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.
Template identification technology of nuclear warheads and components
NASA Astrophysics Data System (ADS)
Liu, Su-Ping; Gong, Jian; Hao, Fan-Hua; Hu, Guang-Chun
2008-02-01
Template identification technology (TIT) is designed for the scenarios where a batch of disarmed nuclear weapons or components would be dismantled to observe a nuclear disarmament treaty. The core function played by the TIT is to make a judgment on whether the verified item belongs to a certain kind of nuclear weapons or component (NW/NC) or to which kind the verified item belongs. This paper analyses the functions played by the TIT in the process of NW/NC dismantlement, and proposes that two phases would be followed when applying the TIT: firstly to establish NW/NC templates with a sample of size n drawn from a certain kind of disarmament NW; secondly to authenticate NW/NC by means of the TIT. This paper also expatiates some terms related to the concept of the TIT and investigates on the development status of NW/NC TIT based on radiation signatures. The study concludes that the design of template structure is crucial to the establishment of an effective TIT and that starting from different research angles and aiming at the same goal of classification different template structures and corresponding template identification methods can be built up to meet specific identification requirements.
NASA Astrophysics Data System (ADS)
A. AL-Salhi, Yahya E.; Lu, Songfeng
2016-08-01
Quantum steganography can solve some problems that are considered inefficient in image information concealing. It researches on Quantum image information concealing to have been widely exploited in recent years. Quantum image information concealing can be categorized into quantum image digital blocking, quantum image stereography, anonymity and other branches. Least significant bit (LSB) information concealing plays vital roles in the classical world because many image information concealing algorithms are designed based on it. Firstly, based on the novel enhanced quantum representation (NEQR), image uniform blocks clustering around the concrete the least significant Qu-block (LSQB) information concealing algorithm for quantum image steganography is presented. Secondly, a clustering algorithm is proposed to optimize the concealment of important data. Finally, we used Con-Steg algorithm to conceal the clustered image blocks. Information concealing located on the Fourier domain of an image can achieve the security of image information, thus we further discuss the Fourier domain LSQu-block information concealing algorithm for quantum image based on Quantum Fourier Transforms. In our algorithms, the corresponding unitary Transformations are designed to realize the aim of concealing the secret information to the least significant Qu-block representing color of the quantum cover image. Finally, the procedures of extracting the secret information are illustrated. Quantum image LSQu-block image information concealing algorithm can be applied in many fields according to different needs.
Self-Concealment and Suicidal Behaviors
ERIC Educational Resources Information Center
Friedlander, Adam; Nazem, Sarra; Fiske, Amy; Nadorff, Michael R.; Smith, Merideth D.
2012-01-01
Understanding self-concealment, the tendency to actively conceal distressing personal information from others, may be important in developing effective ways to help individuals with suicidal ideation. No published study has yet assessed the relation between self-concealment and suicidal behaviors. Additionally, most self-concealment research has…
System and method for controlling remote devices
Carrender, Curtis Lee [Richland, WA; Gilbert, Ronald W [Benton City, WA; Scott, Jeff W [Pasco, WA; Clark, David A [Kennewick, WA
2006-02-07
A system and method for controlling remote devices utilizing a radio frequency identification (RFID) tag device having a control circuit adapted to render the tag device, and associated objects, permanently inoperable in response to radio-frequency control signals. The control circuit is configured to receive the control signals that can include an enable signal, and in response thereto enable an associated object, such as a weapon; and in response to a disable signal, to disable the tag itself, or, if desired, to disable the associated weapon or both the device and the weapon. Permanent disabling of the tag can be accomplished by several methods, including, but not limited to, fusing a fusable link, breaking an electrically conductive path, permanently altering the modulation or backscattering characteristics of the antenna circuit, and permanently erasing an associated memory. In this manner, tags in the possession of unauthorized employees can be remotely disabled, and weapons lost on a battlefield can be easily tracked and enabled or disabled automatically or at will.
Carrell, David; Malin, Bradley; Aberdeen, John; Bayer, Samuel; Clark, Cheryl; Wellner, Ben; Hirschman, Lynette
2013-01-01
Secondary use of clinical text is impeded by a lack of highly effective, low-cost de-identification methods. Both, manual and automated methods for removing protected health information, are known to leave behind residual identifiers. The authors propose a novel approach for addressing the residual identifier problem based on the theory of Hiding In Plain Sight (HIPS). HIPS relies on obfuscation to conceal residual identifiers. According to this theory, replacing the detected identifiers with realistic but synthetic surrogates should collectively render the few 'leaked' identifiers difficult to distinguish from the synthetic surrogates. The authors conducted a pilot study to test this theory on clinical narrative, de-identified by an automated system. Test corpora included 31 oncology and 50 family practice progress notes read by two trained chart abstractors and an informaticist. Experimental results suggest approximately 90% of residual identifiers can be effectively concealed by the HIPS approach in text containing average and high densities of personal identifying information. This pilot test suggests HIPS is feasible, but requires further evaluation. The results need to be replicated on larger corpora of diverse origin under a range of detection scenarios. Error analyses also suggest areas where surrogate generation techniques can be refined to improve efficacy. If these results generalize to existing high-performing de-identification systems with recall rates of 94-98%, HIPS could increase the effective de-identification rates of these systems to levels above 99% without further advancements in system recall. Additional and more rigorous assessment of the HIPS approach is warranted.
Study and application of new Raman spectroscopy
NASA Astrophysics Data System (ADS)
Liu, Qiushi; Zhang, Xiaohua
2016-03-01
Spatially Offset Raman Spectroscopy (SORS) is a new type of Raman Spectroscopy technology, which can detect the medium concealed in the opaque or sub-transparent material fast and nondestructively. The article summarized Spatially Offset Raman Spectroscopy`s international and domestic study and application progress on contraband detecting, medical science (bone ingredient, cancer diagnose etc.), agricultural products, historical relic identification etc. and stated the technology would become an effective measurement which had wide application prospect.
NASA Astrophysics Data System (ADS)
Picazas-Márquez, Nerea; Sierra, María; Nova, Clara; Moreno, Juan Manuel; Aboitiz, Nuria; de Rivas, Gema; Sierra, Miguel A.; Martínez-Álvarez, Roberto; Gómez-Caballero, Esther
2016-09-01
A new class of compounds, mono- and bis-haloethylphosphonates (HAPs and bisHAPs, respectively), listed in Schedule 2.B.04 of the Chemical Weapons Convention (CWC), has been synthesized and studied by GC-MS with two aims. First, to improve the identification of this type of chemicals by the Organization for the Prohibition of Chemical Weapons, (OPCW). Second, to study the synergistic effect of halogen and silicon atoms in molecules undergoing mass spectrometry. Fragmentation patterns of trimethylsilyl derivatives of HAPs were found to depend on the nature of the halogen atom; this was in agreement with DFT-calculations. The data suggest that a novel intramolecular halogen transfer takes place during the fragmentation process.
Picazas-Márquez, Nerea; Sierra, María; Nova, Clara; Moreno, Juan Manuel; Aboitiz, Nuria; de Rivas, Gema; Sierra, Miguel A; Martínez-Álvarez, Roberto; Gómez-Caballero, Esther
2016-09-01
A new class of compounds, mono- and bis-haloethylphosphonates (HAPs and bisHAPs, respectively), listed in Schedule 2.B.04 of the Chemical Weapons Convention (CWC), has been synthesized and studied by GC-MS with two aims. First, to improve the identification of this type of chemicals by the Organization for the Prohibition of Chemical Weapons, (OPCW). Second, to study the synergistic effect of halogen and silicon atoms in molecules undergoing mass spectrometry. Fragmentation patterns of trimethylsilyl derivatives of HAPs were found to depend on the nature of the halogen atom; this was in agreement with DFT-calculations. The data suggest that a novel intramolecular halogen transfer takes place during the fragmentation process. Graphical Abstract ᅟ.
Stinging plants: as future bio-weapon.
Gupta, Sanjay Mohan; Kumar, Kamal
2016-09-01
In the present opinion paper, we have been introducing for the first time the stinging plants and/or their biological toxins as novel bio-threat agents that may be used for the development of bio-weapons for self-defence purpose. The selected studied stinging plants are having dual role as nutraceutical and ethno-pharmacological uses apart from their less explored stinging property. However, future detailed work is required for identification and characterization of the precise stinging chemical components that will be used for the formulation of novel bio-warfare agents for self-defence purpose.
Nakashima, Ann; Farinaccio, Rocco
2015-04-01
Noise-induced hearing loss resulting from weapon noise exposure has been studied for decades. A summary of recent work in weapon noise signal analysis, current knowledge of hearing damage risk criteria, and auditory performance in impulse noise is presented. Most of the currently used damage risk criteria are based on data that cannot be replicated or verified. There is a need to address the effects of combined noise exposures, from similar or different weapons and continuous background noise, in future noise exposure regulations. Advancements in hearing protection technology have expanded the options available to soldiers. Individual selection of hearing protection devices that are best suited to the type of exposure, the auditory task requirements, and hearing status of the user could help to facilitate their use. However, hearing protection devices affect auditory performance, which in turn affects situational awareness in the field. This includes communication capability and the localization and identification of threats. Laboratory training using high-fidelity weapon noise recordings has the potential to improve the auditory performance of soldiers in the field, providing a low-cost tool to enhance readiness for combat. Reprint & Copyright © 2015 Association of Military Surgeons of the U.S.
NASA Astrophysics Data System (ADS)
Sinha, V.; Srivastava, A.; Lee, H. K.; Liu, X.
2013-05-01
The successful creation and operation of a neutron and X-ray combined computed tomography (NXCT) system has been demonstrated by researchers at the Missouri University of Science and Technology. The NXCT system has numerous applications in the field of material characterization and object identification in materials with a mixture of atomic numbers represented. Presently, the feasibility studies have been performed for explosive detection and homeland security applications, particularly in concealed material detection and determination of the light atomic number materials. These materials cannot be detected using traditional X-ray imaging. The new system has the capability to provide complete structural and compositional information due to the complementary nature of X-ray and neutron interactions with materials. The design of the NXCT system facilitates simultaneous and instantaneous imaging operation, promising enhanced detection capabilities of explosive materials, low atomic number materials and illicit materials for homeland security applications. In addition, a sample positioning system allowing the user to remotely and automatically manipulate the sample makes the system viable for commercial applications. Several explosives and weapon simulants have been imaged and the results are provided. The fusion algorithms which combine the data from the neutron and X-ray imaging produce superior images. This paper is a compete overview of the NXCT system for feasibility studies of explosive detection and homeland security applications. The design of the system, operation, algorithm development, and detection schemes are provided. This is the first combined neutron and X-ray computed tomography system in operation. Furthermore, the method of fusing neutron and X-ray images together is a new approach which provides high contrast images of the desired object. The system could serve as a standardized tool in nondestructive testing of many applications, especially in explosives detection and homeland security research.
Mayer, Brian P; Valdez, Carlos A; Hok, Saphon; Chinn, Sarah C; Hart, Bradley R
2012-12-04
Organophosphorus compounds represent a large class of molecules that include pesticides, flame-retardants, biologically relevant molecules, and chemical weapons agents (CWAs). The detection and identification of organophosphorus molecules, particularly in the cases of pesticides and CWAs, are paramount to the verification of international treaties by various organizations. To that end, novel analytical methodologies that can provide additional support to traditional analyses are important for unambiguous identification of these compounds. We have developed an NMR method that selectively edits for organophosphorus compounds via (31)P-(1)H heteronuclear single quantum correlation (HSQC) and provides an additional chromatographic-like separation based on self-diffusivities of the individual species via (1)H diffusion-ordered spectroscopy (DOSY): (1)H-(31)P HSQC-DOSY. The technique is first validated using the CWA VX (O-ethyl S-[2-(diisopropylamino)ethyl] methylphosphonothioate) by traditional two-dimensional DOSY spectra. We then extend this technique to a complex mixture of VX degradation products and identify all the main phosphorus-containing byproducts generated after exposure to a zinc-cyclen organometallic homogeneous catalyst.
Code of Federal Regulations, 2013 CFR
2013-01-01
... ENERGY (GENERAL PROVISIONS) IDENTIFICATION AND PROTECTION OF UNCLASSIFIED CONTROLLED NUCLEAR INFORMATION... Energy, including the National Nuclear Security Administration (NNSA). Essential technology-related... manufacture of a nuclear weapon in violation of either domestic (e.g., the Atomic Energy Act) or international...
Code of Federal Regulations, 2012 CFR
2012-01-01
... ENERGY (GENERAL PROVISIONS) IDENTIFICATION AND PROTECTION OF UNCLASSIFIED CONTROLLED NUCLEAR INFORMATION... Energy, including the National Nuclear Security Administration (NNSA). Essential technology-related... manufacture of a nuclear weapon in violation of either domestic (e.g., the Atomic Energy Act) or international...
Code of Federal Regulations, 2014 CFR
2014-01-01
... ENERGY (GENERAL PROVISIONS) IDENTIFICATION AND PROTECTION OF UNCLASSIFIED CONTROLLED NUCLEAR INFORMATION... Energy, including the National Nuclear Security Administration (NNSA). Essential technology-related... manufacture of a nuclear weapon in violation of either domestic (e.g., the Atomic Energy Act) or international...
Code of Federal Regulations, 2010 CFR
2010-01-01
... ENERGY (GENERAL PROVISIONS) IDENTIFICATION AND PROTECTION OF UNCLASSIFIED CONTROLLED NUCLEAR INFORMATION... Energy, including the National Nuclear Security Administration (NNSA). Essential technology-related... manufacture of a nuclear weapon in violation of either domestic (e.g., the Atomic Energy Act) or international...
Code of Federal Regulations, 2011 CFR
2011-01-01
... ENERGY (GENERAL PROVISIONS) IDENTIFICATION AND PROTECTION OF UNCLASSIFIED CONTROLLED NUCLEAR INFORMATION... Energy, including the National Nuclear Security Administration (NNSA). Essential technology-related... manufacture of a nuclear weapon in violation of either domestic (e.g., the Atomic Energy Act) or international...
Social control of unreliable signals of strength in male but not female crayfish, Cherax destructor.
Walter, Gregory M; van Uitregt, Vincent O; Wilson, Robbie S
2011-10-01
The maintenance of unreliable signals within animal populations remains a highly controversial subject in studies of animal communication. Crustaceans are an ideal group for studying unreliable signals of strength because their chela muscles are cryptically concealed beneath an exoskeleton, making it difficult for competitors to visually assess an opponent's strength. In this study, we examined the importance of social avenues for mediating the possible advantages gained by unreliable signals of strength in crustaceans. To do this, we investigated the factors that determine social dominance and the relative importance of signalling and fighting during aggressive encounters in male and female freshwater crayfish, Cherax destructor. Like other species of crayfish, we expected substantial variation in weapon force for a given weapon size, making the assessment of actual fighting ability of an opponent difficult from signalling alone. In addition, we expected fighting would be used to ensure that individuals that are weak for their signal (i.e. chela) size would not achieve higher than expected dominance. For both male and female C. destructor, we found large variation in the actual force of their chela for any given weapon size, indicating that it is difficult for competitors to accurately assess an opponent's force on signal size alone. For males, these unreliable signals of strength were controlled socially through increased levels of fighting and a decreased reliance on signalling, thus directly limiting the benefits accrued to individuals employing high-quality signals (large chelae) with only low resource holding potential. However, in contrast to our predictions, we found that females primarily relied on signalling to settle disputes, resulting in unreliable signals of strength being routinely used to establish dominance. The reliance by females on unreliable signals to determine dominance highlights our poor current understanding of the prevalence and distribution of dishonesty in animal communication.
The nest-concealment hypothesis: New insights from a comparative analysis
Borgmann, Kathi L.; Conway, Courtney J.
2015-01-01
Selection of a breeding site is critical for many animals, especially for birds whose offspring are stationary during development. Thus, birds are often assumed to prefer concealed nest sites. However, 74% of studies (n = 106) that have evaluated this relationship for open-cup nesting songbirds in North America failed to support the nest-concealment hypothesis. We conducted a comparative analysis to identify factors that contribute to variation in the ability of researchers to find support for the nest-concealment hypothesis. We found that some of the discrepancy among studies can be explained by interspecific differences in morphological and extrinsic factors that affect nest predation. Moreover, methods that investigators used to estimate concealment affected whether studies found support for the nest-concealment hypothesis; 33% of the studies that used quantitative estimates found support for the nest-concealment hypothesis whereas only 10% of the studies that used qualitative estimates found support. The timing of measurements also explained some of the ambiguity; studies that provided little information regarding the timing of their foliage density estimates were less likely to support the nest-concealment hypothesis. Species with more conspicuous male plumage were less likely to support the nest-concealment hypothesis when we analyzed studies that used visual estimates. Whereas species with more conspicuous female plumage were more likely to support the nest-concealment hypothesis when we analyzed studies that used quantitative measures. Our results demonstrate that support for the nest-concealment hypothesis has been equivocal, but that some of the ambiguity can be explained by morphological traits and methods used to measure concealment.
NASA Astrophysics Data System (ADS)
Stokes, Robert J.; Bailey, Mike; Bonthron, Stuart; Stone, Thomas; Maskall, Guy; Presly, Oliver; Roy, Eric; Tombling, Craig; Loeffen, Paul W.
2016-10-01
Raman spectroscopy allows the acquisition of molecularly specific signatures of pure compounds and mixtures making it a popular method for material identification applications. In hazardous materials, security and counter terrorism applications, conventional handheld Raman systems are typically limited to operation by line-of-sight or through relatively transparent plastic bags / clear glass vials. If materials are concealed behind thicker, coloured or opaque barriers it can be necessary to open and take a sample. Spatially Offset Raman Spectroscopy (SORS)[1] is a novel variant of Raman spectroscopy whereby multiple measurements at differing positions are used to separate the spectrum arising from the sub layers of a sample from the spectrum at the surface. For the first time, a handheld system based on SORS has been developed and applied to hazardous materials identification. The system - "Resolve" - enables new capabilities in the rapid identification of materials concealed by a wide variety of non-metallic sealed containers such as; coloured and opaque plastics, paper, card, sacks, fabric and glass. The range of potential target materials includes toxic industrial chemicals, explosives, narcotics, chemical warfare agents and biological materials. Resolve has the potential to improve the safety, efficiency and critical decision making in incident management, search operations, policing and ports and border operations. The operator is able to obtain a positive identification of a potentially hazardous material without opening or disturbing the container - to gain access to take a sample - thus improving safety. The technique is fast and simple thus suit and breathing gear time is used more efficiently. SORS also allows Raman to be deployed at an earlier stage in an event before more intrusive techniques are used. Evidential information is preserved and the chain of custody protected. Examples of detection capability for a number of materials and barrier types are presented below.
Jung, Kyungyong; Kim, Dae Hwan; Ryu, Ji Young
2018-05-11
In this study, we explored the relationship between concealing emotions at work and musculoskeletal symptoms in Korean workers using data from a national, population-based survey. Data were obtained from the third Korean Working Conditions Survey in 2011. We investigated the prevalence of three musculoskeletal symptoms ("back pain", "pain in the upper extremities", and "pain in the lower extremities"). Multiple logistic regression analysis was also performed to determine odds ratios (ORs) for musculoskeletal symptoms according to concealing emotions at work, adjusting for socioeconomic factors. In both sexes, the emotion-concealing group showed a significantly higher prevalence of "pain in the upper extremities" and "pain in the lower extremities" than the non-emotion-concealing group. For back pain, male - but not female - workers who concealed their emotions showed a higher prevalence than their non-emotion-concealing counterparts; the difference was statistically significant. Adjusted ORs for musculoskeletal symptoms (excluding "back pain" for female workers) in the emotion-concealing group were significantly higher. Our study suggests that concealment of emotions is closely associated with musculoskeletal symptoms, and the work environment should operate in consideration not only of the physical health work condition of workers but also of their emotional efforts including concealing emotion at work.
An Exploratory Investigation of Social Stigma and Concealment in Patients with Multiple Sclerosis.
Cook, Jonathan E; Germano, Adriana L; Stadler, Gertraud
2016-01-01
We conducted a preliminary investigation into dimensions of stigma and their relation to disease concealment in a sample of American adults living with multiple sclerosis (MS). Fifty-three adults with MS in the United States completed an online survey assessing anticipated, internalized, and isolation stigma, as well as concealment. Responses to all the scales were relatively low, on average, but above scale minimums (P < .001). Ratings of isolation stigma and concealment were highest. Anticipated stigma strongly predicted concealment. Many adults living with MS may be concerned that they will be the target of social stigma because of their illness. These concerns are associated with disease concealment. More research is needed to investigate how MS stigma and concealment may be independent contributors to health in patients with MS.
Concealment of sexual orientation.
Sylva, David; Rieger, Gerulf; Linsenmeier, Joan A W; Bailey, J Michael
2010-02-01
Sex-atypical behaviors may be used to identify a person as homosexual. To shield themselves from prejudice, homosexual people may attempt to conceal these behaviors. It is not clear how effectively they can do so. In Study 1, we asked homosexual participants to conceal their sex-atypical behaviors while talking about the weather. Raters watched videos of the participants and judged the likelihood that each participant was homosexual. Homosexual participants were able to partially conceal signs of their orientation, but they remained distinguishable from heterosexual participants. In Study 2, we tested the ability to conceal signs of one's sexual orientation in a more demanding situation: a mock job interview. In this scenario, homosexual men were even less effective at concealing their orientation. Higher cognitive demands in this new situation may have interfered with their ability to conceal.
Laser countermeasures for commercial airlines
NASA Astrophysics Data System (ADS)
Keirstead, Burt
2005-05-01
Since the attempted shoot down of an Israeli airliner departing from Mombasa, Kenya in November of 2002, there has been heightened concern that Al Qaeda, or other terrorist factions, will use shoulder-fired heat seeking missiles as part of their tactics. These weapons, known more formally as man-portable air defense systems, or MANPADS, have been widely proliferated, are easy to conceal and deploy, and can be purchased on the black market for as little as $10,000. Recognizing that MANPADS pose a potential threat to commercial airplanes throughout the world, the Department of Homeland Security (DHS) is executing a system design and development (SDD) program to evaluate the viability of missile countermeasures that would be installed on commercial airplanes. This paper provides an overview of the MANPADS threat, a discussion of associated countermeasure requirements for systems installed on commercial airplanes, and a description of a laser countermeasure system that is being prototyped and demonstrated as part of the DHS Counter-MANPADS program.
Student attitudes toward concealed handguns on campus at 2 universities.
Cavanaugh, Michael R; Bouffard, Jeffrey A; Wells, William; Nobles, Matt R
2012-12-01
We examined student support for a policy that would allow carrying of concealed handguns on university campuses. Large percentages of students at 2 universities expressed very low levels of comfort with the idea of permitting concealed handgun carrying on campus, suggesting that students may not welcome less restrictive policies. Students held slightly different opinions about concealed handguns on and off campus, suggesting that they view the campus environment as unique with respect to concealed handgun carrying.
Student Attitudes Toward Concealed Handguns on Campus at 2 Universities
Bouffard, Jeffrey A.; Wells, William; Nobles, Matt R.
2012-01-01
We examined student support for a policy that would allow carrying of concealed handguns on university campuses. Large percentages of students at 2 universities expressed very low levels of comfort with the idea of permitting concealed handgun carrying on campus, suggesting that students may not welcome less restrictive policies. Students held slightly different opinions about concealed handguns on and off campus, suggesting that they view the campus environment as unique with respect to concealed handgun carrying. PMID:22720763
Hoy-Ellis, Charles P.
2016-01-01
Recent population-based studies indicate that sexual minorities aged 50 and older experience significantly higher rates of psychological distress than their heterosexual age-peers. The minority stress model has been useful in explaining disparately high rates of psychological distress among younger sexual minorities. The purpose of this study is to test a hypothesized structural relationship between two minority stressors—internalized heterosexism and concealment of sexual orientation—and consequent psychological distress among a sample of 2,349 lesbian, gay, and bisexual adults aged 50 to 95 years old. Structural equation modeling indicates that concealment has a nonsignificant direct effect on psychological distress but a significant indirect effect that is mediated through internalized heterosexism; the effect of concealment is itself concealed. This may explain divergent results regarding the role of concealment in psychological distress in other studies, and the implications will be discussed. PMID:26322654
Wavelet Fusion for Concealed Object Detection Using Passive Millimeter Wave Sequence Images
NASA Astrophysics Data System (ADS)
Chen, Y.; Pang, L.; Liu, H.; Xu, X.
2018-04-01
PMMW imaging system can create interpretable imagery on the objects concealed under clothing, which gives the great advantage to the security check system. Paper addresses wavelet fusion to detect concealed objects using passive millimeter wave (PMMW) sequence images. According to PMMW real-time imager acquired image characteristics and storage methods firstly, using the sum of squared difference (SSD) as the image-related parameters to screen the sequence images. Secondly, the selected images are optimized using wavelet fusion algorithm. Finally, the concealed objects are detected by mean filter, threshold segmentation and edge detection. The experimental results show that this method improves the detection effect of concealed objects by selecting the most relevant images from PMMW sequence images and using wavelet fusion to enhance the information of the concealed objects. The method can be effectively applied to human body concealed object detection in millimeter wave video.
Classification-Based Spatial Error Concealment for Visual Communications
NASA Astrophysics Data System (ADS)
Chen, Meng; Zheng, Yefeng; Wu, Min
2006-12-01
In an error-prone transmission environment, error concealment is an effective technique to reconstruct the damaged visual content. Due to large variations of image characteristics, different concealment approaches are necessary to accommodate the different nature of the lost image content. In this paper, we address this issue and propose using classification to integrate the state-of-the-art error concealment techniques. The proposed approach takes advantage of multiple concealment algorithms and adaptively selects the suitable algorithm for each damaged image area. With growing awareness that the design of sender and receiver systems should be jointly considered for efficient and reliable multimedia communications, we proposed a set of classification-based block concealment schemes, including receiver-side classification, sender-side attachment, and sender-side embedding. Our experimental results provide extensive performance comparisons and demonstrate that the proposed classification-based error concealment approaches outperform the conventional approaches.
Mental Layouts of Concealed Objects as a Function of Bizarre Imagery and Retention Interval.
ERIC Educational Resources Information Center
Iaccino, James; And Others
To determine whether concealed imagery was an effective mnemonic aid in the recall of paired objects, two studies were conducted with explicitly worded instructions to conceal targets and with variable image formation periods. In each study, 40 subjects were presented with counterbalanced verbal descriptions of Concealed, Pictorial, and Separate…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fox, J.
Program of work to provide support to the Biological Arms Control Treaty Office (BACTO) of the U.S. Army Medical Research and Material Command (USAMRMC), in the development of Army and U.S. Government negotiation, implementation and compliance policies and preparations regarding potential verification and confidence measures for the 1975 Biological Weapons Convention (BWC) and related biological weapons agreements. Support services provided included the preparation of Army installations and commands for implementation of visits pursuant to the U.S./UK/Russian Trilateral Statement on BW. Support included site assistance visit, development of required facility documentation and briefings, identification of additional facilities potentially subject to access,more » and support to DOD development of guidelines, procedures, documentation, and other materials for the conduct of visits. Specific tasks under this contract included: identification and delineation of `Military Biological Facilities` and related activities at Army installations; development of visit implementation documentation for the Army; assessment of potentially at-risk equities and sensitivities at relevant facilities; facility staff training and preparation; and review and modification of facility inputs to annual BWC Confidence Building Measure Declarations. Also supported the provision of timely and critical technical support to the Joint Staff and OSD in the development of DoD negotiation biological arms control positions.« less
Mapping Fearscapes of a Mammalian Herbivore using Terrestrial LiDAR and UAV Imagery
NASA Astrophysics Data System (ADS)
Olsoy, P.; Nobler, J. D.; Forbey, J.; Rachlow, J. L.; Burgess, M. A.; Glenn, N. F.; Shipley, L. A.
2013-12-01
Concealment allows prey animals to remain hidden from a predator and can influence both real and perceived risks of predation. The heterogeneous nature of vegetative structure can create a variable landscape of concealment - a 'fearscape' - that may influence habitat quality and use by prey. Traditional measurements of concealment rely on a limited number of distances, heights, and vantage points, resulting in small snapshots of concealment available to a prey animal. Our objective was to demonstrate the benefits of emerging remote sensing techniques to map fearscapes for pygmy rabbits (Brachylagus idahoensis) in sagebrush steppe habitat across a continuous range of scales. Specifically, we used vegetation height rasters derived from terrestrial laser scanning (TLS) to create viewsheds from multiple vantage points, representing predator visibility. The sum of all the viewsheds modeled horizontal concealment of prey at both the shrub and patch scales. We also used a small, unmanned aerial vehicle (UAV) to determine vertical concealment at a habitat scale. Terrestrial laser scanning provided similar estimates of horizontal concealment at the shrub scale when compared to photographic methods (R2 = 0.85). Both TLS and UAV provide the potential to quantify concealment of prey from multiple distances, heights, or vantage points, allowing the creation of a manipulable fearscape map that can be correlated with habitat use by prey animals. The predictive power of such a map also could identify shrubs or patches for fine scale nutritional and concealment analysis for future investigation and conservation efforts. Fearscape map at the mound-scale. Viewsheds were calculated from 100 equally spaced observer points located 4 m from the closest on-mound sagebrush of interest. Red areas offer low concealment, while green areas provide high concealment.
Automatic Ammunition Identification Technology Project
DOE Office of Scientific and Technical Information (OSTI.GOV)
Weil, B.
1993-01-01
The Automatic Ammunition Identification Technology (AAIT) Project is an activity of the Robotics Process Systems Division at the Oak Ridge National Laboratory (ORNL) for the US Army's Project Manager-Ammunition Logistics (PM-AMMOLOG) at the Picatinny Arsenal in Picatinny, New Jersey. The project objective is to evaluate new two-dimensional bar code symbologies for potential use in ammunition logistics systems and automated reloading equipment. These new symbologies are a significant improvement over typical linear bar codes since machine-readable alphanumeric messages up to 2000 characters long are achievable. These compressed data symbologies are expected to significantly improve logistics and inventory management tasks and permitmore » automated feeding and handling of ammunition to weapon systems. The results will be increased throughout capability, better inventory control, reduction of human error, lower operation and support costs, and a more timely re-supply of various weapon systems. This paper will describe the capabilities of existing compressed data symbologies and the symbol testing activities being conducted at ORNL for the AAIT Project.« less
Automatic Ammunition Identification Technology Project. Ammunition Logistics Program
DOE Office of Scientific and Technical Information (OSTI.GOV)
Weil, B.
1993-03-01
The Automatic Ammunition Identification Technology (AAIT) Project is an activity of the Robotics & Process Systems Division at the Oak Ridge National Laboratory (ORNL) for the US Army`s Project Manager-Ammunition Logistics (PM-AMMOLOG) at the Picatinny Arsenal in Picatinny, New Jersey. The project objective is to evaluate new two-dimensional bar code symbologies for potential use in ammunition logistics systems and automated reloading equipment. These new symbologies are a significant improvement over typical linear bar codes since machine-readable alphanumeric messages up to 2000 characters long are achievable. These compressed data symbologies are expected to significantly improve logistics and inventory management tasks andmore » permit automated feeding and handling of ammunition to weapon systems. The results will be increased throughout capability, better inventory control, reduction of human error, lower operation and support costs, and a more timely re-supply of various weapon systems. This paper will describe the capabilities of existing compressed data symbologies and the symbol testing activities being conducted at ORNL for the AAIT Project.« less
Rogel-Castillo, Cristian; Boulton, Roger; Opastpongkarn, Arunwong; Huang, Guangwei; Mitchell, Alyson E
2016-07-27
Concealed damage (CD) is defined as a brown discoloration of the kernel interior (nutmeat) that appears only after moderate to high heat treatment (e.g., blanching, drying, roasting, etc.). Raw almonds with CD have no visible defects before heat treatment. Currently, there are no screening methods available for detecting CD in raw almonds. Herein, the feasibility of using near-infrared (NIR) spectroscopy between 1125 and 2153 nm for the detection of CD in almonds is demonstrated. Almond kernels with CD have less NIR absorbance in the region related with oil, protein, and carbohydrates. With the use of partial least squares discriminant analysis (PLS-DA) and selection of specific wavelengths, three classification models were developed. The calibration models have false-positive and false-negative error rates ranging between 12.4 and 16.1% and between 10.6 and 17.2%, respectively. The percent error rates ranged between 8.2 and 9.2%. Second-derivative preprocessing of the selected wavelength resulted in the most robust predictive model.
Analytical chemistry: Virulence caught green-handed
NASA Astrophysics Data System (ADS)
Sanchez, Laura M.; Dorrestein, Pieter C.
2013-03-01
Many of us eat mushrooms, but few of us have probably ever thought about -- let alone witnessed -- the epic battle of kingdoms that can occur between this delicacy and its bacterial pathogens. Now, imaging mass spectrometry has enabled the identification of a bacterium's potent antifungal weapon of choice.
Regulatory focus moderates the social performance of individuals who conceal a stigmatized identity.
Newheiser, Anna-Kaisa; Barreto, Manuela; Ellemers, Naomi; Derks, Belle; Scheepers, Daan
2015-12-01
People often choose to hide a stigmatized identity to avoid bias. However, hiding stigma can disrupt social interactions. We considered whether regulatory focus qualifies the social effects of hiding stigma by examining interactions in which stigmatized participants concealed a devalued identity from non-stigmatized partners. In the Prevention Focus condition, stigmatized participants were instructed to prevent a negative impression by concealing the identity; in the Promotion Focus condition, they were instructed to promote a positive impression by concealing the identity; in the Control condition, they were simply asked to conceal the identity. Both non-stigmatized partners and independent raters rated the interactions more positively in the Promotion Focus condition. Thus, promotion focus is interpersonally beneficial for individuals who conceal a devalued identity. © 2015 The British Psychological Society.
Attachment style, self-concealment, and interpersonal distance among Japanese undergraduates.
Yukawa, Shintaro; Tokuda, Hideji; Sato, Jun
2007-06-01
The relationships among attachment style, self-concealment, and interpersonal distance were studied with 71 Japanese undergraduates (33 men and 38 women, ages 18 to 20 years, M = 18.7, SD= .6). Participants completed a questionnaire about Self-concealment and Attachment Styles (Secure, Anxious, and Avoidant). One week later, Interpersonal Distance, which individuals maintain between themselves and others, was measured by the stop-distance paradigm. Analysis showed that scores for more Anxious and Avoidant Attachment Styles were positively correlated with those for greater Self-concealment. Scores for greater Self-concealment and more Anxious Attachment Style were also correlated with longer Interpersonal Distance.
2008-12-04
tracked. The RFID tag can be of various designs, materials , and/or sizes and hold a variable amount of information. Each tag is composed of three...efficiency in acquiring material from suppliers and in delivering to units in the field (Business Wire, 2005). The military learned an important lesson...RFID Supply-chain applications of RFID are beneficial to both the DoD and suppliers. RFID technology has enabled the recording of material transfer
2008-12-01
The RFID tag can be of various designs, materials , and/or sizes and hold a variable amount of information. Each tag is composed 11 of three...acquiring material from suppliers and in delivering to units in the field (Business Wire, 2005). The military learned an important lesson during...recording of material transfer and enhanced TAV. In the limited implementations of RFID to date, the DoD has seen benefits in inventory management
Using pheromones in the management of bark beetle outbreaks
Alf Bakke
1991-01-01
Identification of aggregation pheromones and field experiments using synthetic components have given scientists a better understanding of the behavior of many bark beetles. They have also yielded more effective weapons with which to control outbreaks of aggressive pest species. Synthetic pheromone components are commercially available for control of many species (...
Concealing Emotions at Work Is Associated with Allergic Rhinitis in Korea.
Seok, Hongdeok; Yoon, Jin-Ha; Won, Jong-Uk; Lee, Wanhyung; Lee, June-Hee; Jung, Pil Kyun; Roh, Jaehoon
2016-01-01
Concealing emotions at work can cause considerable psychological stress. While there is extensive research on the adverse health effects of concealing emotions and the association between allergic diseases and stress, research has not yet investigated whether concealing emotions at work is associated with allergic rhinitis. Allergic rhinitis is a common disease in many industrialized countries, and its prevalence is increasing. Thus, our aim was to determine the strength of this association using data from three years (2007-2009) of the 4th Korean National Health and Nutrition Examination Survey. Participants (aged 20-64) were 8,345 individuals who were economically active and who had completed the questionnaire items on concealing emotions at work. Odds ratio (OR) and 95% confidence intervals (95% CIs) were calculated for allergic rhinitis using logistic regression models. Among all participants, 3,140 subjects (37.6%) reported concealing their emotions at work: 1,661 men and 1,479 women. The OR (95% CIs) for allergic rhinitis among those who concealed emotions at work versus those who did not was 1.318 (1.148-1.512). Stratified by sex, the OR (95% CIs) was 1.307 (1.078-1.585) among men and 1.346 (1.105-1.639) among women. Thus, individuals who concealed their emotions at work were significantly more likely to have a diagnosis of AR in comparison to those who did not. Because concealing emotions at work has adverse health effects, labor policies that aim to reduce this practice are needed.
Future of clip-on weapon sights: pros and cons from an applications perspective
NASA Astrophysics Data System (ADS)
Knight, C. Reed; Greenslade, Ken; Francisco, Glen
2015-05-01
US Domestic, International, allied Foreign National Warfighters and Para-Military First Responders (Police, SWAT, Special Operations, Law Enforcement, Government, Security and more) are put in harm's way all the time. To successfully complete their missions and return home safely are the primary goals of these professionals. Tactical product improvements that affect mission effectiveness and solider survivability are pivotal to understanding the past, present and future of Clip-On in-line weapon sights. Clip-On Weapon Sight (WS) technology was deemed an interim solution by the US Government for use until integrated and fused (day/night multi-sensor) Weapon Sights (WSs) were developed/fielded. Clip-On has now become the solution of choice by Users, Warriors, Soldiers and the US Government. SWaP-C (size, weight and power -cost) has been improved through progressive advances in Clip-On Image Intensified (I2), passive thermal, LL-CMOS and fused technology. Clip-On Weapon Sights are now no longer mounting position sensitive. Now they maintain aim point boresight, so they can be used for longer ranges with increased capabilities while utilizing the existing zeroed weapon and daysight optic. Active illuminated low-light level (both analog I2 and digital LL-CMOS) imaging is rightfully a real-world technology, proven to deliver daytime and low-light level identification confidence. Passive thermal imaging is also a real-world technology, proven to deliver daytime, nighttime and all-weather (including dirty battlefield) target detection confidence. Image processing detection algorithms with intelligent analytics provide documented promise to improve confidence by reducing Users, Warriors and Soldiers' work-loads and improving overall system engagement solution outcomes. In order to understand the future of Clip-On in-line weapon sights, addressing pros and cons, this paper starts with an overview of historical weapon sight applications, technologies and stakeholder decisions driving milestone events that helped shape the Clip-On weapon sight industry. Then, this paper systematically reviews current attributes of integrated multispectral wavelength electro-optical imaging systems that successfully (and sometimes unsuccessfully) shape today's Warrior, Soldier and User's net-capabilities. Finally, this paper explores the evolution, pros and cons, of future Clip-On weapon sights, from a manufacturing and real world applications perspective for tomorrow's military soldier and paramilitary first responder.
Method for imaging a concealed object
Davidson, James R [Idaho Falls, ID; Partin, Judy K [Idaho Falls, ID; Sawyers, Robert J [Idaho Falls, ID
2007-07-03
A method for imaging a concealed object is described and which includes a step of providing a heat radiating body, and wherein an object to be detected is concealed on the heat radiating body; imaging the heat radiating body to provide a visibly discernible infrared image of the heat radiating body; and determining if the visibly discernible infrared image of the heat radiating body is masked by the presence of the concealed object.
Thirlaway, H. I. S.
1979-01-01
Twenty years ago, politicians, concerned a the slow progress of negotiations to stop nuclear weapons testing, described the state of seismology as being in the equivalent of the Stone Age. this assessment spurred the beginning of research and development at the Atomic Weapons Research Establishment near the village of Aldermaston, England. the object was to establish the limits of seismology for the detection and identification of underground explosions against a background of earthquakes. Thereby, verification that there was compliance with a treaty to ban further nuclear tests could be assessed before making political decisions. Negotiations now taking place in Geneva between the Soviet Union, the United States, and the United Kingdom are aimed at such a treaty.
Video error concealment using block matching and frequency selective extrapolation algorithms
NASA Astrophysics Data System (ADS)
P. K., Rajani; Khaparde, Arti
2017-06-01
Error Concealment (EC) is a technique at the decoder side to hide the transmission errors. It is done by analyzing the spatial or temporal information from available video frames. It is very important to recover distorted video because they are used for various applications such as video-telephone, video-conference, TV, DVD, internet video streaming, video games etc .Retransmission-based and resilient-based methods, are also used for error removal. But these methods add delay and redundant data. So error concealment is the best option for error hiding. In this paper, the error concealment methods such as Block Matching error concealment algorithm is compared with Frequency Selective Extrapolation algorithm. Both the works are based on concealment of manually error video frames as input. The parameter used for objective quality measurement was PSNR (Peak Signal to Noise Ratio) and SSIM(Structural Similarity Index). The original video frames along with error video frames are compared with both the Error concealment algorithms. According to simulation results, Frequency Selective Extrapolation is showing better quality measures such as 48% improved PSNR and 94% increased SSIM than Block Matching Algorithm.
Saeidian, Hamdollah; Babri, Mehran; Abdoli, Morteza; Sarabadani, Mansour; Ashrafi, Davood; Naseri, Mohammad Taghi
2012-12-15
The availability of mass spectra and interpretation skills are essential for unambiguous identification of the Chemical Weapons Convention (CWC)-related chemicals. The O(S)-alkyl N,N-dimethyl alkylphosphono(thiolo)thionoamidates are included in the list of scheduled CWC-related compounds, but there are very few spectra from these compounds in the literature. This paper examines these spectra and their mass spectral fragmentation routes. The title chemicals were prepared through microsynthetic protocols and were analyzed using electron ionization mass spectrometry with gas chromatography as a MS-inlet system. Structures of fragments were confirmed using analysis of fragment ions of deuterated analogs, tandem mass spectrometry and density functional theory (DFT) calculations. Mass spectrometric studies revealed some interesting fragmentation pathways during the ionization process, such as alkene and amine elimination and McLafferty-type rearrangements. The most important fragmentation route of the chemicals is the thiono-thiolo rearrangement. DFT calculations are used to support MS results and to reveal relative preference formation of fragment ions. The retention indices (RIs) of all the studied compounds are also reported. Mass spectra of the synthesized compounds were investigated with the aim to enrich the Organization for the Prohibition of Chemical Weapons (OPCW) Central Analytical Database (OCAD) which may be used for detection and identification of CWC-related chemicals during on-site inspection and/or off-site analysis such as OPCW proficiency tests. Copyright © 2012 John Wiley & Sons, Ltd.
Hartman, Jessica D; Patock-Peckham, Julie A; Corbin, William R; Gates, Jonathan R; Leeman, Robert F; Luk, Jeremy W; King, Kevin M
2015-01-01
Self-concealment reflects uncomfortable feelings, thoughts, and information people have about themselves that they avoid telling others (Larson & Chastain, 1990). According to Larson and Chastain (1990) these secrets range from the slightly embarrassing to the very distressing with an individual's most traumatic experiences often concealed. Parental attitudes including those involving self-disclosure are thought to be expressed in their choice of parenting style (Brand, Hatzinger, Beck, & Holsboer-Trachsler, 2009). The specific aim of this investigation was to examine the direct and indirect influences of parenting styles on self-concealment, impaired control over drinking (i.e. the inability to stop drinking when intended), alcohol use (quantity/frequency), and alcohol-related problems. A structural equation model with 419 (223 men, 196 women) university students was examined. Two and three path mediated effects were examined with the bias corrected bootstrap technique in Mplus. Having an authoritarian mother was directly linked to more self-concealment, while having an authoritative father was directly linked to less self-concealment. Higher levels of mother authoritarianism were indirectly linked to both increased alcohol use and alcohol-related problems through more self-concealment and more impaired control over drinking. Moreover, higher levels of father authoritativeness were indirectly linked to less alcohol use and alcohol-related problems through less self-concealment and less impaired control over drinking. These findings suggest that parenting styles influence vulnerabilities such as self-concealment in the impaired control over the drinking pathway to alcohol use and alcohol-related problems. Copyright © 2014 Elsevier Ltd. All rights reserved.
The bioscience revolution & the biological weapons threat: levers & interventions
D'Agostino, Mark; Martin, Greg
2009-01-01
In December 2008, the US Commission on the Prevention of Weapons of Mass Destruction Proliferation and Terrorism, released a report, World At Risk. The Report points to the fact that, not only is the use of a weapon of mass destruction in a terrorist attack before the end of 2013, more likely than not, but also to the fact that terrorists are more likely to be able to obtain and use biological weapons than nuclear. This paper examines the recommendations of the report in the context of the historic and geopolitical changes, in particular globalization. The authors highlight the "dual-use" dilemma, as described in the report, as the paradoxical use of technology developed for the benefit of mankind being used for sinister purposes. The mitigation of such a threat lies in broad stakeholder involvement and cooperation, including non-state actors, governments and the bio-tech industry itself. The importance of vigilance measures within the life science community is emphasized and, the authors propose, could include a web-based didactic course in bioterrorism and weapons of mass destruction identification. The site could outline safety protocols, have detailed disaster management tutorials, and could be specifically tailored for different subsets of industry and health professionals. The paper concludes with an endorsement of a multi-pronged approach including strong international guidelines and intelligence cooperation and preparatory measures such as the wide-spread use of detection systems as well as diagnostic decision support systems for bioterrorism detection at the local level. PMID:19220910
Geometry, structure, and concealed lithology of the San Rafael Basin, southeastern Arizona
Bultman, Mark W.
1999-01-01
The contiguous United States has been well explored for exposed conventional mineral deposits. Therefore, it is likely that many economically viable and strategically significant conventional undiscovered mineral deposits will be found in bedrock concealed beneath basin sediments. Mineral resource assessments must incorporate an understanding of the geometry, structure, and concealed lithology of basins in order to be accurate. This report presents an analysis of the basin geometry and structure of the San Rafael basin in southeastern Arizona. In addition, a new methodology for inferring concealed lithology is presented and applied in the San Rafael basin. Gravity data is used to model the geometry of the basin using recent models of sediment density vs. depth developed in the region. This modeling indicates that the basin has a maximum depth of approximately 1.05 km plus or minus 0.10 km. In the southern portion, the basin can be modeled as an asymmetric graben faulted on the western margin. The northern portion of the basin is structurally more complex and may have high angle faults on the western, northern, and eastern margin. Near-ground closely spaced Earth’s total intensity magnetic field data is used to locate concealed faults within the basin. This data is also used to infer lithology concealed by shallow basin sediments. Airborne Earth’s total intensity magnetic field data is used to help infer concealed lithology in deep portions of the basin. The product of integrating all data and interpretations is a map which presents the geometry of the basin, faults and contacts concealed by basin sediments, and an estimate of the bedrock lithology concealed by basin sediment. Based on basin geometry and concealed lithology, the San Rafael basin has a high potential for concealed mineral deposits on its western and northern margin. In particular, a newly discovered magnetic anomaly in the northern portion of the basin can be modeled as a granitic intrusion with highly altered margins and may represent a potential mineral resource target. Based on the permeability and porosity of upper basin fill found in nearby basins, the San Rafael basin may contain an aquifer up to 300 meters thick over a substantial area of the basin.
Development and Validation of the Body Concealment Scale for Scleroderma.
Jewett, Lisa R; Malcarne, Vanessa L; Kwakkenbos, Linda; Harcourt, Diana; Rumsey, Nichola; Körner, Annett; Steele, Russell J; Hudson, Marie; Baron, Murray; Haythornthwaite, Jennifer A; Heinberg, Leslie; Wigley, Fredrick M; Thombs, Brett D
2016-08-01
Body concealment is a component of social avoidance among people with visible differences from disfiguring conditions, including systemic sclerosis (SSc). The study objective was to develop a measure of body concealment related to avoidance behaviors in SSc. Initial items for the Body Concealment Scale for Scleroderma (BCSS) were selected using item analysis in a development sample of 93 American SSc patients. The factor structure of the BCSS was evaluated in 742 Canadian patients with single-factor, 2-factor, and bifactor confirmatory factor analysis models. Convergent and divergent validity were assessed by comparing the BCSS total score with the Brief-Satisfaction with Appearance Scale (Brief-SWAP) and measures of depressive symptoms and pain. A 2-factor model (Comparative Fit Index [CFI] 0.99, Tucker-Lewis Index [TLI] 0.98, Root Mean Square Error of Approximation [RMSEA] 0.08) fit substantially better than a 1-factor model (CFI 0.95, TLI 0.94, RMSEA 0.15) for the 9-item BCSS, but the Concealment with Clothing and Concealment of Hands factors were highly correlated (α = 0.79). The bifactor model (CFI 0.99, TLI 0.99, RMSEA 0.08) also fit well. In the bifactor model, the omega coefficient was high for the general factor (ω = 0.80), but low for the Concealment with Clothing (ω = 0.01) and Concealment of Hands (ω = 0.33) factors. The BCSS total score correlated more strongly with the Brief-SWAP Social Discomfort (r = 0.59) and Dissatisfaction with Appearance (r = 0.53) subscales than with measures of depressive symptoms and pain. The BCSS sum score is a valid indicator of body concealment in SSc that extends the concepts of body concealment and avoidance beyond the realms of body shape and weight to concerns of individuals with visible differences from SSc. © 2016, American College of Rheumatology.
Bultman, Mark W.
2013-01-01
Data on the Earth’s total-intensity magnetic field acquired near ground level and at measurement intervals as small as 1 m include information on the spatial distribution of nearsurface magnetic dipoles that in many cases are unique to a specific lithology. Such spatial information is expressed in the texture (physical appearance or characteristics) of the data at scales of hundreds of meters to kilometers. These magnetic textures are characterized by several descriptive statistics, their power spectrum, and their multifractal spectrum. On the basis of a graphical comparison and textural characterization, ground-based magnetic-field profile data can be used to estimate bedrock lithology concealed by as much as 100 m of basin fill in some cases, information that is especially important in assessing and exploring for concealed mineral deposits. I demonstrate that multifractal spectra of ground-based magnetic-field-profile data can be used to differentiate exposed lithologies and that the shape and position of the multifractal spectrum of the ground-based magnetic-field-profile of concealed lithologies can be matched to the upward-continued multifractal spectrum of an exposed lithology to help distinguish the concealed lithology. In addition, ground-based magnetic-field-profile data also detect minute differences in the magnetic susceptibility of rocks over small horizontal and vertical distances and so can be used for precise modeling of bedrock geometry and structure, even when that bedrock is concealed by 100 m or more of nonmagnetic basin fill. Such data contain valuable geologic information on the bedrock concealed by basin fill that may not be so visible in aeromagnetic data, including areas of hydrothermal alteration, faults, and other bedrock structures. Interpretation of these data in the San Rafael Basin, southeastern Arizona, has yielded results for estimating concealed lithologies, concealed structural geology, and a concealed potential mineral-resource target.
NASA Astrophysics Data System (ADS)
Gilbo, Yekaterina; Wijesooriya, Krishni; Liyanage, Nilanga
2017-01-01
Customarily applied in homeland security for identifying concealed explosives and chemical weapons, NRF (Nuclear Resonance Fluorescence) may have high potential in determining atomic compositions of body tissue. High energy photons incident on a target excite the target nuclei causing characteristic re-emission of resonance photons. As the nuclei of each isotope have well-defined excitation energies, NRF uniquely indicates the isotopic content of the target. NRF radiation corresponding to nuclear isotopes present in the human body is emitted during radiotherapy based on Bremsstrahlung photons generated in a linear electron accelerator. We have developed a Geant4 simulation in order to help assess NRF capabilities in detecting, mapping, and characterizing tumors. We have imported a digital phantom into the simulation using anatomical data linked to known chemical compositions of various tissues. Work is ongoing to implement the University of Virginia's cancer center treatment setup and patient geometry, and to collect and analyze the simulation's physics quantities to evaluate the potential of NRF for medical imaging applications. Preliminary results will be presented.
THz-wave parametric source and its imaging applications
NASA Astrophysics Data System (ADS)
Kawase, Kodo
2004-08-01
Widely tunable coherent terahertz (THz) wave generation has been demonstrated based on the parametric oscillation using MgO doped LiNbO3 crystal pumped by a Q-switched Nd:YAG laser. This method exhibits multiple advantages like wide tunability, coherency and compactness of its system. We have developed a novel basic technology for terahertz (THz) imaging, which allows detection and identification of chemicals by introducing the component spatial pattern analysis. The spatial distributions of the chemicals were obtained from terahertz multispectral transillumination images, using absorption spectra previously measured with a widely tunable THz-wave parametric oscillator. Further we have applied this technique to the detection and identification of illicit drugs concealed in envelopes. The samples we used were methamphetamine and MDMA, two of the most widely consumed illegal drugs in Japan, and aspirin as a reference.
Shin, Dong Wook; Park, Jong Hyock; Kim, So Young; Park, Eal Whan; Yang, Hyung Kook; Ahn, Eunmi; Park, Seon Mee; Lee, Young Joon; Lim, Myong Cheol; Seo, Hong Gwan
2014-05-01
We aimed to identify the prevalence of feelings of guilt, censure, and concealment of smoking status among cancer patients and their family members who continued to smoke after the patient's diagnosis. Among 990 patient-family member dyads, 45 patients and 173 family members who continued to smoke for at least 1 month after the patients' diagnoses were administered questions examining feelings of guilt, censure, and smoking concealment. Most patients who continued to smoke reported experiencing feelings of guilt toward their families (75.6%) and censure from their family members (77.8%), and many concealed their smoking from their family members (44.4%) or healthcare professionals (46.7%). Family members who continued to smoke also reported feelings of guilt with respect to the patient (63.6%) and that the patient was critical of them (68.9%), and many concealed their smoking from the patient (28.5%) or healthcare professionals (9.3%). Patients' feeling of guilt was associated with concealment of smoking from family members (55.9% vs. 10.0%) or health care professionals (55.9% vs. 20.0%). Family members who reported feeling guilty (36.5% vs. 16.3%) or censured (34.5% vs. 16.7%) were more likely to conceal smoking from patients. Many patients and family members continue to smoke following cancer diagnosis, and the majority of them experience feelings of guilt and censure, which can lead to the concealment of smoking status from families or health care professionals. Feelings of guilt, censure, and concealment of smoking should be considered in the development and implementation of smoking cessation programs for cancer patients and family members. Copyright © 2013 John Wiley & Sons, Ltd.
Bry, Laura Jane; Mustanski, Brian; Garofalo, Robert; Burns, Michelle Nicole
2017-01-01
Disclosure of a sexual or gender minority status has been associated with both positive and negative effects on wellbeing. Few studies have explored the disclosure and concealment process in young people. Interviews were conducted with 10 sexual and/or gender minority individuals, aged 18–22 years, of male birth sex. Data were analyzed qualitatively, yielding determinants and effects of disclosure and concealment. Determinants of disclosure included holding positive attitudes about one’s identity and an implicit devaluation of acceptance by society. Coming out was shown to have both positive and negative effects on communication and social support, and was associated with both increases and decreases in experiences of stigma. Determinants of concealment included lack of comfort with one’s identity and various motivations to avoid discrimination. Concealment was also related to hypervigilance and unique strategies of accessing social support. Results are discussed in light of their clinical implications. PMID:27633070
Bril-Barniv, Shani; Moran, Galia S; Naaman, Adi; Roe, David; Karnieli-Miller, Orit
2017-03-01
People with mental illnesses face the dilemma of whether to disclose or conceal their diagnosis, but this dilemma was scarcely researched. To gain in-depth understanding of this dilemma, we interviewed 29 individuals with mental illnesses: 16 with major depression/bipolar disorders and 13 with schizophrenia. Using a phenomenological design, we analyzed individuals' experiences, decision-making processes, and views of gains and costs regarding concealment and disclosure of mental illness. We found that participants employed both positive and negative disclosure/concealment practices. Positive practices included enhancing personal recovery, community integration, and/or supporting others. Negative practices occurred in forced, uncontrolled situations. We also identified various influencing factors, including familial norms of sharing, accumulated experiences with disclosure, and ascribed meaning to diagnosis. Based on these findings, we deepen the understanding about decision-making processes and the consequences of disclosing or concealing mental illness. We discuss how these finding can help consumers explore potential benefits and disadvantages of mental illness disclosure/concealment occurrences.
Bry, Laura Jane; Mustanski, Brian; Garofalo, Robert; Burns, Michelle Nicole
2017-01-01
Disclosure of a sexual or gender minority status has been associated with both positive and negative effects on wellbeing. Few studies have explored the disclosure and concealment process in young people. Interviews were conducted with 10 sexual and/or gender minority individuals, aged 18-22 years, of male birth sex. Data were analyzed qualitatively, yielding determinants and effects of disclosure and concealment. Determinants of disclosure included holding positive attitudes about one's identity and an implicit devaluation of acceptance by society. Coming out was shown to have both positive and negative effects on communication and social support and was associated with both increases and decreases in experiences of stigma. Determinants of concealment included lack of comfort with one's identity and various motivations to avoid discrimination. Concealment was also related to hypervigilance and unique strategies of accessing social support. Results are discussed in light of their clinical implications.
GaN-based THz advanced quantum cascade lasers for manned and unmanned systems
NASA Astrophysics Data System (ADS)
Anwar, A. F. M.; Manzur, Tariq; Lefebvre, Kevin R.; Carapezza, Edward M.
2009-09-01
In recent years the use of Unmanned Autonomous Vehicles (UAV) has seen a wider range of applications. However, their applications are restricted due to (a) advanced integrated sensing and processing electronics and (b) limited energy storage or on-board energy generation to name a few. The availability of a wide variety of sensing elements, operating at room temperatures, provides a great degree of flexibility with an extended application domain. Though sensors responding to a variable spectrum of input excitations ranging from (a) chemical, (b) biological, (c) atmospheric, (d) magnetic and (e) visual/IR imaging have been implemented in UAVs, the use of THz as a technology has not been implemented due to the absence of systems operating at room temperature. The integration of multi-phenomenological onboard sensors on small and miniature unmanned air vehicles will dramatically impact the detection and processing of challenging targets, such as humans carrying weapons or wearing suicide bomb vests. Unmanned air vehicles have the potential of flying over crowds of people and quickly discriminating non-threat humans from treat humans. The state of the art in small and miniature UAV's has progressed to vehicles of less than 1 pound in weight but with payloads of only a fraction of a pound. Uncooled IR sensors, such as amorphous silicon and vanadium oxide microbolometers with MRT's of less than 70mK and requiring power of less than 250mW, are available for integration into small UAV's. These sensors are responsive only up to approximately 14 microns and do not favorably compare with THz imaging systems for remotely detecting and classifying concealed weapons and bombs. In the following we propose the use of THz GaN-based QCL operating at room temperature as a possible alternative.
Forensic and homeland security applications of modern portable Raman spectroscopy.
Izake, Emad L
2010-10-10
Modern detection and identification of chemical and biological hazards within the forensic and homeland security contexts may well require conducting the analysis in field while adapting a non-contact approach to the hazard. Technological achievements on both surface and resonance enhancement Raman scattering re-developed Raman spectroscopy to become the most adaptable spectroscopy technique for stand-off and non-contact analysis of hazards. On the other hand, spatially offset Raman spectroscopy proved to be very valuable for non-invasive chemical analysis of hazards concealed within non-transparent containers and packaging. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.
Non-destructive terahertz imaging of illicit drugs using spectral fingerprints
NASA Astrophysics Data System (ADS)
Kawase, Kodo; Ogawa, Yuichi; Watanabe, Yuuki; Inoue, Hiroyuki
2003-10-01
The absence of non-destructive inspection techniques for illicit drugs hidden in mail envelopes has resulted in such drugs being smuggled across international borders freely. We have developed a novel basic technology for terahertz imaging, which allows detection and identification of drugs concealed in envelopes, by introducing the component spatial pattern analysis. The spatial distributions of the targets are obtained from terahertz multispectral transillumination images, using absorption spectra measured with a tunable terahertz-wave source. The samples we used were methamphetamine and MDMA, two of the most widely consumed illegal drugs in Japan, and aspirin as a reference.
NASA Astrophysics Data System (ADS)
Lizotte, Todd E.; Ohar, Orest P.
2009-09-01
The illicit trafficking in small arms is an international problem with grave consequences to those who live in less developed nations. To stop any form of trafficking it is important to ensure the ability to track weapons to their sources, there must be a common international system for the marking and tracing of weapons. Under current international law, states may adopt various different weapons marking systems, complicating the identification of the country-of-origin of a weapon [1]. However, these marking technologies are only good for those firearms that are recovered or captured. By instituting Intentional Firearm Microstamping (IFM) a technology that provides a link to a serial or production build number, by embossing the IFM code on to the cartridge that is fired and ejected at the scene. IFM will provide critical forensic intelligence in regions of conflict by helping to identify patterns, trafficking routes and ultimately shut down illicit arms sources and markets that fuel the violence associated with regional genocide, terrorism and/or insurgency groups within warzones. Intentional Firearm Microstamping (IFM) technology will provide a rapid and accurate cartridge-to-firearm identification process, enabling law enforcement both national and international to quickly pursue international arms dealers and other illicit firearm markets. Intentional Firearm Microstamping (IFM) is a patented technology and trace solution where intentional tooling marks are formed or micromachined onto firearms interior surfaces that come into contact or impact the surfaces of cartridge casings. The IFM tooling marks can take the form of alphanumeric codes or encoded geometric codes, such as a barcode. As the firearm is discharged the intentional tooling marks transfer a code to the cartridge casing before it is ejected out of the firearm. When recovered at the scene of an incident, the intentional firearm microstamped cartridge can indentify a specific firearm, without the need to recover that firearm. This paper will explain the key attributes of Intentional Firearm Microstamping technology; including its implementation and application benefits such as developing border security controls and law enforcement capacity world wide to combat illicit trafficking of firearms to terrorists, gangs and/or fueling regional conflicts. The data generated by IFM will be discussed and its application to spatial and temporal mapping of trafficking patterns and other criminal patterns.
Abdollahi, Abbas; Hosseinian, Simin; Beh-Pajooh, Ahmad; Carlbring, Per
2017-01-01
One of the biggest barriers in treating adolescents with mental health problems is their refusing to seek psychological help. This study was designed to examine the relationships between two forms of perfectionism, self-concealment and attitudes toward seeking psychological help and to test the mediating role of self-concealment in the relationship between perfectionism and attitudes toward seeking psychological help among Malaysian high school students. The participants were 475 Malaysian high school students from four high schools in Kuala Lumpur, Malaysia. Structural equation modelling results indicated that high school students with high levels of socially prescribed perfectionism, high levels of self-concealment, and low levels of self-oriented perfectionism reported negative attitudes toward seeking psychological help. Bootstrapping analysis showed that self-concealment emerged as a significant, full mediator in the link between socially prescribed perfectionism and attitudes toward seeking psychological help. Moderated mediation analysis also examined whether the results generalized across men and women. The results revealed that male students with socially prescribed perfectionism are more likely to engage in self-concealment, which in turn, leads to negative attitudes toward seeking psychological help more than their female counterparts. The results suggested that students high in socially prescribed perfectionism were more likely to engage in self-concealment and be less inclined to seek psychological help.
Zhang, Xin-Sheng; Liu, Shi-Xiong; Xiang, Xue-Yan; Zhang, Wen-Gang; Tang, Da-Xing
2014-04-01
To search for a simple and effective surgical approach to the management of moderate to severe pediatric concealed penis in children. We used Devine's technique via incision between the penis and scrotum in the treatment of 68 cases of moderate to severe pediatric concealed penis. The patients were aged 3 -13 (mean 6.5) years, 30 with moderate and 38 with severe pediatric concealed penis. This strategy achieved good near- and long-term effects and satisfactory appearance of the penis, which was similar to that of circumcision. At 3 months after surgery, the penile length was 3 - 5.2 cm, averaging (2.35 +/- 0.35) cm. Devine's technique via incision between the penis and scrotum is a simple and effective surgical option for moderate to severe pediatric concealed penis in children.
Concealable Stigmatized Identities and Psychological Well-Being
Quinn, Diane M.; Earnshaw, Valerie A.
2013-01-01
Many people have concealable stigmatized identities: Identities that can be hidden from others and that are socially devalued and negatively stereotyped. Understanding how these concealable stigmatized identities affect psychological well-being is critical. We present our model of the components of concealable stigmatized identities including valenced content – internalized stigma, experienced discrimination, anticipated stigma, disclosure reactions, and counter-stereotypic/positive information – and magnitude – centrality and salience. Research has shown that negatively valenced content is related to increased psychological distress. However, smaller identity magnitude may buffer this distress. We review the research available and discuss important areas for future work. PMID:23730326
Camouflage, detection and identification of moving targets
Hall, Joanna R.; Cuthill, Innes C.; Baddeley, Roland; Shohet, Adam J.; Scott-Samuel, Nicholas E.
2013-01-01
Nearly all research on camouflage has investigated its effectiveness for concealing stationary objects. However, animals have to move, and patterns that only work when the subject is static will heavily constrain behaviour. We investigated the effects of different camouflages on the three stages of predation—detection, identification and capture—in a computer-based task with humans. An initial experiment tested seven camouflage strategies on static stimuli. In line with previous literature, background-matching and disruptive patterns were found to be most successful. Experiment 2 showed that if stimuli move, an isolated moving object on a stationary background cannot avoid detection or capture regardless of the type of camouflage. Experiment 3 used an identification task and showed that while camouflage is unable to slow detection or capture, camouflaged targets are harder to identify than uncamouflaged targets when similar background objects are present. The specific details of the camouflage patterns have little impact on this effect. If one has to move, camouflage cannot impede detection; but if one is surrounded by similar targets (e.g. other animals in a herd, or moving background distractors), then camouflage can slow identification. Despite previous assumptions, motion does not entirely ‘break’ camouflage. PMID:23486439
Camouflage, detection and identification of moving targets.
Hall, Joanna R; Cuthill, Innes C; Baddeley, Roland; Shohet, Adam J; Scott-Samuel, Nicholas E
2013-05-07
Nearly all research on camouflage has investigated its effectiveness for concealing stationary objects. However, animals have to move, and patterns that only work when the subject is static will heavily constrain behaviour. We investigated the effects of different camouflages on the three stages of predation-detection, identification and capture-in a computer-based task with humans. An initial experiment tested seven camouflage strategies on static stimuli. In line with previous literature, background-matching and disruptive patterns were found to be most successful. Experiment 2 showed that if stimuli move, an isolated moving object on a stationary background cannot avoid detection or capture regardless of the type of camouflage. Experiment 3 used an identification task and showed that while camouflage is unable to slow detection or capture, camouflaged targets are harder to identify than uncamouflaged targets when similar background objects are present. The specific details of the camouflage patterns have little impact on this effect. If one has to move, camouflage cannot impede detection; but if one is surrounded by similar targets (e.g. other animals in a herd, or moving background distractors), then camouflage can slow identification. Despite previous assumptions, motion does not entirely 'break' camouflage.
THz-wave parametric sources and imaging applications
NASA Astrophysics Data System (ADS)
Kawase, Kodo
2004-12-01
We have studied the generation of terahertz (THz) waves by optical parametric processes based on laser light scattering from the polariton mode of nonlinear crystals. Using parametric oscillation of MgO-doped LiNbO3 crystal pumped by a nano-second Q-switched Nd:YAG laser, we have realized a widely tunable coherent THz-wave sources with a simple configuration. We have also developed a novel basic technology for THz imaging, which allows detection and identification of chemicals by introducing the component spatial pattern analysis. The spatial distributions of the chemicals were obtained from terahertz multispectral trasillumination images, using absorption spectra previously measured with a widely tunable THz-wave parametric oscillator. Further we have applied this technique to the detection and identification of illicit drugs concealed in envelopes. The samples we used were methamphetamine and MDMA, two of the most widely consumed illegal drugs in Japan, and aspirin as a reference.
Spiegel, Tali; De Bel, Vera; Steverink, Nardi
2016-01-01
This study aims to describe the interplay between the work trajectories and the passing patterns of individuals with degenerative eye conditions in different phases of their career, as well as the disease progression and the career and well-being outcomes associated with different works and passing trajectories. Qualitative interviews on the topic of work trajectories were conducted with 36 working or retired individuals with degenerative eye conditions. The "bigger picture" method was used to explore passing and concealment behavioral patterns, and their associations with various work trajectories. Five patterns of passing and concealment behavior in the workplace were identified and were linked with various work trajectories among visually impaired study participants: (1) no career adjustments, concealed condition throughout career; (2) revealed condition after adjusting career plans; (3) increasingly open about their condition over the course of their career; (4) engaged in career planning, always open about their condition; and (5) engaged in limited career planning, always open about their condition. Patterns characterized by less planning and more identity concealment were associated with more stress and lower levels of self-acceptance, while patterns characterized by more planning for vision deterioration and less passing behavior were associated with higher levels self-acceptance and fewer obstacles over the course of an individual's career. The study's findings can serve as a guide for health professionals. Many individuals with degenerative eye conditions try to conceal their identity as visually impaired in the professional setting. Different aspects of career outcomes (e.g. age of retirement) and wellbeing outcomes (e.g. self-acceptance and stress) associate with identity concealment patterns of individuals throughout their careers. Identifying concealment patterns will allow health professionals to tackle particular adverse outcomes and challenges associated with these patterns.
Malterud, Kirsti; Bjorkman, Mari
2016-10-01
The last decades have offered substantial improvement regarding human rights for lesbian and gay (LG) persons. Yet LG persons are often in the closet, concealing their sexual orientation. We present a qualitative study based on 182 histories submitted from 161 LG individuals to a Web site. The aim was to explore experiences of closeting among LG persons in Norway. A broad range of strategies was used for closeting, even among individuals who generally considered themselves to be out of the closet. Concealment was enacted by blunt denial, clever avoidance, or subtle vagueness. Other strategies included changing or eliminating the pronoun or name of the partner in ongoing conversations. Context-dependent concealment, differentiating between persons, situations, or arenas, was repeatedly applied for security or convenience. We propose a shift from "being in the closet" to "situated concealment of sexual orientation."
Eyewitness identification in actual criminal cases: an archival analysis.
Behrman, B W; Davey, S L
2001-10-01
This study analyzed 271 actual police cases in order to address several prevalent issues in the eyewitness literature. Suspect identification (SI) rates were obtained for 289 photographic lineups, 258 field showups, 58 live lineups, and 66 lineup identifications preceded by earlier identifications. SI rates were assessed for 3 levels of extrinsic evidence: no extrinsic evidence, evidence of minimal probative value, and evidence of substantial probative value. The SI rates for the photographic lineups were assessed as a function of delay, same vs. cross-race conditions, witness type, and weapon presence. SI rates declined significantly over time; SI rates were significantly greater for the same-race condition. SI rates were much greater for field showups than photographic lineups, 76% vs. 48%. The SI rates for the field showups did not vary as a function of eyewitness conditions. The relation between confidence and suspect/foil identifications for the live lineups was significant and moderately high. The utility of archival identification studies for eyewitness testimony research is discussed.
Chemical Stockpile Disposal Program. Chemical Weapons Movement History Compilation.
1987-06-12
Arsenal, Edgewood Arsenal, and Dugway Proving Ground . (2) The Army has transferred agent fram certain munitions into other containers or munitions...Aberdeen Proving Ground , Maryland (Historical Volume). - ~ - - - - -.. , 27. Sea Dump of 700 Tons of Lewisite and Mustard , NAD, Concord, California, 1958... Proving Ground , Maryland (Historical Volumes). 42. SITREP File, SFTCM II, 1980; Chemical Agent Identification Sets (CAIS) Historical File; Information
Steganalysis feature improvement using expectation maximization
NASA Astrophysics Data System (ADS)
Rodriguez, Benjamin M.; Peterson, Gilbert L.; Agaian, Sos S.
2007-04-01
Images and data files provide an excellent opportunity for concealing illegal or clandestine material. Currently, there are over 250 different tools which embed data into an image without causing noticeable changes to the image. From a forensics perspective, when a system is confiscated or an image of a system is generated the investigator needs a tool that can scan and accurately identify files suspected of containing malicious information. The identification process is termed the steganalysis problem which focuses on both blind identification, in which only normal images are available for training, and multi-class identification, in which both the clean and stego images at several embedding rates are available for training. In this paper an investigation of a clustering and classification technique (Expectation Maximization with mixture models) is used to determine if a digital image contains hidden information. The steganalysis problem is for both anomaly detection and multi-class detection. The various clusters represent clean images and stego images with between 1% and 10% embedding percentage. Based on the results it is concluded that the EM classification technique is highly suitable for both blind detection and the multi-class problem.
Use of thermal neutron reflection method for chemical analysis of bulk samples
NASA Astrophysics Data System (ADS)
Papp, A.; Csikai, J.
2014-09-01
Microscopic, σβ, and macroscopic, Σβ, reflection cross-sections of thermal neutrons averaged over bulk samples as a function of thickness (z) are given. The σβ values are additive even for bulk samples in the z=0.5-8 cm interval and so the σβmol(z) function could be given for hydrogenous substances, including some illicit drugs, explosives and hiding materials of ~1000 cm3 dimensions. The calculated excess counts agree with the measured R(z) values. For the identification of concealed objects and chemical analysis of bulky samples, different neutron methods need to be used simultaneously.
The Homo Energeticus: maturity, inheritance, identity
NASA Astrophysics Data System (ADS)
Mason, Arthur
2013-03-01
In this letter, modern society’s intimate bond to the convenience and reliability of delivered energy services results in a form of identification I call the Homo Energeticus. The Homo Energeticus relies upon a mature system of services for achieving an equivalency of status and prestige that is historically similar to the morality of a noble class. I describe the uniqueness of this identity by its imperative for acquiring experience through an invisibility of energy expenditures. In this way, the Homo Energeticus cultivates a highly individualized life whose ambience of perfection, while created personally, is only successful insofar as it conceals energy expenditures in labor and supply.
Measurement strategy and analytic model to determine firing pin force
NASA Astrophysics Data System (ADS)
Lesenciuc, Ioan; Suciu, Cornel
2016-12-01
As illustrated in literature, ballistics is a branch of theoretical mechanics, which studies the construction and working principles of firearms and ammunition, their effects, as well as the motions of projectiles and bullets1. Criminalistics identification, as part of judiciary identification represents an activity aimed at finding common traits of different objects, objectives, phenomena and beings, but more importantly, traits that differentiate each of them from similar ones2-4. In judicial ballistics, in the case of rifled firearms it is relatively simple for experts to identify the used weapon from traces left on the projectile, as the rifling of the barrel leaves imprints on the bullet, which remain approximately identical even after the respective weapon is fired 100 times with the same barrel. However, in the case of smoothbore firearms, their identification becomes much more complicated. As the firing cap suffers alterations from being hit by the firing pin, determination of the force generated during impact creates the premises for determining the type of firearm used to shoot the respective cartridge. The present paper proposes a simple impact model that can be used to evaluate the force generated by the firing pin during its impact with the firing cap. The present research clearly showed that each rifle, by the combination of the three investigated parameters (impact force maximum value, its variation diagram, and impact time) leave a unique trace. Application of such a method in ballistics can create the perspectives for formulating clear conclusions that eliminate possible judicial errors in this field.
The association between concealing emotions at work and medical utilization in Korea.
Seok, Hongdeok; Yoon, Jin-Ha; Lee, Wanhyung; Lee, June-Hee; Jung, Pil Kyun; Kim, Inah; Won, Jong-Uk; Roh, Jaehoon
2014-01-01
We aimed to investigate the association between concealing emotions at work and medical utilization. Data from the 2007-2009 4th Korea National Health and Nutrition Examination Survey (KNHANES IV) was used, 7,094 participants (3,837 males, 3,257 females) aged between 20 and 54 who were economically active and completed all necessary questionnaire items were included. Odds ratios (ORs) and 95% confidence intervals (95% CI) for differences in hospitalization, outpatient visits, and pharmaceutical drug use between those who concealed their emotions and those who did not were investigated using logistic regression models with and without gender stratification. Among those who concealed their emotions (n = 2,763), 47.4% were females, and 50.1% had chronic disease. In addition, 9.7% of the concealing emotions group had been hospitalized within the last year, 24.8% had been outpatients in the last two weeks, and 28.3% had used pharmaceutical drugs in the last two weeks. All ORs represent the odds of belonging to the concealing emotions group over the non-concealing emotions group. After adjustment for individual, occupational, socioeconomic and disease factors, the adjusted ORs (95% CI) in hospitalization are 1.29 (1.08 ~ 1.53) in the total population, 1.25 (0.98 ~ 1.60) in males and 1.30 (1.02 ~ 1.66) in females, in outpatient visits are 1.15 (1.02 ~ 1.29) in the total population, 1.05 (0.88 ~ 1.24) in males and 1.25 (1.06 ~ 1.47) in females and in pharmaceutical drug use are 1.12 (1.01 ~ 1.25) in the total population, 1.08 (0.92 ~ 1.27) in males and 1.14 (0.98 ~ 1.33) in females. Those who concealed their emotions at work were more likely to use medical services. Moreover, the health effects of concealing emotions at work might be more detrimental in women than in men.
Mainstream body-character breach films and subjectivization.
Meiri, Sandra; Kohen-Raz, Odeya
2017-02-01
The authors analyze a unique cinematic corpus - 'body-character breach films' (one character, initially played by a certain actor, occupies the body of another character) - demonstrating Lacan's notion of traversing the fantasy, both on the level of the films' diegesis and that of spectatorship. Breaching the alliance between actors and their characters perturbs the viewer's fantasy of wholeness enabled by this very alliance. Consequently, a change in subject/spectatorial position in relation to the lack in the Other is induced, enhanced through the visualization of various scenarios of unconscious fantasies (mostly incest). These are meant to unsettle the spectator into an awareness of how a conscious fantasy conceals another unconscious fundamental fantasy, thereby encouraging a change in spectatorial position (from 'perverse'/fetishistic to 'neurotic'). Conflating this change with Lacan's notion of traversing the fantasy, the authors contend that mainstream cinema has the capacity to induce a process of subjectivization (assuming responsibility for one's own desire). This process is contingent on four conditions: identification with the protagonist's fantasy to conceal the lack in the Other; dissolution of this fantasy, initiated by the body-character breach; rhetorical strategies (the coding of unconscious scenarios cinematically); and an ethical dimension (encouraging the subject/spectator to follow her/his desire). Copyright © 2016 Institute of Psychoanalysis.
Concealment of type 1 diabetes at work in Finland: a mixed-method study
Munir, Fehmidah; Moilanen, Leena; Räsänen, Kimmo; Hänninen, Vilma
2018-01-01
Objectives To explore the possible reasons for concealing type 1 diabetes (T1D) at work. Methods The main set of data came from a cross-sectional survey (response rate 49.3%), the participants of which were 688 wage earners with T1D. Concealment of T1D was measured by asking respondents have they ever during their working career hidden their diabetes from their (A) colleagues and (B) line manager. Furthermore, semistructured interviews (n=20) were conducted to obtain deeper understanding. Questionnaire data were analysed using logistic regression analyses and qualitative interviews with inductive thematic analysis. Results About 30% of wage earners with T1D had concealed their condition during their working career from their colleagues and almost 20% from their line manager. Individuals aged 18–44 years age were more likely to conceal their T1D from their colleagues than older workers during their working career. Not disclosing T1D to the extended family (OR 5.24 (95% CI 2.06 to 13.35)), feeling an outsider at work (OR 2.47 (95% CI 1.58 to 3.84)), being embarrassed by receiving special attention at work (OR 1.99 (95% CI 1.33 to 2.96)) and neglecting treatment at work (OR 1.59 (95% CI 1.01 to 2.48)) were all associated with concealment of T1D from colleagues. The youngest age group of 18–24 years were more likely to conceal their T1D from their line managers than the older age groups during their working career. Not disclosing T1D to the extended family (OR 4.41 (95% CI 1.72 to 11.32)), feeling like an outsider at work (OR 2.51 (1.52 to 4.14)) and being embarrassed by receiving special attention at work (OR 1.81 (95% CI 1.13 to 2.91)) were associated with concealment of T1D from line managers. From the interviews, five main themes related to concealment emerged, expressing fears related to the consequences of telling: (1) being perceived as weak, (2) job discrimination, (3) unwanted attention, (4) being seen as a person who uses their T1D for seeking advantages and (5) losing privacy. Conclusions A considerable proportion of wage earners with T1D are concealing their diagnosis often because of feelings associated with stigma. Both overemphasis and underestimation of T1D at work by the colleagues or line manager may lead to concealing T1D and may thus be harmful to self-management of T1D. The obstacles in disclosing T1D might be diminished by giving adequate information at the workplace about the condition and its significance. PMID:29331976
Drug concealment in custody deaths--two cases.
Busuttil, A
1994-06-01
Internal concealment of drugs of abuse is a well established method of transporting such substances to avoid detection while they are being smuggled across international frontier lines.(1,2) The same method has been used by dealers and 'pushers' in between purchases on their selling rounds to avoid detection by the police. These methods of hiding drugs may be used by persons taken into short-term custody, in their belief that potential withdrawal effects would thus be avoided by continued availability of their drugs. Two cases are reported in which such concealment was discovered at autopsy after death had occurred while in police custody. In one case the drug concealed was dihydrocodeine and was directly responsible for the death.
Weisz, Bradley M; Quinn, Diane M; Williams, Michelle K
2016-12-01
This research examined whether the relationship between perceived social support and health would be moderated by level of outness for people living with different concealable stigmatized identities (mental illness, substance abuse, domestic violence, rape, or childhood abuse). A total of 394 people living with a concealable stigmatized identity completed a survey. Consistent with hypotheses, at high levels of outness, social support predicted better health; at low levels of outness, social support was less predictive of health. People concealing a stigmatized identity may only be able to reap the health benefits of social support if they are "out" about the stigmatized identity. © The Author(s) 2015.
Air Force Technical Objective Document FY 87
1985-12-01
Air Force Systems Command Edwards Air Force Base. Cal ifornia 93523-5000 NOTICES THIS DOCUMENT IS FOR INFORMATION AND GUIDANCE ONL Y This...acquisition of Air Foree weapon systems . Each Air Foree laboratory annually formulates Q Research and Technology (R& T) Pion in response to available...guidance based on USAF requirements, the identification of scientific and technological opportunities, and the needs of present and projected systems
2012-02-01
risk, bio -terrorism utility, Homeland Security, agricultural monitoring, quality of foodstuffs, environmental monitoring, and biological warfare agents...CAL19717 Putative surface antigen CAL21872 Putative sigma 54 modulation protein NP_395233 Plasminogen activator protease precursor CAL19882 OMP...S. (2005). Chemical and biological weapons : current concepts for future defenses. Johns Hopkins APL Tech. Digest, 26, 321-333. Dworzanski, J.P
F-22 Plus-Up Environmental Assessment Joint Base Elmendorf-Richardson, Alaska
2011-06-01
Page 1-3 The F-22 has enhanced low visibilty, speed, maneuverability, electronics , and maintainability. The proposal is to beddown six primary...tactics, radar employment, identification, weapons employment, defensive response, electronic countermeasures, and electronic counter countermeasures...flare, and electronic countermeasures. Warning Area, MOA, and ATCAA 2,000 AGL to 60,000 MSL 0.75 to 1.5 hour F-22 Plus-Up Environmental
F-22 Operational Squadron and T-38 Detachment Beddown at Tyndall Air Force Base, Florida
2011-08-01
tactics, radar employment, identification, weapons employment, defensive response, electronic countermeasures, and electronic counter...use, and electronic countermeasures. Warning Area, MOA, and ATCAA 2,000 AGL to 60,000 MSL 0.75 to 1.5 hour (Dissimilar) Air Combat...night), air refueling, and strike-force rendezvous, conducting air-to-ground strikes, strike force defense and escort, air intercepts, electronic
Concealed wire tracing apparatus
Kronberg, J.W.
1994-05-31
An apparatus and method that combines a signal generator and a passive signal receiver to detect and record the path of partially or completely concealed electrical wiring without disturbing the concealing surface is disclosed. The signal generator applies a series of electrical pulses to the selected wiring of interest. The applied pulses create a magnetic field about the wiring that can be detected by a coil contained within the signal receiver. An audible output connected to the receiver and driven by the coil reflects the receivers position with respect to the wiring. The receivers audible signal is strongest when the receiver is directly above the wiring and the long axis of the receivers coil is parallel to the wiring. A marking means is mounted on the receiver to mark the location of the wiring as the receiver is directed over the wiring's concealing surface. Numerous marks made on various locations of the concealing surface will trace the path of the wiring of interest. 4 figs.
Associations Between Secret-Keeping and Quality of Life in Older Adults.
Maas, Joyce; Wismeijer, Andreas A J; Van Assen, Marcel A L M
2018-01-01
This study examined the effects of secrecy on quality of life in a sample consisting of older adults (>50 years; N = 301). Three key components of secrecy were examined with the Tilburg Secrecy Scale-25 (TSS25; possession of a secret, self-concealment, and cognitive preoccupation). The TSS25 distinguishes between the tendency to conceal personal information (self-concealment) and the tendency to worry or ruminate about the secret (cognitive preoccupation), thereby enabling investigation of the effects of secrecy on quality of life in detail. Confirming previous findings in younger samples, we found a positive effect of possession of a secret on quality of life, after controlling for both TSS25's self-concealment and cognitive preoccupation. This suggests that keeping secrets may have a positive association with quality of life in older adults as well, as long as they do not have the tendency to self-conceal and are not cognitively preoccupied with their secret.
Fey, David L.; Granitto, Matthew; Giles, Stuart A.; Smith, Steven M.; Eppinger, Robert G.; Kelley, Karen D.
2009-01-01
In the summer of 2007, the U.S. Geological Survey (USGS) began an exploration geochemical research study over the Pebble porphyry copper-gold-molybdenum deposit. This report presents the analytical data collected in 2008. The Pebble deposit is world class in size, and is almost entirely concealed by tundra, glacial deposits, and post-Cretaceous volcanic rocks. The Pebble deposit was chosen for this study because it is concealed by surficial cover rocks, is relatively undisturbed (except for exploration company drill holes), is a large mineral system, and is fairly well-constrained at depth by the drill hole geology and geochemistry. The goals of this study are to 1) determine whether the concealed deposit can be detected with surface samples, 2) better understand the processes of metal migration from the deposit to the surface, and 3) test and develop methods for assessing mineral resources in similar concealed terrains. The analytical data are presented as an integrated Microsoft Access 2003 database and as separate Excel files.
Detection of a concealed object
Keller, Paul E [Richland, WA; Hall, Thomas E [Kennewick, WA; McMakin, Douglas L [Richland, WA
2010-11-16
Disclosed are systems, methods, devices, and apparatus to determine if a clothed individual is carrying a suspicious, concealed object. This determination includes establishing data corresponding to an image of the individual through interrogation with electromagnetic radiation in the 200 MHz to 1 THz range. In one form, image data corresponding to intensity of reflected radiation and differential depth of the reflecting surface is received and processed to detect the suspicious, concealed object.
Detection of a concealed object
Keller, Paul E [Richland, WA; Hall, Thomas E [Kennewick, WA; McMakin, Douglas L [Richland, WA
2008-04-29
Disclosed are systems, methods, devices, and apparatus to determine if a clothed individual is carrying a suspicious, concealed object. This determination includes establishing data corresponding to an image of the individual through interrogation with electromagnetic radiation in the 200 MHz to 1 THz range. In one form, image data corresponding to intensity of reflected radiation and differential depth of the reflecting surface is received and processed to detect the suspicious, concealed object.
NASA Astrophysics Data System (ADS)
Ziegler, James
2017-01-01
After the Iraq war started in 2003, within 15 months over 60% of the US casualties were being caused by a weapon that had never been significant in previous conflicts: the Improvised Explosive Device (IED). These are explosive mines that are mostly concealed at night near roads, and then detonated the next day when combatant vehicles are driven by. This talk will discuss the history of IEDs, and then concentrate on the use of IEDs in Iraq. The political decisions that may have led to the high fatality rate in Iraq will be outlined. Of note, contrasting political decisions in Afghanistan led to IED's causing fewer than 20% of the casualties there, although the number of IED's exceeded that in Iraq. Because of the terrible consequences in Iraq, with no effective available remedy, IED Countermeasures was proposed as ideal for student engineering research projects. Over five years, student work to develop a technology for ``Remote IED Deactivation without Detonation'' will be outlined (they were very successful !). They used high power beams of RF, electrons, protons and neutrons to attempt deactivation at a 100' distance. The final IED Neutralizer was very successfully field tested. (This talk will contain graphic videos, and is not for the squeamish.)
NASA Astrophysics Data System (ADS)
Booske, John H.
2008-05-01
Homeland security and military defense technology considerations have stimulated intense interest in mobile, high power sources of millimeter-wave (mmw) to terahertz (THz) regime electromagnetic radiation, from 0.1 to 10THz. While vacuum electronic sources are a natural choice for high power, the challenges have yet to be completely met for applications including noninvasive sensing of concealed weapons and dangerous agents, high-data-rate communications, high resolution radar, next generation acceleration drivers, and analysis of fluids and condensed matter. The compact size requirements for many of these high frequency sources require miniscule, microfabricated slow wave circuits. This necessitates electron beams with tiny transverse dimensions and potentially very high current densities for adequate gain. Thus, an emerging family of microfabricated, vacuum electronic devices share many of the same plasma physics challenges that are currently confronting "classic" high power microwave (HPM) generators including long-life bright electron beam sources, intense beam transport, parasitic mode excitation, energetic electron interaction with surfaces, and rf air breakdown at output windows. The contemporary plasma physics and other related issues of compact, high power mmw-to-THz sources are compared and contrasted to those of HPM generation, and future research challenges and opportunities are discussed.
Full polarimetric millimetre wave radar for stand-off security screening
NASA Astrophysics Data System (ADS)
Blackhurst, Eddie; Salmon, Neil; Southgate, Matthew
2017-10-01
The development and measurements are described of a frequency modulated continuous wave (FMCW) mono-static millimetre wave full polarimetric radar, operating at k-band (18 to 26 GHz). The system has been designed to explore the feasibility of using full polarimetry for the detection of concealed weapons, and person borne improvised explosive devices (PBIED). The philosophy of this scheme is a means to extract the maximum information content from a target which is normally in the single spatial pixel (sometimes sub-pixel) configuration in stand-off (tens of metres) and crowd surveillance scenarios. The radar comprises a vector network analyser (VNA), an orthomode transducer and a conical horn antenna. A calibration strategy is discussed and demonstrated using a variety of known calibration targets with known reflective properties, including a flat metal plate, dihedral reflector, metal sphere, helix and dipole. The orthomode transducer is based on a high performance linear polarizer of the turnstile type with isolation better than - 35dB between orthogonal polarisations. The calibration enables the polarimetric Sinclair scattering matrix to be measured at each frequency for coherent polarimetry, and this can be extended using multiple measurements via the Kennaugh matrix to investigate incoherent full polarimetry.
A Crime Scene Fabricated as Suicide.
Amararatne, Rrg Sriyantha; Vidanapathirana, Muditha
2017-02-01
When ascertaining the manner of death, the forensic pathologist should be careful, because in some instances, attempts are made by the criminals to conceal homicides as suicides. The case under discussion highlights the contribution of the forensic pathologist in the ascertainment of the manner in firearm deaths. The deceased was a poacher and his dead body was found in a cashew land with his shotgun lying over him. The shirt had a roughly circular defect with muzzle mark, and burnt and blackened margin. Beneath that, on front of the left upper chest a 2cm diameter circular, perforated laceration, with muzzle imprint and, burnt and blackened margin was found. Shelving was found at the upper margin. Chest X-ray showed the downward pellet distribution. Cause of death was chest injuries due to pellets discharged from a smooth bore weapon. Length of the upper arm reach was 65cm (25 inches) and the length from the muzzle to the trigger was 79cm (31 inches). In conclusion, it was found to be a fabricated suicide scene and the manner of death was ascertained as homicide. This reiterates that the postmortem investigation of firearm deaths should be performed or conducted under direct supervision of forensic specialist to deliver justice.
A Crime Scene Fabricated as Suicide
Amararatne, RRG Sriyantha
2017-01-01
When ascertaining the manner of death, the forensic pathologist should be careful, because in some instances, attempts are made by the criminals to conceal homicides as suicides. The case under discussion highlights the contribution of the forensic pathologist in the ascertainment of the manner in firearm deaths. The deceased was a poacher and his dead body was found in a cashew land with his shotgun lying over him. The shirt had a roughly circular defect with muzzle mark, and burnt and blackened margin. Beneath that, on front of the left upper chest a 2cm diameter circular, perforated laceration, with muzzle imprint and, burnt and blackened margin was found. Shelving was found at the upper margin. Chest X-ray showed the downward pellet distribution. Cause of death was chest injuries due to pellets discharged from a smooth bore weapon. Length of the upper arm reach was 65cm (25 inches) and the length from the muzzle to the trigger was 79cm (31 inches). In conclusion, it was found to be a fabricated suicide scene and the manner of death was ascertained as homicide. This reiterates that the postmortem investigation of firearm deaths should be performed or conducted under direct supervision of forensic specialist to deliver justice. PMID:28384886
Saeidian, Hamid; Babri, Mehran; Ramezani, Atefeh; Ashrafi, Davood; Sarabadani, Mansour; Naseri, Mohammad Taghi
2013-01-01
The electron ionization (EI) mass spectra of a series of O-alkyl O-2-(N,N-dialkylaminolethyl alkylphosphonites(phosphonates), which are precursors of nerve agents, were studied for Chemical Weapons Convention (CWC) verification. General El fragmentation pathways were constructed and discussed. Proposed fragment structures were confirmed through analyzing fragment ions of deuterated analogs and density functional theory (DFT) calculations. The observed fragment ions are due to different fragmentation pathways such as hydrogen and McLafferty+1 rearrangements, alkene, amine and alkoxy elimination by alpha- or beta-cleavage process. Fragment ions distinctly allow unequivocal identification of the interested compounds including those of isomeric compounds. The presence and abundance of fragment ions were found to depend on the size and structure of the alkyl group attached to nitrogen, phosphorus and oxygen atoms.
[Cranial CT as basis for reconstruction of events and identification of a weapon].
Madea, Burkhard
2014-01-01
Radiological findings, especially CT scans, are of great importance in the reconstruction of events and may also be helpful to identify the weapon used. This is illustrated by a briefly survived craniocerebral trauma whose origin was controversially discussed. A 51-year-old man had suffered a severe craniocerebral trauma in a robbery. The CT scans revealed fractures of the left parietal region, among them a spider's web fracture, on the cause of which opinions differed (fall or blow). It was also unclear which of the three confiscated objects (empty wine bottle, bending iron, wooden hammer) was used for the assault. Evaluation of the CT findings showed that at least two blows had obviously been inflicted to the cranial skull. Apart from several injuries of the scalp due to blows, the typical combination of findings in the occipital region and contre-coup lesions suggested that the head had also hit the ground due to a fall. The soft tissue injuries may have been caused by all the three confiscated objects. The bony injuries were most probably caused by the bending iron, whereas the wooden hammer and the wine bottle could be ruled out as the causative weapon or were at least highly improbable.
Relationship authenticity partially mediates the effects of attachment on relationship satisfaction.
Rasco, Danney; Warner, Rebecca M
2017-01-01
Individuals with anxious and avoidant attachment tend to experience less satisfaction in their relationships. Past research suggests the negative effects of attachment on relationship satisfaction may be partially mediated by self-disclosure and self-concealment; the present study evaluated relationship authenticity as a potential additional mediator. Confirmatory factor analysis indicated that relationship authenticity is distinct from self-disclosure and self-concealment. Relationship authenticity predicted additional variance in relationship satisfaction controlling for attachment, self-disclosure, and self-concealment. The results were consistent with relationship authenticity, along with self-disclosure and self-concealment, partially mediating the effects of attachment on relationship satisfaction. These findings suggest that relationship authenticity may play a unique role in understanding how attachment influences relationship satisfaction. Theoretical and clinical implications are discussed.
Major Joint/Combined Operations
2008-01-01
Quarterly 3 (Winter 1993–1994), 74. 20 Andrew G. B. Vallance , The Air Weapon: Doctrines of Air Power Strategy and Operational Art (New York: St... Vallance , 94; and Donald L. McSwain, Air Campaign Planning for Contingency Operations (Maxwell Air Force Base, AL: Air War College, May 1989), 37. 23...require positive identification of friendly forces and positive control of aircraft. 36 Richard R. Muller, “Close Air Support: The German, British
Director, Operational Test and Evaluation FY 2004 Annual Report
2004-01-01
HIGH) Space Based Radar (SBR) Sensor Fuzed Weapon (SFW) P3I (CBU-97/B) Small Diameter Bomb (SDB) Secure Mobile Anti-Jam Reliable Tactical Terminal...detection, identification, and sampling capability for both fixed-site and mobile operations. The system must automatically detect and identify up to ten...staffing within the Services. SYSTEM DESCRIPTION AND MISSION The Services envision JCAD as a hand-held device that automatically detects, identifies, and
A new surgical technique for concealed penis using an advanced musculocutaneous scrotal flap.
Han, Dong-Seok; Jang, Hoon; Youn, Chang-Shik; Yuk, Seung-Mo
2015-06-19
Until recently, no single, universally accepted surgical method has existed for all types of concealed penis repairs. We describe a new surgical technique for repairing concealed penis by using an advanced musculocutaneous scrotal flap. From January 2010 to June 2014, we evaluated 12 patients (12-40 years old) with concealed penises who were surgically treated with an advanced musculocutaneous scrotal flap technique after degloving through a ventral approach. All the patients were scheduled for regular follow-up at 6, 12, and 24 weeks postoperatively. The satisfaction grade for penile size, morphology, and voiding status were evaluated using a questionnaire preoperatively and at all of the follow-ups. Information regarding complications was obtained during the postoperative hospital stay and at all follow-ups. The patients' satisfaction grades, which included the penile size, morphology, and voiding status, improved postoperatively compared to those preoperatively. All patients had penile lymphedema postoperatively; however, this disappeared within 6 weeks. There were no complications such as skin necrosis and contracture, voiding difficulty, or erectile dysfunction. Our advanced musculocutaneous scrotal flap technique for concealed penis repair is technically easy and safe. In addition, it provides a good cosmetic appearance, functional outcomes and excellent postoperative satisfaction grades. Lastly, it seems applicable in any type of concealed penis, including cases in which the ventral skin defect is difficult to cover.
Motion compensated shape error concealment.
Schuster, Guido M; Katsaggelos, Aggelos K
2006-02-01
The introduction of Video Objects (VOs) is one of the innovations of MPEG-4. The alpha-plane of a VO defines its shape at a given instance in time and hence determines the boundary of its texture. In packet-based networks, shape, motion, and texture are subject to loss. While there has been considerable attention paid to the concealment of texture and motion errors, little has been done in the field of shape error concealment. In this paper we propose a post-processing shape error concealment technique that uses the motion compensated boundary information of the previously received alpha-plane. The proposed approach is based on matching received boundary segments in the current frame to the boundary in the previous frame. This matching is achieved by finding a maximally smooth motion vector field. After the current boundary segments are matched to the previous boundary, the missing boundary pieces are reconstructed by motion compensation. Experimental results demonstrating the performance of the proposed motion compensated shape error concealment method, and comparing it with the previously proposed weighted side matching method are presented.
Cancer survivors' concealment or disclosure of diagnosis: Implications for return to work.
Morrison, T L; Thomas, R L
2015-01-01
The ability to return to work (RTW) is a significant quality of life indicator for many working aged cancer survivors. In the void of available support, many are left to independently navigate the RTW process which includes such important considerations as disclosure or concealment of diagnosis with concomitant sequellae. This article reviews participants' variable approaches to concealment, disclosure, or even an open educative stance as well as the associated benefits and limitations. Photovoice methods combined with interviewing. While most participants disclosed their diagnosis and many extolled the benefits of an open, educative stance, there were drawbacks experienced. Similarly, those who concealed their diagnosis also experienced benefits and challenges. In the current void of appropriate cancer rehabilitation supports, cancer survivors must independently negotiate their RTW process. Although most participants openly disclosed their diagnosis and associated limitations, a few concealed or camouflaged. There are benefits and limitations to both approaches of which survivors should be made aware at the outset as such will shape their RTW experience. Multidisciplinary rehabilitation support services would best guide survivors' management of the myriad of factors that will impact their work reintegration.
Heimann, Marco; Girotto, Vittorio; Legrenzi, Paolo; Bonnefon, Jean-François
2013-01-01
We introduce the Conceal or Reveal Dilemma, in which individuals receive unfair benefits, and must decide whether to conceal or to reveal this unfair advantage. This dilemma has two important characteristics: it does not lend itself easily to cost-benefit analysis, neither to the application of any strong universal norm. As a consequence, it is ideally suited to the study of interindividual and intercultural variations in moral-economic norms. In this paper we focus on interindividual variations, and we report four studies showing that individuals cannot be swayed by financial incentives to conceal or to reveal, and follow instead fixed, idiosyncratic strategies. We discuss how this result can be extended to individual and cultural variations in the tendency to display or to hide unfair rewards. PMID:24066040
Heimann, Marco; Girotto, Vittorio; Legrenzi, Paolo; Bonnefon, Jean-François
2013-01-01
We introduce the Conceal or Reveal Dilemma, in which individuals receive unfair benefits, and must decide whether to conceal or to reveal this unfair advantage. This dilemma has two important characteristics: it does not lend itself easily to cost-benefit analysis, neither to the application of any strong universal norm. As a consequence, it is ideally suited to the study of interindividual and intercultural variations in moral-economic norms. In this paper we focus on interindividual variations, and we report four studies showing that individuals cannot be swayed by financial incentives to conceal or to reveal, and follow instead fixed, idiosyncratic strategies. We discuss how this result can be extended to individual and cultural variations in the tendency to display or to hide unfair rewards.
Identification and management of nontraumatic splenic rupture.
De Silva, Samanthi
2017-12-01
A 43-year old previously fit and well gentleman presented to the emergency department (ED) with a two day history of worsening epigastric pain. He had had coryzal symptoms the preceding week but had no other past medical history. He was haemodynamically stable at presentation and an ultrasound scan (US) performed in the ED could not definitively rule out intra-abdominal fluid. In view of his tender abdomen on examination and a haemoglobin level of 9.2g/dL, a computerised tomography (CT) scan was performed and revealed extensive high-density fluid within the peritoneal cavity, raising the possibility of a concealed bleed but no obvious source was identified by the scan. Copyright the Association for Perioperative Practice.
Acoustic Resonance Spectroscopy (ARS) Munition Classification System enhancements. Final report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Vela, O.A.; Huggard, J.C.
Acoustic Resonance Spectroscopy (ARS) is a non-destructive evaluation technology developed at the Los Alamos National Laboratory (LANL). This technology has resulted in three generations of instrumentation, funded by the Defense Special Weapons Agency (DSWA), specifically designed for field identification of chemical weapon (CW) munitions. Each generation of ARS instrumentation was developed with a specific user in mind. The ARS1OO was built for use by the U.N. Inspection Teams going into Iraq immediately after the Persian Gulf War. The ARS200 was built for use in the US-Russia Bilateral Chemical Weapons Treaty (the primary users for this system are the US Onsitemore » Inspection Agency (OSIA) and their Russian counterparts). The ARS300 was built with the requirements of the Organization for the Prohibition of Chemical Weapons (OPCW) in mind. Each successive system is an improved version of the previous system based on learning the weaknesses of each and, coincidentally, on the fact that more time was available to do a requirements analysis and the necessary engineering development. The ARS300 is at a level of development that warrants transferring the technology to a commercial vendor. Since LANL will supply the computer software to the selected vendor, it is possible for LANL to continue to improve the decision algorithms, add features where necessary, and adjust the user interface before the final transfer occurs. This paper describes the current system, ARS system enhancements, and software enhancements. Appendices contain the Operations Manual (software Version 3.01), and two earlier reports on enhancements.« less
On Ex Situ NMR: Developing portable low-cost and/or single sided NMR/MRI
DOE Office of Scientific and Technical Information (OSTI.GOV)
Demas, V; Herberg, J; Maxwell, R
2006-06-09
Nuclear magnetic resonance spectroscopy (NMR) is of unsurpassed versatility in its ability to non-destructively probe for chemical identity. Portable, low-cost NMR sensors would enable on site identification of potentially hazardous substances, such as signatures from production of nuclear, chemical, and biological weapon agents, narcotics, explosives, toxins, and poisons. There exist however problems that need to be considered in the case of such sensors: (a) small-scale magnets produce inhomogeneous magnetic fields and therefore undesired Larmor frequency distributions that conceal much of the useful spectral information, and (b) sensitivity in most experiments decreases due to the inherently low and strongly inhomogeneous fieldsmore » associated with portable instruments. Our approach is to: (a) try to improve the field of low cost magnets either with hardware (e.g. magnet design and construction of ''shim coils'') or via special pulse sequences, where the field is ''effectively shimmed'' to appear homogeneous to the sample, and (b) to use microcoils to improve sensitivity and to allow focusing in smaller regions and therefore smaller static field variations. We have been working in setting up a table top, 2-Tesla permanent Halbach magnet system for tabletop NMR. The Spectrometer console is a Tecmag Apollo, controlled by a dell notebook. Currently an external linear chemagnetics rf amplifier is being used, though the power requirements for our system are quite low (a few Watts). The Magnetic Resonance lab in LLNL, has developed several types and sizes of microcoils, which have been proven to perform well for NMR experiments. We have evaluated an rf, 360 {micro}m O.D., microcoil probe that was built previously. We have finished mapping the magnetic field of the magnet. In the optimal position (in terms of field quality), the field inhomogeneity was at 17ppm. Preliminary fluorine spectra with a resolved two peak separation have now been obtained. For the field, as mapped, we have initial designs of first degree shimming, or gradient coils (linear correction to the field). We have calculated ''shim pulses'' to effectively shim the mapped field, for ideal gradient coils. These calculations will be repeated after the coils will be built and evaluated.« less
Knowledge of display rules in prelingually deaf and hearing children.
Hosie, J A; Russell, P A; Gray, C D; Scott, C; Hunter, N; Banks, J S; Macaulay, M C
2000-03-01
Deaf children of elementary and secondary school age participated in a study designed to examine their understanding of display rules, the principles governing the expression and concealment of emotion in social situations. The results showed that deaf children's knowledge of display rules, as measured by their reported concealment of emotion, was comparable to that of hearing children of the same age. However, deaf children were less likely to report that they would conceal happiness and anger. They were also less likely to produce reasons for concealing emotion and a smaller proportion of their reasons were prosocial, that is, relating to the feelings of others. The results suggest that the understanding of display rules (which function to protect the feelings of other people) may develop more gradually in deaf children raised in a spoken language environment than it does in hearing children.
Determinants of felt stigma in epilepsy.
Aydemir, N; Kaya, B; Yıldız, G; Öztura, I; Baklan, B
2016-05-01
The present study aimed to determine the level of felt stigma, overprotection, concealment, and concerns related to epilepsy in different life domains by using culturally-specific scales for Turkish individuals with epilepsy. Also, it aimed to detect relations among the study variables and to determine the variables which predict felt stigma. For this purpose, felt stigma scale, overprotection scale, concealment of epilepsy scale, and concerns of epilepsy scale were administered to two hundred adult persons with epilepsy (PWE). The results showed that almost half of the participants reported felt stigma, overprotection, concealment of epilepsy, concerns related to future occupation, and concerns related to social life. Almost all the study variables show correlations with each other. Concealment of epilepsy, concerns related to social life, and concerns related to future occupation were found as the predictors of felt stigma. Copyright © 2016 Elsevier Inc. All rights reserved.
Hrcek, Jan; Miller, Scott E; Whitfield, James B; Shima, Hiroshi; Novotny, Vojtech
2013-10-01
The processes maintaining the enormous diversity of herbivore-parasitoid food webs depend on parasitism rate and parasitoid host specificity. The two parameters have to be evaluated in concert to make conclusions about the importance of parasitoids as natural enemies and guide biological control. We document parasitism rate and host specificity in a highly diverse caterpillar-parasitoid food web encompassing 266 species of lepidopteran hosts and 172 species of hymenopteran or dipteran parasitoids from a lowland tropical forest in Papua New Guinea. We found that semi-concealed hosts (leaf rollers and leaf tiers) represented 84% of all caterpillars, suffered a higher parasitism rate than exposed caterpillars (12 vs. 5%) and their parasitoids were also more host specific. Semi-concealed hosts may therefore be generally more amenable to biological control by parasitoids than exposed ones. Parasitoid host specificity was highest in Braconidae, lower in Diptera: Tachinidae, and, unexpectedly, the lowest in Ichneumonidae. This result challenges the long-standing view of low host specificity in caterpillar-attacking Tachinidae and suggests higher suitability of Braconidae and lower suitability of Ichneumonidae for biological control of caterpillars. Semi-concealed hosts and their parasitoids are the largest, yet understudied component of caterpillar-parasitoid food webs. However, they still remain much closer in parasitism patterns to exposed hosts than to what literature reports on fully concealed leaf miners. Specifically, semi-concealed hosts keep an equally low share of idiobionts (2%) as exposed caterpillars.
Risk Identification in Major Weapon Systems Acquisition in the Republic of China Air Force
1992-09-01
Association. Washington DC, 1985. 22. Agor , Weston H . "How Top Executives Use Their Intuition to Make Important Decisions," Business Horizon. New York NY, (Jan...Data for Supportability Risk Drivers ..................................... 141 Appendix H : Ranked Data for Supportability Risk Drivers after Ties...block the observations may be ranked according to criterion of interest (26:299). B. Procedures. 1. Hypotheses. H Each ranking of the random variables
Automatic Identification Technology: Tracking Weapons and Ammunition for the Norwegian Armed Forces
2011-06-01
and their error rate. It can also add an anti - theft feature that provides an extra service to the launderers.35 Firms that have problems with...33 Figure 15. Handheld 2D Matrix Reader with USB and Bluetooth Connections. .............34 Figure 16. NDLO is...CCD Charge Coupled Device DoD United States Department of Defense EPC Electronic Product Code ERP Enterprise Resource Planning GHz Giga
1983-01-01
fourth responsible for guided weapons and electronics across-the-board. Each controller would be an accounting officer directly responsible to... electronics . Thereafter, as Hastie Smith says, "the identification of the systems controllers with their Service boards [the committees corporately...COMM. COMD. ASST SECDEF CNTR & INTEL) (HEALTH AFFAIRS) ASST TO THE SECDEF (ATOMIC ENERGY ) R DEFENSE LLIGENCE SE AGENCIES DEESEDFES)EFENSE DEFENSE
Identification of Soldier Behaviors Associated with Search and Target Acquisition (STA)
2010-05-01
specifically concentrated on representing Soldier and small unit behavior engaging "non-acquired" targets and "non-standard" entities, such as: muzzle ...Forces Are Targeting (e.g., weapon orientation, bullet impacts) Area Where Fire Coming From (e.g., muzzle Flash) Target Handoff...Surveys Cue Average Sum* Participants Muzzle Flash 7.51 34 Hostile Behaviors 7.35 40 Outgoing Fire 7.22 18 Suspicious Behaviors/Activities 6.91
Woźniak, Krzysztof; Rzepecka-Woźniak, Ewa; Moskała, Artur; Pohl, Jerzy; Latacz, Katarzyna; Dybała, Bogdan
2012-10-10
A frequent request of a prosecutor referring to forensic autopsy is to determine the mechanism of an injury and to identify the weapons used to cause those injuries. This task could be problematic in many ways, including changes in the primary injury caused by medical intervention and the process of healing. To accomplish this task, the forensic pathologist has to gather all possible information during the post-mortem examination. The more data is collected, the easier it is to obtain an accurate answer to the prosecutor's question. The authors present a case of head injuries that the victim sustained under unknown circumstances. The patient underwent neurosurgical treatment which resulted in alteration of the bone fracture pattern. The only way to evaluate this injury was to analyze antemortem clinical data, especially CT scans, with virtual 3D reconstruction of the fractured skull. A physical model of a part of the broken skull was created with the use of 3D printing. These advanced techniques, applied for the first time in Poland for forensic purposes, allowed investigators to extract enough data to develop a hypothesis about the mechanism of injury and the weapon most likely used. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.
Concealing with structured light.
Sun, Jingbo; Zeng, Jinwei; Wang, Xi; Cartwright, Alexander N; Litchinitser, Natalia M
2014-02-13
While making objects less visible (or invisible) to a human eye or a radar has captured people's imagination for centuries, current attempts towards realization of this long-awaited functionality range from various stealth technologies to recently proposed cloaking devices. A majority of proposed approaches share a number of common deficiencies such as design complexity, polarization effects, bandwidth, losses and the physical size or shape requirement complicating their implementation especially at optical frequencies. Here we demonstrate an alternative way to conceal macroscopic objects by structuring light itself. In our approach, the incident light is transformed into an optical vortex with a dark core that can be used to conceal macroscopic objects. Once such a beam passed around the object it is transformed back into its initial Gaussian shape with minimum amplitude and phase distortions. Therefore, we propose to use that dark core of the vortex beam to conceal an object that is macroscopic yet small enough to fit the dark (negligibly low intensity) region of the beam. The proposed concealing approach is polarization independent, easy to fabricate, lossless, operates at wavelengths ranging from 560 to 700 nm, and can be used to hide macroscopic objects providing they are smaller than vortex core.
Cycles of abuse nurtured by concealment: a clinical report.
Wijma, Barbro; Thapar-Björkert, Suruchi; Hammarström, Nevija Cah; Swahnberg, Katarina
2007-09-01
At present, health care staff do not seem to have sufficient knowledge about their patients' abusive experiences. The aim of the present study is to analyze and discuss what the implications might be for the encounter between patients and health care professionals, when experiences of abuse are concealed. The methodology of this article is varied: a personal narrative, medical records, sociological theoretical literature and empirical evidence. From the narrative we learn that concealment of abuse was devastating for the patient. She was "treated" in vain as a correct diagnosis was not made, while abuse by her father continued. Health care staff also violated her, which she told her therapist, but her protests were not acknowledged. Ten years of treatment thus made her even more sick. This case story focuses on the mechanisms which nurture concealment of a patient's history of abuse, such as structural and symbolic violence. We also suggest ways to break "cycles of abuse". Help the patient to stop concealing also means that she/he leaves a victim role, gets in charge of the situation and takes a first step towards empowerment. In this way, health care settings can become enabling and empowering environments.
Sato, Yoshiharu; Nagata, Hirofumi; Inoda, Ayako; Miura, Hiroko; Watanabe, Yoko; Suzuki, Kenji
2014-10-01
We report a case of paroxysmal supraventricular tachycardia (PSVT) that occurred during video-assisted thoracoscopic (VATS) lobectomy in a patient with concealed Wolff-Parkinson-White (WPW) syndrome. A 59-year-old man with lung cancer was scheduled for VATS lobectomy under general anesthesia. After inserting a thoracic epidural catheter, general anesthesia was induced with intravenous administration of propofol. Anesthesia was maintained with inhalation of desfurane in an air/oxygen mixture and intravenous infusion of remifentanil. Recurrent PSVT occurred three times, and the last episode of PSVT continued for 50 minutes regardless of administration of antiarrhythmic drugs. Synchronized electric shock via adhesive electrode pads on the patient's chest successfully converted PSVT back to normal sinus rhythm. The remaining course and postoperative period were uneventful. An electrophysiological study performed after hospital discharge detected concealed WPW syndrome, which had contributed to the development of atrioventricular reciprocating tachycardia. Concealed WPW syndrome is a rare, but critical complication that could possibly cause lethal atrial tachyarrhythmias during the perioperative period. In the present case, cardioversion using adhesive electrode pads briefly terminated PSVT in a patient with concealed WPW syndrome.
Authenticating concealed private data while maintaining concealment
Thomas, Edward V [Albuquerque, NM; Draelos, Timothy J [Albuquerque, NM
2007-06-26
A method of and system for authenticating concealed and statistically varying multi-dimensional data comprising: acquiring an initial measurement of an item, wherein the initial measurement is subject to measurement error; applying a transformation to the initial measurement to generate reference template data; acquiring a subsequent measurement of an item, wherein the subsequent measurement is subject to measurement error; applying the transformation to the subsequent measurement; and calculating a Euclidean distance metric between the transformed measurements; wherein the calculated Euclidean distance metric is identical to a Euclidean distance metric between the measurement prior to transformation.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bunch, Kyle J.; Jones, Anthony M.; Ramuhalli, Pradeep
The ratification and ongoing implementation of the New START Treaty have been widely regarded as noteworthy global security achievements for both the Obama Administration and the Putin (formerly Medvedev) regime. But deeper cuts that move beyond the United States and Russia to engage the P-5 and other nuclear weapons possessor states are envisioned under future arms control regimes, and are indeed required for the P-5 in accordance with their Article VI disarmament obligations in the Nuclear Non-Proliferation Treaty. Future verification needs will include monitoring the cessation of production of new fissile material for weapons, monitoring storage of warhead components andmore » fissile materials and verifying dismantlement of warheads, pits, secondary stages, and other materials. A fundamental challenge to implementing a nuclear disarmament regime is the ability to thwart unauthorized material diversion throughout the dismantlement and disposition process through strong chain of custody implementation. Verifying the declared presence, or absence, of nuclear materials and weapons components throughout the dismantlement and disposition lifecycle is a critical aspect of the disarmament process. From both the diplomatic and technical perspectives, verification under these future arms control regimes will require new solutions. Since any acceptable verification technology must protect sensitive design information and attributes to prevent the release of classified or other proliferation-sensitive information, non-nuclear non-sensitive modalities may provide significant new verification tools which do not require the use of additional information barriers. Alternative verification technologies based upon electromagnetic and acoustics could potentially play an important role in fulfilling the challenging requirements of future verification regimes. For example, researchers at the Pacific Northwest National Laboratory (PNNL) have demonstrated that low frequency electromagnetic signatures of sealed metallic containers can be used to rapidly confirm the presence of specific components on a yes/no basis without revealing classified information. PNNL researchers have also used ultrasonic measurements to obtain images of material microstructures which may be used as templates or unique identifiers of treaty-limited items. Such alternative technologies are suitable for application in various stages of weapons dismantlement and often include the advantage of an inherent information barrier due to the inability to extract classified weapon design information from the collected data. As a result, these types of technologies complement radiation-based verification methods for arms control. This article presents an overview of several alternative verification technologies that are suitable for supporting a future, broader and more intrusive arms control regime that spans the nuclear weapons disarmament lifecycle. The general capabilities and limitations of each verification modality are discussed and example technologies are presented. Potential applications are defined in the context of the nuclear material and weapons lifecycle. Example applications range from authentication (e.g., tracking and signatures within the chain of custody from downloading through weapons storage, unclassified templates and unique identification) to verification of absence and final material disposition.« less
Predictive value of ADAMTS-13 on concealed chronic renal failure in COPD patients
Zeng, Mian; Chen, Qingui; Liang, Wenjie; He, Wanmei; Zheng, Haichong; Huang, Chunrong
2017-01-01
Background Impaired renal function is often neglected in COPD patients. Considering that COPD patients usually have an ongoing prothrombotic state and systemic inflammation status, we investigated the association among them and explored the predictive value of a disintegrin and metalloproteinase with a thrombospondin type 1 motif, member 13 (ADAMTS-13), on concealed chronic renal failure (CRF) in COPD patients. Methods COPD patients were recruited from the First Affiliated Hospital of Sun Yat-Sen University between January 2015 and December 2016. Control was selected from contemporaneous hospitalized patients without COPD and matched by age and gender at a ratio of 1:1. Estimated glomerular filtration rate (eGFR) was calculated by using the Chronic Kidney Disease Epidemiology Collaboration formula, and all subjects were categorized as having normal renal function (eGFR ≥60 mL min−1 1.73 m−2) and having concealed CRF (normal serum creatinine while eGFR <60 mL min−1 1.73 m−2). Independent correlates of concealed CRF were investigated by logistic regression analysis, and receiver operating characteristic (ROC) curves were used to determine the predictive value of ADAMTS-13. Results In total, 106 COPD and 106 non-COPD patients were finally recruited, and the incidences of concealed CRF were 19.81% and 7.55%, respectively. ADAMTS-13 (odds ratio [OR] =0.858, 95% CI =0.795–0.926), D-dimer (OR =1.095, 95% CI =1.027–1.169), and C-reactive protein (OR =1.252, 95% CI =1.058–1.480) were significantly associated with concealed CRF. Sensitivity and specificity at an ADAMTS-13 cutoff of 318.72 ng/mL were 100% and 81.2%, respectively. The area under the ROC curve was 0.959. Conclusion Prothrombotic state and systemic inflammation status might contribute to explaining the high incidence of concealed CRF in COPD, and plasma ADAMTS-13 levels may serve as a strong predictor. PMID:29255356
Concealed renal failure and adverse drug reactions in older patients with type 2 diabetes mellitus.
Corsonello, Andrea; Pedone, Claudio; Corica, Francesco; Mazzei, Bruno; Di Iorio, Angelo; Carbonin, Pierugo; Incalzi, Raffaele Antonelli
2005-09-01
In elderly patients serum creatinine may be normal despite decreased glomerular filtration rate (GFR). The aim of this study was to evaluate the prevalence of this "concealed" renal failure, i.e., renal failure with normal serum creatinine levels, in elderly diabetic patients, and to verify whether it is a risk factor for adverse drug reactions (ADR) to hydrosoluble drugs. We used data on 2257 hospitalized patients with type 2 diabetes mellitus enrolled in the Gruppo Italiano di Farmacovigilanza nell'Anziano study. On the basis of serum creatinine and calculated GFR, patients were grouped as follows: normal renal function (normal serum creatinine levels and normal GFR), concealed (normal serum creatinine levels and reduced GFR), or overt (increased creatinine levels and reduced GFR) renal failure. GFR was calculated using the Modification of Diet in Renal Disease (MDRD) equation. The outcome of the study was the incidence of ADR to hydrosoluble drugs during the hospital stay. The relationship between renal function and ADR was evaluated using Cox regression analysis including potential confounders. Concealed renal failure was observed in 363 (16.1%) of patients studied. Patients with concealed or overt renal failure were older, had more frequently cognitive impairment and polypharmacy, and had lower serum albumin levels than did those with normal renal function. Both concealed (hazard ratio = 1.90; 95% confidence interval, 1.04-3.48; p =.036) and overt (hazard ratio = 2.23; 95% confidence interval, 1.40-3.55; p =.001) renal failure were significantly associated with ADR to hydrosoluble drugs. The use of more than four drugs also qualified as an independent risk factor for ADRs to hydrosoluble drugs during hospital stay. Older diabetic patients should be systematically screened to ascertain the presence of concealed renal failure in an attempt to optimize the pharmacological treatment and reduce the risk of ADRs.
Psychological and social correlates of HIV status disclosure: the significance of stigma visibility.
Stutterheim, Sarah E; Bos, Arjan E R; Pryor, John B; Brands, Ronald; Liebregts, Maartje; Schaalma, Herman P
2011-08-01
HIV-related stigma, psychological distress, self-esteem, and social support were investigated in a sample comprising people who have concealed their HIV status to all but a selected few (limited disclosers), people who could conceal but chose to be open (full disclosers), and people who had visible symptoms that made concealing difficult (visibly stigmatized). The visibly stigmatized and full disclosers reported significantly more stigma experiences than limited disclosers, but only the visibly stigmatized reported more psychological distress, lower self-esteem, and less social support than limited disclosers. This suggests that having a visible stigma is more detrimental than having a concealable stigma. Differences in psychological distress and self-esteem between the visibly stigmatized and full disclosers were mediated by social support while differences between the visibly stigmatized and limited disclosers were mediated by both social support and stigma. These findings suggest that social support buffers psychological distress in people with HIV.
Mansh, Matthew; White, William; Gee-Tong, Lea; Lunn, Mitchell R; Obedin-Maliver, Juno; Stewart, Leslie; Goldsmith, Elizabeth; Brenman, Stephanie; Tran, Eric; Wells, Maggie; Fetterman, David; Garcia, Gabriel
2015-05-01
To assess identity disclosure among sexual and gender minority (SGM) students pursuing undergraduate medical training in the United States and Canada. From 2009 to 2010, a survey was made available to all medical students enrolled in the 176 MD- and DO-granting medical schools in the United States and Canada. Respondents were asked about their sexual and gender identity, whether they were "out" (i.e., had publicly disclosed their identity), and, if they were not, their reasons for concealing their identity. The authors used a mixed-methods approach and analyzed quantitative and qualitative survey data. Of 5,812 completed responses (of 101,473 eligible respondents; response rate 5.7%), 920 (15.8%) students from 152 (of 176; 86.4%) institutions identified as SGMs. Of the 912 sexual minorities, 269 (29.5%) concealed their sexual identity in medical school. Factors associated with sexual identity concealment included sexual minority identity other than lesbian or gay, male gender, East Asian race, and medical school enrollment in the South or Central regions of North America. The most common reasons for concealing one's sexual identity were "nobody's business" (165/269; 61.3%), fear of discrimination in medical school (117/269; 43.5%), and social or cultural norms (110/269; 40.9%). Of the 35 gender minorities, 21 (60.0%) concealed their gender identity, citing fear of discrimination in medical school (9/21; 42.9%) and lack of support (9/21; 42.9%). SGM students continue to conceal their identity during undergraduate medical training. Medical institutions should adopt targeted policies and programs to better support these individuals.
Garg, Prabhat; Purohit, Ajay; Tak, Vijay K; Dubey, D K
2009-11-06
N,N-Dialkylamino alcohols, N-methyldiethanolamine, N-ethyldiethanolamine and triethanolamine are the precursors of VX type nerve agents and three different nitrogen mustards respectively. Their detection and identification is of paramount importance for verification analysis of chemical weapons convention. GC-FTIR is used as complimentary technique to GC-MS analysis for identification of these analytes. One constraint of GC-FTIR, its low sensitivity, was overcome by converting the analytes to their fluorinated derivatives. Owing to high absorptivity in IR region, these derivatives facilitated their detection by GC-FTIR analysis. Derivatizing reagents having trimethylsilyl, trifluoroacyl and heptafluorobutyryl groups on imidazole moiety were screened. Derivatives formed there were analyzed by GC-FTIR quantitatively. Of these reagents studied, heptafluorobutyrylimidazole (HFBI) produced the greatest increase in sensitivity by GC-FTIR detection. 60-125 folds of sensitivity enhancement were observed for the analytes by HFBI derivatization. Absorbance due to various functional groups responsible for enhanced sensitivity were compared by determining their corresponding relative molar extinction coefficients ( [Formula: see text] ) considering uniform optical path length. The RSDs for intraday repeatability and interday reproducibility for various derivatives were 0.2-1.1% and 0.3-1.8%. Limit of detection (LOD) was achieved up to 10-15ng and applicability of the method was tested with unknown samples obtained in international proficiency tests.
NASA Astrophysics Data System (ADS)
Wang, Long-tao; Jiang, Ning; Lv, Ming-shan
2015-10-01
With the emergence of the anti-ship missle with the capability of infrared imaging guidance, the traditional single jamming measures, because of the jamming mechanism and technical flaws or unsuitable use, greatly reduced the survival probability of the war-ship in the future naval battle. Intergrated jamming of IR weakening + smoke-screen Can not only make jamming to the search and tracking of IR imaging guidance system , but also has feasibility in conjunction, besides , which also make the best jamming effect. The research conclusion has important realistic meaning for raising the antimissile ability of surface ships. With the development of guidance technology, infrared guidance system has expanded by ir point-source homing guidance to infrared imaging guidance, Infrared imaging guidance has made breakthrough progress, Infrared imaging guidance system can use two-dimensional infrared image information of the target, achieve the precise tracking. Which has Higher guidance precision, better concealment, stronger anti-interference ability and could Target the key parts. The traditional single infrared smoke screen jamming or infrared decoy flare interference cannot be imposed effective interference. So, Research how to effectively fight against infrared imaging guided weapons threat measures and means, improving the surface ship antimissile ability is an urgent need to solve.
Potential for detection of explosive and biological hazards with electronic terahertz systems.
Choi, Min Ki; Bettermann, Alan; van der Weide, D W
2004-02-15
The terahertz (THz) regime (0.1-10 THz) is rich with emerging possibilities in sensing, imaging and communications, with unique applications to screening for weapons, explosives and biohazards, imaging of concealed objects, water content and skin. Here we present initial surveys to evaluate the possibility of sensing plastic explosives and bacterial spores using field-deployable electronic THz techniques based on short-pulse generation and coherent detection using nonlinear transmission lines and diode sampling bridges. We also review the barriers and approaches to achieving greater sensing-at-a-distance (stand-off) capabilities for THz sensing systems. We have made several reflection measurements of metallic and non-metallic targets in our laboratory, and have observed high contrast relative to reflection from skin. In particular, we have taken small quantities of energetic materials such as plastic explosives and a variety of Bacillus spores, and measured them in transmission and in reflection using a broadband pulsed electronic THz reflectometer. The pattern of reflection versus frequency gives rise to signatures that are remarkably specific to the composition of the target, even though the target's morphology and position is varied. Although more work needs to be done to reduce the effects of standing waves through time-gating or attenuators, the possibility of mapping out this contrast for imaging and detection is very attractive.
Hydrologic control of carbon cycling and aged carbon discharge in the Congo River basin
NASA Astrophysics Data System (ADS)
Schefuß, Enno; Eglinton, Timothy I.; Spencer-Jones, Charlotte L.; Rullkötter, Jürgen; de Pol-Holz, Ricardo; Talbot, Helen M.; Grootes, Pieter M.; Schneider, Ralph R.
2016-09-01
The age of organic material discharged by rivers provides information about its sources and carbon cycling processes within watersheds. Although elevated ages in fluvially transported organic matter are usually explained by erosion of soils and sedimentary deposits, it is commonly assumed that mainly young organic material is discharged from flat tropical watersheds due to their extensive plant cover and rapid carbon turnover. Here we present compound-specific radiocarbon data of terrigenous organic fractions from a sedimentary archive offshore the Congo River, in conjunction with molecular markers for methane-producing land cover reflecting wetland extent. We find that the Congo River has been discharging aged organic matter for several thousand years, with apparently increasing ages from the mid- to the Late Holocene. This suggests that aged organic matter in modern samples is concealed by radiocarbon from atmospheric nuclear weapons testing. By comparison to indicators for past rainfall changes we detect a systematic control of organic matter sequestration and release by continental hydrology, mediating temporary carbon storage in wetlands. As aridification also leads to exposure and rapid remineralization of large amounts of previously stored labile organic matter, we infer that this process may cause a profound direct climate feedback that is at present underestimated in carbon cycle assessments.
Capability of long distance 100 GHz FMCW using a single GDD lamp sensor.
Levanon, Assaf; Rozban, Daniel; Aharon Akram, Avihai; Kopeika, Natan S; Yitzhaky, Yitzhak; Abramovich, Amir
2014-12-20
Millimeter wave (MMW)-based imaging systems are required for applications in medicine, homeland security, concealed weapon detection, and space technology. The lack of inexpensive room temperature imaging sensors makes it difficult to provide a suitable MMW system for many of the above applications. A 3D MMW imaging system based on chirp radar was studied previously using a scanning imaging system of a single detector. The radar system requires that the millimeter wave detector will be able to operate as a heterodyne detector. Since the source of radiation is a frequency modulated continuous wave (FMCW), the detected signal as a result of heterodyne detection gives the object's depth information according to value of difference frequency, in addition to the reflectance of the 2D image. New experiments show the capability of long distance FMCW detection by using a large scale Cassegrain projection system, described first (to our knowledge) in this paper. The system presents the capability to employ a long distance of at least 20 m with a low-cost plasma-based glow discharge detector (GDD) focal plane array (FPA). Each point on the object corresponds to a point in the image and includes the distance information. This will enable relatively inexpensive 3D MMW imaging.
The use of far infra-red radiation for the detection of concealed metal objects
DOT National Transportation Integrated Search
1971-11-01
The use of infrared radiation for the detection of concealed metal objects has been investigated both theoretically and experimentally. The investigation was divided into two phases, one which considered passive techniques, and another which involved...
The use of far infra-red radiation for the detection of concealed metal objects.
DOT National Transportation Integrated Search
1971-11-01
Abstract The use of infrared radiation for the detection : of concealed metal objects has been investigated both : theoretically and experimentally. The investigation was : divided into two phases, one which considered passive : techniques, and anoth...
20 CFR 404.502 - Overpayments.
Code of Federal Regulations, 2010 CFR
2010-04-01
... representative payee for payments made after the beneficiary's death. We will not recover such overpayments from... intentional false statement or representation, or willful concealment of, or deliberate failure to furnish... individual's intentional false statement or representation, or willful concealment of, or deliberate failure...
Management of concealed penis with modified penoplasty.
Xu, Jian-Guo; Lv, Chuan; Wang, Yu-Chong; Zhu, Ji; Xue, Chun-Yu
2015-03-01
To investigate the effect of penile degloving in combination with penoscrotal angle reconstruction for the correction of concealed penis. A foreskin circumcision incision was made along the coronal sulcus. After a sharp dissection under the superficial layer of tunica albuginea, the penile shaft was degloved to release the fibrous bands of the tunica dartos. Through a longitudinal incision or Z-plasty at the penoscrotal junction, securing of the tunica albuginea to the proximal tunica dartos was performed. The penoscrotal angle was reconstructed. This procedure effectively corrected the concealed penis, while correcting other problems such as phimosis. From August 2008 to August 2013, we performed 41 procedures for concealed penis. Correction was successful in all patients with an improved median length of 2.1 cm in the flaccid state. Follow-up ranged from 6 months to 2 years, and satisfactory cosmetic outcomes were obtained without scars or erectile discomfort. Our technique includes degloving and penoscrotal angle reconstruction, which provides proper visualization for fixation of the penile base. The longitudinal or Z-plasty incision also opened the degloving dead cavity, which was good for drainage. The procedure is straight forward with good functional and cosmetic outcomes and is thus ideal for correction of the concealed penis. Copyright © 2015 Elsevier Inc. All rights reserved.
Modified penoplasty for concealed penis in children.
Yang, Tianyou; Zhang, Liyu; Su, Cheng; Li, Zhongmin; Wen, Yingquan
2013-09-01
To report a modified penoplasty technique for concealed penis in children. Between January 2006 and June 2012, 201 cases of concealed penis were surgically repaired with modified penoplasty. The modified penoplasty technique consisted of 3 major steps: (1) degloved the penile skin and excised the inner prepuce, (2) advanced penoscrotal skin to cover penile shaft, and (3) fixed the penis base and reconstructed the penoscrotal angle. Two hundred one cases of concealed penis were enrolled in this study over a period of 6 years. Mean age at the time of surgery was 5.3 years (range 1-13 years) and mean operative time was 40 minutes (range 30-65minutes). All patients were routinely followed up at 1, 3, and 6 months after surgery. Most patients developed postoperative edema and were resolved within 1 month, whereas 20 cases developed prolonged postoperative edema, especially at the site of frenulum, which took 3 months to be resolved. Ten cases had retraction after surgery. No erection difficulties were recorded. Patients/parents reported better hygiene and improved visualization and accessibility of penis after surgery and were satisfied with the cosmetic outcome. The result of this study shows that the modified penoplasty technique is a simple, safe, and effective procedure for concealed penis with satisfied cosmetic outcome. Copyright © 2013 Elsevier Inc. All rights reserved.
Hiding and finding: the relationship between visual concealment and visual search.
Smilek, Daniel; Weinheimer, Laura; Kwan, Donna; Reynolds, Mike; Kingstone, Alan
2009-11-01
As an initial step toward developing a theory of visual concealment, we assessed whether people would use factors known to influence visual search difficulty when the degree of concealment of objects among distractors was varied. In Experiment 1, participants arranged search objects (shapes, emotional faces, and graphemes) to create displays in which the targets were in plain sight but were either easy or hard to find. Analyses of easy and hard displays created during Experiment 1 revealed that the participants reliably used factors known to influence search difficulty (e.g., eccentricity, target-distractor similarity, presence/absence of a feature) to vary the difficulty of search across displays. In Experiment 2, a new participant group searched for the targets in the displays created by the participants in Experiment 1. Results indicated that search was more difficult in the hard than in the easy condition. In Experiments 3 and 4, participants used presence versus absence of a feature to vary search difficulty with several novel stimulus sets. Taken together, the results reveal a close link between the factors that govern concealment and the factors known to influence search difficulty, suggesting that a visual search theory can be extended to form the basis of a theory of visual concealment.
Lyons, Anthony; Pepping, Christopher A
2017-09-01
Middle-aged and older gay men experience higher rates of depression and anxiety compared to their heterosexual counterparts, with internalized homonegativity and sexual identity concealment known to be major stress-related contributors. This study examined the prospective effect of different types and sources of social support on internalized homonegativity and sexual identity concealment experienced among middle-aged and older gay men. A longitudinal survey involving two waves of data collection separated by 12 months was conducted among a cohort of 186 gay-identified men aged 40 years and older. Two types of social support were found to be important. Greater baseline tangible or practical support independently predicted lower internalized homonegativity at 12-month follow-up, while greater baseline emotional or psychological support independently predicted a lower tendency toward sexual identity concealment at 12-month follow-up. Greater baseline support from community or government agencies, such as health services and support organizations, predicted higher internalized homonegativity at 12-month follow-up. These findings suggest that tangible and emotional support may be beneficial in reducing internalized homonegativity and sexual identity concealment among middle-aged and older gay men. Ensuring that services provide environments that do not compound the stressful impact of stigma also appears to be important.
Contemporary practice in forensic odontology
Gupta, Shalini; Agnihotri, Archana; Chandra, Akhilesh; Gupta, Om Prakash
2014-01-01
Forensic odontology plays a major role in the identification of those individuals who cannot be identified visually or by other means. The unique nature of dental anatomy and placement of custom restorations ensure accuracy when the techniques are correctly employed. It is evident that identification of victims in accidents and natural calamities is of utmost importance and is a challenging task. The teeth may also be used as weapons and under certain circumstances; they may provide information regarding the identity of the biter. Dental professionals play a major role in keeping accurate dental records and providing all necessary information so that legal authorities may recognize malpractices, negligence, fraud child abuse and also, identify an individual. In this article, we will discuss such evolvement of the subject. PMID:25328306
The use of far infra-red radiation for the detection of concealed metal objects.
DOT National Transportation Integrated Search
1971-11-01
The use of infra-red radiation for the detection : of conceal ed metal objects has been investiga ted both : theoretically and experimentally. The investigation was : divided into two phases, one which considered passive : techniques, and another whi...
George, Mathew Sunil; Lambert, Helen
2015-01-01
In HIV prevention and care programmes, disclosure of status by HIV-positive individuals is generally encouraged to contain the infection and provide adequate support to the person concerned. Lack of disclosure is generally framed as a barrier to preventive behaviours and accessing support. The assumption that disclosure is beneficial is also reflected in studies that aim to identify determinants of disclosure and recommend individual-level measures to promote disclosure. However, in contexts where HIV infection is stigmatised and there is fear of rejection and discrimination among those living with HIV, concealment of status becomes a way to try and regain as much as possible the life that was disrupted by the discovery of HIV infection. In this study of HIV-positive women and children in India, concealment was considered essential by individuals and families of those living with HIV to re-establish and maintain their normal lives in an environment where stigma and discrimination were prevalent. This paper describes why women and care givers of children felt the need to conceal HIV status, the various ways in which people tried to do so and the implications for treatment of people living with HIV. We found that while women were generally willing to disclose their status to their husband or partner, they were very keen to conceal their status from all others, including family members. Parents and carers with an HIV-positive child were not willing to disclose this status to the child or to others. Understanding the different rationales for concealment would help policy makers and programme managers to develop more appropriate care management strategies and train care providers to assist clients in accessing care and support without disrupting their lives.
George, Mathew Sunil; Lambert, Helen
2015-01-01
In HIV prevention and care programmes, disclosure of status by HIV-positive individuals is generally encouraged to contain the infection and provide adequate support to the person concerned. Lack of disclosure is generally framed as a barrier to preventive behaviours and accessing support. The assumption that disclosure is beneficial is also reflected in studies that aim to identify determinants of disclosure and recommend individual-level measures to promote disclosure. However, in contexts where HIV infection is stigmatised and there is fear of rejection and discrimination among those living with HIV, concealment of status becomes a way to try and regain as much as possible the life that was disrupted by the discovery of HIV infection. In this study of HIV-positive women and children in India, concealment was considered essential by individuals and families of those living with HIV to re-establish and maintain their normal lives in an environment where stigma and discrimination were prevalent. This paper describes why women and care givers of children felt the need to conceal HIV status, the various ways in which people tried to do so and the implications for treatment of people living with HIV. We found that while women were generally willing to disclose their status to their husband or partner, they were very keen to conceal their status from all others, including family members. Parents and carers with an HIV-positive child were not willing to disclose this status to the child or to others. Understanding the different rationales for concealment would help policy makers and programme managers to develop more appropriate care management strategies and train care providers to assist clients in accessing care and support without disrupting their lives. PMID:25706959
Long, Ashley S; Ambegaonkar, Jatin P; Fahringer, Patty M
2011-12-01
The performing arts style of cirque has grown in popularity, with high-school participants increasingly practicing this style. Still, little research has examined the injury reporting rates and patterns in this population. Our study aimed to compare injury reporting rates and injury concealment patterns between high-school cirque performers and a peer-group of basketball players. Fifty participants (30 cirque, 20 basketball) completed a 12-item injury history and concealment instrument with chi-squared analyses and Fisher's exact tests comparing groups (p = 0.05). While no group differences (p = 0.36) existed in injuries reported, basketball players were more likely (p = 0.01) to miss participation due to injury than cirque performers. No significant difference existed between participants regarding which healthcare provider they reported to first (p = 0.27), but basketball players reported their injuries to the athletic trainer at higher rates (50%) than cirque performers (20%). A nonsignificant trend (p = 0.08) was noted in promptness to report injury, with more cirque performers (13%) concealing their injuries than basketball players (5%). Several reasons were noted for concealment of injury, with the most common being the belief that the injury would "go away" on its own. Knee injuries were most common in basketball players (23.7%) and back and knee injuries (10.5% each) in cirque performers. Despite similar injury rates, cirque participants concealed injuries more than peer-basketball players. Reasons may include losing performance roles, unfamiliarity and low trust with healthcare providers, ignorance about initially minor-looking injuries, and higher pain tolerance thresholds. Education and communication are essential to allow performing artists to seek healthcare support. Research is needed to appropriately understand and meet the needs of this underserved performing artist population.
The need for randomization in animal trials: an overview of systematic reviews.
Hirst, Jennifer A; Howick, Jeremy; Aronson, Jeffrey K; Roberts, Nia; Perera, Rafael; Koshiaris, Constantinos; Heneghan, Carl
2014-01-01
Randomization, allocation concealment, and blind outcome assessment have been shown to reduce bias in human studies. Authors from the Collaborative Approach to Meta Analysis and Review of Animal Data from Experimental Studies (CAMARADES) collaboration recently found that these features protect against bias in animal stroke studies. We extended the scope the work from CAMARADES to include investigations of treatments for any condition. We conducted an overview of systematic reviews. We searched Medline and Embase for systematic reviews of animal studies testing any intervention (against any control) and we included any disease area and outcome. We included reviews comparing randomized versus not randomized (but otherwise controlled), concealed versus unconcealed treatment allocation, or blinded versus unblinded outcome assessment. Thirty-one systematic reviews met our inclusion criteria: 20 investigated treatments for experimental stroke, 4 reviews investigated treatments for spinal cord diseases, while 1 review each investigated treatments for bone cancer, intracerebral hemorrhage, glioma, multiple sclerosis, Parkinson's disease, and treatments used in emergency medicine. In our sample 29% of studies reported randomization, 15% of studies reported allocation concealment, and 35% of studies reported blinded outcome assessment. We pooled the results in a meta-analysis, and in our primary analysis found that failure to randomize significantly increased effect sizes, whereas allocation concealment and blinding did not. In our secondary analyses we found that randomization, allocation concealment, and blinding reduced effect sizes, especially where outcomes were subjective. Our study demonstrates the need for randomization, allocation concealment, and blind outcome assessment in animal research across a wide range of outcomes and disease areas. Since human studies are often justified based on results from animal studies, our results suggest that unduly biased animal studies should not be allowed to constitute part of the rationale for human trials.
Anderson, E.D.; Smith, S.M.; Giles, S.A.; Granitto, Matthew; Eppinger, R.G.; Bedrosian, P.A.; Shah, A.K.; Kelley, K.D.; Fey, D.L.; Minsley, B.J.; Brown, P.J.
2011-01-01
In 2007, the U.S. Geological Survey began a multidisciplinary study in southwest Alaska to investigate the setting and detectability of mineral deposits in concealed volcanic and glacial terranes. The study area hosts the world-class Pebble porphyry Cu-Au-Mo deposit, and through collaboration with the Pebble Limited Partnership, a range of geophysical and geochemical investigations was carried out in proximity to the deposit. The deposit is almost entirely concealed by tundra, glacial deposits, and post-mineralization volcanic rocks. The discovery of mineral resources beneath cover is becoming more important because most of the mineral resources at the surface have already been discovered. Research is needed to identify ways in which to assess for concealed mineral resources. This report presents the uninterpreted geophysical measurements and geochemical and mineralogical analytical data from samples collected during the summer field seasons from 2007 to 2010, and makes the data available in a single Geographic Information System (GIS) database.
The inconspicuous penis in children.
Cimador, Marcello; Catalano, Pieralba; Ortolano, Rita; Giuffrè, Mario
2015-04-01
The term 'inconspicuous penis' refers to a group of anatomical abnormalities in which the penis looks smaller than is expected. Micropenis can be defined as 'true micropenis'--which results from a defect in the hypothalamic-pituitary-gonadal axis--and 'micropenis secondary to congenital anatomical anomalies of the surrounding and overlying structures'--also known as 'concealed penis'. The different forms of concealed penis include webbed penis, congenital megaprepuce and partially hidden penis caused by prepubic adiposity. This disorder can also have iatrogenic causes resulting from adhesions that are secondary to circumcision--this type of concealed penis is known as 'trapped penis'. However, in both groups, micropenis is defined as a stretched penile length that is at least 2.5 SD below the mean for the patient's age, but without any other penile defects. Patients with true micropenis can be managed with testosterone, which has demonstrated good penile elongation results in the long term. Surgery also has a pivotal role in reconstruction for elongating the penis and for correction of anatomical abnormalities in concealed penis.
2016-09-01
noise density and temperature sensitivity of these devices are all on the same order of magnitude. Even the worst- case noise density of the GCDC...accelerations from a handgun firing were distinct from other impulsive events on the wrist, such as using a hammer. Loeffler first identified potential shots by...spikes, taking various statistical parameters. He used a logistic regression model on these parameters and was able to classify 98.9% of shots
Hanaoka, Shigeyuki; Nomura, Koji; Kudo, Shinichi
2005-09-02
Knowledge of the exact nature of the constituents of abandoned chemical weapons (ACW) is a prerequisite for their orderly destruction. Here we report the development of analytical procedures to identify diphenylchloroarsine (DA/Clark I), diphenylcyanoarsine (DC/Clark II) and related substances employed in one of the munitions known as "Red canister". Both DA and DC are relatively unstable under conventional analytical procedures without thiol derivatization. Unfortunately however, thiol drivatization affords the same volatile organo-arsenic derivative from several different diphenylarsenic compounds, making it impossible to identify and quantify the original compounds. Further, diminishing the analytical interference caused by the celluloid powder used as a stacking material in the weapons, is also essential for accurate analysis. In this study, extraction and instrumental conditions have been evaluated and an optimal protocol was determined. The analysis of Red canister samples following this protocol showed that most of the DA and DC associated with pumice had degraded to bis(diphenylarsine)oxide (BDPAO), while those associated with celluloid were dominantly degraded to diphenylarsinic acid (DPAA).
Unusual death of a transvestite: identification of crime weapon and survival time*.
Cornetta, Sandra; Addante, Annalisa; Zotti, Fiorenza; Dell'Erba, Alessandro
2009-09-01
The authors report a case of a transvestite found murdered near his automobile with several lacerated contused wounds to the face and cranial fractures. Autopsy revealed that the cause of death was a serious head trauma with subdural and subarachnoidal hemorrhages. In order to identify the crime weapon, a scanning electron microscopy (SEM) was used which revealed metallic residue on the skin fragments with the same molecular composition of the car paint. As for survival time, antibody anti-beta-amyloid precursor protein (APP) was applied to brain fragments and brainstem tissue, allowing for axonal varicosities (which form 2 to 3 h following death) to be observed under the optic microscope. So, by using SEM we understood that the fatal cranial-encephalic lesions were the result of the victim's head being repeatedly struck against the car door while anti-betaAPP led to the understanding that the time elapsed between injury and death was less than 2 to 3 h.
Asha, Stephen Edward; Higham, Matthew; Child, Peter
2015-05-01
If package counts on abdominal CTs of body-packers were known to be accurate, follow-up CTs could be avoided. The objective was to determine the accuracy of CT for the number of concealed packages in body-packers, and the reliability of package counts reported by body-packers who admit to concealing drugs. Suspected body-packers were identified from the emergency departments (ED) database. The medical record and radiology reports were reviewed for package counts determined by CT, patient-reported and physically retrieved. The last method was used as the reference standard. Sensitivity, specificity, positive predictive values (PPV) and negative predictive values (NPV) were calculated for CT package count accuracy. Reliability of patient-reported package counts was assessed using Pearson's correlation coefficient. There were 50 confirmed body-packers on whom 104 CT scans were performed. Data for the index and reference tests were available for 84 scans. The sensitivity, specificity, PPV and NPV for CT package count were 63% (95% CI 46% to 77%), 82% (95% CI 67% to 92%), 76% (95% CI 58% to 89%) and 71% (95% CI 56% to 83%) respectively. For CTs with a package count<15, the sensitivity, specificity, PPV and NPV for CT package count were 96% (95% CI 80% to 99%), 95% (95% CI 82% to 99%), 93% (95% CI 76% to 99%) and 97% (95% CI 86% to 100%), respectively. Correlation between patient-reported package counts and the number of packages retrieved was high (r=0.90, p<0.001, R2=81%). The accuracy of CT for determining the number of concealed packages is poor, although when applied to patients with few concealed packages accuracy is high and is useful as a rule-out test. Among patients who have admitted to drug concealment, the number of packages reported to be concealed is reliable. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bofman, Ryan K.
Since July of 2016 I have been assigned as a Guest Scientist at Los Alamos National Laboratory under the Training With Industries (TWI) Program. Los Alamos National Laboratory has proven to be a challenging and rewarding assignment in which I have found myself at the cutting edge of technologies pertinent to the Explosive Ordnance Disposal career field. In the last 7 months I have had the pleasure of working in an applications group that conducts research at the DOE “Q” and SCI levels. The group “uses a broad range of engineering and scientific expertise to support nuclear counter proliferation (NCP),more » nuclear counter terrorism (NCT), and nuclear emergency response (ER) missions. The Group contributes to national programs intended to protect, deter, and respond to weapons of mass destruction through tailored training and by using specialized applied electromagnetic solutions, rapid prototyping, designing/building/testing/delivering tools and trainers along with novel safing technologies, RF solutions, and cyberphysical applications”. While the specifics of the work performed are classified, the groups “core expertise includes pulsed power; EMP effects; nuclear weapons engineering; weapons effects and materials; predictive/hydrodynamic modeling and testing; firing and penalty systems; x-ray and non-destructive evaluation of threat devices; applied physics; advanced RF systems; powerline communications; novel electronics; 3-D printing of specialized components and cyber assessment/response technologies”. (int.lanl.gov/org/padgs/threat-identification-response/analytics-intelligencetechnology/ a-3/index.shtml)« less
The "double life" of bulimia: patients' experiences in daily life interactions.
Pettersen, Gunn; Rosenvinge, Jan H; Ytterhus, Borgunn
2008-01-01
This qualitative study, using interviews with 38 subjects, explored how and why they conceal bulimic symptoms and the understanding of concealing in terms of social interaction. A "double life" was described as a dichotomy between being active and outgoing versus performing shameful bulimic behaviors and constantly living with fear of stigmatization, and striving against exposure. Concealing was well planned to avoid such fear, and to preserve dignity. Bulimia may be understood as volitional exertion of interaction control, not just as a result of poor impulse regulation. Understanding the meaning of secrecy and "double life" may facilitate help seeking behavior and guide treatment.
Sampson, Jay A.; Rodriguez, Brian D.
2010-01-01
The Sunnyside porphyry copper system is part of the concealed San Rafael Valley porphyry system located in the Patagonia Mountains of Arizona. The U.S. Geological Survey is conducting a series of multidisciplinary studies as part of the Assessment Techniques for Concealed Mineral Resources project. To help characterize the size, resistivity, and skin depth of the polarizable mineral deposit concealed beneath thick overburden, a regional east-west audio-magnetotelluric sounding profile was acquired. The purpose of this report is to release the audio-magnetotelluric sounding data collected along that east-west profile. No interpretation of the data is included.
Ishikawa, Muriel Y.; Wood, Lowell L.; Lougheed, Ronald W.; Moody, Kenton J.; Wang, Tzu-Fang
2004-05-25
A covert, gamma-ray "signature" is used as a "watermark" for property identification. This new watermarking technology is based on a unique steganographic or "hidden writing" digital signature, implemented in tiny quantities of gamma-ray-emitting radioisotopic material combinations, generally covertly emplaced on or within an object. This digital signature may be readily recovered at distant future times, by placing a sensitive, high energy-resolution gamma-ray detecting instrument reasonably precisely over the location of the watermark, which location may be known only to the object's owner; however, the signature is concealed from all ordinary detection means because its exceedingly low level of activity is obscured by the natural radiation background (including the gamma radiation naturally emanating from the object itself, from cosmic radiation and material surroundings, from human bodies, etc.). The "watermark" is used in object-tagging for establishing object identity, history or ownership. It thus may serve as an aid to law enforcement officials in identifying stolen property and prosecuting theft thereof. Highly effective, potentially very low cost identification-on demand of items of most all types is thus made possible.
College Students' Reasons for Concealing Suicidal Ideation
ERIC Educational Resources Information Center
Burton Denmark, Adryon; Hess, Elaine; Becker, Martin Swanbrow
2012-01-01
Self-reported reasons for concealing suicidal ideation were explored using data from a national survey of undergraduate and graduate students: 558 students indicated that they seriously considered attempting suicide during the previous year and did not tell anyone about their suicidal thoughts. Content analysis of students' qualitative responses…
Behavioral Indicators of Legal and Illegal Gun Carrying
2015-05-01
wide variety of handguns , in a wide variety of sizes and shapes, made of a wide variety of materials , and this variation is likely to have a subtle...Under Clothing/Belt ..................................................................................................... 23 Concealment of Handgun ...in Center of Chest ..................................................................................... 24 Concealment of Handgun in Groin Area with
An interfering Go/No-go task does not affect accuracy in a Concealed Information Test.
Ambach, Wolfgang; Stark, Rudolf; Peper, Martin; Vaitl, Dieter
2008-04-01
Following the idea that response inhibition processes play a central role in concealing information, the present study investigated the influence of a Go/No-go task as an interfering mental activity, performed parallel to the Concealed Information Test (CIT), on the detectability of concealed information. 40 undergraduate students participated in a mock-crime experiment and simultaneously performed a CIT and a Go/No-go task. Electrodermal activity (EDA), respiration line length (RLL), heart rate (HR) and finger pulse waveform length (FPWL) were registered. Reaction times were recorded as behavioral measures in the Go/No-go task as well as in the CIT. As a within-subject control condition, the CIT was also applied without an additional task. The parallel task did not influence the mean differences of the physiological measures of the mock-crime-related probe and the irrelevant items. This finding might possibly be due to the fact that the applied parallel task induced a tonic rather than a phasic mental activity, which did not influence differential responding to CIT items. No physiological evidence for an interaction between the parallel task and sub-processes of deception (e.g. inhibition) was found. Subjects' performance in the Go/No-go parallel task did not contribute to the detection of concealed information. Generalizability needs further investigations of different variations of the parallel task.
A non-imaging polarized terahertz passive system for detecting and identifying concealed explosives
NASA Astrophysics Data System (ADS)
Karam, Mostafa A.; Meyer, Doug
2011-06-01
Existing terahertz THz systems for detecting concealed explosives are not capable of identifying explosive type which leads to higher false alarm rates. Moreover, some of those systems are imaging systems that invade personal privacy, and require more processing and computational resources. Other systems have no polarization preference which makes them incapable of capturing the geometric features of an explosive. In this study a non-imaging polarized THz passive system for detecting and identifying concealed explosives overcoming the forgoing shortcomings is developed. The system employs a polarized passive THz sensor in acquiring emitted data from a scene that may have concealed explosives. The acquired data are decomposed into their natural resonance frequencies, and the number of those frequencies is used as criteria in detecting the explosive presence. If the presence of an explosive is confirmed, a set of physically based retrieval algorithms is used in extracting the explosive dielectric constant/refractive index value from natural resonance frequencies and amplitudes of associated signals. Comparing the refractive index value against a database of refractive indexes of known explosives identifies the explosive type. As an application, a system having a dual polarized radiometer operating within the frequency band of 0.62- 0.82 THz is presented and used in detecting and identifying person borne C-4 explosive concealed under a cotton garment. The system showed higher efficiencies in detecting and identifying the explosive.
Anxiety and Related Disorders and Concealment in Sexual Minority Young Adults.
Cohen, Jeffrey M; Blasey, Christine; Barr Taylor, C; Weiss, Brandon J; Newman, Michelle G
2016-01-01
Sexual minorities face greater exposure to discrimination and rejection than heterosexuals. Given these threats, sexual minorities may engage in sexual orientation concealment in order to avoid danger. This social stigma and minority stress places sexual minorities at risk for anxiety and related disorders. Given that three fourths of anxiety disorder onset occurs before the age of 24, the current study investigated the symptoms of generalized anxiety disorder, social phobia, panic disorder, posttraumatic stress disorder, and depression in sexual minority young adults relative to their heterosexual peers. Secondarily, the study investigated sexual orientation concealment as a predictor of anxiety and related disorders. A sample of 157 sexual minority and 157 heterosexual young adults matched on age and gender completed self-report measures of the aforementioned disorders, and indicated their level of sexual orientation concealment. Results revealed that sexual minority young adults reported greater symptoms relative to heterosexuals across all outcome measures. There were no interactions between sexual minority status and gender, however, women had higher symptoms across all disorders. Sexual minority young women appeared to be at the most risk for clinical levels of anxiety and related disorders. In addition, concealment of sexual orientation significantly predicted symptoms of social phobia. Implications are offered for the cognitive and behavioral treatment of anxiety and related disorders in this population. Copyright © 2015. Published by Elsevier Ltd.
27 CFR 447.62 - False statements or concealment of facts.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 27 Alcohol, Tobacco Products and Firearms 3 2011-04-01 2010-04-01 true False statements or concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION IMPORTATION OF ARMS, AMMUNITION AND...
27 CFR 447.62 - False statements or concealment of facts.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 27 Alcohol, Tobacco Products and Firearms 3 2010-04-01 2010-04-01 false False statements or concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION IMPORTATION OF ARMS, AMMUNITION AND...
27 CFR 447.62 - False statements or concealment of facts.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 27 Alcohol, Tobacco Products and Firearms 3 2012-04-01 2010-04-01 true False statements or concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION IMPORTATION OF ARMS, AMMUNITION AND...
27 CFR 447.62 - False statements or concealment of facts.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 27 Alcohol, Tobacco Products and Firearms 3 2013-04-01 2013-04-01 false False statements or concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION IMPORTATION OF ARMS, AMMUNITION AND...
27 CFR 447.62 - False statements or concealment of facts.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 27 Alcohol, Tobacco Products and Firearms 3 2014-04-01 2014-04-01 false False statements or concealment of facts. 447.62 Section 447.62 Alcohol, Tobacco Products, and Firearms BUREAU OF ALCOHOL, TOBACCO, FIREARMS, AND EXPLOSIVES, DEPARTMENT OF JUSTICE FIREARMS AND AMMUNITION IMPORTATION OF ARMS, AMMUNITION AND...
ERIC Educational Resources Information Center
Laird, Robert D.; Marrero, Matthew D.; Melching, Jessica A.; Kuhn, Emily S.
2013-01-01
Adolescents use various strategies to manage their parents' access to information. This study tested developmental change in strategy use, longitudinal associations between disclosing and concealing strategies, and longitudinal associations linking disclosing and concealing strategies with antisocial behavior and depressive symptoms. Self-report…
Automated Human Screening for Detecting Concealed Knowledge
ERIC Educational Resources Information Center
Twyman, Nathan W.
2012-01-01
Screening individuals for concealed knowledge has traditionally been the purview of professional interrogators investigating a crime. But the ability to detect when a person is hiding important information would be of high value to many other fields and functions. This dissertation proposes design principles for and reports on an implementation…
The Effects of Concealing Academic Achievement Information on Adolescents' Self-Concept
ERIC Educational Resources Information Center
Zhang, Baoshan; Wang, Mo; Li, Juan; Yu, Guoliang; Bi, Yan-Ling
2011-01-01
Using an experimental design, the effect of concealing academic achievement information on adolescents' self-concept was examined in the current study. Specifically, adolescents with low academic achievement and adolescents with average to high academic achievement (N = 129) were randomly assigned to different interview contexts wherein…
Concealed Questions. In Search of Answers
ERIC Educational Resources Information Center
Frana, Ilaria
2010-01-01
This dissertation examines the semantic interpretation of various types of DPs in so-called concealed-question (CQ) constructions, as "Bill's phone number" in the sentence "John knows Bill's phone number". The peculiar characteristic of DP-CQs is that they are interpreted as having the meaning of an embedded question. So, for instance, the…
Hard x-ray focusing optics for concealed object detection
NASA Astrophysics Data System (ADS)
Jannson, Tomasz; Gertsenshteyn, Michael
2006-05-01
In this paper, we discuss hard x-ray optics, in general, and lobster-eye focusing optics, in particular, for concealed object detection, at longer distances. The longer distance (~50m) scenario is important for Improvised Explosives Detection (IED), "seeing through walls," "seeing objects under ground," and related applications.
Ground roost resource selection for Merriam's wild turkeys
Chad P. Lehman; Daniel J. Thompson; Mark A. Rumble
2010-01-01
Concealment cover is important for ground-roosting wild turkey (Meleagris gallopavo) poults immediately following hatch during the vulnerable, preflight stage. We compared concealment cover resources selected at ground roosts to those of nest sites and available resources for Merriam's turkeys (Meleagris gallopavo merriami) in the Black Hills of South Dakota, USA...
Remote Chemical Sensing Using Quantum Cascade Lasers
DOE Office of Scientific and Technical Information (OSTI.GOV)
Harper, Warren W.; Schultz, John F.
2003-01-30
Spectroscopic chemical sensing research at Pacific Northwest National Laboratory (PNNL) is focused on developing advanced sensors for detecting the production of nuclear, chemical, or biological weapons; use of chemical weapons; or the presence of explosives, firearms, narcotics, or other contraband of significance to homeland security in airports, cargo terminals, public buildings, or other sensitive locations. For most of these missions, the signature chemicals are expected to occur in very low concentrations, and in mixture with ambient air or airborne waste streams that contain large numbers of other species that may interfere with spectroscopic detection, or be mistaken for signatures ofmore » illicit activity. PNNL’s emphasis is therefore on developing remote and sampling sensors with extreme sensitivity, and resistance to interferents, or selectivity. PNNL’s research activities include: 1. Identification of signature chemicals and quantification of their spectral characteristics, 2. Identification and development of laser and other technologies that enable breakthroughs in sensitivity and selectivity, 3. Development of promising sensing techniques through experimentation and modeling the physical phenomenology and practical engineering limitations affecting their performance, and 4. Development and testing of data collection methods and analysis algorithms. Close coordination of all aspects of the research is important to ensure that all parts are focused on productive avenues of investigation. Close coordination of experimental development and numerical modeling is particularly important because the theoretical component provides understanding and predictive capability, while the experiments validate calculations and ensure that all phenomena and engineering limitations are considered.« less
Identifying the location of a concealed object through unintentional eye movements
Neuman, Yair; Assaf, Dan; Israeli, Navot
2015-01-01
In some investigative and interrogative contexts, the investigator is seeking to identify the location of an object (e.g., implanted bomb) which is known to a given subject (e.g., a terrorist). In this paper, we present a non-intrusive methodology for uncovering the loci of a concealed object by analyzing the subject's eye movements. Using a combination of eye tracking, psychological manipulation and a search algorithm, we have performed two experiments. In the first experiment, we have gained 58% hit rate in identifying the location of the concealed object and in the second experiment 56% hit rate. The pros and cons of the methodology for forensic investigation are discussed. PMID:25904879
Williams, Charlotte J; Cropley, Mark
2014-10-01
If perfectionists avoid engaging in preventive health behaviours, they may be putting their long-term health and well-being at risk. Correlational analyses based on a sample of 370 university students identified maladaptive perfectionism to be associated with decreased levels of engagement in preventive health behaviours, life satisfaction and well-being and increased levels of self-concealment and psychological distress. Adaptive perfectionism was associated with higher levels of engagement in preventive health behaviours. Self-concealment was identified as a partial mediator in the relationship between maladaptive perfectionism and both engagement in preventive health behaviours and psychological distress. Implications of the findings are discussed. © The Author(s) 2013.
Being and feeling unique: statistical deviance and psychological marginality.
Frable, D E
1993-03-01
Two studies tested the hypothesis that people with culturally stigmatized and concealable conditions (e.g., gays, epileptics, juvenile delinquents, and incest victims) would be more likely to feel unique than people with culturally valued or conspicuous conditions (e.g., the physically attractive, the intellectually gifted, the obese, and the facially scarred). In Study 1, culturally stigmatized individuals with concealable conditions were least likely to perceive consensus between their personal preferences and those of others. In Study 2, they were most likely to describe themselves as unique and to make these self-relevant decisions quickly. Marginality is a psychological reality, not just a statistical one, for those with stigmatized and concealable "master status" conditions.
Do Children Understand That People Selectively Conceal or Express Emotion?
ERIC Educational Resources Information Center
Hayashi, Hajimu; Shiomi, Yuki
2015-01-01
This study examined whether children understand that people selectively conceal or express emotion depending upon the context. We prepared two contexts for a verbal display task for 70 first-graders, 80 third-graders, 64 fifth-graders, and 71 adults. In both contexts, protagonists had negative feelings because of the behavior of the other…
The Psychological Implications of Concealing a Stigma: A Cognitive-Affective-Behavioral Model
ERIC Educational Resources Information Center
Pachankis, John E.
2007-01-01
Many assume that individuals with a hidden stigma escape the difficulties faced by individuals with a visible stigma. However, recent research has shown that individuals with a concealable stigma also face considerable stressors and psychological challenges. The ambiguity of social situations combined with the threat of potential discovery makes…
The Cost of Question Concealment: Eye-Tracking and MEG Evidence
ERIC Educational Resources Information Center
Harris, Jesse; Pylkkanen, Liina; McElree, Brian; Frisson, Steven
2008-01-01
Although natural language appears to be largely compositional, the meanings of certain expressions cannot be straightforwardly recovered from the meanings of their parts. This study examined the online processing of one such class of expressions: "concealed questions", in which the meaning of a complex noun phrase ("the proof of the theorem")…
Turkey habitat use and nesting characteristics in ponderosa pine
Mark A. Rumble; Stanley H. Anderson
1987-01-01
Turkeys (Meleagris gallapovo) selected nest sites that provided good horizontal concealment. Rock or rock outcrops were selected most frequently for nest concealment on first-nest attempts. Renest attempts showed a selection preference for shrubs as nest cover; most of these were located in meadows. Nesting success doubled for renests versus first...
Gender-specific health implications of minority stress among lesbians and gay men.
Bariola, Emily; Lyons, Anthony; Leonard, William
2016-12-01
Lesbians and gay men are exposed to unique minority stressors. We examined the health implications of one type of distal minority stressor (victimisation) and one type of proximal minority stressor (sexual identity concealment due to anticipated stigma) among lesbians and gay men. Gender-specific health implications were assessed. Data were collected via an online survey involving an Australian sample of 1,470 gay men and 1,264 lesbians. Survey questions assessed demographics, experiences of different forms of sexual identity-related victimisation and sexual identity concealment in a variety of contexts. Health outcomes included self-reported general health, illicit drug use, frequency of alcohol consumption, smoking status, and weight status. Gay men reported higher rates of victimisation and identity concealment than lesbians. Controlling for demographic differences, experiences of victimisation were associated with poorer self-rated health, illicit drug use, and smoking among both gay men and lesbians. In contrast, identity concealment was linked with poorer health outcomes among lesbians only. Our findings offer new insights into the potential antecedents of the health inequalities that have previously been reported for these populations. © 2016 Public Health Association of Australia.
NCTR using a polarization-agile coherent radar system
NASA Astrophysics Data System (ADS)
Walton, E. K.; Moffatt, D. L.; Garber, F. D.; Kamis, A.; Lai, C. Y.
1986-01-01
This report describes the results of the first year of a research project performed by the Ohio State University ElectroScience Laboratory (OSU/ESL) for the Naval Weapons Center (NWC). The goal of this project is to explore the use of the polarization properties of the signal scattered from a radar target for the purpose of radar target identification. Various radar target identification algorithms were applied to the case of a full polarization coherent radar system, and were tested using a specific data base and noise model. The data base used to test the performance of the radar target identification algorithms developed here is a unique set of measurements made on scale models of aircraft. Measurements were made using the OSU/ESL Compact Radar Measurement Range. The range was operated in a broad-band (1-12 GHZ) mode and the full polarization matrix was measured. Calibrated values (amplitude and phase) of the RCS for the three polarization states were thus available. The polarization states are listed below.
Effects of modified penoplasty for concealed penis in children.
Chen, Chao; Li, Ning; Luo, Yi-Ge; Wang, Hong; Tang, Xian-Ming; Chen, Jia-Bo; Dong, Chun-Qiang; Liu, Qiang; Dong, Kun; Su, Cheng; Yang, Ti-Quan
2016-10-01
To evaluate the effect of modified penoplasty in the management of concealed penis. We retrospectively reviewed 96 consecutive patients with concealed penis, which had been surgically corrected between July 2013 and July 2015. All patients underwent modified Shiraki phalloplasty. All patients were scheduled for regular follow-up at 1, 3, and 6 months after the surgery. Data on the patients' age, operative time, postoperative complications, and parents' satisfaction grade were collected and analyzed. The mean follow-up period was 17.4 months (range 7-31 months). The mean operative time was 63.2 ± 8.7 min. The mean perpendicular penile length was 1.89 ± 0.77 cm preoperatively and 4.42 ± 0.87 cm postoperatively, with an improved mean length of 2.5 ± 0.68 cm in the flaccid state postoperatively (p < 0.05). The patients' satisfaction grades after the surgery were improved significantly (p < 0.05). Fifty-two patients had penile lymphedema postoperatively; however, it disappeared spontaneously within 3 months. Additionally, postoperative wound infection occurred in two patients. There were no complications such as flap necrosis, penile shaft contracture, voiding difficulty, and erection difficulties. The modified Shiraki phalloplasty for concealed penis can achieve maximum utilization of prepuce to assure coverage of the exposed penile shaft. It has fewer complications, achieving marked asthetics, and functional improvement. It is a relatively ideal means for treating concealed penis.
Flexible weapons architecture design
NASA Astrophysics Data System (ADS)
Pyant, William C., III
Present day air-delivered weapons are of a closed architecture, with little to no ability to tailor the weapon for the individual engagement. The closed architectures require weaponeers to make the target fit the weapon instead of fitting the individual weapons to a target. The concept of a flexible weapons aims to modularize weapons design using an open architecture shell into which different modules are inserted to achieve the desired target fractional damage while reducing cost and civilian casualties. This thesis shows that the architecture design factors of damage mechanism, fusing, weapons weight, guidance, and propulsion are significant in enhancing weapon performance objectives, and would benefit from modularization. Additionally, this thesis constructs an algorithm that can be used to design a weapon set for a particular target class based on these modular components.
Proliferation of nuclear weapons: opportunities for control and abolition.
Sidel, Victor W; Levy, Barry S
2007-09-01
Nuclear weapons pose a particularly destructive threat. Prevention of the proliferation and use of nuclear weapons is urgently important to public health. "Horizontal" proliferation refers to nation-states or nonstate entities that do not have, but are acquiring, nuclear weapons or developing the capability and materials for producing them. "Vertical" proliferation refers to nation-states that do possess nuclear weapons and are increasing their stockpiles of these weapons, improving the technical sophistication or reliability of their weapons, or developing new weapons. Because nation-states or other entities that wish to use or threaten to use nuclear weapons need methods for delivering those weapons, proliferation of delivery mechanisms must also be prevented. Controlling proliferation--and ultimately abolishing nuclear weapons--involves national governments, intergovernmental organizations, nongovernmental and professional organizations, and society at large.
CF NEUTRON TIME OF FLIGHT TRANSMISSION FOR MATERIAL IDENTIFICATION FOR WEAPONS TRAINERS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mihalczo, John T; Valentine, Timothy E; Blakeman, Edward D
2011-01-01
The neutron transmission, elastic scattering, and non elastic reactions can be used to distinguish various isotopes. Neutron transmission as a function of energy can be used in some cases to identify materials in unknown objects. A time tagged californium source that provides a fission spectrum of neutrons is a useful source for neutron time-of-flight (TOF) transmission measurements. Many nuclear weapons trainer units for a particular weapons system (no fissile, but of same weight and center of gravity) in shipping containers were returned to the National Nuclear Security Administration Y-12 National Security Complex in the mid 1990s. Nuclear Materials Identification Systemmore » (NMIS) measurements with a time tagged californium neutron source were used to verify that these trainers did not contain fissile material. In these blind tests, the time distributions of neutrons through the containers were measured as a function of position to locate the approximate center of the trainer in the container. Measurements were also performed with an empty container. TOF template matching measurements were then performed at this location for a large number of units. In these measurements, the californium source was located on one end of the container and a proton recoil scintillator was located on the other end. The variations in the TOF transmission for times corresponding to 1 to 5 MeV were significantly larger than statistical. Further examination of the time distribution or the energy dependence revealed that these variations corresponded to the variations in the neutron cross section of aluminum averaged over the energy resolution of the californium TOF measurement with a flight path of about 90 cm. Measurements using different thicknesses of aluminum were also performed with the source and detector separated the same distance as for the trainer measurements. These comparison measurements confirmed that the material in the trainers was aluminum, and the total thickness of aluminum through the trainers was determined. This is an example of how californium transmission TOF measurements can be used to identify materials.« less
Youths carrying a weapon or using a weapon in a fight: what makes the difference?
Thurnherr, Judit; Michaud, Pierre-André; Berchtold, André; Akré, Christina; Suris, Joan-Carles
2009-04-01
The objective of this study was to characterize weapon-carrying adolescents and to assess whether weapon carriers differ from weapon users. Data were drawn from a cross-sectional school-based survey of 7548 adolescents aged 16-20 years in Switzerland. Youths carrying a weapon were compared with those who do not. Subsequently, weapon carriers were divided into those who had used it in a fight and those who had not. Individual, family, school and social factors were analyzed using bivariate and stepwise multivariate analysis. For both genders, delinquent behavior and being victim of physical violence were associated with weapon carrying. For males, quarreling while intoxicated, being an apprentice, being sensation seekers, having a tattoo, having a poor relationship with parents and practicing unsafe sex were also related to weapon carrying. Compared with weapon carriers, female weapon users were more likely to be regular smokers. Male weapon users were foreign born, urban and apprentices; had poor school connectedness; practiced unsafe sex and quarreled while intoxicated. Carrying a weapon is a relatively frequent behavior among youths in Switzerland and a sizeable proportion of weapon carriers have used it in a fight. Weapon carrying should be part of the clinical assessment and preventive counseling of adolescents. Preventive programs specific for at-risk youth groups need to be developed.
ERIC Educational Resources Information Center
Cepeda-Benito, Antonio; Short, Paul
1998-01-01
New information about the role of self-concealment in the decision to seek psychological services is investigated. Different types of distress selectively predict students' perceived likelihood of seeking help according to the problems for which help would be sought (N=732). Results are discussed in contrast to previous researchers' findings. (EMK)
Concealment of Child Sexual Abuse in Sports
ERIC Educational Resources Information Center
Hartill, Mike
2013-01-01
When the sexual abuse of children is revealed, it is often found that other nonabusing adults were aware of the abuse but failed to act. During the past twenty years or so, the concealment of child sexual abuse (CSA) within organizations has emerged as a key challenge for child protection work. Recent events at Pennsylvania State University (PSU)…
ERIC Educational Resources Information Center
Price, James H.; Thompson, Amy; Khubchandani, Jagdish; Dake, Joseph; Payton, Erica; Teeple, Karen
2014-01-01
Objective: To assess the perceptions and practices of a national sample of college and university presidents regarding their support for concealed handguns being carried on college campuses. Participants: The sample for this study consisted of a national random sample of 900 college or university presidents. Methods: In the spring of 2013, a…
A hybrid frame concealment algorithm for H.264/AVC.
Yan, Bo; Gharavi, Hamid
2010-01-01
In packet-based video transmissions, packets loss due to channel errors may result in the loss of the whole video frame. Recently, many error concealment algorithms have been proposed in order to combat channel errors; however, most of the existing algorithms can only deal with the loss of macroblocks and are not able to conceal the whole missing frame. In order to resolve this problem, in this paper, we have proposed a new hybrid motion vector extrapolation (HMVE) algorithm to recover the whole missing frame, and it is able to provide more accurate estimation for the motion vectors of the missing frame than other conventional methods. Simulation results show that it is highly effective and significantly outperforms other existing frame recovery methods.
Kanaujia, Pankaj K; Tak, Vijay; Pardasani, Deepak; Gupta, A K; Dubey, D K
2008-03-28
The analysis of nitrogen containing amino alcohols, which are the precursors and degradation products of nitrogen mustards and nerve agent VX, constitutes an important aspect for verifying the compliance to the CWC (Chemical Weapons Convention). This work devotes on the development of solid-phase extraction method using silica- and polymer-based SCX (strong cation-exchange) and MCX (mixed-mode strong cation-exchange) cartridges for N,N-dialkylaminoethane-2-ols and alkyl N,N-diethanolamines, from water. The extracted analytes were analyzed by GC-MS (gas chromatography-mass spectrometry) in the full scan and selected ion monitoring modes. The extraction efficiencies of SCX and MCX cartridges were compared, and results revealed that SCX performed better. Extraction parameters, such as loading capacity, extraction solvent, its volume, and washing solvent were optimized. Best recoveries were obtained using 2 mL methanol containing 10% NH(4)OH and limits of detection could be achieved up to 5 x 10(-3) microg mL(-1) in the selected ion monitoring mode and 0.01 microg mL(-1) in full scan mode. The method was successfully employed for the detection and identification of amino alcohol present in water sample sent by Organization for Prohibition of Chemical Weapons (OPCW) in the official proficiency tests. The method was also applied to extract the analytes from human plasma. The SCX cartridge showed good recoveries of amino alcohols from human plasma after protein precipitation.
Imaging through atmospheric turbulence for laser based C-RAM systems: an analytical approach
NASA Astrophysics Data System (ADS)
Buske, Ivo; Riede, Wolfgang; Zoz, Jürgen
2013-10-01
High Energy Laser weapons (HEL) have unique attributes which distinguish them from limitations of kinetic energy weapons. HEL weapons engagement process typical starts with identifying the target and selecting the aim point on the target through a high magnification telescope. One scenario for such a HEL system is the countermeasure against rockets, artillery or mortar (RAM) objects to protect ships, camps or other infrastructure from terrorist attacks. For target identification and especially to resolve the aim point it is significant to ensure high resolution imaging of RAM objects. During the whole ballistic flight phase the knowledge about the expectable imaging quality is important to estimate and evaluate the countermeasure system performance. Hereby image quality is mainly influenced by unavoidable atmospheric turbulence. Analytical calculations have been taken to analyze and evaluate image quality parameters during an approaching RAM object. In general, Kolmogorov turbulence theory was implemented to determine atmospheric coherence length and isoplanatic angle. The image acquisition is distinguishing between long and short exposure times to characterize tip/tilt image shift and the impact of high order turbulence fluctuations. Two different observer positions are considered to show the influence of the selected sensor site. Furthermore two different turbulence strengths are investigated to point out the effect of climate or weather condition. It is well known that atmospheric turbulence degenerates image sharpness and creates blurred images. Investigations are done to estimate the effectiveness of simple tip/tilt systems or low order adaptive optics for laser based C-RAM systems.
Youths Carrying a Weapon or Using a Weapon in a Fight: What Makes the Difference?
ERIC Educational Resources Information Center
Thurnherr, Judit; Michaud, Pierre-Andre; Berchtold, Andre; Akre, Christina; Suris, Joan-Carles
2009-01-01
The objective of this study was to characterize weapon-carrying adolescents and to assess whether weapon carriers differ from weapon users. Data were drawn from a cross-sectional school-based survey of 7548 adolescents aged 16-20 years in Switzerland. Youths carrying a weapon were compared with those who do not. Subsequently, weapon carriers were…
Microwave and Millimeter Wave Imaging Using Synthetic Aperture Focusing and Holographical Techniques
NASA Technical Reports Server (NTRS)
Case, Joseph Tobias
2005-01-01
Microwave and millimeter wave nondestructive testing and evaluation (NDT&E) methods have shown great potential for determining material composition in composite structures, determining material thickness or debond thickness between two layers, and determining the location and size of flaws, defects, and anomalies. The same testing methods have also shown great potential to produce relatively high-resolution images of voids inside Spray On Foam Insulation (SOFI) test panels using real focused methods employing lens antennas. An alternative to real focusing methods are synthetic focusing methods. The essence of synthetic focusing is to match the phase of the scattered signal to measured points spaced regularly on a plane. Many variations of synthetic focusing methods have already been developed for radars, ultrasonic testing applications, and microwave concealed weapon detection. Two synthetic focusing methods were investigated; namely, a) frequency-domain synthetic aperture focusing technique (FDSAFT), and b) wide-band microwave holography. These methods were applied towards materials whose defects were of low dielectric contrast like air void in SOFI. It is important to note that this investigation used relatively low frequencies from 8.2 GHz to 26.5 GHz that are not conducive for direct imaging of the SOFI. The ultimate goal of this work has been to demonstrate the capability of these methods before they are applied to much higher frequencies such as the millimeter wave frequency spectrum (e.g., 30-300 GHz).
The Future of Warfare and Impact of Space Operations
2011-01-01
cyber warfare is occurring as a preferred method of conflict between large players on the global stage. Smaller players also have reasons to avoid conventional warfare and remain hidden. In Iraq and Afghanistan, those who fight against us attempt to remain hidden. The individual who places an improvised explosive device (IED) attempts to engage us without exposure or identification. Those who aid the individual emplacing an IED do so with hidden networks of support. The IED is an anonymous weapon. Both cyber warfare and insurgent use of IEDs depend
DOE Office of Scientific and Technical Information (OSTI.GOV)
Larson, M
NEST stands for Nuclear Emergency Support Team. The NEST Mission Statement as first established: (1) Conduct, direct, coordinate search and recovery operations for nuclear material, weapons or devices; and (2) Assist in identification and deactivation of Improvised Nuclear Devices (INDs) and Radiological Dispersal Devices (RDDs). Then in 1980 a very sophisticated improvised explosive device was found at Harvey's Casino at Lake Tahoe, Nevada. The FBI and Bomb Squads were unprepared and it detonated. As a result the additional phrase 'and Sophisticated Improvised Explosive Devices (SIEDs)' was added to the Mission Statement.
Sandia National Laboratories: National Security Missions: Nuclear Weapons:
Safety & Security Sandia National Laboratories Exceptional service in the national interest & Figures Programs Nuclear Weapons About Nuclear Weapons Safety & Security Weapons Science & Twitter YouTube Flickr RSS Top Nuclear Weapons About Nuclear Weapons at Sandia Safety & Security
Genetic calibration of species diversity among North America's freshwater fishes.
April, Julien; Mayden, Richard L; Hanner, Robert H; Bernatchez, Louis
2011-06-28
Freshwater ecosystems are being heavily exploited and degraded by human activities all over the world, including in North America, where fishes and fisheries are strongly affected. Despite centuries of taxonomic inquiry, problems inherent to species identification continue to hamper the conservation of North American freshwater fishes. Indeed, nearly 10% of species diversity is thought to remain undescribed. To provide an independent calibration of taxonomic uncertainty and to establish a more accessible molecular identification key for its application, we generated a standard reference library of mtDNA sequences (DNA barcodes) derived from expert-identified museum specimens for 752 North American freshwater fish species. This study demonstrates that 90% of known species can be delineated using barcodes. Moreover, it reveals numerous genetic discontinuities indicative of independently evolving lineages within described species, which points to the presence of morphologically cryptic diversity. From the 752 species analyzed, our survey flagged 138 named species that represent as many as 347 candidate species, which suggests a 28% increase in species diversity. In contrast, several species of parasitic and nonparasitic lampreys lack such discontinuity and may represent alternative life history strategies within single species. Therefore, it appears that the current North American freshwater fish taxonomy at the species level significantly conceals diversity in some groups, although artificially creating diversity in others. In addition to providing an easily accessible digital identification system, this study identifies 151 fish species for which taxonomic revision is required.
Random patterns and biometrics for counterfeit deterrence
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tolk, K.M.
1993-12-31
Sandia National Laboratories (SNL) has been working on non-counterfeitable seals, tags, and documents for over fifteen years. During that time, several technologies have been developed that can be applied to deter counterfeiting of identification documents such as ID cards, passports, and possibly credit cards. Two technologies are presented in some detail. The first is reflective particle tagging technology that was developed to help verify treaties limiting the numbers of nuclear weapons that participating parties may possess. This approach uses the random locations and orientations of reflective particles applied to the surface of an item to uniquely identify the item. Themore » resulting tags are secure against even the most determined adversaries. The second technology uses biometric information printed on the document and public key cryptography to ensure that an adversary cannot issue identification documents to unauthorized individuals.« less
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 2 2012-07-01 2012-07-01 false Weapons. 234.10 Section 234.10 National Defense... PENTAGON RESERVATION § 234.10 Weapons. (a) Except as otherwise authorized under this section, the following are prohibited: (1) Possessing a weapon. (2) Carrying a weapon. (3) Using a weapon. (b) This section...
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 2 2013-07-01 2013-07-01 false Weapons. 234.10 Section 234.10 National Defense... PENTAGON RESERVATION § 234.10 Weapons. (a) Except as otherwise authorized under this section, the following are prohibited: (1) Possessing a weapon. (2) Carrying a weapon. (3) Using a weapon. (b) This section...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 2 2010-07-01 2010-07-01 false Weapons. 234.10 Section 234.10 National Defense... PENTAGON RESERVATION § 234.10 Weapons. (a) Except as otherwise authorized under this section, the following are prohibited: (1) Possessing a weapon. (2) Carrying a weapon. (3) Using a weapon. (b) This section...
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 2 2014-07-01 2014-07-01 false Weapons. 234.10 Section 234.10 National Defense... PENTAGON RESERVATION § 234.10 Weapons. (a) Except as otherwise authorized under this section, the following are prohibited: (1) Possessing a weapon. (2) Carrying a weapon. (3) Using a weapon. (b) This section...
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 2 2011-07-01 2011-07-01 false Weapons. 234.10 Section 234.10 National Defense... PENTAGON RESERVATION § 234.10 Weapons. (a) Except as otherwise authorized under this section, the following are prohibited: (1) Possessing a weapon. (2) Carrying a weapon. (3) Using a weapon. (b) This section...
Infrared detection, recognition and identification of handheld objects
NASA Astrophysics Data System (ADS)
Adomeit, Uwe
2012-10-01
A main criterion for comparison and selection of thermal imagers for military applications is their nominal range performance. This nominal range performance is calculated for a defined task and standardized target and environmental conditions. The only standardization available to date is STANAG 4347. The target defined there is based on a main battle tank in front view. Because of modified military requirements, this target is no longer up-to-date. Today, different topics of interest are of interest, especially differentiation between friend and foe and identification of humans. There is no direct way to differentiate between friend and foe in asymmetric scenarios, but one clue can be that someone is carrying a weapon. This clue can be transformed in the observer tasks detection: a person is carrying or is not carrying an object, recognition: the object is a long / medium / short range weapon or civil equipment and identification: the object can be named (e. g. AK-47, M-4, G36, RPG7, Axe, Shovel etc.). These tasks can be assessed experimentally and from the results of such an assessment, a standard target for handheld objects may be derived. For a first assessment, a human carrying 13 different handheld objects in front of his chest was recorded at four different ranges with an IR-dual-band camera. From the recorded data, a perception experiment was prepared. It was conducted with 17 observers in a 13-alternative forced choice, unlimited observation time arrangement. The results of the test together with Minimum Temperature Difference Perceived measurements of the camera and temperature difference and critical dimension derived from the recorded imagery allowed defining a first standard target according to the above tasks. This standard target consist of 2.5 / 3.5 / 5 DRI line pairs on target, 0.24 m critical size and 1 K temperature difference. The values are preliminary and have to be refined in the future. Necessary are different aspect angles, different carriage and movement.
Nuclear Forensics: Report of the AAAS/APS Working Group
NASA Astrophysics Data System (ADS)
Tannenbaum, Benn
2008-04-01
This report was produced by a Working Group of the American Physical Society's Program on Public Affairs in conjunction with the American Association for the Advancement of Science Center for Science, Technology and Security Policy. The primary purpose of this report is to provide the Congress, U.S. government agencies and other institutions involved in nuclear forensics with a clear unclassified statement of the state of the art of nuclear forensics; an assessment of its potential for preventing and identifying unattributed nuclear attacks; and identification of the policies, resources and human talent to fulfill that potential. In the course of its work, the Working Group observed that nuclear forensics was an essential part of the overall nuclear attribution process, which aims at identifying the origin of unidentified nuclear weapon material and, in the event, an unidentified nuclear explosion. A credible nuclear attribution capability and in particular nuclear forensics capability could deter essential participants in the chain of actors needed to smuggle nuclear weapon material or carry out a nuclear terrorist act and could also encourage states to better secure such materials and weapons. The Working Group also noted that nuclear forensics result would take some time to obtain and that neither internal coordination, nor international arrangements, nor the state of qualified personnel and needed equipment were currently enough to minimize the time needed to reach reliable results in an emergency such as would be caused by a nuclear detonation or the intercept of a weapon-size quantity of material. The Working Group assesses international cooperation to be crucial for forensics to work, since the material would likely come from inadequately documented foreign sources. In addition, international participation, if properly managed, could enhance the credibility of the deterrent effect of attribution. Finally the Working Group notes that the U.S. forensics capability involved a number of agencies and other groups that would have to cooperate rapidly in an emergency and that suitable exercises to ensure such cooperation were needed.
Gauld, Cassandra S; Lewis, Ioni; White, Katherine M
2014-01-01
Making a conscious effort to hide the fact that you are texting while driving (i.e., concealed texting) is a deliberate and risky behaviour involving attention diverted away from the road. As the most frequent users of text messaging services and mobile phones while driving, young people appear at heightened risk of crashing from engaging in this behaviour. This study investigated the phenomenon of concealed texting while driving, and utilised an extended Theory of Planned Behaviour (TPB) including the additional predictors of moral norm, mobile phone involvement, and anticipated regret to predict young drivers' intentions and subsequent behaviour. Participants (n=171) were aged 17-25 years, owned a mobile phone, and had a current driver's licence. Participants completed a questionnaire measuring their intention to conceal texting while driving, and a follow-up questionnaire a week later to report their behavioural engagement. The results of hierarchical multiple regression analyses showed overall support for the predictive utility of the TPB with the standard constructs accounting for 69% of variance in drivers' intentions, and the extended predictors contributing an additional 6% of variance in intentions over and above the standard constructs. Attitude, subjective norm, PBC, moral norm, and mobile phone involvement emerged as significant predictors of intentions; and intention was the only significant predictor of drivers' self-reported behaviour. These constructs can provide insight into key focal points for countermeasures including advertising and other public education strategies aimed at influencing young drivers to reconsider their engagement in this risky behaviour. Copyright © 2013 Elsevier Ltd. All rights reserved.
Detection of dim targets in multiple environments
NASA Astrophysics Data System (ADS)
Mirsky, Grace M.; Woods, Matthew; Grasso, Robert J.
2013-10-01
The proliferation of a wide variety of weapons including Anti-Aircraft Artillery (AAA), rockets, and small arms presents a substantial threat to both military and civilian aircraft. To address this ever-present threat, Northrop Grumman has assessed unguided threat phenomenology to understand the underlying physical principles for detection. These principles, based upon threat transit through the atmosphere, exploit a simple phenomenon universal to all objects moving through an atmosphere comprised of gaseous media to detect and track the threat in the presence of background and clutter. Threat detection has rapidly become a crucial component of aircraft survivability systems that provide situational awareness to the crew. It is particularly important to platforms which may spend a majority of their time at low altitudes and within the effective range of a large variety of weapons. Detection of these threats presents a unique challenge as this class of threat typically has a dim signature coupled with a short duration. Correct identification of each of the threat components (muzzle flash and projectile) is important to determine trajectory and intent while minimizing false alarms and maintaining a high detection probability in all environments.
Gendered Perceptions of Sexual Behaviour in Rural South Africa
Ndinda, C.; Uzodike, U. O.; Chimbwete, C.; Mgeyane, M. T. M.
2011-01-01
This paper discusses sexual behaviour findings collected through eleven homogenous focus group discussions conducted among women and men in a predominantly Zulu population in rural KwaZulu-Natal, South Africa. The objective of this paper is to shed light on sexual behaviour in a rural community. The findings suggest that sex is a taboo subject and the discussion around it is concealed in the use of polite language, euphemisms, and gestures. There are gender and generational dimensions to the discussion of sex. The contribution of this paper lies in the identification of what rural people discuss about sex and the influence of cultural practices and urban or global forces on sexual behaviour in rural areas. The paper adds to the growing body of literature on the use of focus groups in understanding sexual behaviour in rural contexts. PMID:22295199
Detecting concealed objects at a checkpoint
McMakin, Douglas L [Richland, WA; Hall, Thomas E [Kennewick, WA; Sheen, David M [Richland, WA; Severtsen, Ronald H [Richland, WA
2008-07-29
Disclosed are systems, methods, devices, and apparatus to interrogate a clothed individual with electromagnetic radiation to determine if a concealed object is being carried. This determination includes establishing data corresponding to an image of the individual with a pair of opposed, semi-cylindrical array panels each configured to interrogate the individual with electromagnetic radiation in the 200 MHz to 1 THz range.
ERIC Educational Resources Information Center
Chaudoir, Stephenie R.; Fisher, Jeffrey D.
2010-01-01
Disclosure is a critical aspect of the experience of people who live with concealable stigmatized identities. This article presents the disclosure processes model (DPM)--a framework with which to examine when and why interpersonal disclosure may be beneficial. The DPM suggests that antecedent goals representing approach and avoidance motivational…
ERIC Educational Resources Information Center
Bouffard, Jeffrey A.; Nobles, Matt R.; Wells, William; Cavanaugh, Michael R.
2012-01-01
Among other arguments, advocates for lifting bans on carrying concealed handguns on campus propose that this would increase the prevalence of legitimately carried handguns, which might then deter crimes or be used to intervene in campus shooting incidents like the one that took place at Virginia Tech in 2007. Opponents suggest that increased…
ERIC Educational Resources Information Center
Masuda, Akihiko; Boone, Matthew S.
2011-01-01
The present study examined whether mental health stigma (i.e., negative attitudes toward people with a psychological disorder) and self-concealment are unique predictors of help-seeking attitudes in Asian American and European American college students with no history of seeking professional psychological services. The Asian American group had…
ERIC Educational Resources Information Center
Jorgensen, Lisa J.; Ellis, Gary D.; Ruddell, Edward
2013-01-01
This research examined the effect of concealment (environmental cues), presence or absence of people recreating (social cues), and gender on individuals' fear of crime in a community park setting. Using a 7-point single-item indicator, 732 participants from two samples (540 park visitors and 192 college students) rated their estimates of fear of…
ERIC Educational Resources Information Center
Horan, Sean M.; Bryant, Leah E.
2017-01-01
This essay encourages research on the presence of guns in college classrooms. Readers are asked to consider that around 11 million individuals have concealed carry permits (Crime Prevention Research Center, 2014), and roughly 20% of states allow concealed guns on campus (e.g., Anderson, 2016). Given the centrality of guns in our culture, and…
ERIC Educational Resources Information Center
Mendoza, Hadrian; Masuda, Akihiko; Swartout, Kevin M.
2015-01-01
The study examined whether mental health stigma and self-concealment are uniquely related to various dimensions of attitudes toward seeking professional psychological services (i.e., help-seeking attitudes) in Latina/o college students. Data from 129 Latina/o undergraduates (76% female) were used in the analysis. Results revealed that mental…
Integrated structural control design of large space structures
DOE Office of Scientific and Technical Information (OSTI.GOV)
Allen, J.J.; Lauffer, J.P.
1995-01-01
Active control of structures has been under intensive development for the last ten years. Reference 2 reviews much of the identification and control technology for structural control developed during this time. The technology was initially focused on space structure and weapon applications; however, recently the technology is also being directed toward applications in manufacturing and transportation. Much of this technology focused on multiple-input/multiple-output (MIMO) identification and control methodology because many of the applications require a coordinated control involving multiple disturbances and control objectives where multiple actuators and sensors are necessary for high performance. There have been many optimal robust controlmore » methods developed for the design of MIMO robust control laws; however, there appears to be a significant gap between the theoretical development and experimental evaluation of control and identification methods to address structural control applications. Many methods have been developed for MIMO identification and control of structures, such as the Eigensystem Realization Algorithm (ERA), Q-Markov Covariance Equivalent Realization (Q-Markov COVER) for identification; and, Linear Quadratic Gaussian (LQG), Frequency Weighted LQG and H-/ii-synthesis methods for control. Upon implementation, many of the identification and control methods have shown limitations such as the excitation of unmodelled dynamics and sensitivity to system parameter variations. As a result, research on methods which address these problems have been conducted.« less
Self-stigma among concealable minorities in Hong Kong: conceptualization and unified measurement.
Mak, Winnie W S; Cheung, Rebecca Y M
2010-04-01
Self-stigma refers to the internalized stigma that individuals may have toward themselves as a result of their minority status. Not only can self-stigma dampen the mental health of individuals, it can deter them from seeking professional help lest disclosing their minority status lead to being shunned by service providers. No unified instrument has been developed to measure consistently self-stigma that could be applied to different concealable minority groups. The present study presented findings based on 4 studies on the development and validation of the Self-Stigma Scale, conducted in Hong Kong with community samples of mental health consumers, recent immigrants from Mainland China, and sexual minorities. Upon a series of validation procedures, a 9-item Self-Stigma Scale-Short Form was developed. Initial support on its reliability and construct validity (convergent and criterion validities) were found among 3 stigmatized groups. Utility of this unified measure was to establish an empirical basis upon which self-stigma of different concealable minority groups could be assessed under the same dimensions. Health-care professionals could make use of this short scale to assess potential self-stigmatization among concealable minorities, which may hamper their treatment process as well as their overall well-being.
[Half-gloving cordectomy: a modified procedure for concealed penis].
Sun, Wei-Gui; Zheng, Qi-Chuan; Jiang, Kun
2012-06-01
To search for a simple surgical procedure for the treatment of concealed penis that may have better effect and less complications. We used a modified surgical method in the treatment of 58 patients with concealed penis aged from 3 to 15 (mean 6.8) years. The operation was simplified and involved the following steps: wholly unveiling the penis glans, half-degloving the foreskins, cutting off all the adhesive fibers up to the penile suspensory ligaments, and liberating the external penis. The operation was successful in all the patients, with the operative time of 15 -45 (mean 33) minutes, hospital stay of 2 - 5 (mean 3.5) days, but no complications except mild foreskin edema in 5 cases. The external penis was prolonged from 0.5 - 2.8 (mean 1.4) cm preoperatively to 3.2 - 8.5 (mean 3.9) cm postoperatively. The patients were followed up for 1 -3 years, all satisfied with the length and appearance of the penis, and their sexual and reproductive functions were normal. The modified surgical procedure for concealed penis is simple and effective, with desirable outcomes, few postoperative complications and no damage to sexual and reproductive functions.
Keene, Danya E; Cowan, Sarah K; Baker, Amy Castro
2015-05-01
We analyzed experiences of stigmatization, concealment, and isolation among African American homeowners who were experiencing mortgage strain. We conducted semistructured interviews between March 2012 and May 2013 with 28 African American homeowners in a northeastern US city who were experiencing mortgage strain. We coded all of the transcripts and reviewed data for codes relating to stigma, sharing information, social support, social isolation, and the meaning of homeownership. Our data showed that mortgage strain can be a concealable stigma. Participants internalized this stigma, expressing shame about their mortgage situation. Additionally, some participants anticipated that others would view them as less worthy given their mortgage trouble. In an effort to avoid stigmatization, many concealed their mortgage trouble, which often led to isolation. This stigmatization, concealment, and isolation seemed to contribute to participants' depression, anxiety, and emotional distress. Stigma may exacerbate stress associated with mortgage strain and contribute to poor mental health, particularly among upwardly mobile African Americans who have overcome significant structural barriers to home ownership. Reducing stigma associated with mortgage strain may help to reduce the health consequences of this stressful life event.
Examination of an Electronic Patient Record Display Method to Protect Patient Information Privacy.
Niimi, Yukari; Ota, Katsumasa
2017-02-01
Electronic patient records facilitate the provision of safe, high-quality medical care. However, because personnel can view almost all stored information, this study designed a display method using a mosaic blur (pixelation) to temporarily conceal information patients do not want shared. This study developed an electronic patient records display method for patient information that balanced the patient's desire for personal information protection against the need for information sharing among medical personnel. First, medical personnel were interviewed about the degree of information required for both individual duties and team-based care. Subsequently, they tested a mock display method that partially concealed information using a mosaic blur, and they were interviewed about the effectiveness of the display method that ensures patient privacy. Participants better understood patients' demand for confidentiality, suggesting increased awareness of patients' privacy protection. However, participants also indicated that temporary concealment of certain information was problematic. Other issues included the inconvenience of removing the mosaic blur to obtain required information and risk of insufficient information for medical care. Despite several issues with using a display method that temporarily conceals information according to patient privacy needs, medical personnel could accept this display method if information essential to medical safety remains accessible.
Code of Federal Regulations, 2014 CFR
2014-01-01
... to the Proliferation of Weapons of Mass Destruction Presidential Documents Other Presidential... Proliferation of Weapons of Mass Destruction On November 14, 1994, by Executive Order 12938, the President... chemical weapons (weapons of mass destruction) and the means of delivering such weapons. On July 28, 1998...
[Chemical weapons and chemical terrorism].
Nakamura, Katsumi
2005-10-01
Chemical Weapons are kind of Weapons of Mass Destruction (WMD). They were used large quantities in WWI. Historically, large quantities usage like WWI was not recorded, but small usage has appeared now and then. Chemical weapons are so called "Nuclear weapon for poor countrys" because it's very easy to produce/possession being possible. They are categorized (1) Nerve Agents, (2) Blister Agents, (3) Cyanide (blood) Agents, (4) Pulmonary Agents, (5) Incapacitating Agents (6) Tear Agents from the viewpoint of human body interaction. In 1997 the Chemical Weapons Convention has taken effect. It prohibits chemical weapons development/production, and Organization for the Prohibition of Chemical Weapons (OPCW) verification regime contributes to the chemical weapons disposal. But possibility of possession/use of weapons of mass destruction by terrorist group represented in one by Matsumoto and Tokyo Subway Sarin Attack, So new chemical terrorism countermeasures are necessary.
Proliferation of Nuclear Weapons: Opportunities for Control and Abolition
Sidel, Victor W.; Levy, Barry S.
2007-01-01
Nuclear weapons pose a particularly destructive threat. Prevention of the proliferation and use of nuclear weapons is urgently important to public health. “Horizontal” proliferation refers to nation-states or nonstate entities that do not have, but are acquiring, nuclear weapons or developing the capability and materials for producing them. “Vertical” proliferation refers to nation-states that do possess nuclear weapons and are increasing their stockpiles of these weapons, improving the technical sophistication or reliability of their weapons, or developing new weapons. Because nation-states or other entities that wish to use or threaten to use nuclear weapons need methods for delivering those weapons, proliferation of delivery mechanisms must also be prevented. Controlling proliferation—and ultimately abolishing nuclear weapons—involves national governments, intergovernmental organizations, nongovernmental and professional organizations, and society at large. PMID:17666690
Bugs and gas: Agreements banning chemical and biological weapons
NASA Astrophysics Data System (ADS)
Mikulak, Robert P.
2017-11-01
The use of chemical or biological weapons, whether by a State or terrorists, continues to be a serious security concern. Both types of weapons are prohibited by multilateral treaties that have very broad membership, but both the Biological Weapons Convention and the Chemical Weapons Convention are facing major challenges. In particular, the continued use of chemical weapons in the Syrian civil war by government forces risks eroding the norm against the use of such weapons. This paper briefly explore the recent history of efforts to constrain chemical and biological weapons and outlines challenges for the future.
Could plate tectonics on Venus be concealed by volcanic deposits
NASA Technical Reports Server (NTRS)
Kaula, W. M.; Muradian, L. M.
1982-01-01
The present investigation is supplementary to a study reported by Kaula and Phillips (1981). From an analysis of Pioneer Venus altimetry, Kaula and Phillips had inferred that any heat loss from the planet by plate tectonics must be small compared to that from the earth. However, it has been suggested by others that plate tectonic may exist on Venus, but that the expected 'square root of s' dependence of the topographic drop off is not observed because it is concealed by lava flows. The present investigation has the objective to conduct an examination whether this suggestion of concealment by lava flow is correct. On the basis of the performed analysis, it is concluded that the results obtained by Kaula and Phillips appear to be well justified.
An Approach to Near Field Data Selection in Radio Frequency Identification
NASA Astrophysics Data System (ADS)
Winkworth, Robert D.
Personal identification is needed in many civil activities, and the common identification cards, such as a driver's license, have become the standard document de facto. Radio frequency identification has complicated this matter. Unlike their printed predecessors, contemporary RFID cards lack a practical way for users to control access to their individual fields of data. This leaves them more available to unauthorized parties, and more prone to abuse. Here, then was undertaken a means to test a novel RFID card technology that allows overlays to be used for reliable, reversible data access settings. Similar to other proposed switching mechanisms, it offers advantages that may greatly improve outcomes. RFID use is increasing in identity documents such as drivers' licenses and passports, and with it concern over the theft of personal information, which can enable unauthorized tracking or fraud. Effort put into designing a strong foundation technology now may allow for widespread development on them later. In this dissertation, such a technology was designed and constructed, to drive the central thesis that selective detuning could serve as a feasible, reliable mechanism. The concept had been illustrated effective in limiting access to all fields simultaneously before, and was here effective in limiting access to specific fields selectively. A novel card was produced in familiar dimensions, with an intuitive interface by which users may conceal the visible print of the card to conceal the wireless emissions it allows. A discussion was included of similar technologies, involving capacitive switching, that could further improve the outcomes if such a product were put to large-scale commercial fabrication. The card prototype was put to a battery of laboratory tests to measure the degree of independence between data fields and the reliability of the switching mechanism when used under realistically variable coverage, demonstrating statistically consistent performance in both. The success rate of RFID card read operations, which are already greater than 99.9%, were exceeded by the success rate of selection using the featured technology. With controls in place for the most influential factors related to card readability (namely the distance from the reader antennas and the orientation of the card antenna with respect to them), the card was shown to completely resist data acquisition from unauthorized fields while allowing unimpeded access to authorized fields, even after thousands of varied attempts. The effect was proven to be temporary and reversible. User intervention allowed for the switching to occur in a matter of seconds by sliding a conductive sleeve or applying tape to regions of the card. Strategies for widespread implementation were discussed, emphasizing factors that included cost, durability, size, simplicity, and familiarity, all of which arise in card management decisions for common state and national identification such as a driver's license. The relationship between the card and external database systems was detailed, as no such identification document could function in isolation. A practical solution involving it will include details of how multiple fields will be written to the card and separated sufficiently in external databases so as to allow for user-directed selection of data field disclosure. Opportunities for implementation in corporate and academic environments were discussed, along with the ways in which this technology could invite further investigation.
Wallace, Lacey N
2017-01-01
Prior research has found that persistently delinquent youth or more violent youth were less popular than their less delinquent peers (Young, 2013). However, recent research has also found that weapon carrying is associated with being more popular in adolescence (Dijkstra et al., 2010). The present paper examines the perceived popularity of adolescents who carry weapons in comparison to those who both carry and use weapons in acts of violence or threatened violence. Data consist of two waves from the National Longitudinal Study of Adolescent to Adult Health. Analyses use OLS regression with lagged predictors. This paper found no differences in number of friends between weapon carriers and weapon users. However, among both male and female gang members, those who did not use or carry weapons (abstainers) named significantly fewer friends than weapon users. Among females, weapon abstainers both named and were named by significantly more people than weapon users. These differences were not observed for males. Implications of these results and directions for future research are discussed.
NASA Astrophysics Data System (ADS)
Mariano, Adrian V.; Grossmann, John M.
2010-11-01
Reflectance-domain methods convert hyperspectral data from radiance to reflectance using an atmospheric compensation model. Material detection and identification are performed by comparing the compensated data to target reflectance spectra. We introduce two radiance-domain approaches, Single atmosphere Adaptive Cosine Estimator (SACE) and Multiple atmosphere ACE (MACE) in which the target reflectance spectra are instead converted into sensor-reaching radiance using physics-based models. For SACE, known illumination and atmospheric conditions are incorporated in a single atmospheric model. For MACE the conditions are unknown so the algorithm uses many atmospheric models to cover the range of environmental variability, and it approximates the result using a subspace model. This approach is sometimes called the invariant method, and requires the choice of a subspace dimension for the model. We compare these two radiance-domain approaches to a Reflectance-domain ACE (RACE) approach on a HYDICE image featuring concealed materials. All three algorithms use the ACE detector, and all three techniques are able to detect most of the hidden materials in the imagery. For MACE we observe a strong dependence on the choice of the material subspace dimension. Increasing this value can lead to a decline in performance.
Terahertz parametric sources and imaging applications
NASA Astrophysics Data System (ADS)
Yamashita, M.; Ogawa, Y.; Otani, C.; Kawase, K.
2005-12-01
We have studied the generation of terahertz (THz) waves by optical parametric processes based on laser light scattering from the polariton mode of nonlinear crystals. Using parametric oscillation of LiNbO 3 or MgO-doped LiNbO 3 crystal pumped by a nano-second Q-switched Nd:YAG laser, we have realized a widely tunable coherent THz-wave sources with a simple configuration. We report the detailed characteristics of the oscillation and the radiation including tunability, spatial and temporal coherency, uni directivity, and efficiency. A Fourier transform limited THz-wave spectrum narrowing was achieved by introducing the injection seeding method. Further, we have developed a spectroscopic THz imaging system using a TPO, which allows detection and identification of drugs concealed in envelopes, by introducing the component spatial pattern analysis. Several images of the envelope are recorded at different THz frequencies and then processed. The final result is an image that reveals what substances are present in the envelope, in what quantity, and how they are distributed across the envelope area. The example presented here shows the identification of three drugs, two of which illegal, while one is an over-the-counter drug.
Terahertz parametric sources and imaging applications
NASA Astrophysics Data System (ADS)
Kawase, Kodo; Ogawa, Yuichi; Minamide, Hiroaki; Ito, Hiromasa
2005-07-01
We have studied the generation of terahertz (THz) waves by optical parametric processes based on laser light scattering from the polariton mode of nonlinear crystals. Using parametric oscillation of LiNbO3 or MgO-doped LiNbO3 crystal pumped by a nano-second Q-switched Nd:YAG laser, we have realized a widely tunable coherent THz-wave source with a simple configuration. We report the detailed characteristics of the oscillation and the radiation including tunability, spatial and temporal coherency, uni-directivity, and efficiency. A Fourier transform limited THz-wave spectrum narrowing was achieved by introducing the injection seeding method. Further, we have developed a spectroscopic THz imaging system using a THz-wave parametric oscillator, which allows detection and identification of drugs concealed in envelopes, by introducing the component spatial pattern analysis. Several images of the envelope are recorded at different THz frequencies and then processed. The final result is an image that reveals what substances are present in the envelope, in what quantity, and how they are distributed across the envelope area. The example presented here shows the identification of three drugs, two of which are illegal, while one is an over-the-counter drug.
36 CFR 2.4 - Weapons, traps and nets.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 36 Parks, Forests, and Public Property 1 2011-07-01 2011-07-01 false Weapons, traps and nets. 2.4... PROTECTION, PUBLIC USE AND RECREATION § 2.4 Weapons, traps and nets. (a)(1) Except as otherwise provided in... prohibited: (i) Possessing a weapon, trap or net (ii) Carrying a weapon, trap or net (iii) Using a weapon...
36 CFR 2.4 - Weapons, traps and nets.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 36 Parks, Forests, and Public Property 1 2012-07-01 2012-07-01 false Weapons, traps and nets. 2.4... PROTECTION, PUBLIC USE AND RECREATION § 2.4 Weapons, traps and nets. (a)(1) Except as otherwise provided in... prohibited: (i) Possessing a weapon, trap or net (ii) Carrying a weapon, trap or net (iii) Using a weapon...
36 CFR 2.4 - Weapons, traps and nets.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 36 Parks, Forests, and Public Property 1 2013-07-01 2013-07-01 false Weapons, traps and nets. 2.4... PROTECTION, PUBLIC USE AND RECREATION § 2.4 Weapons, traps and nets. (a)(1) Except as otherwise provided in... prohibited: (i) Possessing a weapon, trap or net (ii) Carrying a weapon, trap or net (iii) Using a weapon...
36 CFR 2.4 - Weapons, traps and nets.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 36 Parks, Forests, and Public Property 1 2014-07-01 2014-07-01 false Weapons, traps and nets. 2.4... PROTECTION, PUBLIC USE AND RECREATION § 2.4 Weapons, traps and nets. (a)(1) Except as otherwise provided in... prohibited: (i) Possessing a weapon, trap or net (ii) Carrying a weapon, trap or net (iii) Using a weapon...
36 CFR 2.4 - Weapons, traps and nets.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 36 Parks, Forests, and Public Property 1 2010-07-01 2010-07-01 false Weapons, traps and nets. 2.4... PROTECTION, PUBLIC USE AND RECREATION § 2.4 Weapons, traps and nets. (a)(1) Except as otherwise provided in... prohibited: (i) Possessing a weapon, trap or net (ii) Carrying a weapon, trap or net (iii) Using a weapon...
Benjamin, Arlin James; Bushman, Brad J
2018-02-01
In some societies, weapons are plentiful and highly visible. This review examines recent trends in research on the weapons effect, which is the finding that the mere presence of weapons can prime people to behave aggressively. The General Aggression Model provides a theoretical framework to explain why the weapons effect occurs. This model postulates that exposure to weapons increases aggressive thoughts and hostile appraisals, thus explaining why weapons facilitate aggressive behavior. Data from meta-analytic reviews are consistent with the General Aggression Model. These findings have important practical as well as theoretical implications. They suggest that the link between weapons and aggression is very strong in semantic memory, and that merely seeing a weapon can make people more aggressive. Copyright © 2017 Elsevier Ltd. All rights reserved.
Correlates of weapon carrying in school among adolescents in three countries.
Stickley, Andrew; Koyanagi, Ai; Koposov, Roman; Blatný, Marek; Hrdlička, Michal; Schwab-Stone, Mary; Ruchkin, Vladislav
2015-01-01
To determine the factors associated with weapon carrying in school among Czech, Russian, and US adolescents. Logistic regression was used to analyze data drawn from the Social and Health Assessment (SAHA). Violent behavior (perpetration / victimization) was linked to adolescent weapon carrying in all countries. Substance use was associated with weapon carrying among boys in all countries. Greater parental warmth reduced the odds for weapon carrying among Czech and Russian adolescents. Associating with delinquent peers was important for weapon carrying only among US adolescents. Factors associated with weapon carrying in school vary among countries although violent behavior and substance use may be associated with weapon carrying across countries.
Analyses of battle casualties by weapon type aboard U.S. Navy warships.
Blood, C G
1992-03-01
The number of casualties was determined for 513 incidents involving U.S. Navy warships sunk or damaged during World War II. Ship type and weapon were significant factors in determining the numbers of wounded and killed. Multiple weapon attacks and kamikazes yielded more wounded in action than other weapon types. Multiple weapons and torpedos resulted in a higher incidence of killed in action than other weapons. Penetrating wounds and burns were the most prominent injury types. Kamikaze attacks yielded significantly more burns than incidents involving bombs, gunfire, torpedos, mines, and multiple weapons. Mine explosions were responsible for more strains, sprains, and dislocations than the other weapon types.
ERIC Educational Resources Information Center
Schrimshaw, Eric W.; Siegel, Karolynn; Downing, Martin J., Jr.; Parsons, Jeffrey T.
2013-01-01
Objective: Although bisexual men report lower levels of mental health relative to gay men, few studies have examined the factors that contribute to bisexual men's mental health. Bisexual men are less likely to disclose, and more likely to conceal (i.e., a desire to hide), their sexual orientation than gay men. Theory suggests that this may…
ERIC Educational Resources Information Center
McKenna-Buchanan, Tim; Munz, Stevie; Rudnick, Justin
2015-01-01
Lesbian, gay, and queer (LGQ) teachers often deal with the tension between disclosing and concealing their sexual orientations in the college classroom. This article presents the results of a qualitative interview study with 29 self-identified LGQ college teachers about their choices to disclose or conceal their sexual identities. Using…
ERIC Educational Resources Information Center
Dogan, Ugur; Çolak, Tugba Seda
2016-01-01
This study was tested a model for explain to social networks sites (SNS) usage with structural equation modeling (SEM). Using SEM on a sample of 475 high school students (35% male, 65% female) students, model was investigated the relationship between self-concealment, social appearance anxiety, loneliness on SNS such as Twitter and Facebook usage.…
Dijkstra, Jan Kornelis; Gest, Scott D; Lindenberg, Siegwart; Veenstra, René; Cillessen, Antonius H N
2012-04-01
To examine the relative contribution of weapon carrying of peers, aggression, and victimization to weapon carrying of male and female adolescents over time. Data were derived from a population-based sample of male (N = 224) and female (N = 244) adolescents followed from grade 10 (M age = 15.5) to grade 11 (M age = 16.5). Peer networks were derived from best friend nominations. Self-reports were used to assess weapon carrying. Aggression and victimization were assessed using both self- and peer-reports. Use of dynamic social network modeling (SIENA) allowed prediction of weapon carrying in grade 11 as a function of weapon carrying of befriended peers, aggression, and victimization in grade 10, while selection processes and structural network effects (reciprocity and transitivity) were controlled for. Peer influence processes accounted for changes in weapon carrying over time. Self-reported victimization decreased weapon carrying 1 year later. Peer-reported victimization increased the likelihood of weapon carrying, particularly for highly aggressive adolescents. Boys were more likely to carry weapons than girls, but the processes associated with weapon carrying did not differ for boys and girls. These findings revealed that, in this population-based sample, weapon carrying of best friends, as well as aggression, contributed to the proliferation of weapons in friendship networks, suggesting processes of peer contagion as well as individual vulnerability to weapon carrying. Copyright © 2012 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.
Weapon carrying and psychopathic-like features in a population-based sample of Finnish adolescents.
Saukkonen, Suvi; Laajasalo, Taina; Jokela, Markus; Kivivuori, Janne; Salmi, Venla; Aronen, Eeva T
2016-02-01
We investigated the prevalence of juvenile weapon carrying and psychosocial and personality-related risk factors for carrying different types of weapons in a nationally representative, population-based sample of Finnish adolescents. Specifically, we aimed to investigate psychopathic-like personality features as a risk factor for weapon carrying. The participants were 15-16-year-old adolescents from the Finnish self-report delinquency study (n = 4855). Four different groups were formed based on self-reported weapon carrying: no weapon carrying, carrying knife, gun or other weapon. The associations between psychosocial factors, psychopathic-like features and weapon carrying were examined with multinomial logistic regression analysis. 9% of the participants had carried a weapon in the past 12 months. Adolescents with a history of delinquency, victimization and antisocial friends were more likely to carry weapons in general; however, delinquency and victimization were most strongly related to gun carrying, while perceived peer delinquency (antisocial friends) was most strongly related to carrying a knife. Better academic performance was associated with a reduced likelihood of carrying a gun and knife, while feeling secure correlated with a reduced likelihood of gun carrying only. Psychopathic-like features were related to a higher likelihood of weapon carrying, even after adjusting for other risk factors. The findings of the study suggest that adolescents carrying a weapon have a large cluster of problems in their lives, which may vary based on the type of weapon carried. Furthermore, psychopathic-like features strongly relate to a higher risk of carrying a weapon.
Wallace, Lacey N.
2017-01-01
Prior research has found that persistently delinquent youth or more violent youth were less popular than their less delinquent peers (Young, 2013). However, recent research has also found that weapon carrying is associated with being more popular in adolescence (Dijkstra et al., 2010). The present paper examines the perceived popularity of adolescents who carry weapons in comparison to those who both carry and use weapons in acts of violence or threatened violence. Data consist of two waves from the National Longitudinal Study of Adolescent to Adult Health. Analyses use OLS regression with lagged predictors. This paper found no differences in number of friends between weapon carriers and weapon users. However, among both male and female gang members, those who did not use or carry weapons (abstainers) named significantly fewer friends than weapon users. Among females, weapon abstainers both named and were named by significantly more people than weapon users. These differences were not observed for males. Implications of these results and directions for future research are discussed. PMID:29104446
Air gun wounding and current UK laws controlling air weapons.
Bruce-Chwatt, Robert Michael
2010-04-01
Air weapons whether rifles or pistols are, potentially, lethal weapons. The UK legislation is complex and yet little known to the public. Hunting with air weapons and the laws controlling those animals that are permitted to be shot with air weapons is even more labyrinthine due to the legal power limitations on the possession of air weapons. Still relatively freely available by mail order or on the Internet, an increasing number of deaths have been reported from the misuse of air weapons or accidental discharges. Ammunition for air weapons has become increasingly sophisticated, effective and therefore increasingly dangerous if misused, though freely available being a mere projectile without a concomitant cartridge containing a propellant and an initiator.
Benjamin, Arlin J; Kepes, Sven; Bushman, Brad J
2017-09-01
Guns are associated with aggression. A landmark 1967 study showed that simply seeing a gun can increase aggression-called the "weapons effect." This meta-analysis integrates the findings of weapons effect studies conducted from 1967 to 2017. It includes 162 effect-size estimates from 78 independent studies involving 7,668 participants. The theoretical framework used to explain the weapons effect was the General Aggression Model (GAM), which proposes three routes to aggression-cognitive, affective, and arousal. The GAM also proposes that hostile appraisals can facilitate aggression. As predicted by the GAM, the mere presence of weapons increased aggressive thoughts, hostile appraisals, and aggression, suggesting a cognitive route from weapons to aggression. Weapons did not significantly increase angry feelings. Only one study tested the effects of weapons on arousal. These findings also contribute to the debate about social priming by showing that incidental exposure to a stimulus (weapon) can affect subsequent related behavior (aggression).
Holographic radar imaging privacy techniques utilizing dual-frequency implementation
NASA Astrophysics Data System (ADS)
McMakin, Douglas L.; Hall, Thomas E.; Sheen, David M.
2008-04-01
Over the last 15 years, the Pacific Northwest National Laboratory has performed significant research and development activities to enhance the state of the art of holographic radar imaging systems to be used at security checkpoints for screening people for concealed threats hidden under their garments. These enhancement activities included improvements to privacy techniques to remove human features and providing automatic detection of body-worn concealed threats. The enhanced privacy and detection methods used both physical and software imaging techniques. The physical imaging techniques included polarization-diversity illumination and reception, dual-frequency implementation, and high-frequency imaging at 60 GHz. Software imaging techniques to enhance the privacy of the person under surveillance included extracting concealed threat artifacts from the imagery to automatically detect the threat. This paper will focus on physical privacy techniques using dual-frequency implementation.
Liu, Huijie; Li, Nianqiang; Zhao, Qingchun
2015-05-10
Optical chaos generated by chaotic lasers has been widely used in several important applications, such as chaos-based communications and high-speed random-number generators. However, these applications are susceptible to degradation by the presence of time-delay (TD) signature identified from the chaotic output. Here we propose to achieve the concealment of TD signature, along with the enhancement of chaos bandwidth, in three-cascaded vertical-cavity surface-emitting lasers (VCSELs). The cascaded system is composed of an external-cavity master VCSEL, a solitary intermediate VCSEL, and a solitary slave VCSEL. Through mapping the evolutions of TD signature and chaos bandwidth in the parameter space of the injection strength and frequency detuning, photonic generation of polarization-resolved wideband chaos with TD concealment is numerically demonstrated for wide regions of the injection parameters.
Holographic Radar Imaging Privacy Techniques Utilizing Dual-Frequency Implementation
DOE Office of Scientific and Technical Information (OSTI.GOV)
McMakin, Douglas L.; Hall, Thomas E.; Sheen, David M.
2008-04-18
Over the last 15 years, the Pacific Northwest National Laboratory has performed significant research and development activities to enhance the state of the art of holographic radar imaging systems to be used at security checkpoints for screening people for concealed threats hidden under their garments. These enhancement activities included improvements to privacy techniques to remove human features and providing automatic detection of body-worn concealed threats. The enhanced privacy and detection methods used both physical and software imaging techniques. The physical imaging techniques included polarization-diversity illumination and reception, dual-frequency implementation, and high-frequency imaging at 60 GHz. Software imaging techniques to enhancemore » the privacy of the person under surveillance included extracting concealed threat artifacts from the imagery to automatically detect the threat. This paper will focus on physical privacy techniques using dual-frequency implementation.« less
How Men Manage Bulbar Urethral Stricture by Concealing Urinary Symptoms.
Whybrow, Paul; Rapley, Tim; Pickard, Robert; Hrisos, Susan
2015-10-01
In this article, we present findings from research conducted as part of a multi-center surgical trial. Bulbar urethral stricture, a narrowing of the middle urethra, is a common cause of urinary problems in men that can have a profound impact on their lives. Semi-structured interviews were conducted with a sample of 19 men seeking treatment for urethral stricture. The findings reveal how men tend to develop routines and tactics to adapt to their symptoms and hide them from others rather than seek help. We argue that this concealment becomes an inseparable part of how the disease is managed and is an additional hidden practical and emotional burden for these men. In addition, we suggest that the patients only sought curative treatments once practices of social concealment are no longer viable. © The Author(s) 2015.
Induction detection of concealed bulk banknotes
NASA Astrophysics Data System (ADS)
Fuller, Christopher; Chen, Antao
2012-06-01
The smuggling of bulk cash across borders is a serious issue that has increased in recent years. In an effort to curb the illegal transport of large numbers of paper bills, a detection scheme has been developed, based on the magnetic characteristics of bank notes. The results show that volumes of paper currency can be detected through common concealing materials such as plastics, cardboard, and fabrics making it a possible potential addition to border security methods. The detection scheme holds the potential of also reducing or eliminating false positives caused by metallic materials found in the vicinity, by observing the stark difference in received signals caused by metal and currency. The detection scheme holds the potential to detect for both the presence and number of concealed bulk notes, while maintaining the ability to reduce false positives caused by metal objects.
Design of a steganographic virtual operating system
NASA Astrophysics Data System (ADS)
Ashendorf, Elan; Craver, Scott
2015-03-01
A steganographic file system is a secure file system whose very existence on a disk is concealed. Customarily, these systems hide an encrypted volume within unused disk blocks, slack space, or atop conventional encrypted volumes. These file systems are far from undetectable, however: aside from their ciphertext footprint, they require a software or driver installation whose presence can attract attention and then targeted surveillance. We describe a new steganographic operating environment that requires no visible software installation, launching instead from a concealed bootstrap program that can be extracted and invoked with a chain of common Unix commands. Our system conceals its payload within innocuous files that typically contain high-entropy data, producing a footprint that is far less conspicuous than existing methods. The system uses a local web server to provide a file system, user interface and applications through a web architecture.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Paul, J. N.; Chin, M. R.; Sjoden, G. E.
2013-07-01
A mobile 'drive by' passive radiation detection system to be applied in special nuclear materials (SNM) storage facilities for validation and compliance purposes has been designed through the use of computational modeling and new radiation detection methods. This project was the result of work over a 1 year period to create optimal design specifications to include creation of 3D models using both Monte Carlo and deterministic codes to characterize the gamma and neutron leakage out each surface of SNM-bearing canisters. Results were compared and agreement was demonstrated between both models. Container leakages were then used to determine the expected reactionmore » rates using transport theory in the detectors when placed at varying distances from the can. A 'typical' background signature was incorporated to determine the minimum signatures versus the probability of detection to evaluate moving source protocols with collimation. This established the criteria for verification of source presence and time gating at a given vehicle speed. New methods for the passive detection of SNM were employed and shown to give reliable identification of age and material for highly enriched uranium (HEU) and weapons grade plutonium (WGPu). The finalized 'Mobile Pit Verification System' (MPVS) design demonstrated that a 'drive-by' detection system, collimated and operating at nominally 2 mph, is capable of rapidly verifying each and every weapon pit stored in regularly spaced, shelved storage containers, using completely passive gamma and neutron signatures for HEU and WGPu. This system is ready for real evaluation to demonstrate passive total material accountability in storage facilities. (authors)« less
NASA Astrophysics Data System (ADS)
Brubaker, Kathryne M.
1998-08-01
This paper addresses sensor fusion and its applications in emerging Soldier Systems integration and the unique challenges associated with the human platform. Technology that,provides the highest operational payoff in a lightweight warrior system must not only have enhanced capabilities, but have low power components resulting in order of magnitude reductions coupled with significant cost reductions. These reductions in power and cost will be achieved through partnership with industry and leveraging of commercial state of the art advancements in microelectronics and power sources. As new generation of full solution fire control systems (to include temperature, wind and range sensors) and target acquisition systems will accompany a new generation of individual combat weapons and upgrade existing weapon systems. Advanced lightweight thermal, IR, laser and video senors will be used for surveillance, target acquisition, imaging and combat identification applications. Multifunctional sensors will provide embedded training features in combat configurations allowing the soldier to 'train as he fights' without the traditional cost and weight penalties associated with separate systems. Personal status monitors (detecting pulse, respiration rate, muscle fatigue, core temperature, etc.) will provide commanders and highest echelons instantaneous medical data. Seamless integration of GPS and dead reckoning (compass and pedometer) and/or inertial sensors will aid navigation and increase position accuracy. Improved sensors and processing capability will provide earlier detection of battlefield hazards such as mines, enemy lasers and NBC (nuclear, biological, chemical) agents. Via the digitized network the situational awareness database will automatically be updated with weapon, medical, position and battlefield hazard data. Soldier Systems Sensor Fusion will ultimately establish each individual soldier as an individual sensor on the battlefield.
32 CFR 552.104 - Disposition of confiscated/seized weapons.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 3 2014-07-01 2014-07-01 false Disposition of confiscated/seized weapons. 552... RESERVATIONS AND NATIONAL CEMETERIES REGULATIONS AFFECTING MILITARY RESERVATIONS Firearms and Weapons § 552.104 Disposition of confiscated/seized weapons. All weapons, ammunition, explosives or other devices defined in...
32 CFR 552.104 - Disposition of confiscated/seized weapons.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 3 2013-07-01 2013-07-01 false Disposition of confiscated/seized weapons. 552... RESERVATIONS AND NATIONAL CEMETERIES REGULATIONS AFFECTING MILITARY RESERVATIONS Firearms and Weapons § 552.104 Disposition of confiscated/seized weapons. All weapons, ammunition, explosives or other devices defined in...
32 CFR 552.104 - Disposition of confiscated/seized weapons.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 3 2010-07-01 2010-07-01 true Disposition of confiscated/seized weapons. 552... RESERVATIONS AND NATIONAL CEMETERIES REGULATIONS AFFECTING MILITARY RESERVATIONS Firearms and Weapons § 552.104 Disposition of confiscated/seized weapons. All weapons, ammunition, explosives or other devices defined in...
32 CFR 552.104 - Disposition of confiscated/seized weapons.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 3 2012-07-01 2009-07-01 true Disposition of confiscated/seized weapons. 552... RESERVATIONS AND NATIONAL CEMETERIES REGULATIONS AFFECTING MILITARY RESERVATIONS Firearms and Weapons § 552.104 Disposition of confiscated/seized weapons. All weapons, ammunition, explosives or other devices defined in...
32 CFR 552.104 - Disposition of confiscated/seized weapons.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 3 2011-07-01 2009-07-01 true Disposition of confiscated/seized weapons. 552... RESERVATIONS AND NATIONAL CEMETERIES REGULATIONS AFFECTING MILITARY RESERVATIONS Firearms and Weapons § 552.104 Disposition of confiscated/seized weapons. All weapons, ammunition, explosives or other devices defined in...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-01
... Request; Chemical Weapons Convention Declaration and Report Handbook and Forms AGENCY: Bureau of Industry.... Abstract The Chemical Weapons Convention Implementation Act of 1998 and Commerce Chemical Weapons... Chemical Weapons Convention (CWC), an international arms control treaty. II. Method of Collection Submitted...
Duband, Sébastien; Govin, Alexandre; Dumollard, Jean-Marc; Forest, Fabien; Basset, Thierry; Péoc'h, Michel
2012-01-10
Forensic pathologists are sometimes confronted with microscopic foreign bodies mixed in with soft tissues surrounding wounds and which are thus difficult to identify. This identification, however, could be primordial in investigating a crime and in determining the weapon used. A case of a fatal respiratory distress syndrome due to conjoining suicidal drug intoxication and laryngeal obstruction by a voluminous foreign body giant cell granuloma is presented. The classical histological examination showed exogenous particles in the vocal cord tumor with birefringent qualities. Their analysis with Fourier-Transform infrared (FTIR) spectrometry coupled with infrared microscope allows the determination of their chemical nature as polytetrafluoroethylene and to the diagnosis of teflonoma. This case report put the emphasis on the forensic interest of the FTIR imaging. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.
Rapid Detection and Identification of a Pathogen's DNA Using Phi29 DNA Polymerase
DOE Office of Scientific and Technical Information (OSTI.GOV)
Xu, Y.; Dunn, J.; Gao, S.
2008-10-31
Zoonotic pathogens including those transmitted by insect vectors are some of the most deadly of all infectious diseases known to mankind. A number of these agents have been further weaponized and are widely recognized as being potentially significant biothreat agents. We describe a novel method based on multiply-primed rolling circle in vitro amplification for profiling genomic DNAs to permit rapid, cultivation-free differential detection and identification of circular plasmids in infectious agents. Using Phi29 DNA polymerase and a two-step priming reaction we could reproducibly detect and characterize by DNA sequencing circular DNA from Borrelia burgdorferi B31 in DNA samples containing asmore » little as 25 pg of Borrelia DNA amongst a vast excess of human DNA. This simple technology can ultimately be adapted as a sensitive method to detect specific DNA from both known and unknown pathogens in a wide variety of complex environments.« less
ERIC Educational Resources Information Center
Bathje, Geoff J.; Kim, Eunha; Rau, Ellen; Bassiouny, Muhammad Adam; Kim, Taehoon
2014-01-01
This study examined attitudes toward face-to-face (f2f) and online counseling among 228 Korean college students. In addition, it tested a hypothesized model proposing that general propensities (i.e., self-concealment, openness to experience, and loss of face) would influence counseling-specific expectations (i.e., self-stigma and disclosure…
Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects' Information
Ho, Peng Foong; Kam, Yvonne Hwei-Syn; Wee, Mee Chin
2014-01-01
Traditionally, picture-based password systems employ password objects (pictures/icons/symbols) as input during an authentication session, thus making them vulnerable to “shoulder-surfing” attack because the visual interface by function is easily observed by others. Recent software-based approaches attempt to minimize this threat by requiring users to enter their passwords indirectly by performing certain mental tasks to derive the indirect password, thus concealing the user's actual password. However, weaknesses in the positioning of distracter and password objects introduce usability and security issues. In this paper, a new method, which conceals information about the password objects as much as possible, is proposed. Besides concealing the password objects and the number of password objects, the proposed method allows both password and distracter objects to be used as the challenge set's input. The correctly entered password appears to be random and can only be derived with the knowledge of the full set of password objects. Therefore, it would be difficult for a shoulder-surfing adversary to identify the user's actual password. Simulation results indicate that the correct input object and its location are random for each challenge set, thus preventing frequency of occurrence analysis attack. User study results show that the proposed method is able to prevent shoulder-surfing attack. PMID:24991649
Dietrich, Ariana B; Hu, Xiaoqing; Rosenfeld, J Peter
2014-03-01
In the first of two experiments, we compared the accuracy of the P300 concealed information test protocol as a function of numbers of trials experienced by subjects and ERP averages analyzed by investigators. Contrary to Farwell et al. (Cogn Neurodyn 6(2):115-154, 2012), we found no evidence that 100 trial based averages are more accurate than 66 or 33 trial based averages (all numbers led to accuracies of 84-94 %). There was actually a trend favoring the lowest trial numbers. The second study compared numbers of irrelevant stimuli recalled and recognized in the 3-stimulus protocol versus the complex trial protocol (Rosenfeld in Memory detection: theory and application of the concealed information test, Cambridge University Press, New York, pp 63-89, 2011). Again, in contrast to expectations from Farwell et al. (Cogn Neurodyn 6(2):115-154, 2012), there were no differences between protocols, although there were more irrelevant stimuli recognized than recalled, and irrelevant 4-digit number group stimuli were neither recalled nor recognized as well as irrelevant city name stimuli. We therefore conclude that stimulus processing in the P300-based complex trial protocol-with no more than 33 sweep averages-is adequate to allow accurate detection of concealed information.
Gu, Jing; Wang, Qi; Wang, Xiaogang; Li, Hailong; Gu, Mei; Ming, Haixia; Dong, Xiaoli; Yang, Kehu; Wu, Hongyan
2014-01-01
Background. This review provides the first methodological information assessment of protocol of acupuncture RCTs registered in WHO International Clinical Trials Registry Platform (ICTRP). Methods. All records of acupuncture RCTs registered in the ICTRP have been collected. The methodological design assessment involved whether the randomization methods, allocation concealment, and blinding were adequate or not based on the information of registration records (protocols of acupuncture RCTs). Results. A total of 453 records, found in 11 registries, were examined. Methodological details were insufficient in registration records; there were 76.4%, 89.0%, and 21.4% records that did not provide information on randomization methods, allocation concealment, and blinding respectively. The proportions of adequate randomization methods, allocation concealment, and blinding were only 107 (23.6%), 48 (10.6%), and 210 (46.4%), respectively. The methodological design improved year by year, especially after 2007. Additionally, methodology of RCTs with ethics approval was clearly superior to those without ethics approval and different among registries. Conclusions. The overall methodological design based on registration records of acupuncture RCTs is not very well but improved year by year. The insufficient information on randomization methods, allocation concealment, and blinding maybe due to the relevant description is not taken seriously in acupuncture RCTs' registration. PMID:24688591
Gu, Jing; Wang, Qi; Wang, Xiaogang; Li, Hailong; Gu, Mei; Ming, Haixia; Dong, Xiaoli; Yang, Kehu; Wu, Hongyan
2014-01-01
Background. This review provides the first methodological information assessment of protocol of acupuncture RCTs registered in WHO International Clinical Trials Registry Platform (ICTRP). Methods. All records of acupuncture RCTs registered in the ICTRP have been collected. The methodological design assessment involved whether the randomization methods, allocation concealment, and blinding were adequate or not based on the information of registration records (protocols of acupuncture RCTs). Results. A total of 453 records, found in 11 registries, were examined. Methodological details were insufficient in registration records; there were 76.4%, 89.0%, and 21.4% records that did not provide information on randomization methods, allocation concealment, and blinding respectively. The proportions of adequate randomization methods, allocation concealment, and blinding were only 107 (23.6%), 48 (10.6%), and 210 (46.4%), respectively. The methodological design improved year by year, especially after 2007. Additionally, methodology of RCTs with ethics approval was clearly superior to those without ethics approval and different among registries. Conclusions. The overall methodological design based on registration records of acupuncture RCTs is not very well but improved year by year. The insufficient information on randomization methods, allocation concealment, and blinding maybe due to the relevant description is not taken seriously in acupuncture RCTs' registration.
Krajčovič, Jozef; Janík, Martin; Novomeský, František; Straka, Lubomír; Hejna, Petr
2014-11-01
In forensic assessment, denial and concealment of pregnancy has wide-ranging implications including criminal abortions, extramural deliveries, concealment of birth, newborn infant abandonment or even neonaticide. Clarification of whether a newborn was born alive is the most important factor when evaluating an abandoned neonate or concealment of birth. Other points that need to be addressed are determination of viability and maturity of the newborn infant, and the identity of the mother. A prolonged postmortem interval following illegal disposal of a dead body often leads to advanced decomposition, making postmortem elucidation difficult. We report an exceptionally uncommon autopsy case of a well-preserved female newborn, which was accidentally found after eight years in a home freezer. Despite the prolonged postmortem interval, tissue preservation was sufficient for a meaningful autopsy including a comprehensive histopathological study. The purpose of the present investigations was to expand our understanding of thanatological processes, as well as detectability of particular histological findings on the remains of a newborn after extremely prolonged storage in an artificially frozen environment. In addition, this article discusses forensically important issues regarding concealment of newborn infant under specific conditions. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.
Concealed neuroanatomy in Michelangelo's Separation of Light From Darkness in the Sistine Chapel.
Suk, Ian; Tamargo, Rafael J
2010-05-01
Michelangelo Buonarroti (1475-1564) was a master anatomist as well as an artistic genius. He dissected cadavers numerous times and developed a profound understanding of human anatomy. From 1508 to 1512, Michelangelo painted the ceiling of the Sistine Chapel in Rome. His Sistine Chapel frescoes are considered one of the monumental achievements of Renaissance art. In the winter of 1511, Michelangelo entered the final stages of the Sistine Chapel project and painted 4 frescoes along the longitudinal apex of the vault, which completed a series of 9 central panels depicting scenes from the Book of Genesis. It is reported that Michelangelo concealed an image of the brain in the first of these last 4 panels, namely, the Creation of Adam. Here we present evidence that he concealed another neuronanatomic structure in the final panel of this series, the Separation of Light From Darkness, specifically a ventral view of the brainstem. The Separation of Light From Darkness is an important panel in the Sistine Chapel iconography because it depicts the beginning of Creation and is located directly above the altar. We propose that Michelangelo, a deeply religious man and an accomplished anatomist, intended to enhance the meaning of this iconographically critical panel and possibly document his anatomic accomplishments by concealing this sophisticated neuroanatomic rendering within the image of God.
Magsamen-Conrad, Kate; Billotte-Verhoff, China; Greene, Kathryn
2014-11-01
This research examines the effect of online social capital and Internet use on the normally negative effects of technology addiction, especially for individuals prone to self-concealment. Self-concealment is a personality trait that describes individuals who are more likely to withhold personal and private information, inhibiting catharsis and wellbeing. Addiction, in any context, is also typically associated with negative outcomes. However, we investigate the hypothesis that communication technology addiction may positively affect wellbeing for self-concealing individuals when online interaction is positive, builds relationships, or fosters a sense of community. Within these parameters, increased communication through mediated channels (and even addiction) may reverse the otherwise negative effects of self-concealment on wellbeing. Overall, the proposed model offers qualified support for the continued analysis of mediated communication as a potential source for improving the wellbeing for particular individuals. This study is important because we know that healthy communication in relationships, including disclosure, is important to wellbeing. This study recognizes that not all people are comfortable communicating in face-to-face settings. Our findings offer evidence that the presence of computers in human behaviors (e.g., mediated channels of communication and NCTs) enables some individuals to communicate and fos ter beneficial interpersonal relationships, and improve their wellbeing.
Magsamen-Conrad, Kate; Billotte-Verhoff, China; Greene, Kathryn
2014-01-01
This research examines the effect of online social capital and Internet use on the normally negative effects of technology addiction, especially for individuals prone to self-concealment. Self-concealment is a personality trait that describes individuals who are more likely to withhold personal and private information, inhibiting catharsis and wellbeing. Addiction, in any context, is also typically associated with negative outcomes. However, we investigate the hypothesis that communication technology addiction may positively affect wellbeing for self-concealing individuals when online interaction is positive, builds relationships, or fosters a sense of community. Within these parameters, increased communication through mediated channels (and even addiction) may reverse the otherwise negative effects of self-concealment on wellbeing. Overall, the proposed model offers qualified support for the continued analysis of mediated communication as a potential source for improving the wellbeing for particular individuals. This study is important because we know that healthy communication in relationships, including disclosure, is important to wellbeing. This study recognizes that not all people are comfortable communicating in face-to-face settings. Our findings offer evidence that the presence of computers in human behaviors (e.g., mediated channels of communication and NCTs) enables some individuals to communicate and fos ter beneficial interpersonal relationships, and improve their wellbeing. PMID:25568591
Modeling human target acquisition in ground-to-air weapon systems
NASA Technical Reports Server (NTRS)
Phatak, A. V.; Mohr, R. L.; Vikmanis, M.; Wei, K. C.
1982-01-01
The problems associated with formulating and validating mathematical models for describing and predicting human target acquisition response are considered. In particular, the extension of the human observer model to include the acquisition phase as well as the tracking segment is presented. Relationship of the Observer model structure to the more complex Standard Optimal Control model formulation and to the simpler Transfer Function/Noise representation is discussed. Problems pertinent to structural identifiability and the form of the parameterization are elucidated. A systematic approach toward the identification of the observer acquisition model parameters from ensemble tracking error data is presented.
Code of Federal Regulations, 2010 CFR
2010-01-01
... weapons, explosives, or other dangerous materials. 1204.1005 Section 1204.1005 Aeronautics and Space... Weapons or Dangerous Materials § 1204.1005 Unauthorized introduction of firearms or weapons, explosives... or causing to be introduced, or using firearms or other dangerous weapons, explosives or other...
Code of Federal Regulations, 2013 CFR
2013-01-01
... weapons, explosives, or other dangerous materials. 1204.1005 Section 1204.1005 Aeronautics and Space... Weapons or Dangerous Materials § 1204.1005 Unauthorized introduction of firearms or weapons, explosives... or causing to be introduced, or using firearms or other dangerous weapons, explosives or other...
3 CFR - Continuation of the National Emergency With Respect to Weapons of Mass Destruction
Code of Federal Regulations, 2012 CFR
2012-01-01
... to Weapons of Mass Destruction Presidential Documents Other Presidential Documents Notice of November 9, 2011 Continuation of the National Emergency With Respect to Weapons of Mass Destruction On... United States posed by the proliferation of nuclear, biological, and chemical weapons (weapons of mass...
Code of Federal Regulations, 2012 CFR
2012-01-01
... weapons, explosives, or other dangerous materials. 1204.1005 Section 1204.1005 Aeronautics and Space... Weapons or Dangerous Materials § 1204.1005 Unauthorized introduction of firearms or weapons, explosives... or causing to be introduced, or using firearms or other dangerous weapons, explosives or other...
32 CFR 552.130 - Disposition of confiscated/seized weapons.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 3 2011-07-01 2009-07-01 true Disposition of confiscated/seized weapons. 552..., Ammunition and Other Dangerous Weapons on Fort Gordon § 552.130 Disposition of confiscated/seized weapons. All weapons, ammunition, explosives, or other devices defined in this subpart, that are confiscated...
3 CFR - Continuation of the National Emergency With Respect to Weapons of Mass Destruction
Code of Federal Regulations, 2013 CFR
2013-01-01
... to Weapons of Mass Destruction Presidential Documents Other Presidential Documents Notice of November 1, 2012 Continuation of the National Emergency With Respect to Weapons of Mass Destruction On... United States posed by the proliferation of nuclear, biological, and chemical weapons (weapons of mass...
48 CFR 217.173 - Multiyear contracts for weapon systems.
Code of Federal Regulations, 2010 CFR
2010-10-01
... weapon systems. 217.173 Section 217.173 Federal Acquisition Regulations System DEFENSE ACQUISITION... Mulityear Contracting 217.173 Multiyear contracts for weapon systems. As authorized by 10 U.S.C. 2306b(h... contract for— (a) A weapon system and associated items, services, and logistics support for a weapon system...
32 CFR 552.130 - Disposition of confiscated/seized weapons.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 3 2010-07-01 2010-07-01 true Disposition of confiscated/seized weapons. 552..., Ammunition and Other Dangerous Weapons on Fort Gordon § 552.130 Disposition of confiscated/seized weapons. All weapons, ammunition, explosives, or other devices defined in this subpart, that are confiscated...
32 CFR 552.130 - Disposition of confiscated/seized weapons.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 3 2013-07-01 2013-07-01 false Disposition of confiscated/seized weapons. 552..., Ammunition and Other Dangerous Weapons on Fort Gordon § 552.130 Disposition of confiscated/seized weapons. All weapons, ammunition, explosives, or other devices defined in this subpart, that are confiscated...
Code of Federal Regulations, 2011 CFR
2011-01-01
... weapons, explosives, or other dangerous materials. 1204.1005 Section 1204.1005 Aeronautics and Space... Weapons or Dangerous Materials § 1204.1005 Unauthorized introduction of firearms or weapons, explosives... or causing to be introduced, or using firearms or other dangerous weapons, explosives or other...
32 CFR 552.130 - Disposition of confiscated/seized weapons.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 3 2012-07-01 2009-07-01 true Disposition of confiscated/seized weapons. 552..., Ammunition and Other Dangerous Weapons on Fort Gordon § 552.130 Disposition of confiscated/seized weapons. All weapons, ammunition, explosives, or other devices defined in this subpart, that are confiscated...
32 CFR 552.130 - Disposition of confiscated/seized weapons.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 3 2014-07-01 2014-07-01 false Disposition of confiscated/seized weapons. 552..., Ammunition and Other Dangerous Weapons on Fort Gordon § 552.130 Disposition of confiscated/seized weapons. All weapons, ammunition, explosives, or other devices defined in this subpart, that are confiscated...
Nuclear Weapons: Comprehensive Test Ban Treaty
2007-07-12
done. Critics raised concerns about the implications of these policies for testing and new weapons. At present, Congress addresses nuclear weapon...future, but there are no plans to do so.’”7 Critics expressed concern about the implications of these policies for testing and new weapons. A statement by...opportunity to design and build new nuclear weapons, and abandon a ten-year-old moratorium on nuclear weapons testing.”8 Another critic felt that
Nuclear weapons modernizations
NASA Astrophysics Data System (ADS)
Kristensen, Hans M.
2014-05-01
This article reviews the nuclear weapons modernization programs underway in the world's nine nuclear weapons states. It concludes that despite significant reductions in overall weapons inventories since the end of the Cold War, the pace of reductions is slowing - four of the nuclear weapons states are even increasing their arsenals, and all the nuclear weapons states are busy modernizing their remaining arsenals in what appears to be a dynamic and counterproductive nuclear competition. The author questions whether perpetual modernization combined with no specific plan for the elimination of nuclear weapons is consistent with the nuclear Non-Proliferation Treaty and concludes that new limits on nuclear modernizations are needed.
15 CFR 742.18 - Chemical Weapons Convention (CWC or Convention).
Code of Federal Regulations, 2011 CFR
2011-01-01
... 15 Commerce and Foreign Trade 2 2011-01-01 2011-01-01 false Chemical Weapons Convention (CWC or... REGULATIONS CONTROL POLICY-CCL BASED CONTROLS § 742.18 Chemical Weapons Convention (CWC or Convention). States... Use of Chemical Weapons and on Their Destruction, also known as the Chemical Weapons Convention (CWC...
36 CFR 1002.4 - Weapons, traps and nets.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 36 Parks, Forests, and Public Property 3 2012-07-01 2012-07-01 false Weapons, traps and nets. 1002... AND RECREATION § 1002.4 Weapons, traps and nets. (a)(1) Except as otherwise provided in this section, the following are prohibited: (i) Possessing a weapon, trap or net. (ii) Carrying a weapon, trap or...
3 CFR - Continuation of Emergency With Respect to Weapons of Mass Destruction
Code of Federal Regulations, 2011 CFR
2011-01-01
... 3 The President 1 2011-01-01 2011-01-01 false Continuation of Emergency With Respect to Weapons of... Continuation of Emergency With Respect to Weapons of Mass Destruction On November 14, 1994, by Executive Order... of nuclear, biological, and chemical weapons (weapons of mass destruction) and the means of...
32 CFR 552.122 - Personnel not authorized to possess or retain personal weapons.
Code of Federal Regulations, 2012 CFR
2012-07-01
... personal weapons. 552.122 Section 552.122 National Defense Department of Defense (Continued) DEPARTMENT OF... authorized to possess or retain personal weapons. (a) Possession, retention or storage of personal weapons or... enforcement officer authorized to carry the weapon under state or federal law, while on Fort Lewis or a sub...
32 CFR 552.124 - Transportation of privately owned weapons and ammunition.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 3 2011-07-01 2009-07-01 true Transportation of privately owned weapons and... owned weapons and ammunition. (a) Privately owned firearms and ammunition will be transported in the following manner: (1) Weapons, other than weapons being transported into Fort Lewis for the first time, may...
32 CFR 552.124 - Transportation of privately owned weapons and ammunition.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 3 2012-07-01 2009-07-01 true Transportation of privately owned weapons and... owned weapons and ammunition. (a) Privately owned firearms and ammunition will be transported in the following manner: (1) Weapons, other than weapons being transported into Fort Lewis for the first time, may...
32 CFR 552.124 - Transportation of privately owned weapons and ammunition.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 3 2014-07-01 2014-07-01 false Transportation of privately owned weapons and... owned weapons and ammunition. (a) Privately owned firearms and ammunition will be transported in the following manner: (1) Weapons, other than weapons being transported into Fort Lewis for the first time, may...
3 CFR - Continuation of Emergency With Respect to Weapons of Mass Destruction
Code of Federal Regulations, 2010 CFR
2010-01-01
... 3 The President 1 2010-01-01 2010-01-01 false Continuation of Emergency With Respect to Weapons of... Continuation of Emergency With Respect to Weapons of Mass Destruction On November 14, 1994, by Executive Order... of nuclear, biological, and chemical weapons (weapons of mass destruction) and the means of...
Code of Federal Regulations, 2014 CFR
2014-01-01
... weapons, explosives, or other dangerous materials. § 1204.1005 Section § 1204.1005 Aeronautics and Space... Weapons or Dangerous Materials § 1204.1005 Unauthorized introduction of firearms or weapons, explosives... description of the consequences for unauthorized introduction of firearms or weapons, explosives, or other...
32 CFR 552.124 - Transportation of privately owned weapons and ammunition.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 3 2013-07-01 2013-07-01 false Transportation of privately owned weapons and... owned weapons and ammunition. (a) Privately owned firearms and ammunition will be transported in the following manner: (1) Weapons, other than weapons being transported into Fort Lewis for the first time, may...
36 CFR 1002.4 - Weapons, traps and nets.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 36 Parks, Forests, and Public Property 3 2014-07-01 2014-07-01 false Weapons, traps and nets. 1002... AND RECREATION § 1002.4 Weapons, traps and nets. (a)(1) Except as otherwise provided in this section, the following are prohibited: (i) Possessing a weapon, trap or net. (ii) Carrying a weapon, trap or...
32 CFR 552.122 - Personnel not authorized to possess or retain personal weapons.
Code of Federal Regulations, 2013 CFR
2013-07-01
... personal weapons. 552.122 Section 552.122 National Defense Department of Defense (Continued) DEPARTMENT OF... authorized to possess or retain personal weapons. (a) Possession, retention or storage of personal weapons or... enforcement officer authorized to carry the weapon under state or federal law, while on Fort Lewis or a sub...
32 CFR 552.122 - Personnel not authorized to possess or retain personal weapons.
Code of Federal Regulations, 2014 CFR
2014-07-01
... personal weapons. 552.122 Section 552.122 National Defense Department of Defense (Continued) DEPARTMENT OF... authorized to possess or retain personal weapons. (a) Possession, retention or storage of personal weapons or... enforcement officer authorized to carry the weapon under state or federal law, while on Fort Lewis or a sub...
32 CFR 552.124 - Transportation of privately owned weapons and ammunition.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 3 2010-07-01 2010-07-01 true Transportation of privately owned weapons and... owned weapons and ammunition. (a) Privately owned firearms and ammunition will be transported in the following manner: (1) Weapons, other than weapons being transported into Fort Lewis for the first time, may...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-25
... Proposed Rule on Enhanced Weapons, Firearms Background Checks, and Security Event Notifications AGENCY... the proposed enhanced weapons rule, the two draft regulatory guides, and the draft weapons safety.... No formal comments on the proposed enhanced weapons rule or the draft guidance documents will be...
15 CFR 742.18 - Chemical Weapons Convention (CWC or Convention).
Code of Federal Regulations, 2013 CFR
2013-01-01
... 15 Commerce and Foreign Trade 2 2013-01-01 2013-01-01 false Chemical Weapons Convention (CWC or... REGULATIONS CONTROL POLICY-CCL BASED CONTROLS § 742.18 Chemical Weapons Convention (CWC or Convention). States... Use of Chemical Weapons and on Their Destruction, also known as the Chemical Weapons Convention (CWC...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-03
... holders, and other stakeholders on a draft guidance document entitled ``Weapons Safety Assessment'' (WSA... weapons under the NRC's proposed rule titled ``Enhanced Weapons, Firearms Background Checks, and Security.... You should not include any site-specific security information in your comments. Federal rulemaking Web...
76 FR 70317 - Continuation of the National Emergency With Respect to Weapons of Mass Destruction
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-10
... proliferation of nuclear, biological, and chemical weapons (weapons of mass destruction) and the means of...--Continuation of the National Emergency With Respect to Weapons of Mass Destruction #0; #0; #0; Presidential... the National Emergency With Respect to Weapons of Mass Destruction On November 14, 1994, by Executive...
77 FR 66513 - Continuation of the National Emergency With Respect to Weapons of Mass Destruction
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-05
... proliferation of nuclear, biological, and chemical weapons (weapons of mass destruction) and the means of delivering such weapons. On July 28, 1998, the President issued Executive Order 13094 amending Executive... the National Emergency With Respect to Weapons of Mass Destruction On November 14, 1994, by Executive...
Pohjoismäki, Jaakko L O; Karhunen, Pekka J; Goebeler, Sirkka; Saukko, Pekka; Sääksjärvi, Ilari E
2010-06-15
Fly species that are commonly recovered on human corpses concealed in houses or other dwellings are often dependent on human created environments and might have special features in their biology that allow them to colonize indoor cadavers. In this study we describe nine typical cases involving forensically relevant flies on human remains found indoors in southern Finland. Eggs, larvae and puparia were reared to adult stage and determined to species. Of the five species found the most common were Lucilia sericata Meigen, Calliphora vicina Robineau-Desvoidy and Protophormia terraenovae Robineau-Desvoidy. The flesh fly Sarcophaga caerulescens Zetterstedt is reported for the first time to colonize human cadavers inside houses and a COI gene sequence based DNA barcode is provided for it to help facilitate identification in the future. Fly biology, colonization speed and the significance of indoors forensic entomological evidence are discussed. (c) 2010 Elsevier Ireland Ltd. All rights reserved.
Enhancing Energy in Future Conventional Munition
NASA Astrophysics Data System (ADS)
Peiris, Suhithi
2017-06-01
Future conventional weapons are envisioned to contain more energy per volume than current weapons. Current weapons comprise of inert steel outer case, with inner volume for energetic materials, fuzing, sensor package, propulsion system, etc. Recent research on reactive materials (RM) & new energetics, and exploiting additive manufacturing can optimize the use of both mass and volume to achieve much higher energy in future weapons. For instance, replacing inert steel with RM of similar strength, additively manufacturing fuzing packages within the weapon form factor, and combing the whole with new energetics, will enable the same lethality effects from smaller weapons as obtained from today's larger weapons. This paper will elaborate on reactive materials and properties necessary for optimal utilization in various weapon features, and touch on other aspects of enhancing energy in future conventional munition.
Why Sexually Selected Weapons Are Not Ornaments.
McCullough, Erin L; Miller, Christine W; Emlen, Douglas J
2016-10-01
The elaboration and diversification of sexually selected weapons remain poorly understood. We argue that progress in this topic has been hindered by a strong bias in sexual selection research, and a tendency for weapons to be conflated with ornaments used in mate choice. Here, we outline how male-male competition and female choice are distinct mechanisms of sexual selection, and why weapons and ornaments are fundamentally different types of traits. We call for research on the factors contributing to weapon divergence, the potential for male-male competition to drive speciation, and the specific use of weapons in the context of direct fights versus displays. Given that weapons are first and foremost fighting structures, biomechanical approaches are an especially promising direction for understanding weapon design. Copyright © 2016 Elsevier Ltd. All rights reserved.
Nuclear weapons modernizations
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kristensen, Hans M.
This article reviews the nuclear weapons modernization programs underway in the world's nine nuclear weapons states. It concludes that despite significant reductions in overall weapons inventories since the end of the Cold War, the pace of reductions is slowing - four of the nuclear weapons states are even increasing their arsenals, and all the nuclear weapons states are busy modernizing their remaining arsenals in what appears to be a dynamic and counterproductive nuclear competition. The author questions whether perpetual modernization combined with no specific plan for the elimination of nuclear weapons is consistent with the nuclear Non-Proliferation Treaty and concludesmore » that new limits on nuclear modernizations are needed.« less
Meddings, David R; O’Connor, Stephanie M
1999-01-01
Objective To examine the circumstances surrounding weapon injury and combatant status of those injured by weapons. Design Prospective cohort study. Setting Northwestern Cambodia after departure of United Nations peacekeeping force. Subjects 863 people admitted to hospital for weapon injuries over 12 months. Main outcome measures Annual incidence of weapon injury by time period; proportions of injuries inflicted as a result of interfactional combat (combat injuries) and outside such combat (non-combat injuries) by combatant status and weapon type. Results The annual incidence of weapon injuries was higher than the rate observed before the peacekeeping operation. 30% of weapon injuries occurred in contexts other than interfactional combat. Most commonly these were firearm injuries inflicted intentionally on civilians. Civilians accounted for 71% of those with non-combat injuries, 42% of those with combat related injuries, and 51% of those with weapon injuries of either type. Conclusions The incidence of weapon injuries remained high when the disarmament component of a peacekeeping operation achieved only limited success. Furthermore, injuries occurring outside the context of interfactional combat accounted for a substantial proportion of all weapon injuries, were experienced disproportionately by civilians, and were most likely to entail the intentional use of a firearm against a civilian. Key messagesThe study took place in Cambodia after a United Nations peacekeeping operation that achieved only limited success in disarmamentA substantial proportion of weapon injuries was inflicted in contexts unrelated to interfactional combatThese injuries were most commonly firearm injuries inflicted intentionally on civiliansWidespread availability of weapons can facilitate social violence PMID:10445922
Phenology largely explains taller grass at successful nests in greater sage-grouse.
Smith, Joseph T; Tack, Jason D; Doherty, Kevin E; Allred, Brady W; Maestas, Jeremy D; Berkeley, Lorelle I; Dettenmaier, Seth J; Messmer, Terry A; Naugle, David E
2018-01-01
Much interest lies in the identification of manageable habitat variables that affect key vital rates for species of concern. For ground-nesting birds, vegetation surrounding the nest may play an important role in mediating nest success by providing concealment from predators. Height of grasses surrounding the nest is thought to be a driver of nest survival in greater sage-grouse ( Centrocercus urophasianus ; sage-grouse), a species that has experienced widespread population declines throughout their range. However, a growing body of the literature has found that widely used field methods can produce misleading inference on the relationship between grass height and nest success. Specifically, it has been demonstrated that measuring concealment following nest fate (failure or hatch) introduces a temporal bias whereby successful nests are measured later in the season, on average, than failed nests. This sampling bias can produce inference suggesting a positive effect of grass height on nest survival, though the relationship arises due to the confounding effect of plant phenology, not an effect on predation risk. To test the generality of this finding for sage-grouse, we reanalyzed existing datasets comprising >800 sage-grouse nests from three independent studies across the range where there was a positive relationship found between grass height and nest survival, including two using methods now known to be biased. Correcting for phenology produced equivocal relationships between grass height and sage-grouse nest survival. Viewed in total, evidence for a ubiquitous biological effect of grass height on sage-grouse nest success across time and space is lacking. In light of these findings, a reevaluation of land management guidelines emphasizing specific grass height targets to promote nest success may be merited.
1993-08-01
effectiveness , estimate personnel attr;i"on, perform studies and analyses. or assess protective equipment for personnel. i II CAA-RP-93-3 DEPARTMENT OF THE...weapons or weapons effects that are difficult to localize are excluded from the 1-1 CAA-RP-93-3 scope of this paper Some examples of the types of weapons...or weapon effects excluded atr" .;i,nical weapons (encompassing war gases and other toxic substances, flame weapons. and biological agents), nuclear
Genetic calibration of species diversity among North America's freshwater fishes
April, Julien; Mayden, Richard L.; Hanner, Robert H.; Bernatchez, Louis
2011-01-01
Freshwater ecosystems are being heavily exploited and degraded by human activities all over the world, including in North America, where fishes and fisheries are strongly affected. Despite centuries of taxonomic inquiry, problems inherent to species identification continue to hamper the conservation of North American freshwater fishes. Indeed, nearly 10% of species diversity is thought to remain undescribed. To provide an independent calibration of taxonomic uncertainty and to establish a more accessible molecular identification key for its application, we generated a standard reference library of mtDNA sequences (DNA barcodes) derived from expert-identified museum specimens for 752 North American freshwater fish species. This study demonstrates that 90% of known species can be delineated using barcodes. Moreover, it reveals numerous genetic discontinuities indicative of independently evolving lineages within described species, which points to the presence of morphologically cryptic diversity. From the 752 species analyzed, our survey flagged 138 named species that represent as many as 347 candidate species, which suggests a 28% increase in species diversity. In contrast, several species of parasitic and nonparasitic lampreys lack such discontinuity and may represent alternative life history strategies within single species. Therefore, it appears that the current North American freshwater fish taxonomy at the species level significantly conceals diversity in some groups, although artificially creating diversity in others. In addition to providing an easily accessible digital identification system, this study identifies 151 fish species for which taxonomic revision is required. PMID:21670289
Medical makeup for concealing facial scars.
Mee, Donna; Wong, Brian J F
2012-10-01
Surgical, laser, and pharmacological therapies are all used to correct scars and surgical incisions, though have limits with respect to how well facial skin can be restored or enhanced. The use of cosmetics has long been a relevant adjunct to all scar treatment modalities. In recent years, technical advancements in the chemistry and composition of cosmetic products have provided the patient with a broader range of products to employ for concealing scars. This review will provide an overview of contemporary methods for concealing facial scars, birthmarks, and pigmentary changes without the use of traditional/dated, heavy appearing camouflage products. Additionally, general guidelines and information will be provided with respect to identifying competent makeup artists for care of the medical patient. The article by no means is meant to be a tutorial, but rather serves as a starting point in this allied field of medicine. Thieme Medical Publishers 333 Seventh Avenue, New York, NY 10001, USA.
A Poor Man's Nuclear Deterrent: Assessing the Value of Radiological Weapons for State Actors
NASA Astrophysics Data System (ADS)
Donohue, Nathan
The threat of weapons of mass destruction is an issue which remains at the forefront on national security. Nuclear, chemical, and biological weapons are all considered very dangerous by both state and non-state actors. Radiological weapons exist in that same category yet are not held in the same regard; the reason that is given is that these types of weapons are not the weapons of mass destruction that the other three are. Instead, radiological weapons are better considered weapons of mass disruption. Accordingly, in the academic and policy literature there has been very little perceived value associated with such weapons for use by state actors. However the historical focus on the military efficacy of radiological weapons has obscured the obvious truth that they may pose significant value for state actors. What this research shows is that the explosion of a radiological weapon could disrupt a target area in ways which could cripple the economy of an adversary state and promote widespread fear concerning exposure to radiation. Any such attack would not only necessitate large scale evacuation, but cleanup, decontamination, demolition, territory exclusion, and relocation. Moreover, the effects of such an attack would be unlikely to remain an isolated event as evacuated and displaced citizens spread across the nation carrying both fear and residual radiation. All of these factors would only be compounded by a state actor's ability to not only develop such weapons, but to manufacture them in such a composition that contemporary examples of such weapons grossly underestimate their impact. Accordingly, radiological weapons could hold great value for any state actor wishing to pursue their development and to threaten their use. Moreover, "while RDDs may not be well suited as "military weapons" in the classic sense, the use of RDDs could be powerfully coercive."1 In that sense, state actors could even acquire radiological weapons for their deterrent value. 1James L. Ford, "Radiological Dispersal Devices: Assessing the Transnational Threat," Strategic Forum, No. 136, (March 1998), March 29, 2012, http://www.au.af.mil/au/awc/awcgate/ndu/forum136.htm.
36 CFR § 1002.4 - Weapons, traps and nets.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 36 Parks, Forests, and Public Property 3 2013-07-01 2012-07-01 true Weapons, traps and nets. Â... USE AND RECREATION § 1002.4 Weapons, traps and nets. (a)(1) Except as otherwise provided in this section, the following are prohibited: (i) Possessing a weapon, trap or net. (ii) Carrying a weapon, trap...
ERIC Educational Resources Information Center
McClintock, Michael; And Others
This collection of articles includes a general account of the environmental effects of modern weapons technology, a selection of news reports demonstrating the peacetime hazards of chemical and biological weapons, data on the physiological effects of the most common chemical weapons, a discussion of the hazards of biological weapons, a report of…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-12
... economy of the United States posed by the proliferation of nuclear, biological, and chemical weapons (weapons of mass destruction) and the means of delivering such weapons. On July 28, 1998, the President... November 7, 2013 Continuation of the National Emergency With Respect to the Proliferation of Weapons of...
Multiple exaggerated weapon morphs: a novel form of male polymorphism in harvestmen.
Painting, Christina J; Probert, Anna F; Townsend, Daniel J; Holwell, Gregory I
2015-11-06
Alternative reproductive tactics in animals are commonly associated with distinct male phenotypes resulting in polymorphism of sexually selected weapons such as horns and spines. Typically, morphs are divided between small (unarmed) and large (armed) males according to one or more developmental thresholds in association with body size. Here, we describe remarkable weapon trimorphism within a single species, where two exaggerated weapon morphs and a third morph with reduced weaponry are present. Male Pantopsalis cheliferoides harvestmen display exaggerated chelicerae (jaws) which are highly variable in length among individuals. Across the same body size spectrum, however, some males belong to a distinct second exaggerated morph which possesses short, broad chelicerae. Multiple weapon morphs in a single species is a previously unknown phenomenon and our findings have significant implications for understanding weapon diversity and maintenance of polymorphism. Specifically, this species will be a valuable model for testing how weapons diverge by being able to test directly for the circumstances under which a certain weapon type is favoured and how weapon shape relates to performance.
Taylor, J Eric T; Witt, Jessica K; Pratt, Jay
2017-01-01
Attentional allocation is flexibly altered by action-related priorities. Given that tools - and specifically weapons - can affect attentional allocation, we asked whether training with a weapon or holding a weapon during search would affect change detection. In three experiments, participants searched for changes to agents, shootable objects, or environments in the popular flicker paradigm. Participants trained with a simulated weapon or watched a video from the same training perspective and then searched for changes while holding a weapon or a control object. Results show an effect of training, highlighting the importance of sensorimotor experience for the action-relevant allocation of attention, and a possible interaction between training and the object held during search. Simulated training with ballistic weapons reduces change blindness. This result has implications for the interaction between tool use and attentional allocation.
Plasma Physics Challenges of MM-to-THz and High Power Microwave Generation
NASA Astrophysics Data System (ADS)
Booske, John
2007-11-01
Homeland security and military defense technology considerations have stimulated intense interest in mobile, high power sources of millimeter-wave to terahertz regime electromagnetic radiation, from 0.1 to 10 THz. While sources at the low frequency end, i.e., the gyrotron, have been deployed or are being tested for diverse applications such as WARLOC radar and active denial systems, the challenges for higher frequency sources have yet to be completely met for applications including noninvasive sensing of concealed weapons and dangerous agents, high-data-rate communications, and high resolution spectroscopy and atmospheric sensing. The compact size requirements for many of these high frequency sources requires miniscule, micro-fabricated slow wave circuits with high rf ohmic losses. This necessitates electron beams with not only very small transverse dimensions but also very high current density for adequate gain. Thus, the emerging family of mm-to-THz e-beam-driven vacuum electronics devices share many of the same plasma physics challenges that currently confront ``classic'' high power microwave (HPM) generators [1] including bright electron sources, intense beam transport, energetic electron interaction with surfaces and rf air breakdown at output windows. Multidimensional theoretical and computational models are especially important for understanding and addressing these challenges. The contemporary plasma physics issues, recent achievements, as well as the opportunities and outlook on THz and HPM will be addressed. [1] R.J. Barker, J.H. Booske, N.C. Luhmann, and G.S. Nusinovich, Modern Microwave and Millimeter-Wave Power Electronics (IEEE/Wiley, 2005).
NASA Astrophysics Data System (ADS)
Sheen, David M.; Fernandes, Justin L.; Tedeschi, Jonathan R.; McMakin, Douglas L.; Jones, A. Mark; Lechelt, Wayne M.; Severtsen, Ronald H.
2013-05-01
Active millimeter-wave imaging is currently being used for personnel screening at airports and other high-security facilities. The cylindrical imaging techniques used in the deployed systems are based on licensed technology developed at the Pacific Northwest National Laboratory. The cylindrical and a related planar imaging technique form three-dimensional images by scanning a diverging beam swept frequency transceiver over a two-dimensional aperture and mathematically focusing or reconstructing the data into three-dimensional images of the person being screened. The resolution, clothing penetration, and image illumination quality obtained with these techniques can be significantly enhanced through the selection of the aperture size, antenna beamwidth, center frequency, and bandwidth. The lateral resolution can be improved by increasing the center frequency, or it can be increased with a larger antenna beamwidth. The wide beamwidth approach can significantly improve illumination quality relative to a higher frequency system. Additionally, a wide antenna beamwidth allows for operation at a lower center frequency resulting in less scattering and attenuation from the clothing. The depth resolution of the system can be improved by increasing the bandwidth. Utilization of extremely wide bandwidths of up to 30 GHz can result in depth resolution as fine as 5 mm. This wider bandwidth operation may allow for improved detection techniques based on high range resolution. In this paper, the results of an extensive imaging study that explored the advantages of using extremely wide beamwidth and bandwidth are presented, primarily for 10-40 GHz frequency band.
Fleming, Kevin K; Bandy, Carole L; Kimble, Matthew O
2010-01-01
The decision to shoot a gun engages executive control processes that can be biased by cultural stereotypes and perceived threat. The neural locus of the decision to shoot is likely to be found in the anterior cingulate cortex (ACC), where cognition and affect converge. Male military cadets at Norwich University (N=37) performed a weapon identification task in which they made rapid decisions to shoot when images of guns appeared briefly on a computer screen. Reaction times, error rates, and electroencephalogram (EEG) activity were recorded. Cadets reacted more quickly and accurately when guns were primed by images of Middle-Eastern males wearing traditional clothing. However, cadets also made more false positive errors when tools were primed by these images. Error-related negativity (ERN) was measured for each response. Deeper ERNs were found in the medial-frontal cortex following false positive responses. Cadets who made fewer errors also produced deeper ERNs, indicating stronger executive control. Pupil size was used to measure autonomic arousal related to perceived threat. Images of Middle-Eastern males in traditional clothing produced larger pupil sizes. An image of Osama bin Laden induced the largest pupil size, as would be predicted for the exemplar of Middle East terrorism. Cadets who showed greater increases in pupil size also made more false positive errors. Regression analyses were performed to evaluate predictions based on current models of perceived threat, stereotype activation, and cognitive control. Measures of pupil size (perceived threat) and ERN (cognitive control) explained significant proportions of the variance in false positive errors to Middle-Eastern males in traditional clothing, while measures of reaction time, signal detection response bias, and stimulus discriminability explained most of the remaining variance.
Fleming, Kevin K.; Bandy, Carole L.; Kimble, Matthew O.
2014-01-01
The decision to shoot engages executive control processes that can be biased by cultural stereotypes and perceived threat. The neural locus of the decision to shoot is likely to be found in the anterior cingulate cortex (ACC) where cognition and affect converge. Male military cadets at Norwich University (N=37) performed a weapon identification task in which they made rapid decisions to shoot when images of guns appeared briefly on a computer screen. Reaction times, error rates, and EEG activity were recorded. Cadets reacted more quickly and accurately when guns were primed by images of middle-eastern males wearing traditional clothing. However, cadets also made more false positive errors when tools were primed by these images. Error-related negativity (ERN) was measured for each response. Deeper ERN’s were found in the medial-frontal cortex following false positive responses. Cadets who made fewer errors also produced deeper ERN’s, indicating stronger executive control. Pupil size was used to measure autonomic arousal related to perceived threat. Images of middle-eastern males in traditional clothing produced larger pupil sizes. An image of Osama bin Laden induced the largest pupil size, as would be predicted for the exemplar of Middle East terrorism. Cadets who showed greater increases in pupil size also made more false positive errors. Regression analyses were performed to evaluate predictions based on current models of perceived threat, stereotype activation, and cognitive control. Measures of pupil size (perceived threat) and ERN (cognitive control) explained significant proportions of the variance in false positive errors to middle-eastern males in traditional clothing, while measures of reaction time, signal detection response bias, and stimulus discriminability explained most of the remaining variance. PMID:19813139